INSIDER-INFOS VON “GoMoPa”-GESCHÄDIGTEN ZU MAURISCHAT, BENNEWIRTZ, RESKI, VORNKAHL, EHLERS UND DEM REST DER-STASI-BANDE

http://www.privacy.li/forum/viewtopic.php?f=30&t=778

BREAKING NEWS – CIA drone kills U.S.-born al Qaeda cleric in Yemen

Anwar al-Awlaki, a U.S.-born cleric linked to al Qaeda's Yemen-based wing, gives a religious lecture in an unknown location in this still image taken from video released by Intelwire.com on September 30, 2011. Anwar al-Awlaki has been killed, Yemen's Defence Ministry said on Friday. A Yemeni security official said Awlaki, who is of Yemeni descent, was hit in a Friday morning air raid in the northern al-Jawf province that borders oil giant Saudi Arabia. REUTERS-Intelwire.com.
Police troopers stand guard on a police patrol vehicle outside a state security court during the trial in absentia of the U.S.-born radical cleric Anwar al-Awlaki in Sanaa November 6, 2010. REUTERS-Khaled Abdullah

1 of 2. Anwar al-Awlaki, a U.S.-born cleric linked to al Qaeda’s Yemen-based wing, gives a religious lecture in an unknown location in this still image taken from video released by Intelwire.com on September 30, 2011. Anwar al-Awlaki has been killed, Yemen’s Defence Ministry said on Friday. A Yemeni security official said Awlaki, who is of Yemeni descent, was hit in a Friday morning air raid in the northern al-Jawf province that borders oil giant Saudi Arabia.

Anwar al-Awlaki, a U.S.-born cleric linked to al Qaeda, was killed in a CIA drone strike in Yemen on Friday, U.S. officials said, removing a “global terrorist” high on a U.S. wanted list.

Awlaki’s killing deprives the Yemen-based al Qaeda in the Arabian Peninsula (AQAP) of an eloquent propagandist in English and Arabic who was implicated in attacks on the United States.

“He planned and directed attacks against the United States,” one U.S. official said. “In addition, Awlaki publicly urged attacks against U.S. persons and interests worldwide and called for violence against Arab governments he judged to be working against al Qaeda.”

Earlier in his career, Awlaki preached at mosques in the United States attended by some of the hijackers in the September 11, 2001 attacks by al Qaeda, whose leader, Osama bin Laden, was killed in a U.S. raid on his hideout in Pakistan in May.

Awlaki’s death could be a boon for U.S. President Barack Obama and for his Yemeni counterpart, Ali Abdullah Saleh, who is clinging to power despite months of popular protests, factional violence and international pressure.

A Yemeni government statement said Samir Khan, an American of Pakistani origin, and two others were killed with Awlaki. Khan, from North Carolina, was an editor of AQAP’s English-language online magazine Inspire, which often published Awlaki’s writings.

A Yemeni official said Awlaki had been located based on information obtained from a detained AQAP militant.

U.S. drone aircraft targeted but missed Awlaki in May. The United States has stepped up drone strikes in Yemen to try and keep al Qaeda off balance and prevent it from capitalizing on the strife and chaos gripping the nation that borders oil giant Saudi Arabia and lies near vital shipping routes.

“CHIEF OF EXTERNAL OPERATIONS”

A senior U.S. official said Awlaki had orchestrated attacks on U.S. interests as “chief of external operations” for AQAP.

“Awlaki played a significant operational role in the attempted attack on a U.S. airliner in December 2009 (and) helped oversee the October 2010 plot to detonate explosive devices aboard U.S. cargo aircraft,” the official said.

Washington also learned that Awlaki sought to use poisons including cyanide and ricin to attack Westerners and exchanged e-mails with a U.S. military psychiatrist later accused of killing 13 people at Fort Hood army base in Texas in 2009.

AQAP, which established itself in Yemen after Saudi Arabia defeated a violent al Qaeda campaign from 2003-6, has emerged as one of the network’s most ambitious wings, attempting daring, if unsuccessful, attacks on U.S. and Saudi targets.

Bin Laden’s al Qaeda made its first mark in Yemen with an attack that killed 17 U.S. sailors on the warship Cole in Aden harbor in 2000.

The Yemen embassy in Washington said Awlaki had been killed 8 km (five miles) from the town of Khashef in the northern province of Jawf, adjacent to Saudi Arabia, about 140 km east of Sanaa, at about 9:55 a.m. (0655 GMT).

AQAP has not acknowledged Awlaki’s death. It usually takes a few days to post an Internet response to such killings.

A tribal sheikh in Jawf said Awlaki and three other people had been killed. “We have retrieved their bodies. There was another car that had al Qaeda members inside it, but they were able to escape,” he said, asking not to be named.

A Yemeni official said more details would be announced once the surviving al Qaeda group had been tracked down.

HARD TO REPLACE

“If he is dead, Awlaki will be difficult to replace,” said Jeremy Binnie, a terrorism and insurgency analyst at IHS Jane’s in London. “It’s a blow for AQAP’s international operations. Awlaki has helped the group build its international profile.”

U.S. authorities have branded Awlaki a “global terrorist” and last year authorized his capture or killing, but Sanaa had previously appeared reluctant to act against him.

Awlaki was not a senior Islamic cleric, nor a commander of AQAP, which is led by a Yemeni named Nasser al-Wuhayshi, but he played a key role in the group’s global outreach.

“Awlaki’s death won’t hurt al Qaeda’s operations because he didn’t have a leadership role. But the organization has lost an important figure for recruiting people from afar,” said Said Obeid, a Yemeni analyst on al Qaeda.

Henry Wilkinson, head analyst at risk consultancy Janusian in London, said Awlaki’s demise would have little impact on AQAP’s local operations, but added: “He was a rare talent who could reach out and recruit and mobilize. If the U.S. have killed Awlaki, then they have achieved a major target.”

Yemen has been mired in turmoil after eight months of mass protests demanding that Saleh step down, something he has reiterated he will do only if his main rivals do not take over.

“Because if we transfer power and they are there, this will mean that we have given into a coup,” Saleh told The Washington Post and Time magazine in an interview published on Friday, a week after he made a surprise return from Saudi Arabia.

He had been recuperating in Riyadh from a June bomb attack on his Sanaa compound that badly burned and wounded him.

STALLED TALKS

His return halted talks over a Gulf-brokered transition plan that had been revived despite violence that has killed more than 100 people in Sanaa in the past two weeks.

Saleh’s troops have been fighting the forces of rebel General Ali Mohsen and those of tribal leader Sadeq al-Ahmar.

Saleh who has repeatedly shied away from signing a Gulf-brokered transition plan at the last minute, urged outside powers to have more patience in concluding the deal, saying:

“We are pressed by America and the international community to speed up the process of handing over power. And we know where power is going to go. It is going to al Qaeda, which is directly and completely linked to the Muslim Brotherhood.”

Opposition groups accuse Saleh of giving militants more leeway in a ploy to frighten Western powers and convince them that he is the best defense against al Qaeda.

“Awlaki serves the government as a way to scare the West,” said protest organizer Manea al-Mattari. “They want to improve their image in the West after all the killing they have done.”

Thousands of pro- and anti-Saleh demonstrators took to the streets of Sanaa again on Friday, the Muslim day of prayer.

Protesters carried 13 bodies, wrapped in Yemeni flags, of people killed in fighting in the capital this week. Asked about Awlaki’s death, one demonstrator said it was irrelevant.

“Nobody cared about his death today and we wonder why the government announced it now. We have much bigger problems than Anwar al-Awlaki,” said Fayza al-Suleimani, 29.

Gefälschter Lebenslauf von Klaus Maurischat-Pseudoym Siegfried Siewert – Partner von “Bennewirtz und Ehlers” – “CEO” DER STASI-“GoMoPa”

http://www.victims-opfer.com/?p=19616

 

http://www.victims-opfer.com/?p=19611

 

 

DIE WAHRHEIT – DAS SIND DIE ERPRESSER : “GoMoPa”-ERPRESST MERIDIAN CAPITAL “GoMoPa”-CEO MAURISCHAT WIRD VOM BKA VERHAFTET

DER BEWEIS: “GoMoPa”-ERPRESST MERIDIAN CAPITAL “GoMoPa”-CEO MAURISCHAT WIRD VOM BKA VERHAFTET

Millionen Finanzierungen mit Widersprüchen / Die Werbemethoden der Meridian Capital Enterprises

ORIGINAL ARTIKEL GOMOPA

ORIGINAL ARTIKEL GOMOPA 2

ZUM DOWNLOAD OBEN CLICKEN

Berlin (ots) – Die Meridian Capital Enterprises Ltd. bietet auf ihren Webseiten weltweite Finanzierungen an. GoMoPa hat die dort gemachten Angaben analysiert und starke Widersprüche entdeckt.

Die Unternehmensstruktur

Die Meridian Capital Enterprises Ltd. behauptet “ein Finanzinstitut” zu sein, “das zu einer internationalen Finanzgruppe gehört.” Diese Gruppe setze sich aus 11 verschiedenen Mitgliedern zusammen. GoMoPa fragte alle zuständigen Handelsregister ab. Ergebnis: 5 der 11 angegebenen Finanzinstitute sind nicht eingetragen.

Mitarbeiter der KLP Group Emirates, GoMoPa-Partner und Management-Gruppe in Dubai, machten sich die Mühe, drei weitere Geschäftsadressen der Meridian Capital Enterprises Ltd. zu überprüfen. Martin Kraeter, Prinzipal der KLP Group: “Alle 3 genannten Firmen existieren hier nicht, auch nicht in abgewandelter Form.”

Das Unternehmen will weltweit über zahlreiche Standorte verfügen. Bei denen handelt es sich allerdings lediglich um “Virtual Offices” eines Büroservice-Anbieters.

Laut Firmenhomepage hat das Unternehmen seinen “rechtlichen Geschäftssitz” in Dubai. In einem GoMoPa vorliegenden Schreiben der Meridian Capital Enterprises Ltd. heißt es jedoch, der Firmensitz sei in London. Auf der Homepage selbst tauchen zwei Londoner Adressen auf, die das Unternehmen als “Kundenabteilung für deutschsprachige Kunden” und “Abteilung der Zusammenarbeit mit Investoren” bezeichnet.

Die Meridian Capital Enterprises ist tatsächlich als “Limited” (Ltd.) mit Sitz in England und Wales eingetragen. Eine Abfrage beim Gewerbeamt Dubais (DED) zur Firmierung jedoch bleibt ergebnislos. Bemerkenswert ist auch der vermeintliche Sitz in Israel. Auf der Webseite von Meridian Capital Enterprises heißt es: “Die Firma Meridian Capital Enterprises Ltd. ist im Register des israelischen Justizministeriums unter der Nummer 514108471 (…) angemeldet.” Martin Kraeter hierzu: ” Ein ‘britisch-arabisch-israelisches bankfremdes Finanzinstitut sein zu wollen, wie die Meridian Capital Enterprises Ltd. es darstellt, ist mehr als zweifelhaft. Es würde keinem einzigen Emirati, geschweige denn einem ‘Scheich’, auch nur im Traum einfallen Geschäfte mit Personen oder Firmen aus Israel zu machen. “

Eigenartig ist auch: Zwei angebliche Großinvestitionen der Meridian Capital Enterprises in Dubai sind Investmentruinen bzw. erst gar nicht realisierte Projekte.

Der Aktivitätsstatus der Meridian Capital Enterprises Ltd. ist laut englischem Handelsregister als “dormant” gemeldet. Auf der Grundlage des britischen Gesellschaftsrechts können sich eingetragene Unternehmen selbst “dormant” (schlafend) melden, wenn sie keine oder nur unwesentliche buchhalterisch zu erfassende Transaktionen vorgenommen haben. Angesichts der angeblichen globalen Investitionstätigkeit der Meridian Capital Ltd. ist dieses jedoch sehr erstaunlich.

Auf ihrer Webseite gibt die Meridian Capital Enterprises Ltd. einen Überblick über ihre größten Investitionen in Deutschland: “Dithmarschen Wind Powerplant, Waldpolenz Solar Park, AIDAdiva, Berlin Hauptbahnhof, Sony Center”. Die Eigentümer des Sony Centers am Potsdamer Platz teilten GoMoPA mit, dass ihnen sei ein solcher Investor unbekannt sei. Meridian Capital Enterprises Ltd. will übrigens angeblich auch in die Erweiterung des Panama-Kanals sowie in das Olympiastadion in Peking investiert haben.

Der Webauftritt

Die Internetseite der MCE ist aufwendig gestaltet. Bei näherer Betrachtung fällt jedoch auf, dass es sich bei zahlreichen Fotos der Veranstaltungen der Meridian Capital Enterprises in den meisten Fällen um Bildmaterial von Online-Zeitungen oder frei zugänglichen Medienfotos einzelner Institutionen handelt.

Auf der Homepage befinden sich Videofilme, die eine verblüffende Ähnlichkeit mit dem Werbematerial von NAKHEEL aufweisen, dem größten Bauträger der Vereinigten Arabischen Emirate. Den schillernden Videos über die berühmten drei Dubai Palmen wurden offensichtlich selbstproduzierte Trailersequenzen der Meridian Capital Enterprises vorangestellt.

Ab einem Volumen von 10 Millionen Euro oder höher präsentiert sich so die Meridian Capital Enterprises Ltd. als der passende Investitionspartner. Auf der Internetseite sind diverse Fotos mit Scheichs an Konferenztischen zu sehen. Doch diese großen Tagungen und großen Kongresse der Meridian Capital Enterprises werden in den Pressearchiven der lokalen Presse Dubais mit keinem Wort erwähnt.

Vertiefende Information unter:

http://www.presseportal.de/go2/mehr_zu_MCE_ltd

Originaltext: GoMoPa GmbH Digitale Pressemappe: http://www.presseportal.de/pm/72697 Pressemappe via RSS : http://www.presseportal.de/rss/pm_72697.rss2

Pressekontakt: Herr Friedrich Wasserburg Telefon: +49 (30) 51060992 Fax: +49 (30) 51060994 Zuständigkeitsbereich: Presse

Firmeninfo Goldman Morgenstern & Partners LLC 575 Madison Avenue USA-10022 – 2511 New York http://www.gomopa.net

Über Goldman Morgenstern & Partners LLC: Ein Zusammenschluss aus Unternehmens-, Steuer-, Anlageberatern und Rechtsanwälten.
© 2008 news aktuell

DANN GING DIe ERPRESSUNG LOS UND MERIDIAN CAPITAL REAGIERTE – STATT DIES ABER ZUZUGEBEN SETZEN DIE STASI-VERBRECHER EINE GEFÄLSCHTE PRESSE-MITTEILUNG IN NETZ, DIE MICH BELASTEN SOLL

BITTE KONTAKTIEREN SIE AUCH MERIDIAN CAPITAL

sales@meridiancapital.com

1 Battery Park Plaza
New York, NY 10004
TEL: 212-972-3600
FAX: 212-612-0100

Hierzu  weitere Infos unter

Original Stellungnahme Meridian Capital gegen “GoMoPa” auf http://meridiancapital.wordpress.com/

Original Stellungnahme Meridian Capital gegen “GoMoPa” auf http://meridiancapital.wordpress.com

Skip navigation

Sehr geehrte Damen und Herren,

die Betrüger und durch uns inhaftierten Erpresser der GoMoPa versuchen mit einer gefälschten Presse-Mitteilung von usich abzulenken und einen investigativen Journalisten, Bernd Pulch, zu belasten.

Die Presse-Mitteilung auf pressreleaser.org ist eine Fälschung und die gesamte webseite ist der GoMoPa zu zuordnen.

Hier noch einmal die tatäschlichen Geschehnisse:

Hier der Artikel von “GoMoPa” über Meridian Capital.


Der Beweis: Erpressungsversuch des „NACHRICHTENDIENSTES“ GoMoPa“ an Meridian Capital „GoMopa“ schreibt:08.09.2008
Weltweite Finanzierungen mit WidersprüchenDie Meridian Capital Enterprises Ltd. gibt an, weltweite Finanzierungen anbieten zu können und präsentiert sich hierbei auf aufwendig kreierten Webseiten. GOMOPA hat die dort gemachten Angaben analysiert und Widersprüche entdeckt.Der FirmensitzDer Firmensitz befindet sich laut eigener Aussage in Dubai, Vereinigte Arabische Emirate. In einem GOMOPA vorliegenden Schreiben der Meridian Capital Enterprises Ltd. heißt es jedoch, der Firmensitz sei in London. Auf der Homepage des Unternehmens taucht die Geschäftsadresse in der Londoner Old Broad Street nur als „Kundenabteilung für deutschsprachige Kunden“ auf. Eine weitere Adresse in der englischen Hauptstadt, diesmal in der Windsor Avenue, sei die „Abteilung der Zusammenarbeit mit Investoren“.Die Meridian Capital Enterprises ist tatsächlich als „Limited“ (Ltd.) mit Sitz in England und Wales eingetragen. Aber laut Firmenhomepage hat das Unternehmen seinen „rechtlichen Geschäftssitz“ in Dubai. Eine Abfrage beim Gewerbeamt Dubais (DED) zu dieser Firmierung bleibt ergebnislos.

Bemerkenswert ist auch der vermeintliche Sitz in Israel. Auf der Webseite von Meridian Capital Enterprises heißt es: „Die Firma Meridian Capital Enterprises Ltd. ist im Register des israelischen Justizministeriums unter der Nummer 514108471, gemäß dem Gesellschaftsrecht von 1999, angemeldet.“ Hierzu Martin Kraeter, Gomopa-Partner und Prinzipal der KLP Group Emirates in Dubai: „Es würde keinem einzigen Emirati – geschweige denn einem Scheich auch nur im Traum einfallen, direkte Geschäfte mit Personen oder Firmen aus Israel zu tätigen. Und schon gar nicht würde er zustimmen, dass sein Konterfei auch noch mit vollem Namen auf der Webseite eines Israelischen Unternehmens prangt.“

Auf der Internetseite sind diverse Fotos mit Scheichs an Konferenztischen zu sehen. Doch diese großen Tagungen und großen Kongresse der Meridian Capital Enterprises werden in den Pressearchiven der lokalen Presse Dubais mit keinem Wort erwähnt.
Martin Kraeter: „ Ein ‚britisch-arabisch-israelisches bankfremdes Finanzinstitut sein zu wollen, wie die Meridian Capital Enterprises Ltd. es darstellt, ist mehr als zweifelhaft. So etwas gibt es schlicht und ergreifend nicht! Der Nahostkonflikt schwelt schon seit mehr als 50 Jahren. Hier in den Vereinigten Arabischen Emiraten (VAE) werden Israelis erst gar nicht ins Land gelassen. Israelische Produkte sind gebannt. Es gibt nicht einmal direkte Telefonverbindungen. Die VAE haben fast 70% der Wiederaufbaukosten des Libanon geschultert, nachdem Israel dort einmarschiert ist.“

Zwei angebliche Großinvestitionen der Meridian Capital Enterprises in Dubai sind Investmentruinen bzw. erst gar nicht realisierte Projekte. Das Unternehmen wirbt mit ihrer finanziellen Beteiligung an dem Dubai Hydropolis Hotel und dem Dubai Snowdome.

Der Aktivitätsstatus der Meridian Capital Enterprises Ltd. ist laut englischen Handelsregister (UK Companies House) „dormant“ gemeldet. Auf der Grundlage des englischen Gesellschaftsrechts können sich eingetragene Unternehmen selbst „dormant“ (schlafend) melden, wenn sie keine oder nur unwesentliche buchhalterisch zu erfassende Transaktionen vorgenommen haben. Dies ist angesichts der angeblichen globalen Investitionstätigkeit der Meridian Capital Ltd. sehr erstaunlich.

Der Webauftritt

Die Internetseite der MCE ist sehr aufwendig gestaltet, die Investitionen angeblich in Millionen- und Milliardenhöhe. Bei näherer Betrachtung der Präsentationselemente fällt jedoch auf, dass es sich bei zahlreichen veröffentlichen Fotos, die Veranstaltungen der Meridian Capital Enterprises dokumentieren sollen, meist um Fotos von Online-Zeitungen oder frei zugänglichen Medienfotos einzelner Institutionen handelt wie z.B. der Börse Dubai.

Auf der Internetpräsenz befinden sich Videofilmchen, die eine frappierende Ähnlichkeit mit dem Werbematerial von NAKHEEL aufweisen, dem größten Bauträger der Vereinigten Arabischen Emirate. Doch den schillernden Videos über die berühmten drei Dubai Palmen „Jumeirah, Jebel Ali und Deira“ oder das Archipel „The World“ wurden offensichtlich selbstproduzierte Trailersequenzen der Meridian Capital Enterprises vorangestellt. Doch könnte es sich bei den Werbevideos um Fremdmaterial handeln.

Auch die auf der Webseite wahllos platzierten Fotos von bekannten Sehenswürdigkeiten Dubais fungieren als Augenfang für den interessierten Surfer mit eigenem Finanzierungswunsch. Bei einem Volumen von 10 Millionen Euro oder höher präsentiert sich die Meridian Capital Enterprises Ltd. als der passende Investitionspartner. Das Unternehmen verfügt weltweit über zahlreiche Standorte: Berlin, London, Barcelona, Warschau, Moskau, Dubai, Riad, Tel Aviv, Hong Kong und New York. Aber nahezu alle Standorte sind lediglich Virtual Offices eines global arbeitenden Büroservice-Anbieters. „Virtual Office“ heißt im Deutschen schlicht „Briefkastenfirma“. Unter solchen Büroadressen sollen laut Meridian Capital Enterprises ganze Kommissionen ansässig sein, alles zum Wohle des Kunden.“

Zitatende

Hier die Hintergründe der Erpressung:

http://www.immobilien-vertraulich.com/law/7154-opfer-nach-immovation-und-estavis-versucht-gomopa-nun-dkb-zu-erpressen-gomopa-hintermann-ra-resch.html

Hier unsere Original-Stellungnahme:

Anfang Oktober 2008 erhielt einer der Arbeiter der Meridian Capital Enterprises Ltd. eine Meldung von einem anonymen Sender, dass in naher Zukunft – zuerst im Internet, dann im Fernsehen, im Radio und in der deutschen Presse – Informationen erscheinen, die die Funktionsweise und Tätigkeiten der Meridian Capital Enterprises Ltd. in einem äußerst negativen Licht darstellen. Der Mitarbeiter der Meridian Capital Enterprises Ltd. wurde also informiert, dass diese Meldungen/Nachrichten zweifelsohne deutlich das Aussehen und den guten Ruf der Firma Meridian Capital Enterprises Ltd. beeinträchtigen.
Der an dieser Stelle erwähnte „Gesprächspartner” hat den Arbeiter der Meridian Capital Enterprises Ltd. informiert, dass die Möglichkeit besteht die peinliche Situation zu vermeiden, indem die Meridian Capital Enterprises Ltd. auf das von der Person gezeigte Konto die Summe von 100.000,00 EUR überweist. Wie sich aber später zeigte, war der Herr Klaus Maurischat – dieser anonyme Gesprächspartner – „Gehirn“ und „Lider des GOMOPA“. Die Ermittlungen wurden angestellt durch die Bundeskriminalpolizei (Verfolgungs- und Ermittlungsorgan auf der Bundesebene) während des Ermittlungsverfahrens wegen einer finanziellen Erpressung, Betrügereien auch wegen der Bedrohungen, welche von Herrn Maurischat und seine Mitarbeiter praktiziert wurden sowie wegen Teilnahme anderer (Leiter der Internetservices und Moderatoren der Blogs) an diesem Prozedere. Diese Straftaten wurden begangen zu Schaden vieler Berufs- und Justizpersonen, darunter auch der Meridian Capital Enterprises Ltd. Die Opfer dieses Verbrechens sind in Deutschland, Österreich, der Schweiz, Spanien, Portugal, Großbritannien, den USA und Kanada sichtbar.
In diesem Moment taucht folgende Frage auf: Wie war die Reaktion der Meridian Capital Enterprises Ltd. auf die Forderungen seitens GOMOPA? Entsprach die Reaktion den Erwartungen von GOMOPA? Hat die Meridian Capital Enterprises Ltd. die geforderte Summe 100.000,00 EUR überwiesen?
Seites der Meridian Capital Enterprises Ltd. gab es überhaupt keine Reaktion auf den Erpressungsversuch von GOMOPA. Ende August 2008 auf dem Service http://www.gompa.net sind zahlreiche Artikel/Meldungen erscheinen, welche die Tätigkeit der Meridian Capital Enterprises Ltd. in einem sehr negativen Licht dargestellt haben. Nachdem die auf http://www.gomopa.net enthaltenen Informationen ausführlich und vollständig analysiert worden waren, ergab es sich, dass sie der Wahrheit nicht einmal in einem Punkt entsprechen und potenzielle und bereits bestehende Kunden der Meridian Capital Enterprises Ltd. in Bezug auf die von diesem Finanzinstitut geführten Geschäftstätigkeit irreführen. Infolge der kriminellen Handlugen von GOMOPA und der mit ihm kooperierenden Services und Blogs im Netz hat die Meridian Capital Enterprises Ltd. beachtliche und messbare geschäftliche Verluste erlitten. Die Meridian Capital Enterprises Ltd. hat nämlich in erster Linie eine wichtige Gruppe von potenziellen Kund verloren. Was sich aber als wichtiger ergab, haben sich die bisherigen Kunden von der Meridian Capital Enterprises Ltd. kaum abgewandt. Diejenigen Kunden haben unsere Dienstleitungen weiterhin genutzt und nutzen die immer noch. In Hinblick auf die bisherige Zusammenarbeit mit der Meridian Capital Enterprises Ltd., werden ihrerseits dem entsprechend keine Einwände erhoben .
GOMOPA hat so einen Verlauf der Ereignisse genau prognostiziert, dessen Ziel beachtliche und messbare geschäftliche durch die Meridian Capital Enterprises Ltd. erlittene Verluste waren. Der Verlauf der Ereignisse hat das Service GOMOPA mit Sicherheit gefreut. GOMOPA hat nämlich darauf gerechnet, dass die Stellung der Meridian Capital Enterprises Ltd. nachlässt und das Finanzinstitut die geforderte Summe (100.000,00 EUR) bereitstellt. Im Laufe der Zeit, als das ganze Prozedere im Netz immer populärer war, versuchte GOMOPA noch vier mal zu der Meridian Capital Enterprises Ltd. Kontakte aufzunehmen, indem es jedes mal das Einstellen dieser kriminellen „Kompanie” versprochen hat, wobei es jedes mal seine finanziellen Forderungen heraufsetzte. Die letzte für das Einstellen der „Kompanie“ gegen die Meridian Capital Enterprises Ltd. vorgesehene Quote betrug sogar 5.000.000,00 EUR (in Worten: fünfmilionen EURO). Die Meridian Capital Enterprises Ltd. konnte sich aber vor den ständig erhöhenden Forderungen seitens des Services GOMOPA behaupten.
Im Oktober 2008 traf die Leitung der Meridian Capital Enterprises Ltd. Entscheidung über die Benachrichtigung der Internationalen Polizei INTERPOL sowie entsprechender Strafverfolgungsorgane der BRD (die Polizei und die Staatsanwaltschaft) über den bestehenden Sachverhalt. In der Zwischenzeit meldeten sich bei der Meridian Capital Enterprises Ltd. zahlreiche Firmen und Korporationen, sogar Berufsperson wie Ärzte, Richter, Priester, Schauspieler und anderen Personen aus unterschiedlichen Ländern der Welt, die der Erpressung von GOMOPA nachgegeben und die geforderten Geldsummen überwiesen haben. Diese Personen gaben bereits Erklärungen ab, dass sie dies getan haben, damit man sie bloß endlich „in Ruhe lässt” und um unnötige Probleme, Schwierigkeiten und einen kaum begründbaren Ausklang vermeiden zu können. Die Opfer dieses kriminellen Vorgehens haben die Meridian Capital Enterprises Ltd. über unterschiedliche Geldsummen, welche verlangt wurden, informiert.
In einem Fall gab es verhältnismäßig kleine (um ein paar tausend EURO), in einem anderen Fall handelte es schon um beachtliche Summen (rund um paar Millionen EURO).
Zusätzlich wendeten sich an die Meridian Capital Enterprises Ltd. Firmen, welche dem GOMOPA noch keine „Gebühr” überweisen haben und bereits überlegen, ob sie dies tun sollen, oder nicht. Diese Firmen erwarteten von der Meridian Capital Enterprises Ltd. eine klare Stellungnahme sowie eine professionelle praktische Beratung, wie man sich in solch einer Lage verhalten soll und wie man diese Geldforderungen umgehen kann. Die Meridian Capital Enterprises Ltd. hat ausnahmslos allen Verbrechensopfern, welche sich bei unserer Firma gemeldet haben, eine Zusammenarbeit vorgeschlagen. Als oberste Aufgabe stellt sich diese Kooperation, gemeinsam entschlossene und wirksame Maßnahmen gegen GOMOPA, gegen andere Services im Netz sowie gegen alle Bloggers zu treffen, die an dem hier beschriebenen internationalen kriminellen Vorgehen mit GOMOPA-Führung teilnehmen.Auf unsere Bitte benachrichtigten alle mitbeteiligten Firmen die Internationale Polizei INTERPOL sowie ihre heimischen Verfolgungsorgane, u. a. die zuständige Staatsanwaltschaft und die Polizeibehörden über den bestehenden Sachverhalt.
In Hinblick auf die Tatsache, dass das verbrecherische Handeln von GOMOPA sich über viele Staaten erstreckte und dass die Anzahl der in der Bundesrepublik Deutschland erstatteten Anzeigen wegen der durch GOMOPA, Internetservices und Bloggers begangenen Straftaten, rasant wuchs – was zweifelsohne von einer weit gehenden kriminellen Wirkungskraft des GOMOPA zeugt – schlug die Internationale Wirtschaftspolizei INTERPOL der Meridian Capital Enterprises Ltd. vor, dass sich ihr Vertreter in Berlin mit dem Vertreter von GOMOPA trifft, um die „Zahlungsmodalitäten“ und Überweisung der Summe von 5.000.000,00 EUR zu besprechen. Dieser Schritt meinte, eine gut durchdachte und durch die Bundeskriminalpolizei organisierte Falle durchzuführen, deren Ziel die Festnahme der unter GOMOPA wirkenden internationalen Straftäter war.
Die koordinierten Schritte und Maßnahmen der Meridian Capital Enterprises Ltd. und anderer Beschädigter, geleitet von der Internationalen Wirtschaftspolizei INTERPOL, dem Bundeskriminalamt und der Staatsanwaltschaft der Bundesrepublik Deutschland haben zur Aus-, Einarbeitung und Durchführung der oben beschriebenen Falle beigetragen. Im November 2008 führte die in Berlin vorbereitete Falle zur Festnahme und Verhaftung des Vertreters des GOMOPA, der nach der Festnahme auf Herrn Klaus Maurichat – als den Hauptverantwortlichen und Anführer der internationalen kriminellen Gruppe GOMOPA verwies. Der Festgenommene benannte und zeigte der Bundeskriminalpolizei zugleich den aktuellen Aufenthaltsort des Herrn Klaus Maurischat. „Gehirn“ und Gründer dieser internationalen kriminellen Gruppe GOMOPA, Herr Klaus Maurischat wurde am selben Tag auch festgenommen und auf Frist verhaftet, wird bald in Anklagezustand gestellt, wird die Verantwortung für eigene Straftaten und die des Forums GOMOPA vor einem zuständigen Bundesgericht tragen. Die Meridian Capital Enterprises Ltd. unternahm bereits alle möglichen Schritte, damit Herr Klaus Maurischat auch auf der Anklagebank des zuständigen Gerichts des Vereinigten Königsreiches Großbritannien erscheint. Unter den beschädigten Berufs- und Justizpersonen aus Großbritannien, neben der Meridian Capital Enterprises Ltd. gibt es noch viele Opfer von GOMOPA…

Die dreisten Verbrecher wagen es unter http://www.pressreleaser.org, einer eigenen “GoMoPa”-Seite unsere Pressemitteilung oben zu verfälschen und unschuldige Personen zu belasten.

Dear Readers,

after a thorough research we are sure that the real “GoMoPa” boss is Jochen Resch, lawyer in Berlin, Germany. He is the brain behind “GoMoPa” and responsable for blackmailing, extortion, racketeering, cybermurder and murder – in the tradition of the East German “Inteeligence” STASI that is why he called “GoMoPa” – Financial “Intelligence” Service .

Webmaster

Meridian Capital about GoMoPa

Meridian Capital Enterprises Ltd.. unveils new criminal phenomena in network. In recently appeared on the net more often at the same time a new a very worrying phenomenon of criminal nature. Professional criminals groups in the network are taking part, to extortion, fraud, Erschwindeln relating to certain specifically selected companies and businesses are capable of. These criminals developed new methods and means, simply and in a short time to bereichern.Strategien and manifestations, which underlie this process are fairly simple. A criminal is looking to “carefully” on the Internet specific companies and corporations (victims of crime) and informed them in the next step, that of the business activities of such companies and corporations in the near future – first on the Internet then in other available mass media – numerous and very unfavorable information appears. At the same time, the criminals beat their future victims an effective means of reducing unnecessary difficulties and problems to escape the loss of good name and image of the company and corporate sector. These offenders are aware of that reputation, name and appearance of each company is a value in itself. It was therefore a value of what each company is prepared to pay any price. But the reason for difficulties and problems arising from the loss of good name and reputation result. The criminals and their victims are already aware that this loss is devastating consequences might have been the closing down of a particular business can enforce. It takes both to No as well as at large companies regard. The company is concerned that in virtually every industry in each country and cross-border activities sind.Das criminal procedure in the form of a blackmail on money, a fraud is becoming rapidly and globally, ie led cross-border and internationally. Among the victims of extortion, fraud is now looking both at home (domestic) and international corporations, the major emphasis on conservation, keeping and maintaining their reputation in the business according to their credibility lay. The criminals in the network have understood that maintaining an unassailable reputation and name of a company the unique ability to provide fast and easy enrichment forms. The above-mentioned criminal procedure is difficult to track because it is international in nature, and by overlapping or even nonexistent (fictional) professional and judicial persons in various countries and operated company wird.Diese offenders in the network publish it and disseminate false information about your victims on remote servers, which are not uncommon in many exotic countries. There are those countries in which serious gaps in the legal system, investigative and prosecution procedures are visible. As an example, at this point mention India werden. Mit criminals working in the network grid portals known leader of blogs with your seat-consciously or unconsciously, even in highly developed countries. For example, at this point, countries such as Germany, Austria, Switzerland, the United States, Britain, Spain or Portugal are mentioned. The below listed criminals were able to act unpunished today. As a symptom of such action appears here the activity and “effectiveness” of the company GOMOPA, which is on countries such as Germany, Switzerland, Austria, the United States, Britain, Spain and India. A good example of such an action is Mr. Klaus Mauri Chat – the leader and “brain” of the company GOMOPA with many already in force and criminal judgments “on his account”, which in this way for years and funded its maintenance in the industry almost unlimited activity. This status will change dramatically, however, including far and wide thanks to discontinued operations of the firm Meridian Capital Enterprises Ltd.. who would oppose such offenses addressed in the network. Other companies and corporations, in which the crime network and outside of this medium have fallen victim to contribute to combating such crimes bei.Die situation is changing, thanks to effective steps and the successful cooperation of the firm Meridian Capital Enterprises Ltd.. with the international police Interpol, with the federal agency (FBI) in the U.S., the Federal Criminal Police in Germany, with Scotland Yard in Britain, as well as with the Russian secret service FSB.Die Meridian Capital Enterprises Ltd.. – Together with other companies and cooperations, the victim of criminal activities of the network of crime have fallen – has undeniably already started to yield results. The fact that in recent weeks (November 2008) on the territory of the Federal Republic of Germany of the above-mentioned leaders and “brain” of the company GOMOPA, Mr Klaus Maurishat was arrested should not be ignored. The Meridian Capital Enterprises Ltd.. information available results clearly show that the next arrests of persons participating in this process in such countries as: Austria, Switzerland, Russia, Ukraine, Poland, Spain, Mexico, Portugal, Brazil, the USA, Canada, UK, Ireland , Australia, New Zealand and made in a.. The ultimate goal of Meridian Capital Enterprises Ltd.. and the other victims of crime in the network is to provide all participants in this criminal procedure before the competent court to lead. All professional and judicial persons, regardless of the seat and out of the business, which the above-described criminal action (fraud, extortion) to have fallen victim can of Meridian Capital Enterprises Ltd.. led company to join the goal set at all at this point the procedure described those associated in the public and the economic life out. II blacklist blackmail and with international fraudsters and their methods (opus operandi) in the following countries: 1 The Federal Republic Deutschland2. Dubai 3rd Russia 1st The Federal Republic of Germany GmbH GOMOPA, Goldman Morgenstern & Partners LLC., Goldman Morgenstern & Partners Consulting LLC, Wottle collection. In these firms are quite active following persons: – Klaus Mauri Chat ( “Father” and “brain” of the criminal organization responsible for countless final judgments have been achieved (arrested in Germany in November 2008) – Josef Rudolf Heckel ( “right hand “when Mr Klaus Mauri chat, denounced former banker who is excessive in many Bankschmuggeleien was involved.
The study of 900 pages named Toxdat by Ehrenfried Stelzer is the “Stasi Killer Bible”. It lists all kind of murder methods and concentrates on the most effective and untraceable.
“The toxdat study was ordered by Stasi Vice-President Gerhard Neiber, the second man in rank after boss Erich Mielke. The toxdat study was also the theoretical “story book” for the murder of the famous German watchdog and journalist Heinz Gerlach by former Stasi member under the guidance of “GoMoPa”,” an informer stated. “Ehrenfried stelzer” was nicknamed “Professor Murder” by his victims. Even close co-worker now compare him with the German SS”doctor” Mengele, “Dr. Death” from Auschwitz.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution.

For more Information the victims have launched a new site: http://www.victims-opfer.com

The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.
Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.
The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.
This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelzner, Berlin.
Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror Regime in Eastern Germany.
Furthermore the Stasi Top Agent Ehrenfried Stelzer disguised as Professor for Criminal studies during the Communist Regime at the Eastern Berlin Humboldt University.
Background:
The man behind the Berlin lawyer Jochen Resch and his activities is Ehrenfried Stelzer, former Stasi Top officer in Berlin and “Professor for Criminal Studies” at the Eastern Berlin Humboldt University during the Communist regime, the SJB-GoMoPa-victims say (www.sjb-fonds-opfer.com) is responsable for the killing of German watchdog and journalist Heinz Gerlach.
These informations stem from various sources who were close to the criminal organization of GoMoPa in the last years. The SJB-GoMoPa say that the well-known German watchdog and journalist Heinz Gerlach was killed by former Stasi members with dioxins. Polychlorinated dibenzodioxins (PCDDs), or simply dioxins, are a group of organic polyhalogenated compounds that are significant because they act as environmental pollutants. They are commonly referred to as dioxins for simplicity in scientific publications because every PCDD molecule contains a dioxin skeletal structure. Typically, the p-dioxin skeleton is at the core of a PCDD molecule, giving the molecule a dibenzo-p-dioxin ring system. Members of the PCDD family have been shown to bioaccumulate in humans and wildlife due to their lipophilic properties, and are known teratogens, mutagens, and confirmed (avered) human carcinogens. They are organic compounds.
Dioxins build up primarily in fatty tissues over time (bioaccumulate), so even small exposures may eventually reach dangerous levels. In 1994, the US EPA reported that dioxins are a probable carcinogen, but noted that non-cancer effects (reproduction and sexual development, immune system) may pose an even greater threat to human health. TCDD, the most toxic of the dibenzodioxins, is classified as a Group 1 carcinogen by the International Agency for Research on Cancer (IARC).
In 2004, a notable individual case of dioxin poisoning, Ukrainian politician Viktor Yushchenko was exposed to the second-largest measured dose of dioxins, according to the reports of the physicians responsible for diagnosing him. This is the first known case of a single high dose of TCDD dioxin poisoning, and was diagnosed only after a toxicologist recognized the symptoms of chloracne while viewing television news coverage of his condition.
German dioxin scandal: In January 2011 about 4700 German farms were banned from making deliveries after tests at the Harles und Jentzsch plant in the state of Schleswig-Holstein showed high levels of dioxin. Again this incident appears to involve PCBs and not PCDDs at all. Dioxin were found in animal feed and eggs in many farms. The person who is responsible for this, Siegfried Sievert is also a former Stasi Agent. At “GoMoPa” the notorious Eastern-Berlin press agency (see article below) one of the henchmen acted under the name of “Siegfried Siewert”.
Further evidence for the killing of Mr.Heinz Gerlach is provided by the SJB-GoMoPa-victims by analyzing the dubious role of former Stasi-Top-agent Ehrenfried Stelzer, also a former “Professor for Crime Studies” under the Communist regime in Eastern Germany and the dubious role of “detective” Medard Fuchsgruber. Both are closely tied to the dubious “GoMoPa” and Berlin lawyer Jochen Resch.
According to the SJB-GoMoPa-victims is Berlin lawyer Jochen Resch the mastermind of the criminal organization “GoMoPa2. The victims state that they have a source inside “GoMoPa” who helped them discover  the shocking truth. The so-called “Deep Throat from Berlin” has information that Resch had the idea to found the criminal organization “GoMoPa” and use non-existing Jewish lawyers  named Goldman, Morgenstern & Partner as camouflage. Their “office” in Madison Avenue, New York, is a mailbox. This is witnessed by a German Ex-Patriot, a lawyer, whose father, Heinz Gerlach, died under strange circumstances.
Resch seems to use “GoMoPa” as an instrument to blackmail parts of the German Property and Investment.

German authorities are under growing pressure to reopen investigations into at least a dozen suspicious deaths after the arrest of an alleged East German assassin cast new light on the communist regime. Stasi victims quoted a source saying “isolated units” had conducted operations that were “extremely well organised” and had “100 per cent logistical support” from the East German state.
A statement from prosecutors read: “The accused [Jurgen G] is suspected, as a member of a commando of the former DDR, of killing a number of people between 1976 and 1987 who from the point of view of the DDR regime had committed treason or were threatening to do so.”
Details of his Jurgen G’s arrest have been described in suitably florid terms, with the mass circulation tabloid Bild saying he was working at the Wolfsbruch marina near Rheinsberg in north-eastern Germany when a woman approached him. “Excuse me, is that your yellow Trabant in the car park? I just ran into it with my car,” she is said to have asked.
When he followed her to the car park, masked officers jumped out of vans and bushes and overpowered him in an operation worthy of the Stasi itself.
An eyewitness told Bild: “They blindfolded him and raced off in an unmarked car.”
Police across Germany are reported to be sifting through files to see who the victims may have been, and some intelligence officers are greeting the arrest of Jurgen G as a breakthrough.
Thomas Auerbach, who works for the Stasi file authority in Berlin and has written a book based on the death squad files, said: “These people were trained to make such murders look like accidents or suicides, even as ‘ordinary’ crimes such as robberies. They were real terror experts.”
The cases said to be linked to Jurgen G or his unit include many people involved with the commercial arm of the East German ruling socialist party, the SED (Socialist Unity Party).
Uwe Harms, the head of a Hamburg-based haulage firm which was part of a network of companies secretly owned by the SED, disappeared in March 1987 after conversations with various DDR functionaries. Six weeks later, his body was found in a plastic bag.
Weeks before his death he told friends that he felt he was being followed. After reunification, one of the other SED company heads said Mr Harms had been liquidated for refusing to allow his firm to be used to transport arms into East Germany.
Dieter Vogel, a businessman who had been jailed for life for spying for the CIA, was found suffocated in his cell in the East German prison Bautzen on March 9, 1982. The fact that he was due to be taken to the West in a spy swap arrangement just a few weeks later cast doubt on the suicide theory.
He had passed the names of several Stasi moles to the BND, West Germany’s heavily penetrated counter-intelligence service.
The Christian Democrat Union politician Uwe Barschel, 43, was found dead by magazine reporters in his bathtub in a hotel room in Geneva in October, 1987. He died of poisoning, but rumours that he was involved somehow in arms deals and the Stasi have clung to the case.
One of the more high-profile and enduring mysteries is that of Lutz Eigendorf, an East German footballer from the Stasi-backed Dynamo Berlin.
He fled to the West in 1979 amid great publicity. Four years later, he died after crashing his car into a tree on a straight stretch of road with blood alcohol levels way over the limit. Witnesses who had seen him earlier in the evening said he had not been drinking.
Most controversial though is the suggestion that the assassination squad was linked to the murder of a Swedish television reporter and her friend in 1984.
Cats Falk and her friend Lena Graens went missing on Nov 19, 1984. Their bodies were fished out of a Stockholm canal six months later.
Reports suggested a three-man assassination squad killed them, spiking their drinks with drugs, putting them into their car and pushing it into the Hammarby canal.
Shortly before her death, Cats Falk had reportedly uncovered a deal between an arms dealer and an East German firm.
Germany has recently undergone a wave of nostalgia for all things East German, dubbed Ostalgie, with colourful television shows featuring former DDR stars such as the ice skater Katerina Witt talking wistfully about socialist pop music.
A reassessment may be coming in the wake of the revelations.

Victims: The DDR-STASI MURDER GANG “GoMOPa” in murderoplot against Joerg Berger

The Stasi Murder Gang of „GoMoPa“ was involved in many trials to kill the popular East German soccer trainer Joerg Berger, Stasi victims tell in postings on their hompage http://www.sjb-fonds-opfer.com. Berger stated before his early death in his biography that they tried to pollute him with arsenic.
Arsenic and many of its compounds are especially potent poisons. Many water supplies close to mines are contaminated by these poisons. Arsenic disrupts ATP production through several mechanisms. At the level of the citric acid cycle, arsenic inhibits lipoic acid which is a cofactor for pyruvate dehydrogenase; and by competing with phosphate it uncouples oxidative phosphorylation, thus inhibiting energy-linked reduction of NAD+, mitochondrial respiration and ATP synthesis. Hydrogen peroxide production is also increased, which might form reactive oxygen species and oxidative stress. These metabolic interferences lead to death from multi-system organ failure, probably from necrotic cell death, not apoptosis. A post mortem reveals brick red coloured mucosa, owing to severe haemorrhage. Although arsenic causes toxicity, it can also play a protective role.[
Elemental arsenic and arsenic compounds are classified as “toxic” and “dangerous for the environment” in the European Union under directive 67/548/EEC. The International Agency for Research on Cancer (IARC) recognizes arsenic and arsenic compounds as group 1 carcinogens, and the EU lists arsenic trioxide, arsenic pentoxide and arsenate salts as category 1 carcinogens.
Arsenic is known to cause arsenicosis owing to its manifestation in drinking water, “the most common species being arsenate [HAsO42- ; As(V)] and arsenite [H3AsO3 ; As(III)]”. The ability of arsenic to undergo redox conversion between As(III) and As(V) makes its availability in the environment more abundant. According to Croal, Gralnick, Malasarn and Newman, “[the] understanding [of] what stimulates As(III) oxidation and/or limits As(V) reduction is relevant for bioremediation of contaminated sites (Croal). The study of chemolithoautotrophic As(III) oxidizers and the heterotrophic As(V) reducers can help the understanding of the oxidation and/or reduction of arsenic.
Treatment of chronic arsenic poisoning is easily accomplished. British anti-lewisite (dimercaprol) is prescribed in dosages of 5 mg/kg up to 300 mg each 4 hours for the first day. Then administer the same dosage each 6 hours for the second day. Then prescribe this dosage each 8 hours for eight additional days. However the Agency for Toxic Substances and Disease Registry (ATSDR) states that the long term effects of arsenic exposure cannot be predicted. Blood, urine, hair and nails may be tested for arsenic, however these tests cannot foresee possible health outcomes due to the exposure. Excretion occurs in the urine and long term exposure to arsenic has been linked to bladder and kidney cancer in addition to cancer of the liver, prostate, skin, lungs and nasal cavity.[
Occupational exposure and arsenic poisoning may occur in persons working in industries involving the use of inorganic arsenic and its compounds, such as wood preservation, glass production, nonferrous metal alloys and electronic semiconductor manufacturing. Inorganic arsenic is also found in coke oven emissions associated with the smelter industry.

THE DDR GESTAPO-STASI MURDER GANG responsable for the murder of Lutz Eigendorf

The talented Eigendorf played for East German side Dynamo Berlin.
He made his debut for the GDR in an August 1978 match against Bulgaria, immediately scoring his first two goals in a 2–2 draw. He went on to collect six caps, scoring three goals.[1] His final international was a February 1979 friendly match against Iraq.
On 20 March 1979, after a friendship match between Dynamo and West German club 1. FC Kaiserslautern in Gießen he fled to the west hoping to play for that team. But because of his defection he was banned from play for one year by UEFA and instead spent that time as a youth coach with the club.
This was not the first time an East German athlete had fled to the west, but it was a particularly embarrassing defection. Eigendorf’s club Dynamo was under the patronage of the Stasi, East Germany’s secretive state police, and subject to the personal attentions of the organisation’s head, Erich Mielke. He ensured that the club’s roster was made up of the country’s best players, as well as arranging for the manipulation of matches in Dynamo’s favour. After his defection Eigendorf openly criticised the DDR in the western media.
His wife Gabriele remained behind in Berlin with their daughter and was placed under constant police surveillance. Lawyers working for the Stasi quickly arranged a divorce and the former Frau Eigendorf re-married. Her new husband was eventually revealed as a Lothario – an agent of the state police whose role it was to spy on a suspect while romancing them.
In 1983 Eigendorf moved from Kaiserslautern to join Eintracht Braunschweig, all the while under the scrutiny of the Stasi who employed a number of West Germans as informants. On 5 March that year he was badly injured in a suspicious traffic accident and died within two days. An autopsy indicated a high blood alcohol level despite the testimony of people he had met with that evening indicating that Eigendorf had only a small amount of beer to drink.
After German re-unification and the subsequent opening of the files of the former East Germany’s state security service it was revealed that the traffic accident had been an assassination attempt orchestrated by the Stasi, confirming the longtime suspicions held by many. A summary report of the events surrounding Eigendorf’s death was made on German television on 22 March 2000 which detailed an investigation by Heribert Schwan in the documentary “Tod dem Verräter” (“Death to the Traitor”).
On 10 February 2010, a former East German spy revealed the Stasi ordered him to kill Eigendorf, which he claimed not to have done

MfS has been accused of a number of assassinations against political dissidents and other people both inside and outside the country. Examples include the East German football player Lutz Eigendorf and the Swedish journalist Cats Falck.
The terrorists who killed Alfred Herrhausen were professionals. They dressed as construction workers to lay a wire under the pavement of the road along Mr. Herrhausen’s usual route to work. They planted a sack of armor-piercing explosives on a parked bicycle by the roadside. An infrared beam shining across the road triggered the explosion just when the limousine, one of three cars in a convoy, sped by.
The operation, from the terrorists’ point of view, was flawless: Mr. Herrhausen, the chairman of one of Europe’s most powerful companies, Deutsche Bank, was killed in the explosion along that suburban Frankfurt road on Nov. 30, 1989.
But was everything what it seemed?
Within days, the Red Army Faction — a leftist terrorist group that had traumatized West Germany since 1970 with a series of high-profile crimes and brazen killings of bankers and industrialists — claimed responsibility for the assassination. An intense manhunt followed. In June 1990, police arrested 10 Red Army Faction members who had fled to East Germany to avoid arrest for other crimes. To the police’s surprise, they were willing to talk. Equally confounding to authorities: All had solid alibis. None was charged in the Herrhausen attack.
Now, almost two decades later, German police, prosecutors and other security officials have focused on a new suspect: the East German secret police, known as the Stasi. Long fodder for spy novelists like John le Carré, the shadowy Stasi controlled every aspect of East German life through imprisonment, intimidation and the use of informants — even placing a spy at one point in the office of West German Chancellor Willy Brandt.
According to documents reviewed by The Wall Street Journal, the murders of Mr. Herrhausen and others attributed to the Red Army Faction bear striking resemblance to methods and tactics pioneered by a special unit of the Stasi. The unit reported to Stasi boss Erich Mielke and actively sought in the waning years of the communist regime to imitate the Red Army Faction to mask their own attacks against prominent people in Western Germany and destabilize the country.
“The investigation has intensified in recent months,” said Frank Wallenta, a spokesman for the Federal Prosecutor. “And we are investigating everything, including leads to the Stasi.”
If those leads turn out to be true, it would mean not only rewriting some of the most dramatic episodes of the Cold War, but would likely accelerate a broader soul-searching now under way in Germany about the communist past.
In building a reunified country, many Germans have ignored discussion of the brutal realities of its former communist half. When the former East Germany is discussed, it’s often with nostalgia or empathy for brothers hostage to Soviet influence.

Stasi boss Erich Mielke, middle, with unnamed associates
That taboo is slowly being broken. Last year’s Oscar-winning movie, “The Lives of Others,” chronicled in dark detail a Stasi agent’s efforts to subvert the lives of ordinary people. Material in the Stasi archives shows that senior leaders had a shoot-to-kill order against those fleeing from East to West — a controversial order that contradicts East German leaders’ claims that they never ordered any shootings.
This story is based on more than a dozen interviews with police, prosecutors and other security officials. Several policemen and prosecutors confirmed that the allegation of extensive Stasi involvement with the Red Army Faction is a key part of the current investigation.
Court cases in West Germany in the 1990s established that members of the Red Army Faction were granted free passage to other countries in the 1970s and refuge in East Germany in the 1980s. But the current investigation and documents from Stasi archives suggest far deeper involvement — that members of the Red Army Faction were not only harbored by the Stasi but methodically trained in sophisticated techniques of bombing and murder.
Traudl Herrhausen, Mr. Herrhausen’s widow, is one of those pushing for further investigation. She says she long suspected involvement by the Stasi or other intelligence service such as the KGB, but never spoke publicly because she didn’t have evidence and didn’t want to interfere in the investigation. She says she is now breaking an 18-year silence in her desire to see justice done. “Now I want to look my husband’s killers in the eye,” she said in an interview.
The Red Army Faction was founded about 1970 by a band of leftists who justified their terrorism based on opposition to West Germany’s ruling elite. Killing members of this elite would provoke the West German state to take repressive measures that would show its true fascist face, Red Army Faction leaders believed.
In its early years, the group, also known as the Baader-Meinhof band, made headlines with prison breaks, bank robberies, bomb attacks and deadly shootouts. Four gang members led by Ulrike Meinhof freed Red Army Faction leader Andreas Baader from a Berlin jail a month after his arrest.
Red Army Faction violence in West Germany intensified in 1977 when Jürgen Ponto, then head of Dresdner Bank, was shot and killed at his home. Five weeks later, the group killed four people and abducted the chairman of the German employer association, Hans-Martin Schleyer, one of West Germany’s most prominent businessmen. It was the start of a six-week ordeal in which neither government nor terrorists would compromise. To support the Red Army Faction cause, Palestinian terrorists hijacked a Lufthansa jet in Spain, forcing it to land in Mogadishu, Somalia. After the plane was rushed by West German commandos, top Red Army Faction leaders in West Germany committed suicide and Mr. Schleyer was executed by his captors.
Red Army Faction violence began to abate in the late 1970s after the Lufthansa incident. Many in Germany thought the group — whose attacks were often crude — lost its will to kill after the arrest of its senior leaders in 1982. So when the group appeared to renew its terror campaign with a series of high-profile attacks in 1985, police were stunned by the level of their sophistication and determination.
This time, the group dazzled police with its ability to hit targets and leave little substantial evidence behind. They used high-tech devices no one thought they possessed. Their marksmen killed with military precision.

Weapons used by terrorists during the 1977 kidnapping of German industrialist Hanns-Martin Schleyer.
Surprisingly, members of the Red Army Faction so-called third generation had a policeman’s understanding of forensic science. From 1985 onward, the Red Army Faction rarely left a fingerprint or other useful piece of evidence at a crime scene, according to court records. The murder cases from this era are still open. Some suspected Stasi involvement, but no one could ever prove it, according to a senior police official.
The 1989 car-bomb murder of Mr. Herrhausen particularly stunned police with its audacity and sophistication. Mr. Herrhausen was the head of Deutsche Bank, Germany’s largest bank. He was part of the political-business elite that helped turn West Germany from a war-ravaged rump state into an economic powerhouse — all while East Germany languished in frustration. Mr. Herrhausen was a vocal proponent of a united Germany.
In November 1989, Mr. Herrhausen was following the fall of the Berlin wall and events in the Soviet Union closely, conferring frequently with Mikhail Gorbachev, according to his wife and friends. Then on Nov. 27, Mr. Herrhausen announced a plan to acquire the investment banking firm Morgan Grenfell — at the time a record-breaking bank acquisition.
Also during November, a spot along Mr. Herrhausen’s usual route to work was closed because of construction. Terrorists, dressed as construction workers, laid an electric wire under the road’s pavement. On Nov. 29, the stretch reopened.
On the morning of Nov. 30, like every workday morning, Mr. Herrhausen stepped into his limousine at about 8:30. Mr. Herrhausen’s driver waited about one minute to allow the first of the three-car entourage to drive ahead and survey the road.
“It was the route they hadn’t used in weeks,” Mrs. Herrhausen said.
As Mr. Herrhausen sped down the road, a team of terrorists waited. Beside the road, a parked bicycle held a sack of armor-piercing explosives. The detonator was connected by the electric wire under the road to a trigger activated by an interruption in an infrared beam shining across the road.
A terrorist activated the detonator after the first car of bodyguards drove past the bomb. Mr. Herrhausen died at the scene.
As they had during previous attacks, police set up dragnets to round up Red Army Faction cadre. But the June 1990 arrests of 10 members of the group who had earlier been granted political asylum in East Germany produced no leads. All the seized Red Army Faction members had solid alibis.
In July 1991, prosecutors believed they had a breakthrough when an informant claimed he had allowed two members of the Red Army Faction to stay at his home near the Herrhausen residence. Prosecutors followed that trail 13 years before dropping charges in 2004.
Frustrated with the inability of prosecutors to solve the Herrhausen case and believing that prosecutors were ignoring other leads including possible Stasi involvement, German officials replaced the prosecutor overseeing the case.
Police acknowledge that part of the reason for their focus on possible Stasi involvement was that all other leads had dried up. But they say they also knew that over the years the Stasi had worked with and given explosives to other terrorists, including “Carlos the Jackal” and the Basque group ETA in Spain. And in 2001 to 2003, an undercover police officer met with a man who claimed he had been a killer for the Stasi operating in Western Germany, although police were never able to tie him to specific murders.
German investigators turned their attention to Wartin, a small eastern German village nestled in yellow-brown fields of grain near the Polish border. Today, sheep graze in a field spotted with wooden posts.
In the 1980s, however, Wartin was home to the Stasi’s AGM/S — “Minister Working Group/Special Operations.” It got its name because it reported to Mr. Mielke, the minister who headed the Stasi for almost all of East Germany’s 40-year history.
The Wartin unit’s peacetime duties included the kidnapping and murder of influential people in the West, according to Stasi records reviewed by The Wall Street Journal in the Stasi archives in Berlin.
The documents say the unit’s activities included “intimidating anti-communist opinion leaders” by “liquidation,” and “kidnapping or hostage taking, connected with the demand that political messages be read,” according to a description of the unit’s activities written by a senior Wartin official in 1982.
Based on these documents, German investigators increasingly believe that the Stasi played a more active role than previously believed in Red Army Faction terrorism. After years of not being able to draw parallels between the Stasi unit in Wartin and the Red Army Faction killings, police are now focusing closely on such a link. Joachim Lampe, who assisted the successful prosecution of the first wave of Red Army Faction terrorists up until 1982 and was then assigned to prosecute Stasi-related crimes in West Germany, says it’s time to compare the activities of Wartin with the activities of the Red Army Faction to see where they overlap. “It is an important line of investigation,” he said.
A year after the Red Army Faction’s first generation collapsed in 1972, an internal Wartin report said cooperation with terrorists is possible if the individuals could be trusted to maintain secrecy and obey orders. Initial contacts, however, may not have taken place until later in the decade. Disillusionment gripped many of the terrorists living on the lam, according to court records citing witness statements by accused terrorists. Beginning about 1980, the Stasi granted refuge to 10 members of the Red Army Faction in East Germany and gave them assumed identities.
The Stasi sympathized with the anti-capitalist ideals of the Red Army Faction, but Stasi leaders were concerned about placing their trust in a group of uncontrollable leftist militants, a review of Stasi records shows. Stasi officials did not want to tarnish East Germany’s international reputation, so they toyed with different concepts for cooperation with terrorist groups, according to a prosecutor who has investigated Stasi involvement with terrorism.
One suggestion, contained in a document prepared for new officers assigned to the unit, was to emulate Romanian intelligence, which successfully worked with the terrorist “Carlos” to bomb the Radio Free Europe office in Munich, Germany, in 1981. To assist in such operations, the Wartin unit developed highly specialized explosives, poisons and miniature firearms.
About 1980 the Stasi also proposed a second strategy: instead of using a terrorist group directly — such cooperation always contained risk of discovery — they could simply execute attacks so similar to those of known terrorists that police would never look for a second set of suspects, according to Wartin records. The Wartin leadership called this strategy the “perpetrator principle,” according to Stasi records. The unit’s progress in implementing the steps to imitate terrorist attacks is described in a series of progress reports by Wartin officials between 1980 and 1987.
In September 1981, Red Army Faction terrorists attempted to kill U.S. Gen. James Kroesen in Heidelberg, Germany, shooting a bazooka at his car. About the same time, members of the same Red Army Faction team visited East Germany, where they were asked by the Stasi to shoot a bazooka at a car containing a dog. The dog died, according to court records.
In Wartin, officials wrote up a detailed description of the Red Army Faction members’ re-enactment of the Kroesen attack. “It is important to collect all accessible information about the terrorist scene in imperialist countries, to study and analyze their equipment, methods and tactics, so we can do it ourselves,” a senior Wartin official wrote in February 1982, according to the report.
In 1982, West German police discovered two troves of Red Army Faction weapons and documents buried in German forests. Three terrorists, including Red Army Faction leader Christian Klar, were arrested when they approached the sites. The troves were buried in locations easy to find at night, a tactic used by Wartin’s own agents to store operational equipment in West Germany, according to an investigator who viewed the troves and Stasi records.
That same year, a Wartin official described the staged bombing of a moving vehicle. According to the report, several Stasi officers shed “tears of joy” when electronic sensors detected the approaching car and ignited the detonator.
A spokesman at Germany’s federal police investigative agency, the equivalent of the U.S. Federal Bureau of Investigation, declined to comment on the close similarity between the detonator used in the demonstration and the device that killed Mr. Herrhausen, saying this is part of their investigation.
Wartin officers continued their preparations for imitating terrorist attacks in West Germany, according to a 1985 internal Wartin report. They created a special archive profiling the characteristics of known terrorists and terrorist groups, and taught staff members to execute nearly identical attacks, according to Stasi records. Each year, the unit’s officers detailed the unit’s success in teaching these techniques in their annual reports, according to the reports.
Then, in 1987, the AGM/S stopped offensive operations. The unit was disbanded.
Werner Grossmann, a former three-star Stasi General and former head of foreign intelligence operations, says the AGM/S was responsible for planning attacks in West Germany, but was dissolved “because it didn’t produce results.” Mr. Grossmann assumed control of part of the AGM/S after most of the unit was dissolved.
Mr. Grossmann says he took control of part of the AGM/S because he wanted to run intelligence operations against West Germany’s civil defense infrastructure.
“I refused to have anything to do with terrorism and terrorists,” Mr. Grossmann said in an interview. He said he didn’t have any influence over the AGM/S activities before 1987 and wasn’t informed about the unit’s activities before it came under his control.
Olaf Barnickel, a career Stasi officer who served at Wartin, says his unit planned murders in West Germany, but never committed one. “It was all theory and no practice,” Mr. Barnickel said in an interview.
But some German police are unpersuaded. They believe the seeds may have been planted for future violent attacks.
In November 1989, as East Germany disintegrated, groups of citizens forced their way into Stasi installations, seizing control. In Wartin, a local church minister led a group of demonstrators to the main entrance of the Stasi base. The base closed.
Within the Stasi as a whole, the chain of command began to disintegrate. Links to organizations in West Germany, including the Red Army Faction, were broken.
Sixteen months after Mr. Herrhausen’s murder, the Red Army Faction claimed its last victim, killing Detlev Karsten Rohwedder, the head of the Treuhandanstalt, the powerful trust that controlled most state-owned assets in the former East Germany and was overseeing their privatization. Mr. Rohwedder was killed while he was standing by the window of his house in Düsseldorf.
The murder was performed by a trained sharpshooter, according to a police official familiar with the investigation. The Stasi trained members of the Red Army Faction in sharpshooting skills and had its own teams of sharpshooters, according to witness statements by Stasi officials to a Berlin prosecutor and Stasi records.
In 1998, the Red Army Faction issued the last of its communiques, announcing it was disbanding. German police attribute the group’s disappearance to changing times, which made the group seem a relic of the past. Indeed, the Red Army Faction today is largely seen by the German public as part of the social upheaval that plagued West Germany in the 1970s and 1980s. More than one in four Germans consider former Red Army Faction members to have been misguided idealists. More than half now think the investigations should be closed for good in the coming decade when the current group of Red Army Faction prisoners finish serving their prison sentences.
German prosecutors say their investigation of the Stasi’s role is continuing.
Since last month, Mrs. Herrhausen has been in contact with the next of kin of victims in the other unsolved Red Army Faction murder cases, looking for support to push the investigation. The bomb that killed her husband nearly 18 years ago exploded soon after he left for work, within earshot of their home in suburban Frankfurt.
“I still hear that bomb every day,” she says.

Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution.
The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.
Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.
The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.
This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelzner, Berlin.
Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror Regime in Eastern Germany.
Furthermore the Stasi Top Agent Ehrenfried Stelzer disguised as Professor for Criminal studies during the Communist Regime at the Eastern Berlin Humboldt University.
Background:
The man behind the Berlin lawyer Jochen Resch and his activities is Ehrenfried Stelzer, former Stasi Top officer in Berlin and “Professor for Criminal Studies” at the Eastern Berlin Humboldt University during the Communist regime, the SJB-GoMoPa-victims say (www.sjb-fonds-opfer.com) is responsable for the killing of German watchdog and journalist Heinz Gerlach.
These informations stem from various sources who were close to the criminal organization of GoMoPa in the last years. The SJB-GoMoPa say that the well-known German watchdog and journalist Heinz Gerlach was killed by former Stasi members with dioxins. Polychlorinated dibenzodioxins (PCDDs), or simply dioxins, are a group of organic polyhalogenated compounds that are significant because they act as environmental pollutants. They are commonly referred to as dioxins for simplicity in scientific publications because every PCDD molecule contains a dioxin skeletal structure. Typically, the p-dioxin skeleton is at the core of a PCDD molecule, giving the molecule a dibenzo-p-dioxin ring system. Members of the PCDD family have been shown to bioaccumulate in humans and wildlife due to their lipophilic properties, and are known teratogens, mutagens, and confirmed (avered) human carcinogens. They are organic compounds.
Dioxins build up primarily in fatty tissues over time (bioaccumulate), so even small exposures may eventually reach dangerous levels. In 1994, the US EPA reported that dioxins are a probable carcinogen, but noted that non-cancer effects (reproduction and sexual development, immune system) may pose an even greater threat to human health. TCDD, the most toxic of the dibenzodioxins, is classified as a Group 1 carcinogen by the International Agency for Research on Cancer (IARC).
In 2004, a notable individual case of dioxin poisoning, Ukrainian politician Viktor Yushchenko was exposed to the second-largest measured dose of dioxins, according to the reports of the physicians responsible for diagnosing him. This is the first known case of a single high dose of TCDD dioxin poisoning, and was diagnosed only after a toxicologist recognized the symptoms of chloracne while viewing television news coverage of his condition.
German dioxin scandal: In January 2011 about 4700 German farms were banned from making deliveries after tests at the Harles und Jentzsch plant in the state of Schleswig-Holstein showed high levels of dioxin. Again this incident appears to involve PCBs and not PCDDs at all. Dioxin were found in animal feed and eggs in many farms. The person who is responsible for this, Siegfried Sievert is also a former Stasi Agent. At “GoMoPa” the notorious Eastern-Berlin press agency (see article below) one of the henchmen acted under the name of “Siegfried Siewert”.
Further evidence for the killing of Mr.Heinz Gerlach is provided by the SJB-GoMoPa-victims by analyzing the dubious role of former Stasi-Top-agent Ehrenfried Stelzer, also a former “Professor for Crime Studies” under the Communist regime in Eastern Germany and the dubious role of “detective” Medard Fuchsgruber. Both are closely tied to the dubious “GoMoPa” and Berlin lawyer Jochen Resch.
According to the SJB-GoMoPa-victims is Berlin lawyer Jochen Resch the mastermind of the criminal organization “GoMoPa2. The victims state that they have a source inside “GoMoPa” who helped them discover  the shocking truth. The so-called “Deep Throat from Berlin” has information that Resch had the idea to found the criminal organization “GoMoPa” and use non-existing Jewish lawyers  named Goldman, Morgenstern & Partner as camouflage. Their “office” in Madison Avenue, New York, is a mailbox. This is witnessed by a German Ex-Patriot, a lawyer, whose father, Heinz Gerlach, died under strange circumstances.
Resch seems to use “GoMoPa” as an instrument to blackmail parts of the German Property and Investment.

The name of Benno Ohnesorg became a rallying cry for the West German left after he was shot dead by police in 1967. Newly discovered documents indicate that the cop who shot him may have been a spy for the East German secret police.
It was one of the most important events leading up to the wave of radical left-wing violence which washed over West Germany in the 1970s. On the evening of June 2, 1967, the literature student Benno Ohnesorg took part in a demonstration at West Berlin’s opera house. Mohammad Reza Pahlavi, the shah of Iran, was to attend and the gathered students wanted to call attention to his brutal regime.
The protests, though, got out of hand. Pro-shah demonstrators, some of them flown in from Iran for the occasion, battled with the student protestors. West Berlin police also did their part, brutally beating back the crowd. At 8:30 p.m., a shot was fired, and a short time later the 26-year-old Ohnesorg, having been hit in the back of the head, became the left wing’s first martyr.
Now, though, the history of the event may have to be re-written. New documents discovered in the Stasi archive — the vast collection of files left behind by the East German secret police — reveal that the policeman who shot Ohnesorg, Karl-Heinz Kurras, could in fact have been a spy for East Germany’s communist regime.
In an article that will appear in late May in Deutschlandarchiv, a periodical dedicated to the ongoing project of German reunification, Helmut Müller-Enbergs and Cornelia Jabs reveal that documents they found in the Stasi papers show that Kurras began working together with the Stasi in 1955. He had wanted to move to East Berlin to work for the East German police. Instead, he signed an agreement with the Stasi to remain with the West Berlin police force and spy for the communist state.
As a result of the new information, criminal charges have once again been filed against Kurras, who was acquitted twice, once in 1967 and again in 1970, of negligent homicide charges related to Ohnesorg’s death. Kurras told the Berlin paper Tagesspiegel on Friday that he had never worked together with the Stasi.
But in addition to finding the agreement between Kurras and the Stasi, the two researchers also discovered numerous documents indicating that the East Germans were pleased with the information Kurras passed along — particularly given that he was posted to a division responsible for rooting out moles within the West German police force.
Immediately after Ohnesorg’s death, Kurras received a Stasi communication ordering him to destroy his records and to “cease activities for the moment.” Kurras responded with his acquiescence and wrote “I need money for an attorney.”
The exact circumstances surrounding the death of Ohnesorg have never been completely clarified. Kurras himself, now 81, gave conflicting versions of the story during the investigation but the official version has long been that Kurras fired in self defense. Many others point to witness accounts whereby the police were beating Ohnesorg when the shot was fired.
It is still unclear how the new evidence might play into history’s understanding of the tragic event. The day was one full of violence, with demonstrators and police battling each other with pipes, wooden clubs and stones. Police were further incited by rumors that an officer had been stabbed earlier in the evening. Ohnesorg himself, however, was not directly involved in the violence.
West Berlin in the 1960s and 70s became a focal point of German left wing radicalism. The city had long been left-leaning, and the fact that Berliners were exempt from military service meant that it became a magnate for pacifists and anti-state activists.
Ohnesorg’s death gave them an immediate rallying cry. As the left-wing movement became more radical, many justified their violent activities by pointing to the police brutality that led to the student’s death. A letter written by Ulrike Meinhof announcing the founding of the Red Army Faction, which appeared in SPIEGEL in the fall of 1967, explicitly mentioned the Ohnesorg incident. The RAF went on to terrorize Germany for decades, ultimately killing over 30 people across the country. The radical “June 2 Movement” used the date of the incident in its name.
Kurras, for his part, seems to have been a highly valued Stasi agent. In his files, it is noted that “he is prepared to complete any task assigned to him.” It also mentions that he is notable for having the “courage and temerity necessary to accomplish difficult missions.”

Now it seems the STASI is back again in business after transforming it in to the CYBER-STASI of the 21st Century.

The serial betrayer and cyberstalker Klaus Maurischat is on the run again. The latest action against him (see below) cause him to react in a series of fake statements and “press releases” – one more absurd than the other. Insider analyze that his criminal organisation “GoMoPa” is about to fade away.

On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders say they have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the Encyclopedia – Britannica

The case is also directed against Google, Germany, whilst supporting criminal action of “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention ofGoogle Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.
Besides that many legal institutions, individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.
The case number is ST/0148943/2011

In a series of interviews beginning 11 months before the sudden death of German watchdog Heinz Gerlach Berlin lawyer Joschen Resch unveilved secrets of Gerlach, insiders say. Secret documents from Mr Gerlachs computer were published on two dubious hostile German websites. Both have a lot of similarities in their internet registration. One the notorious “GoMoPa” website belongs to a n Eastern German organization which calls itself “
Numerous attempts have been made to stop our research and the publication of the stories by “GoMoPa” members in camouflage thus confirming the truth and the substance of it in a superior way.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution. The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.

Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.

The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.

This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)

Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelznr, Berlin.

Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror

The Stasi murder:
„GoMoPa“ & Backers: Blackmailing, Extortion, Racketeering, Internet Murder and Murder. These are the weapons of the East-German “NACHRICHTENDIENST” “GoMoPa”, a renegate confesses.
Deep Throat, Berlin; confesses: „Since months the „GoMoPa“ keyfigures like Klaus-Dieter Maurischat< are in hide-aways because the German police is hunting them for the wirecard fraud and a lot of other criminal actions. I left the group when I noticed that. The found and former Stasi-Colonel Ehrenfried Stelzer died under strange circumstances in Berlin. This has been told to us. But it is also possible that his death was staged. In any case the criminal organization of “GoMoPa” is responsible for the murder of Heinz Gerlach by dioxin. Now my life is also in danger that is why I hide myself.”
According to Deep Throat, Hans J. the murder was done with the help of the old Stasi-connections of the “NACHRICHTENDIENST” “GoMoPa”.
The renegate says that computer hacker Thomas Promny and Sven Schmidt are responsible for the computer crimes and he states that the crime organization of “GoMoPa” has also helpers inside internet companies like Go-Daddy, Media-on and even in Google, Hamburg..

THE “NACHRICHTENDIENST”:New criminal police action against “GoMoPa”:

German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground.

On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders say they have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the
Encyclopedia – Britannica

The case is also directed against Google, Germany, whilst supporting criminal action of “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention of Google Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.

Besides that many legal institutions, individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.

The case number is

ST/0148943/2011

Stasi-Dioxin: The “NACHRICHTENDIENST”  searching for the perfect murder:

Viktor Yushchenko was running against Prime Minister Viktor Yanukovych. Yanukovych was a political ally of outgoing president Leonid Kuchma. Kuchma’s administration depended upon corruption and dishonesty for its power. Government officials ruled with a sense of terror rather than justice. For the powerful and wealthy few, having Yanukovych elected president was important. Should Yushchenko win, Ukraine’s government was sure to topple. Yushchenko’s campaign promises included a better quality of life for Ukrainians through democracy. His wife, Katherine, told CBS in a 2005 interview, “He was a great threat to the old system, where there was a great deal of corruption, where people were making millions, if not billions.”
On September 6, 2004, Yushchenko became ill after dining with leaders of the Ukrainian secret police. Unlike other social or political engagements, this dinner did not include anyone else on Yushchenko’s team. No precautions were taken regarding the food. Within hours after the dinner, Yushchenko began vomiting violently. His face became paralyzed; he could not speak or read. He developed a severe stomachache and backache as well as gastrointestinal pain. Outwardly, Yushchenko developed what is known as chloracne, a serious skin condition that leaves the face scarred and disfigured.
By December 2004, doctors had determined that Yushchenko had been the victim of dioxin poisoning. Dioxin is a name given to a group of related toxins that can cause cancer and even death. Dioxin was used in the biochemical weapon called Agent Orange during the Vietnam War controversial war in which the United States aidedSouth Vietnam in its fight against a takeover by Communist North Vietnam). Yushchenko had a dioxin level six thousand times greater than that normally found in the bloodstream. His is the second-highest level ever recorded.
Yushchenko immediately suspected he had been poisoned, though Kuchma’s camp passionately denied such allegations. Instead, when Yushchenko showed up at a parliamentary meeting shortly after the poisoning incident, Kuchma’s men teased him, saying he must have had too much to drink or was out too late the night before.
Dioxin can stay in the body for up to thirty-five years. Experts predict that his swelling and scars will fade but never completely disappear. John Henry, a toxicologist at London’s Imperial Hospital, told RedNova.com, “It’ll be a couple of years, and he will always be a bit pockmarked. After damage as heavy as that, I think he will not return to his film star looks.” And Yushchenko will live with the constant threat of cancer.
At first it was believed the poison must have come from a Russian laboratory. Russia was a strong supporter of Kuchma and lobbied against Yushchenko in the 2004 election. But by July 2005, Yushchenko’s security forces were able to trace the poison to a lab in Ukraine. Though not entirely ruling out Russia’s involvement, Yushchenko is quoted on his Web site as saying “I’m sure that even though some people are running from the investigation, we will get them. I am not afraid of anything or anybody.”

Evidence shows that such a perfect murder plotted by former Stasi agents is the cause of the death of German watchdog and journalist Heinz Gerlach.

The Ministry for State Security (German: Ministerium für Staatssicherheit (MfS), commonly known as the Stasi (IPA: [‘?tazi?]) (abbreviation German: Staatssicherheit, literally State Security), was the official state security service of East Germany. The MfS was headquartered in East Berlin, with an extensive complex in Berlin-Lichtenberg and several smaller facilities throughout the city. It was widely regarded as one of the most effective and repressive intelligence and secret police agencies in the world. The MfS motto was “Schild und Schwert der Partei” (Shield and Sword of the Party), that is the ruling Socialist Unity Party of Germany (SED).

According to the confessions of an informer, Berlin lawyer Jochen Resch writes most of the “articles” of the communist “STASI” agency “GoMoPa” himself or it is done by lawyers of his firm. The whistleblower states that lawyer Resch is the mastermind behind the “CYBER-STASI” called “NACHRICHTENDIENST” “GoMoPa”. Bizarre enough they use Jewish names of non-existing Jewish lawyers by the name of “Goldman, Morgenstern and Partner” to stage their bogus “firm”.  Further involved in their complots are a “detective” Medard Fuchsgruber and “STASI”-Colonel Ehrenfried Stelzer, “the first crime expert” in the former communist East-Germany.
According to London based Meridian Capital hundreds and thousands of wealthy people and companies have paid to the “NACHRICHTENDIENST” to avoid their cyberstalking (see article below).
Finally the German criminal police started their investigations (case number ST/0148943/2011).
The “NACHRICHTENDIENST” is also involved in the death of the well-known German watchdog and journalist Heinz Gerlach who died under strange circumstances in July 2010.
Only hours after his death the “NACHRICHTENDIENST” was spreading the news that Mr Gerlach died of blood pollution and set the stage for a fairy tale. Months before his death the “NACHRICHTENDIENST” started a campaign to ruin his reputation and presumably was also responsable for cyberattacks to bring his website down. In fact they presumably used the same tactics also against our servers. Therefore we investigated all internet details of them and handed the facts to the FBI and international authorities.

Story background:
Now it seems the STASI is back again in business after transforming it in to the CYBER-STASI of the 21st Century.

The serial betrayer and  cyberstalker Klaus Maurischat is on the run again. The latest action against him (see below) cause him to react in a series of fake statements and “press releases” – one more absurd than the other. Insider analyze that his criminal organisation “GoMoPa” is about to fade away.
On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders  say they  have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the Encyclopedia – Britannica
The case is also directed against Google, Germany, whilst supporting criminal action of  “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention of Google Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.
Besides that many legal institutions,  individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.
The case number is ST/0148943/2011
In a series of interviews beginning 11 months before the sudden death of German watchdog Heinz Gerlach Berlin lawyer Joschen Resch unveilved secrets of Gerlach, insiders say. Secret documents from Mr Gerlachs computer were published on two dubious hostile German websites. Both have a lot of similarities in their internet registration. One the notorious “GoMoPa” website belongs to a n Eastern German organization which calls itself “
Numerous attempts have been made to stop our research and the publication of the stories by “GoMoPa” members in camouflage thus confirming the truth and the substance of it in a superior way.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution. The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.

Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.

The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.

This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelzner, Berlin.

Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror Regime in Eastern Germany.
Furthermore the Stasi Top Agent Ehrenfried Stelzer disguised as Professor for Criminal studies during the Communist Regime at the Eastern Berlin Humboldt University.

Background:
The man behind the Berlin lawyer Jochen Resch and his activities is Ehrenfried Stelzer, former Stasi Top officer in Berlin and “Professor for Criminal Studies” at the Eastern Berlin Humboldt University during the Communist regime, the SJB-GoMoPa-victims say (www.sjb-fonds-opfer.com) is responsable for the killing of German watchdog and journalist Heinz Gerlach.
These informations stem from various sources who were close to the criminal organization of GoMoPa in the last years. The SJB-GoMoPa say that the well-known German watchdog and journalist Heinz Gerlach was killed by former Stasi members with dioxins. Polychlorinated dibenzodioxins (PCDDs), or simply dioxins, are a group of organic polyhalogenated compounds that are significant because they act as environmental pollutants. They are commonly referred to as dioxins for simplicity in scientific publications because every PCDD molecule contains a dioxin skeletal structure. Typically, the p-dioxin skeleton is at the core of a PCDD molecule, giving the molecule a dibenzo-p-dioxin ring system. Members of the PCDD family have been shown to bioaccumulate in humans and wildlife due to their lipophilic properties, and are known teratogens, mutagens, and confirmed (avered) human carcinogens. They are organic compounds.
Dioxins build up primarily in fatty tissues over time (bioaccumulate), so even small exposures may eventually reach dangerous levels. In 1994, the US EPA reported that dioxins are a probable carcinogen, but noted that non-cancer effects (reproduction and sexual development, immune system) may pose an even greater threat to human health. TCDD, the most toxic of the dibenzodioxins, is classified as a Group 1 carcinogen by the International Agency for Research on Cancer (IARC).
In 2004, a notable individual case of dioxin poisoning, Ukrainian politician Viktor Yushchenko was exposed to the second-largest measured dose of dioxins, according to the reports of the physicians responsible for diagnosing him. This is the first known case of a single high dose of TCDD dioxin poisoning, and was diagnosed only after a toxicologist recognized the symptoms of chloracne while viewing television news coverage of his condition.
German dioxin scandal: In January 2011 about 4700 German farms were banned from making deliveries after tests at the Harles und Jentzsch plant in the state of Schleswig-Holstein showed high levels of dioxin. Again this incident appears to involve PCBs and not PCDDs at all. Dioxin were found in animal feed and eggs in many farms. The person who is responsible for this, Siegfried Sievert is also a former Stasi Agent. At “GoMoPa” the notorious Eastern-Berlin press agency (see article below) one of the henchmen acted under the name of “Siegfried Siewert”.
Further evidence for the killing of Mr.Heinz Gerlach is provided by the SJB-GoMoPa-victims by analyzing the dubious role of former Stasi-Top-agent Ehrenfried Stelzer, also a former “Professor for Crime Studies” under the Communist regime in Eastern Germany and the dubious role of “detective” Medard Fuchsgruber. Both are closely tied to the dubious “GoMoPa” and Berlin lawyer Jochen Resch.
According to the SJB-GoMoPa-victims is Berlin lawyer Jochen Resch the mastermind of the criminal organization “GoMoPa2. The victims state that they have a source inside “GoMoPa” who helped them discover  the shocking truth. The so-called “Deep Throat from Berlin” has information that Resch had the idea to found the criminal organization “GoMoPa” and use non-existing Jewish lawyers  named Goldman, Morgenstern & Partner as camouflage. Their “office” in Madison Avenue, New York, is a mailbox. This is witnessed by a German Ex-Patriot, a lawyer, whose father, Heinz Gerlach, died under strange circumstances.
Resch seems to use “GoMoPa” as an instrument to blackmail parts of the German Property and Investment section.

-”Worse than the Gestapo.” —Simon Wiesenthal, Nazi hunter said about the notorious “Stasi”.

Less than a month after German demonstrators began to tear down the Berlin Wall on November 9, 1989, irate East German citizens stormed the Leipzig district office of the Ministry for State Security (MfS)—the Stasi, as it was more commonly called. Not a shot was fired, and there was no evidence of “street justice” as Stasi officers surrendered meekly and were peacefully led away. The following month, on January 15, hundreds of citizens sacked Stasi headquarters in Berlin. Again there was no bloodshed. The last bit of unfinished business was accomplished on May 31 when the Stasi radioed its agents in West Germany to fold their tents and come home.
The intelligence department of the Nationale Volksarmee (NVA), the People’s Army, had done the same almost a week earlier, but with what its members thought was better style. Instead of sending the five-digit code groups that it had used for decades to message its spies in West Germany, the army group broadcast a male choir singing a children’s ditty about a duck swimming on a lake. There was no doubt that the singing spymasters had been drowning their sorrow over losing the Cold War in schnapps. The giggling, word-slurring songsters repeated the refrain three times: “Dunk your little head in the water and lift your little tail.” This was the signal to agents under deep cover that it was time to come home.
With extraordinary speed and political resolve, the divided nation was reunified a year later. The collapse of the despotic regime was total. It was a euphoric time for Germans, but reunification also produced a new national dilemma. Nazi war crimes were still being tried in West Germany, forty-six years after World War II. Suddenly the German government was faced with demands that the communist officials who had ordered, executed, and abetted crimes against their own people—crimes that were as brutal as those perpetrated by their Nazi predecessors—also be prosecuted.
The people of the former Deutsche Demokratische Republik (DDR), the German Democratic Republic, as the state had called itself for forty years, were clamoring for instant revenge. Their wrath was directed primarily against the country’s communist rulers—the upper echelon of the Sozialistische Einheitspartei (SED), the Socialist Unity Party. The tens of thousands of second-echelon party functionaries who had enriched themselves at the expense of their cocitizens were also prime targets for retribution.
Particularly singled out were the former members of the Stasi, the East German secret police, who previously had considered themselves the “shield and sword” of the party. When the regime collapsed, the Stasi had 102,000 full-time officers and noncommissioned personnel on its rolls, including 11,000 members of the ministry’s own special guards regiment. Between 1950 and 1989, a total of 274,000 persons served in the Stasi.
The people’s ire was running equally strong against the regular Stasi informers, the inoffizielle Mitarbeiter (IMs). By 1995, 174,000 had been identified as IMs, or 2.5 percent of the total population between the ages of 18 and 60. Researchers were aghast when they found that about 10,000 IMs, or roughly 6 percent of the total, had not yet reached the age of 18. Since many records were destroyed, the exact number of IMs probably will never be determined; but 500,000 was cited as a realistic figure. Former Colonel Rainer Wiegand, who served in the Stasi counterintelligence directorate, estimated that the figure could go as high as 2 million, if occasional stool pigeons were included.
“The Stasi was much, much worse than the Gestapo, if you consider only the oppression of its own people,” according to Simon Wiesenthal of Vienna, Austria, who has been hunting Nazi criminals for half a century. “The Gestapo had 40,000 officials watching a country of 80 million, while the Stasi employed 102,000 to control only 17 million.” One might add that the Nazi terror lasted only twelve years, whereas the Stasi had four decades in which to perfect its machinery of oppression, espionage, and international terrorism and subversion.
To ensure that the people would become and remain submissive, East German communist leaders saturated their realm with more spies than had any other totalitarian government in recent history. The Soviet Union’s KGB employed about 480,000 full-time agents to oversee a nation of 280 million, which means there was one agent per 5,830 citizens. Using Wiesenthal’s figures for the Nazi Gestapo, there was one officer for 2,000 people. The ratio for the Stasi was one secret policeman per 166 East Germans. When the regular informers are added, these ratios become much higher: In the Stasi’s case, there would have been at least one spy watching every 66 citizens! When one adds in the estimated numbers of part-time snoops, the result is nothing short of monstrous: one informer per 6.5 citizens. It would not have been unreasonable to assume that at least one Stasi informer was present in any party of ten or twelve dinner guests.

THE STASI OCTOPUS

Like a giant octopus, the Stasi’s tentacles probed every aspect of life. Full-time officers were posted to all major industrial plants. Without exception, one tenant in every apartment building was designated as a watchdog reporting to an area representative of the Volkspolizei (Vopo), the People’s Police. In turn, the police officer was the Stasi’s man. If a relative or friend came to stay overnight, it was reported. Schools, universities, and hospitals were infiltrated from top to bottom. German academe was shocked to learn that Heinrich Fink, professor of theology and vice chancellor at East Berlin’s Humboldt University, had been a Stasi informer since 1968. After Fink’s Stasi connections came to light, he was summarily fired. Doctors, lawyers, journalists, writers, actors, and sports figures were co-opted by Stasi officers, as were waiters and hotel personnel. Tapping about 100,000 telephone lines in West Germany and West Berlin around the clock was the job of 2,000 officers.
Stasi officers knew no limits and had no shame when it came to “protecting the party and the state.” Churchmen, including high officials of both Protestant and Catholic denominations, were recruited en masse as secret informers. Their offices and confessionals were infested with eavesdropping devices. Even the director of Leipzig’s famous Thomas Church choir, Hans-Joachim Rotch, was forced to resign when he was unmasked as a Spitzel, the people’s pejorative for a Stasi informant.
Absolutely nothing was sacred to the secret police. Tiny holes were bored in apartment and hotel room walls through which Stasi agents filmed their “suspects” with special video cameras. Even bathrooms were penetrated by the communist voyeurs.8 Like the Nazi Gestapo, the Stasi was the sinister side of deutsche Gründlichkeit (German thoroughness).
After the Berlin wall came down, the victims of the DDR regime demanded immediate retribution. Ironically, their demands were countered by their fellow Germans in the West who, living in freedom, had diligently built einen demokratischen Rechtsstaat, a democratic state governed by the rule of law. The challenge of protecting the rights of both the victims and the accused was immense, given the emotions surrounding the issue. Government leaders and democratic politicians recognized that there could be no “quick fix” of communist injustices without jeopardizing the entire system of democratic jurisprudence. Moving too rapidly merely to satisfy the popular thirst for revenge might well have resulted in acquittals or mistrials. Intricate jurisdictional questions needed to be resolved with both alacrity and meticulousness. No German government could afford to allow a perpetrator to go free because of a judicial error. The political fallout from any such occurrence, especially in the East, could prove fatal to whatever political party occupied the chancellor’s office in Bonn at the time.
Politicians and legal scholars of the “old federal states,” or West Germany, counseled patience, pointing out that even the prosecution of Nazi criminals had not yet been completed. Before unification, Germans would speak of Vergangenheitsbewältigung (“coming to grips with the past”) when they discussed dealing with Nazi crimes. In the reunited Germany, this word came to imply the communist past as well. The two were considered comparable especially in the area of human rights violations. Dealing with major Nazi crimes, however, was far less complicated for the Germans: Adolf Hitler and his Gestapo and Schutzstaffel (SS) chief, Heinrich Himmler, killed themselves, as did Luftwaffe chief and Vice Chancellor Hermann Göring, who also had been the first chief of the Gestapo. The victorious Allies prosecuted the rest of the top leadership at the International War Crimes Tribunal in Nürnberg. Twelve were hanged, three received life terms, four were sentenced to lesser terms of imprisonment (up to twenty years), and three were acquitted.
The cases of communist judges and prosecutors accused of Rechtsbeugung (perversion of justice) are more problematic. According to Franco Werkenthin, a Berlin legal expert charged with analyzing communist crimes for the German parliament, those sitting in judgment of many of the accused face a difficult task because of the general failure of German justice after World War II. Not a single judge or prosecutor who served the Nazi regime was brought to account for having perverted justice—even those who had handed down death sentences for infringements that in a democracy would have been considered relatively minor offenses. Werkenthin called this phenomenon die Jauche der Justiz, the cesspool of justice.
Of course, the crimes committed by the communists were not nearly as heinous as the Nazis’ extermination of the Jews, or the mass murders in Nazi-occupied territories. However, the communists’ brutal oppression of the nation by means including murder alongside legal execution put the SED leadership on a par with Hitler’s gang. In that sense, Walter Ulbricht or Erich Honecker (Ulbricht’s successor as the party’s secretary-general and head of state) and secret police chief Erich Mielke can justifiably be compared to Hitler and Himmler, respectively.
Arrest warrants were issued for Honecker and Mielke. The Soviet government engineered Honecker’s escape to Moscow, where he became the ward of Soviet President Mikhail S. Gorbachev. When the Soviet Union crumbled, the new Russian President Boris Yeltsin expelled Honecker. He was arrested on his return to Germany, but a court decided against a trial when he was diagnosed with liver cancer. Honecker flew to Chile with his wife Margot to live with their daughter, a Chilean citizen by marriage. His exile was short, and he died in 1994. Mielke was not so fortunate: His KGB friends turned their backs on him. He was tried in Germany for the 1931 murder of two police officers, found guilty, and sentenced to six years in prison. Other charges, including manslaughter, were dismissed because of his advanced age and poor health.
Three other members of the twenty-one-member ruling Politburo also have been tried. Former Defense Minister Heinz Kessler was convicted of manslaughter in connection with the order to kill people who were trying to escape to the West. He received a seven-and-a-half-year term. Two others, members of the Central Committee and the National Defense Council, were tried with Kessler and sentenced to seven and a half years and five years, respectively. Politburo member Harry Tisch, who was also head of the communist trade union, was found guilty of embezzlement and served eighteen months. Six others, including Egon Krenz (Honecker’s successor as party chief), were charged with manslaughter. Krenz was found guilty, and on August 25, 1997, was sentenced to six and a half years in prison.
However, eight years after reunification, many of the 165 members of the Central Committee have not yet been put under investigation. In 1945, Nazis holding comparable or lesser positions were subject to automatic arrest by the Allies. They spent months or even years in camps while their cases were adjudicated. Moreover, the Nürnberg Tribunal branded the Reich and its Corps of Political Leaders, SS, Security Service (SD), Secret State Police (Gestapo), SA (Storm Troopers), and Armed Forces High Command criminal organizations. Similarly sweeping actions against communist leaders and functionaries such as Stasi officers were never contemplated, even though tens of thousands of political trials and human rights abuses have been documented. After the East German regime fell, German judicial authorities scrupulously avoided the appearance of waging witch-hunts or using the law as a weapon of vengeance. Prosecutors and judges made great efforts to be fair, often suspending legal action while requesting rulings from the supreme court on possible constitutional conflicts.
The victims of oppression clamored for revenge and demanded speedy prosecution of the erstwhile tyrants. They had little patience for a judicial system that was handicapped by a lack of unblemished and experienced criminal investigators, prosecutors, and judges. Despite these handicaps, the Berlin Central Police Investigations Group for Government Criminality, mindful that the statute of limitations for most communist crimes would expire at the end of 1999, made significant progress under its director Manfred Kittlaus, the able former director of the West Berlin state police. Kittlaus’s major task in 1998 was to investigate wrongful deaths, including 73 murders, 30 attempted murders, 583 cases of manslaughter, 2,938 instances of attempted manslaughter, and 425 other suspicious deaths. Of the 73 murders, 22 were classified as contract murders.
One of those tried and convicted for attempted contract murder was former Stasi collaborator Peter Haak, who was sentenced to six and a half years in prison. The fifty-two-year-old Haak took part in the Stasi’s 1981 Operation Scorpion, which was designed to pursue people who helped East Germans escape to the West. Proceedings against former General Gerhard Neiber, whose Stasi directorate was responsible for preventing escapes and for wreaking vengeance, were still pending in 1998.
Peter Haak’s murder plot was hatched after he befriended Wolfgang Welsch and his family. Welsch was a thorn in the side of the Stasi because of his success in smuggling people out of the DDR. Haak joined Welsch and the latter’s wife and seven-year-old daughter on a vacation in Israel, where he mixed a gram of thallium, a highly poisonous metallic chemical element used in rat poison, into the hamburgers he was preparing for a meal. Welsch’s wife and daughter vomited immediately after ingesting the poison and recovered quickly. Welsch suffered severe aftereffects, but eventually recovered: He had consumed a large amount of beer with the meal, and an expert testified that the alcohol had probably flushed the poison from his system.
Berlin Prosecutor General Christoph Schäfgen revealed that after the DDR’s demise 15,200 investigations had been launched, of which more than 9,000 were still active at the beginning of 1995. Indictments were handed down in 153 cases, and 73 perpetrators were convicted. Among those convicted were the aforementioned Politburo members as well as a number of border guards who had killed people who were trying to escape to the West.
Despite widespread misgivings about the judicial failures in connection with some Nazi crimes, a number of judges and prosecutors were convicted and jailed for up to three years for perversion of justice. In collusion with the Stasi, they had requested or handed down more severe sentences in political cases so that the state could collect greater amounts when the “convicts” were ransomed by the West German government. {The amount of ransom paid was governed by the time a prisoner had been sentenced to serve.)
The enormity of the task facing judicial authorities in reunified Germany becomes starkly evident when one examines the actions they have taken in all five former East German provinces and in East Berlin. From the end of 1990 to July 1996, 52,050 probes were launched into charges of murder, attempted murder, manslaughter, kidnapping, election fraud, and perversion of justice. A total of 29,557 investigations were halted for various reasons including death, severe illness, old age, or insufficient evidence. In those five and a half years, there were only 139 convictions.
The problem is even more staggering when cases of espionage are included. Between 1990 and 1996, the office of the federal prosecutor general launched 6,641 probes, of which 2,431 were terminated before trial—most due to the statute of limitations. Of 175 indictments on charges of espionage, 95 resulted in convictions. In addition to the cases handled at the federal level, the prosecutor general referred 3,926 investigations to state authorities, who terminated 3,344 without trial. State courts conducted 356 trials, resulting in 248 convictions. Because the statute of limitations for espionage is five years, the prosecutor general’s office told me in 1997 it was unlikely that more espionage trials would be conducted.
It is important to emphasize the difference between the statute’s application to so-called government crimes committed in East Germany before the collapse and to crimes, such as espionage, committed in West Germany. The Unification Treaty specifically permits the belated prosecution of individuals who committed acts that were punishable under the East German criminal code and who due to official connivance were not prosecuted earlier. There is no statute of limitations for murder. For most other crimes the limit is five years; however, due to the obstacles created by previous government connivance, the German parliament in 1993 doubled this time limit for prosecution of the more serious crimes. At the same time, the parliament decreed that all cases must be adjudicated by the end of 2002. For less serious offenses, the statute would have run out on December 31, 1997, but the parliament extended it to 2000.
A number of politicians, jurists, and liberal journalists pleaded for a general amnesty for crimes committed by former DDR leaders and Communist Party functionaries. A former West German supreme court judge, Ernst Mahrenholz, said the “sharp sword of justice prevents reconciliation.” Schäfgen, the Berlin prosecutor general, had this answer for the former high court judge and other amnesty advocates:

I cannot agree. We are raising no special, sharp sword against East Germans. We must pursue state-sponsored injustice in exactly the same manner as we do when a thief steals or when one human being kills another. If one wants to change that, then we would have to do away with the entire criminal justice system, because punishment always hurts. We are not criminalizing an entire people but only an ever shrinking, small portion.

German Foreign Minister Klaus Kinkel, who was West Germany’s minister of justice when the nation was unified, said this at a session of parliament in September 1991: “We must punish the perpetrators. This is not a matter of a victor’s justice. We owe it to the ideal of justice and to the victims. All of those who ordered injustices and those who executed the orders must be punished; the top men of the SED as well as the ones who shot [people] at the wall.” Aware that the feelings against communists were running high among their victims, Kinkel pointed to past revolutions after which the representatives of the old system were collectively liquidated. In the same speech before parliament, he said:

Such methods are alien to a state ruled by law. Violence and vengeance are incompatible with the law in any case. At the same time, we cannot tolerate that the problems are swept under the rug as a way of dealing with a horrible past, because the results will later be disastrous for society. We Germans know from our own experience where this leads. Jewish philosophy formulates it in this way: “The secret of redemption is called remembering.”

Defense attorneys for communist officials have maintained that the difficulty lies in the fact that hundreds of thousands of political opponents were tried under laws of the DDR. Although these laws were designed to smother political dissent and grossly violated basic human rights and democratic norms, they were nonetheless laws promulgated by a sovereign state. How could one justly try individual Stasi officers, prosecutors, and judges who had simply been fulfilling their legal responsibility to pursue and punish violators of the law?
Opinions varied widely on whether and how the Stasi and other perpetrators of state-sponsored crimes should be tried. Did the laws of the DDR, as they existed before reunification, still apply in the east? Or was the criminal code of the western part of the country the proper instrument of justice in reunified Germany? However, these questions were moot: As Rupert Scholz, professor of law at the University of Munich and a Christian Democratic member of parliament, pointed out, the Unification Treaty specifies that the penal code of the DDR and not that of the Federal Republic of Germany (FRG) shall be applied to offenses committed in East Germany. Scholz’s view was upheld by the Bundesverfassungsgericht, the supreme court. Most offenses committed by party functionaries and Stasi officers—murder, kidnapping, torture, illegal wiretapping, mail robbery, and fraud—were subject to prosecution in reunified Germany under the DDR’s penal code. But this would not satisfy the tens of thousands of citizens who had been sent to prison under East German laws covering purely political offenses for which there was no West German equivalent.
Nevertheless, said Scholz, judicial authorities were by no means hamstrung, because West Germany had never recognized the East German state according to international law. “We have always said that we are one nation; that the division of Germany led neither to full recognition under international law nor, concomitantly, to a recognition of the legal system of the DDR,” Scholz said. Accordingly, West German courts have consistently maintained that West German law protects all Germans equally, including those living in the East. Therefore, no matter where the crimes were committed, whether in the East or the West, all Germans have always been subject to West German laws. Applying this logic, East German border guards who had either killed or wounded persons trying to escape to the West could be tried under the jurisdiction of West Germany.
The “one nation” principle was not upheld by the German supreme court. Prior to the court’s decision, however, Colonel General Markus Wolf, chief of the Stasi’s foreign espionage directorate, and some of his officers who personally controlled agents from East Berlin had been tried for treason and convicted. Wolf had been sentenced to six years in prison. The supreme court ruling overturned that verdict and those imposed on Wolf’s cohorts, even though they had obtained the most closely held West German secrets and handed them over to the KGB. The maximum penalty for Landesverrat, or treason, is life imprisonment. In vacating Wolf’s sentence, the court said he could not be convicted because he operated only from East German territory and under East German law.
However, Wolf was reindicted on charges of kidnapping and causing bodily harm, crimes also punishable under East German law. The former Stasi three-star general, on March 24, 1955, had approved in writing a plan to kidnap a woman who worked for the U.S. mission in West Berlin. The woman and her mother were tricked by a Stasi agent whom the woman had been teaching English, and voluntarily got into his car. He drove them into the Soviet sector of the divided city, where they were seized by Stasi officers. The woman was subjected to psychological torture and threatened with imprisonment unless she signed an agreement to spy for the Stasi. She agreed. On her return to the American sector, however, the woman reported the incident to security officials. Wolf had committed a felony punishable by up to fifteen years’ imprisonment in West Germany. He was found guilty in March 1977 and sentenced to two years’ probation.
Those who have challenged the application of the statute of limitations to communist crimes, especially to the executions of citizens fleeing to the West, have drawn parallels to the notorious executive orders of Adolf Hitler. Hitler issued orders mandating the summary execution of Soviet Army political commissars upon their capture and initiating the extermination of Jews. An early postwar judicial decision held that these orders were equivalent to law. When that law was declared illegal and retroactively repealed by the West German Bundestag, the statute of limitations was suspended—that is, it never took effect. Many of those convicted in subsequent trials of carrying out the Führer’s orders were executed by the Allies. The German supreme court has ruled the same way as the Bundestag on the order to shoot people trying to escape to West Germany, making the statute of limitations inapplicable to such cases. The ruling made possible the trial of members of the National Defense Council who took part in formulating or promulgating the order. A number of border guards who had shot would-be escapees also have been tried and convicted.
Chief Prosecutor Heiner Sauer, former head of the West German Central Registration Office for Political Crimes, was particularly concerned with the border shootings. His office, located in Salzgitter, West Germany, was established in 1961 as a direct consequence of the Berlin Wall, which was erected on August 13 of that year. Willy Brandt, at the time the city’s mayor (later federal chancellor) had decided that crimes committed by East German border guards should be recorded. At his behest, a central registry of all shootings and other serious border incidents was instituted. Between August 13, 1961 and the opening of the borders on November 9, 1989, 186 border killings were registered. But when the Stasi archives were opened, investigators found that at least 825 people had paid with their lives for trying to escape to the West. This figure was reported to the court that was trying former members of the National Defense Council. In addition to these border incidents, the registry also had recorded a number of similar political offenses committed in the interior of the DDR: By fall 1991, Sauer’s office had registered 4,444 cases of actual or attempted killings and about 40,000 sentences handed down by DDR courts for “political offenses.”
During the early years of Sauer’s operation, the details of political prosecutions became known only when victims were ransomed by West Germany or were expelled. Between 1963 and 1989, West Germany paid DM5 billion (nearly US$3 billion) to the communist regime for the release of 34,000 political prisoners. The price per head varied according to the importance of the person or the length of the sentence. In some cases the ransom amounted to more than US$56,000. The highest sum ever paid to the East Germans appears to have been DM450,000 (US$264,705 using an exchange rate of US$1.70 to the mark). The ransom “object” in this case was Count Benedikt von Hoensbroech. A student in his early twenties, von Hoensbroech was attending a West Berlin university when the wall went up. He was caught by the Stasi while trying to help people escape and was sentenced to ten years at hard labor. The case attracted international attention because his family was related to Queen Fabiola of Belgium, who interceded with the East Germans. Smelling money, the East German government first demanded the equivalent of more than US$1 million from the young man’s father as ransom. In the end, the parties settled on the figure of DM450,000, of which the West German government paid DM40,000 (about $23,529). Such ransom operations were fully controlled by the Stasi.
Political prisoners released in the DDR could not be registered by the West Germans because their cases remained secret. The victims were admonished to keep quiet or face another prison term. Nonetheless, in the first year after reunification, Sauer’s office added another 20,000 documented cases, for a total of 60,000. Sauer said he believed the final figure of all political prosecutions would be somewhere around 300,000. In every case, the Stasi was involved either in the initial arrest or in pretrial interrogations during which “confessions” were usually extracted by physical or psychological torture, particularly between the mid-1940s and the mid-1960s.
Until 1987, the DDR imposed the death penalty for a number of capital crimes, including murder, espionage, and economic offenses. But after the mid-1950s, nearly all death sentences were kept quiet and executions were carried out in the strictest secrecy, initially by guillotine and in later years by a single pistol shot to the neck. In most instances, the relatives of those killed were not informed either of the sentence or of the execution. The corpses were cremated and the ashes buried secretly, sometimes at construction sites. In reporting about one executioner who shot more than twenty persons to death, the Berlin newspaper Bildzeitung said that a total of 170 civilians had been executed in East Germany. However, Franco Werkenthin, the Berlin official investigating DDR crimes, said he had documented at least three hundred executions. He declined to say how many were for political offenses, because he had not yet submitted his report to parliament. “But it was substantial,” he told me. The true number of executions may never be known because no complete record of death sentences meted out by civil courts could be found. Other death sentences were handed down by military courts, and many records of those are also missing. In addition, German historian Günther Buch believes that about two hundred members of the Stasi itself were executed for various crimes, including attempts to escape to the West.

SAFEGUARDING HUMAN DIGNITY?

The preamble to the East German criminal code stated that the purpose of the code was to “safeguard the dignity of humankind, its freedom and rights under the aegis of the criminal code of the socialist state,” and that “a person can be prosecuted under the criminal code only in strictest concurrence with the law.” However, many of the codified offenses for which East German citizens were prosecuted and imprisoned were unique to totalitarian regimes, both fascist and communist.
Moreover, certain sections of the code, such as those on “Treasonable Relaying of Information” and “Treasonable Agent Activity,” were perversely applied, landing countless East Germans in maximum security penitentiaries. The victims of this perversion of justice usually were persons who had requested legal exit permits from the DDR authorities and had been turned down. In many cases, their “crime” was having contacted a Western consulate to inquire about immigration procedures. Sentences of up to two and a half years’ hard labor were not unusual as punishment for such inquiries.
Engaging in “propaganda hostile to the state” was another punishable offense. In one such case, a young man was arrested and prosecuted for saying that it was not necessary to station tanks at the border and for referring to border fortifications as “nonsense.” During his trial, he “admitted” to owning a television set on which he watched West German programs and later told friends what he saw. One of those “friends” had denounced him to the Stasi. The judge considered the accused’s actions especially egregious and sentenced him to a year and a half at hard labor.
Ironically, another part of this section of the criminal code decreed that “glorifying militarism” also was a punishable offense, although the DDR itself “glorified” its People’s Army beyond any Western norm. That army was clad in uniforms and insignia identical to those of the Nazi Wehrmacht, albeit without eagles and swastikas. The helmets, too, were differently shaped, but the Prussian goose step was regulation during parades.
A nineteen-year-old who had placed a sign in an apartment window reading “When justice is turned into injustice, resistance becomes an obligation!” was rewarded with twenty-two months in the penitentiary. Earlier, the youth had applied for an exit visa and had been turned down. A thirty-four-year-old father of two who also had been denied permission to leave the “workers’ and peasants’ state” with his family similarly advertised that fact with a poster reading “We want to leave, but they won’t let us.” The man went to prison for sixteen months. The “crimes” of both men were covered by a law on “Interference in Activities of the State or Society.”
Two letters—one to a friend in West Germany, seeking assistance to legally emigrate to the West, and another containing a similar appeal to Chief of State Honecker—brought a four-year sentence to their writer, who was convicted under two laws: those on “establishing illegal contacts” (writing to his friend) and on “public denigration” (writing to Honecker). The Stasi had illegally intercepted both letters.
The East German party chiefs were not content to rely only on the Stasi’s millions of informers to ferret out antistate sentiments. Leaving nothing to chance, they created a law that made the failure to denounce fellow citizens a crime punishable by up to five years’ imprisonment. One man was sentenced to twenty-three months for failing to report that a friend of his was preparing to escape to the West. The mandatory denunciation law had its roots in the statutes of the Socialist Unity Party, which were published in the form of a little red booklet. I picked up a copy of this booklet that had been discarded by its previous owner, a Stasi chauffeur, who had written “Ha, Ha” next to the mandate to “report any misdeeds, regardless of the person responsible, to leading party organs, all the way up to the Central Committee.”
Rupert Scholz, member of parliament and professor of law at the University of Munich, said many East Germans feel there is little determination among their Western brethren to bring the Stasi criminals to trial. “In fact, we already have heard many of them say that the peaceful revolution should have been a bloody one instead so they could have done away with their tormentors by hanging them posthaste,” Scholz told me.
The Reverend Joachim Gauck, minister to a Lutheran parish in East Germany, shared the people’s pessimism that justice would be done. Following reunification, Gauck was appointed by the Bonn government as its special representative for safeguarding and maintaining the Stasi archives. “We must at least establish a legal basis for finding the culprits in our files,” Gauck told me. “But it will not be easy. If you stood the millions of files upright in one line, they would stretch for 202 kilometers [about 121 miles]. In those files you can find an unbelievable number of Stasi victims and their tormentors.”
Gauck was given the mandate he needed in November 1991, when the German parliament passed a law authorizing file searches to uncover Stasi perpetrators and their informants. He viewed this legislation as first step in the right direction. With the evidence from Stasi files, the perpetrators could be removed from their public service jobs without any formal legal proceedings. Said Gauck: “We needed this law badly. It is not reasonable that persons who served this apparatus of oppression remain in positions of trust.

DAS BETRUGSURTEIL GEGEN “BENNEWIRTZ” UND “PETER EHLERS” “GoMoPa”-PARTNER “MAURISCHAT” UND “VORNKAHL” WG BETRUGES AM EIGEN ANLEGER

http://www.immobilien-vertraulich.com/law/7273-der-beweis-betrugs-urteil-gegengomopa-maurischat-betrug-am-eigenen-anleger-wg–10000-.html

TOP-SECRET – FBI UNVEILS THE FACTS ABOUT THE PENTAGON ATTACK

Massachusetts Man Charged with Plotting Attack on Pentagon and U.S. Capitol and Attempting to Provide Material Support to a Foreign Terrorist Organization

BOSTON—A 26-year-old Ashland man was arrested and charged today in connection with his plot to damage or destroy the Pentagon and U.S. Capitol, using large remote controlled aircraft filled with C-4 plastic explosives. Rezwan Ferdaus, a U.S. citizen, was also charged with attempting to provide material support and resources to a foreign terrorist organization, specifically to al Qaeda, in order to carry out attacks on U.S. soldiers stationed overseas.

“Our top priority is to protect our nation from terrorism and national security threats. The conduct alleged today shows that Mr. Ferdaus had long planned to commit violent acts against our country, including attacks on the Pentagon and our nation’s Capitol. Thanks to the diligence of the FBI and our many other law enforcement partners, that plan was thwarted,” said U.S. Attorney Carmen M. Ortiz. “I want the public to understand that Mr. Ferdaus’ conduct, as alleged in the complaint, is not reflective of a particular culture, community, or religion,” she added. “In addition to protecting our citizens from the threats and violence alleged today, we also have an obligation to protect members of every community, race, and religion against violence and other unlawful conduct.”

The public was never in danger from the explosive devices, which were controlled by undercover FBI employees (UCs). The defendant was closely monitored as his alleged plot developed and the UCs were in frequent contact with him.

Richard DesLauriers, Special Agent in Charge of the FBI’s Boston Division said, “Today’s arrest was the culmination of an investigation forged through strong relationships among various Massachusetts law enforcement agencies to detect, deter, and prevent terrorism. Each of the more than 30 federal, state, and local agencies on the FBI’s Joint Terrorism Task Force (JTTF) worked together to protect the community from this threat. In this particular investigation, the Worcester, Ashland, and Framingham Police Departments and the Bureau of Alcohol, Tobacco, Firearms, and Explosives, played particularly critical roles. The communities of Worcester, Ashland, and Framingham should be proud of the unwavering commitment and professionalism the agencies demonstrated in ensuring that their towns and region were safe from harm. The Massachusetts State Police and the Commonwealth Fusion Center also contributed significantly to this investigation.”

“The FBI used an undercover operation to conduct this investigation. Undercover operations are used to combat all types of crimes and criminals, including in the counterterrorism arena.”

“The JTTF initiated this investigation because we have an obligation to take action to protect the public whenever an individual expresses a desire to commit violence. A committed individual, even one with no direct connections to, or formal training from, an international terrorist organization, can pose a serious danger to the community,” added DesLauriers. “It is important to remember that our system of justice is based on the notion of individual responsibility. Therefore, no one should cite Mr. Ferdaus’ actions as an excuse or reason to engage in any unlawful behavior against others in the community. We will work diligently to protect the civil rights of all Americans.”

The affidavit alleges the following: Ferdaus, a Northeastern University graduate with a degree in physics, began planning to commit a violent “jihad” against the U.S. in early 2010. He obtained mobile phones, each of which he modified to act as an electrical switch for an IED. He then supplied the phones to FBI UCs, who he believed to be members of, or recruiters for, al Qaeda. According to the affidavit, Ferdaus believed that the devices would be used to kill American soldiers overseas. During a June 2011 meeting, he appeared gratified when he was told that his first phone detonation device had killed three U.S. soldiers and injured four or five others in Iraq. Ferdaus responded, “That was exactly what I wanted.”

According to the affidavit, after each subsequent delivery, Ferdaus was anxious to know how well each of his detonation devices had worked and how many Americans they had killed. During recorded conversations, Ferdaus stated that he devised the idea of attacking the Pentagon long before he met with the government’s cooperating witness (CW) and UC, and that his jihad had, “started last year.”

In recorded conversations with the CW that began in January 2011, Ferdaus stated that he planned to attack the Pentagon using aircraft similar to “small drone airplanes” filled with explosives and guided by GPS equipment. According to the affidavit, in April 2011, Ferdaus expanded his plan to include an attack on the U.S. Capitol. In May and June 2011, Ferdaus delivered two thumb drives to the UCs, which contained detailed attack plans with step-by-step instructions as to how he planned to attack the Pentagon and Capitol. The plans included using three remote controlled aircraft and six people, including himself, whom he described as an “amir,” i.e., an Arabic term meaning leader.

During various recorded meetings, Ferdaus envisioned causing a large “psychological” impact by killing Americans, including women and children, who he referred to as “enemies of Allah.” According to the affidavit, Ferdaus’ desire to attack the United States is so strong that he confided, “I just can’t stop; there is no other choice for me.”

In May 2011, Ferdaus traveled from Boston to Washington, D.C., conducted surveillance and took photographs of his targets (Pentagon and Capitol), and identified and photographed sites at the East Potomac Park from which he planned to launch his aircraft filled with explosives. Upon his return, Ferdaus told the UC that “more stuff ha[d] to be done,” that his plan needed to be expanded, and that he had decided to couple his “aerial assault” plan with a “ground directive.” Ferdaus indicated that his ground assault plan would involve the use of six people, armed with automatic firearms and divided into two teams. Ferdaus described his expanded attack as follows:

…with this aerial assault, we can effectively eliminate key locations of the P-building then we can add to it in order to take out everything else and leave one area only as a squeeze where the individuals will be isolated, they’ll be vulnerable and we can dominate.

Once isolated, Ferdaus planned to “open up on them” and “keep firing” to create “chaos” and “take out” everyone. He also provided the expanded plan to the UC on a thumb drive.

Between May and September 2011, Ferdaus researched, ordered and acquired the necessary components for his attack plans, including one remote controlled aircraft (F-86 Sabre). This morning prior to his arrest, Ferdaus received from the UCs 25 pounds of (what he believed to be) C-4 explosives, six fully-automatic AK-47 assault rifles (machine guns) and grenades. In June 2011, Ferdaus rented a storage facility in Framingham, Mass., under a false name, to use to build his attack planes and maintain all his equipment.

According to the affidavit, in August 2011, the F-86 remote controlled aircraft was delivered to the Framingham storage facility. Ferdaus delivered a total of eight detonation devices to the UCs over the course of the investigation, which he built with the intention that they be used by al Qaeda operatives overseas to kill U.S. soldiers. On September 20, 2011 Ferdaus made a training video, which he provided to the UCs, demonstrating how to make “cell phone detonators.”

According to the affidavit, at today’s meeting the UCs allowed Ferdaus to inspect the explosives and firearms (a quantity of C-4 explosives, three grenades, and six fully-automatic AK-47 assault rifles) that the UCs delivered, and that Ferdaus had requested for his attack plan. After inspecting the components, Ferdaus brought them to his storage unit, took possession of the explosives and firearms, and locked them in his storage unit. Ferdaus was then immediately arrested.

Although Ferdaus was presented with multiple opportunities to back out of his plan, including, being told that his attack would likely kill women and children, the affidavit alleges that Ferdaus never wavered in his desire to carry out the attacks.

If convicted, Ferdaus faces up to 15 years in prison on the material support and resources to a foreign terrorist organization charge; up to 20 years in prison on the charge of attempting to destroy national defense premises; and a five-year minimum mandatory in prison and up to 20 years on the charge of attempting to damage and destroy buildings that are owned by the United States, by using an explosive. On each charge Ferdaus also faces up to three years of supervised release and a $250,000 fine.

The case was investigated by the FBI, with assistance from the Worcester, Ashland and Framingham Police Departments and the Bureau of Alcohol, Tobacco, Firearms ,and Explosives.

The case is being prosecuted by Assistant U.S. Attorneys B. Stephanie Siegmann and Donald L. Cabell of Ortiz’s Anti-Terrorism and National Security Unit.

The details contained in the complaint are allegations. The defendant is presumed to be innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

Neo Stalin Show Case – Tymoshenko denounces court case ‘lynching’

Yulia Tymoshenko, the former Ukrainian prime minister, has denounced as a “lynching” and a “show” the trial that could see her jailed as early as Friday.

Making her closing statement on Thursday with hundreds of her supporters outside the Kiev courtroom, she accused Viktor Yanukovich, Ukraine’s president, of orchestrating the case to crush someone he saw as a “dangerous political rival”.
“This has been a classic lynching trial,” said the 50-year-old political firebrand, seemingly energised despite already spending 57 days in detention on contempt of court charges.

“You should have already brought in an acquittal and ended this humiliation of Ukraine. But the show goes on,” she told the judge.

In an unexpected twist, the verdict could now come during a summit of European Union leaders and former Soviet republics in Warsaw on Friday meant to celebrate Kiev’s progress towards a crucial political and trade deal with the EU.

EU leaders have warned that a guilty verdict and jail term for Ukraine’s leading opposition politician could be a major setback for hopes professed by Mr Yanukovich’s administration for closer integration with Europe.

Ms Tymoshenko faces up to 10 years in prison if found guilty of exceeding her authority when brokering a 2009 natural gas agreement with Russia while prime minister.

Prosecutors say the deal damaged Ukraine’s economy and have called for a seven-year sentence.

“Today I understand well what it felt like to be crushed during the Soviet regime, thrown into Soviet jails without proper courts and due process,” she told the courtroom as she read from a 60-page statement.

Mr Yanukovich, who narrowly beat his arch-rival in elections last year, has come under intensifying pressure from EU states and the US in recent weeks to drop the case, widely seen in Ukraine and beyond as politically motivated.

He has denied being behind the case, saying it was instigated by his predecessor and Ms Tymoshenko’s one-time Orange Revolution ally, Viktor Yushchenko.

Stefan Füle, EU enlargement commissioner, told a conference in Warsaw on Thursday that talks would continue aimed at concluding a political “association” and wide-ranging free trade deal with Kiev by the end of the year.

But he said a guilty court verdict could jeopardise chances of winning the necessary ratification by the EU’s 27 states and the European parliament.

“There is no doubt that if the former prime minister was put in prison, the relationship between Ukraine and the EU should not be the same,” he warned.

As well as bringing rival camps of pro- and anti-Tymoshenko demonstrators to Khreshchatyk, Kiev’s main street, the case is being closely watched in neighbouring countries. It featured prominently on Thursday in newspapers in Poland, which is keen to see its eastern neighbour more closely integrated with the EU and wrested out of Moscow’s orbit.

Civic groups in Ukraine warn the Tymoshenko case is symbolic of a broader rollback of democratic gains achieved after the Orange Revolution.

But they urged the EU to continue talks with Kiev as the best way of securing future reforms and avoiding the country again falling under Russian influence.

Russian prime minister Vladimir Putin – now almost certain to return as president next year – has repeatedly tried to pull Ukraine into a customs union he has formed with other ex-Soviet republics.

Mr Yanukovich had hinted in recent weeks that Kiev might seek a face-saving exit from the Tymoshenko trial by “decriminalising” the article under which she was charged.

But motions to do so now seem unlikely to pass through parliament in time, although the judge could still adjourn the case.

Ms Tymoshenko warned she would “under no circumstances” seek amnesty from Mr Yanukovich if the law changed after her trial ended. Doing so would be “recognition of a dictatorship”, she said.

Jose Manuel Pinto Teixeira, head of the EU delegation to Ukraine talks, warned this week: “It seems our messages were not heard well by the Ukrainian side.”

TOP-SECRET – Costly Database of Terrorism Racket Porn Video

IntelCenter Database (ICD)Comprehensive Online Database Covering
Terrorist/Rebel Incidents, Threats & Videos

A sends:

—–Original Message—–

From: BenV <benv[at]intelcenter.com>
Date: Wed, 28 Sep 2011 18:57:27
To: <DailyBrief[at]yahoogroups.com>
Subject: [DailyBrief] IntelCenter Dubbed Netflix of Terrorism – Feedback on Searching Terrorist Video

We just rolled out a new terrorist/rebel online database that allows full searching and streaming of up to HD quality video and full screen viewing. It’s part of our existing IntelCenter Database (ICD) and is called the Video Component. The database is accessible from anywhere with a Net connection and will support optimized versions for phone and tablet devices. The library goes back 20 years and once fully migrated will be in excess of 15,000 videos. You can see more details at

http://www.intelcenter.com/icd/

Fast Company just released an article on the database dubbing us the NetFlix of terrorism. You can see the piece here: http://www.fastcompany.com/1783435/netflix-for-terrorists and I put the full text below.

Here’s my question. How would you like to search for terrorist/rebel video that you need to review?

As it stands now the database allows search by group, video production group, speaker, release date, runtime, video type (i.e. hostage, statement, documentary style), language, primary country, main themes, contains (i.e. vehicular bombing, IED construction, shooting, statement), addressed to, transcript and many more technical metadata areas to support exploitation that cannot be posted here. All the group and individual names are on standardized lists so you don’t have to go guessing as to how we spelled it. You just review the list and pick the match.

Is there something else that you’ve wanted or found incredibly helpful in the past?

If anyone here wants the dog and pony show over WebEx or otherwise, just shoot me a note directly at

benv[at]intelcenter.com.

Thanks in advance for any feedback. We can have the greatest resource in the world but if we don’t understand how each different community needs to find and work with the video then it does nothing to forward the mission and at the end of the day that’s what our singular goal is, impact.

– Ben

Fast Company – 28 Sep. 2011

The Netflix Of Terrorism

http://www.fastcompany.com/1783435/netflix-for-terrorists

BY Neal Ungerleider

Terrorist organizations are nothing if not telegenic. Web video tends to be the preferred way they get messages across and recruit sympathizers. Now private company IntelCenter, has assembled one of the world’s largest collections of streaming terrorist videos for viewing on demand.

Terrorist organizations love making videos and uploading them to the internet. It’s a quick and effective way of getting their message across–and not just for potential recruits and sympathizers. A private company, IntelCenter, has assembled one of the world’s largest collections of streaming terrorist videos for viewing by the military, intelligence and academic communities.

The video archive, called IntelCenter Database: Video Component, contains approximately 15,000 terrorist and rebel-produced propaganda videos. According to IntelCenter’s Ben Venzke, the archive mainly contains video from “non-nation state actors, be they small or large, that are actively involved in bombings, kidnappings, shootings, insurgencies, and the like.” In other words: More FARC and al-Qaeda and fewer creepy, angry teenagers in their bedrooms. Users who subscribe to the service can instantly watch the videos and search by keywords and (terrorist) content creators, just as they could on Netflix or YouTube.

Homeland Security–the sprawling conglomeration of counter-terrorism, intelligence gathering, surveillance, and fearmongering that arose after the September 11 attacks–is big business. According to the left-leaning National Priorities Project, a staggering $69 billion dollars was allocated by the federal government for homeland security during fiscal year 2011. This is a massive source of revenue for the many private firms creating services and products used by federal and local governments. Access to IntelCenter’s video archive doesn’t come cheap; individual accounts for government users go for $9,995/year a piece or $65,000 for group licenses of 6-10 users. Substantially more affordable packages are available for private security and academic subscribers that begin at $2,320 annually. The cheaper levels give the user access to the same content but limit the number of search fields that can be used.

Subscribers to IntelCenter’s services are not limited to the United States; according to the company, their products are also designed to servvice intelligence analysts and military in Canada, Australia, Europe and other regions worldwide.

IntelCenter’s Venzke tells Fast Company that his company offers intelligence service-level video archives to researchers, private security professionals, corporate securities, universities, and the media. The archive grew out of the previously existing IntelCenter Database, which offers text-based background  information and reference materials on militant groups.

Users can search terrorist videos on the site by release date, the militant organization that created it, video producer (ironically enough, jihadists have formed their own media organizations such as as-Sahab Media), speaker, language, main themes, and regional focus. Although thousands of terrorist and militant-produced videos are currently available on the internet–ironically mainly through mainstream content archivers such as YouTube–the considerable time spent searching video archives in both English and foreign languages for a particular video does present a difficulty. One of IntelCenter’s strongest selling points is that they reduce the manpower hours needed to retrieve older propaganda videos.

Videos viewed through the site stream up to HD quality and can be watched either in a window or full-screen. Users can also view videos on their smartphones or tablets; the service is compatible with Android devices as well as the iPhone or iPad and offers both HTML5 and Flash video. According to Venzke, the archive “grows at a rate of about 3-20 new videos a day.”

Thankfully for intelligence agencies and counter-terrorism investigators, militant organizations love producing video clips and internet propaganda. Hezbollah has their own satellite television network with a huge internet presence and terrorist groups worldwide use YouTube to reach sympathizers before their videos are (sometimes) pulled down. Just this week, al-Qaeda in Yemen released the latest issue of their English-language propaganda magazine online–the PDF-format magazine encouraged readers to target “the populations of countries that are at war with the Muslims.”

The growth market in Homeland Security means that a streaming video site aimed at intelligence and corporate security is smart business. Police departments and regional law enforcement around the country generally have generous funds to spend on Homeland Security; the New York Police Department’s counter-terrorism unit is currently dealing with fallout from an Associated Press expose. Those big budgets translate into money to spend on all sorts of tools developed by private firms. More importantly, there are relatively few public-access databases archiving videos from militant organizations  that can be easily searched without bouncing between English, Arabic, Spanish, Urdu and other foreign-language queries. Promoting that capability, for IntelCenter and the many other small companies serving the Homeland Security industry, can be very profitable.

[Story images: IntelCenter]

For more stories like this, follow [at]fastcompany on Twitter. Email Neal Ungerleider, the author of this article, here or find him on Twitter and Google+.

SPIEGEL -“GELIEBTER GENOSSE”-WIE STASI-OBERST STELZER BND-CHEF HELLENBROICH FÜR “GoMoPa” ANWARBT

http://www.spiegel.de/spiegel/print/d-13502488.html

TOP-SECRET – Megadeath Weapons Tritium Production to Increase

[Federal Register Volume 76, Number 188 (Wednesday, September 28, 2011)]
[Notices]
[Pages 60017-60020]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-24947]

-----------------------------------------------------------------------

DEPARTMENT OF ENERGY

National Nuclear Security Administration

Notice of Intent To Prepare a Supplemental Environmental Impact
Statement (SEIS) for the Production of Tritium in a Commercial Light
Water Reactor

AGENCY: National Nuclear Security Administration (NNSA), U.S.
Department of Energy (DOE).

ACTION: Notice of intent to prepare a supplemental environmental impact
statement and conduct public scoping meetings.

-----------------------------------------------------------------------

SUMMARY: The Council on Environmental Quality's implementing
regulations for the National Environmental Policy Act (NEPA) and DOE's
NEPA implementing regulations require the preparation of a supplement
to an environmental impact statement (EIS) when there are substantial
changes to a proposal or when there are significant new circumstances
or information relevant to environmental concerns. DOE may also prepare
a SEIS at any time to further the purposes of NEPA. Pursuant to these
provisions, the NNSA, a semi-autonomous agency within DOE, intends to
prepare a SEIS to update the environmental analyses in DOE's 1999 EIS
for the Production of Tritium in a Commercial Light Water Reactor (CLWR
EIS; DOE/EIS-0288). The CLWR EIS addressed the production of tritium in
Tennessee Valley Authority (TVA) reactors using tritium-producing
burnable absorber rods (TPBARs). In the Record of Decision (ROD) for
the CLWR EIS, NNSA selected TVA's Watts Bar Unit 1 and Sequoyah Units 1
and 2, located in Spring City and Soddy-Daisy, Tennessee, respectively,
for tritium production. TVA has been producing tritium for NNSA at
Watts Bar Unit 1 since 2004.
    After several years of tritium production experience at TVA's Watts
Bar Unit 1, NNSA has determined that tritium permeation through TPBAR
cladding into the reactor cooling water occurs at a higher rate than
previously projected. The proposed SEIS will analyze the potential
environmental impacts associated with increased tritium permeation
levels observed since 2004; DOE's revised estimate of the maximum
number of TPBARs required to support the current Nuclear Posture Review
tritium supply requirements; and proposed changes to TVA facilities
that may be used for future tritium production. TVA will be
participating as a cooperating agency in the preparation of the SEIS.
Any other agency that would like to be a cooperating agency in the
preparation of the SEIS is requested to contact the SEIS Document
Manager as noted in this Notice under ADDRESSES.

DATES: NNSA invites comments on the scope of the SEIS. The public
scoping period starts with the publication of this Notice in the
Federal Register and will continue until November 14, 2011. NNSA will
consider all comments received or postmarked by that date in defining
the scope of the SEIS. Comments received or postmarked after that date
will be considered to the extent practicable. A public scoping meeting
is scheduled to be held on October 20, 2011, from 6:30 p.m. to 10 p.m.

[[Page 60018]]

ADDRESSES: The public scoping meeting will be held at the Southeast
Tennessee Trade and Conference Center, Athens, TN. NNSA will publish
additional notices on the date, time, and location of the scoping
meeting in local newspapers in advance of the scheduled meeting. Any
necessary changes will be announced in the local media. The scoping
meeting will provide the public with an opportunity to present
comments, ask questions, and discuss issues with NNSA officials
regarding the SEIS.
    Written comments or suggestions concerning the scope of the SEIS or
requests for more information on the SEIS and public scoping process
should be directed to: Mr. Curtis Chambellan, Document Manager for the
SEIS, U.S. Department of Energy, National Nuclear Security
Administration, Box 5400, Albuquerque, New Mexico 87185-5400; facsimile
at 505-845-5754; or e-mail at: tritium.readiness.seis@doeal.gov. Mr.
Chambellan may also be reached by telephone at 505-845-5073.

FOR FURTHER INFORMATION CONTACT: For general information on the NNSA
NEPA process, please contact: Ms. Mary Martin, NNSA NEPA Compliance
Officer, U.S. Department of Energy, 1000 Independence Avenue, SW,
Washington, DC 20585, or telephone 202-586-9438. For general
information about the DOE NEPA process, please contact: Ms. Carol
Borgstrom, Director, Office of NEPA Policy and Compliance (GC-54), U.S.
Department of Energy, 1000 Independence Avenue, SW, Washington, DC
20585, or telephone 202-586-4600, or leave a message at 1-800-472-2756.
Additional information about the DOE NEPA process, an electronic
archive of DOE NEPA documents, and other NEPA resources are provided at
http://energy.gov/nepa.

SUPPLEMENTARY INFORMATION: NNSA is responsible for supplying nuclear
materials for national security needs and ensuring that the nuclear
weapons stockpile remains safe and reliable. Tritium, a radioactive
isotope of hydrogen, is an essential component of every weapon in the
U.S. nuclear weapons stockpile. Unlike other nuclear materials used in
nuclear weapons, tritium decays at a rate of 5.5 percent per year.
Accordingly, as long as the Nation relies on a nuclear deterrent, the
tritium in each nuclear weapon must be replenished periodically. The
last reactor used for tritium production during the Cold War was shut
down in 1988. Since then, tritium requirements for the stockpile have
largely been met from the existing original inventory through the
harvest and recycle of tritium gas during the dismantlement of weapon
systems, and the replacement of tritium-containing weapons components
as part of Limited Life Component Exchange programs. In December 1999,
a new tritium production capability was established through an
Interagency Agreement with TVA in which TPBARs are irradiated in the
Watts Bar Unit 1 commercial nuclear power reactor and undergo
extraction at the Tritium Extraction Facility (TEF) located at DOE's
Savannah River Site (SRS) in South Carolina. In order to continue to
provide the required supply, irradiation will increase from today's 544
TPBARs per fuel cycle to a projected steady state rate of approximately
1,700 TPBARs per fuel cycle, i.e., approximately every 18 months.
    To provide sufficient capacity to ensure the ability to meet
projected future stockpile requirements, NNSA and TVA anticipate
requesting authorization for TPBAR irradiation to be increased in
fiscal year 2016 to a level that is beyond currently licensed rates for
one reactor. Meeting the increased demand will require a license
amendment from the Nuclear Regulatory Commission (NRC) to permit the
irradiation of a greater number of TPBARs per reactor than can
currently be irradiated at either the Watts Bar or Sequoyah site.
License amendments are reactor specific. NNSA and TVA will supplement
the 1999 CLWR EIS with analyses supporting the anticipated license
amendment requests that also evaluate a higher level of tritium
permeation through TPBAR cladding into the reactor cooling water than
was previously analyzed. The tritium releases associated with the
proposed increase in the number of TPBARs that could be irradiated at
Watts Bar, Sequoyah, or both sites (compared to the number currently
authorized by the NRC) would remain below Environmental Protection
Agency (EPA) and NRC regulatory limits. Subsequently, TVA plans to
adopt the SEIS for use in obtaining the necessary NRC license
amendment(s).
    The production of tritium in a CLWR is technically straightforward.
All of the Nation's supply of tritium has been produced in reactors.
Most commercial pressurized water reactors were designed to utilize 12-
foot-long rods containing an isotope of boron (boron-10) in ceramic
form. These rods are sometimes called burnable absorber rods. The rods
are inserted in the reactor fuel assemblies to absorb excess neutrons
produced by the uranium fuel in the fission process for the purpose of
controlling power in the core at the beginning of an operating cycle.
DOE's tritium program developed TPBARs in which neutrons are absorbed
by a lithium aluminate ceramic rather than boron ceramic. While the two
types of rods function in a very similar manner to absorb excess
neutrons in the reactor core, there is one notable difference: When
neutrons strike the lithium aluminate ceramic material in a TPBAR,
tritium is produced inside the TPBAR. These TPBARs are placed in the
same locations in the reactor core as the standard boron burnable
absorber rods. There is no fissile material (uranium or plutonium) in
the TPBARs. Tritium produced in TPBARs is captured almost
instantaneously in a solid zirconium material in the rod, called a
``getter.'' The getter material that captures the tritium is very
effective. During each reactor refueling cycle, the TPBARs are removed
from the reactor and transported to SRS. At SRS, the TPBARs are heated
in a vacuum at the TEF to extract the tritium from the getter material.
    DOE's May 1999 Consolidated Record of Decision for Tritium Supply
and Recycling (64 FR 26369) announced the selection of TVA's Watts Bar
Unit 1, Sequoyah Unit 1 and Sequoyah Unit 2 for use in irradiating
TPBARs and stated that a maximum of approximately 3,400 TPBARs would be
irradiated per reactor during each 18-month fuel cycle. Since then, the
projected need for tritium has decreased significantly. NNSA has
determined that tritium demand to supply the Nuclear Weapons Stockpile
could be satisfied using a maximum of approximately 2,500 TPBARs per
fuel cycle, with a projected steady state number of approximately 1,700
TPBARs per fuel cycle.

Purpose and Need

    Although NNSA's projected need for tritium to support the nuclear
weapons stockpile today is less than originally planned, a higher than
expected rate of permeation of tritium from TPBARs into reactor coolant
water and subsequent release to the environment has restricted the
number of TPBARs irradiated at TVA's Watts Bar Unit 1. Before TVA
increases tritium production rates to meet expected national security
requirements, the environmental analyses in the CLWR EIS are being
updated to analyze and evaluate the effects of the higher tritium
permeation, as well as any potential effects related to other changes
in the regulatory and operating environment since publication of the
original CLWR EIS.
    As a cooperating agency in the preparation of the SEIS, TVA plans
to use the SEIS in pursuing NRC licensing amendments to increase TPBAR

[[Page 60019]]

irradiation at TVA's Watts Bar Nuclear Plant (WBN) at Spring City,
Tennessee, and/or the Sequoyah Nuclear Plant at Soddy-Daisy, Tennessee,
beyond levels set in 2002. Four alternatives are expected to be
analyzed in the SEIS: The No Action Alternative and three action
alternatives, one using only the Watts Bar site, one using only the
Sequoyah site, and one using both the Watts Bar and Sequoyah sites. As
a matter of note, in a separate proceeding, DOE and TVA are also
analyzing the potential use of mixed oxide fuel during some fuel cycles
at the Sequoyah Nuclear Plant as part of the U.S. program for surplus
plutonium disposition (75 FR 41850. July 19, 2010).

Proposed Action and Alternatives

    The CLWR EIS assessed the potential impacts of irradiating up to
3,400 TPBARs per reactor unit operating on 18 month fuel cycles. It
included TPBAR irradiation scenarios using multiple reactor units to
achieve a maximum level of 6,000 TPBARs every 18 months. Subsequently,
tritium production requirements have been reduced such that irradiation
of approximately 1,700 TPBARs every reactor fuel cycle is expected to
be sufficient to fulfill current requirements, consistent with the 2010
Nuclear Posture Review. To provide flexibility in future tritium supply
decisions, the revised environmental analysis is expected to consider
irradiation of up to a total of 2,500 TPBARs every 18 months. This
approach would provide sufficient reserve capacity to accommodate
potential future changes in requirements and to allow for production
above currently expected annual requirement levels for short durations
(i.e., several years) to recover from potential future shortfalls
should that become necessary.
    In the CLWR EIS, the permeation of tritium through the TPBAR
cladding into the reactor coolant systems of potential tritium
production reactors was estimated to be less than or equal to one
tritium curie/TPBAR/year. After several years of tritium production
experience at Watts Bar Unit 1, NNSA has determined that tritium
permeation through TPBAR cladding is approximately three to four times
higher than this estimate; nevertheless, tritium releases have been
below regulatory limits. To conservatively bound the potential
environmental impacts, the SEIS will assess the impacts associated with
tritium production in CLWRs based on a permeation rate of approximately
five tritium curies/TPBAR/year.
    An assessment of tritium mitigation and management measures will be
included as part of the environmental analyses in the SEIS. Mitigation
and management measures include an assessment of technologies
commercially available to treat tritiated effluents, transportation of
tritiated effluents and/or low level radioactive waste streams, and
other applicable effluent management actions.
    The SEIS, which will supplement the 1999 CLWR EIS, will support
agency deliberations regarding potential changes in the tritium
production at NRC licensed TVA facilities in order to meet the
requirements of TVA's agreement with NNSA. These changes also require
TVA to pursue an NRC license amendment request for these facilities.
Accordingly, the SEIS is expected to substantially meet NRC
requirements for an environmental report necessary to support TVA's
license amendment request(s) for tritium production at the Watts Bar
and/or Sequoyah Nuclear Plants.
    No Action Alternative: Produce tritium at currently approved TVA
facilities (Watts Bar Unit 1 and Sequoyah Units 1 and 2) at appropriate
levels to keep permeation levels within currently approved NRC license
and regulatory limits.
    Alternative 1: Utilize TVA's Watts Bar site only to a maximum level
of 2,500 TPBARs every reactor fuel cycle (18 months).
    Alternative 2: Utilize TVA's Sequoyah site only to a maximum level
of 2,500 TPBARs every 18 months.
    Alternative 3: Utilize both the Watts Bar and Sequoyah sites to a
maximum total level of 2,500 TPBARS every 18 months. The level of
production per site would be determined by TVA. This alternative would
provide the ability to supply stockpile requirements at either site
independently, or using both sites with each supplying a portion of the
supply.

Preliminary Identification of Environmental Issues

    NNSA has tentatively identified the issues for analysis in the
SEIS. Additional issues may be identified as a result of the scoping
comment process. The SEIS will analyze the potential impacts on:
    1. Air, water, soil, and visual resources.
    2. Plants and animals, and their habitats, including state and
Federally-listed threatened or endangered species and their critical
habitats.
    3. Irretrievable and irreversible consumption of natural resources
and energy, including transportation issues.
    4. Cultural resources, including historical and pre-historical
resources and traditional cultural properties.
    5. Infrastructure and utilities.
    6. Socioeconomic conditions.
    7. Human health under routine operations and accident conditions,
including potential impacts from seismic events.
    8. Minority and low-income populations (Environmental Justice).
    9. Intentional Destructive Acts, including terrorist acts.
    10. Other past, present, and reasonably foreseeable actions
(cumulative impacts).
    SEIS Process and Invitation to Comment. The SEIS scoping process
provides an opportunity for the public to assist the NNSA in
determining issues and alternatives to be addressed in the SEIS. One
public scoping meeting will be held as noted under DATES in this
Notice. The purpose of the scoping meeting is to provide attendees with
an opportunity to present comments, ask questions, and discuss issues
regarding the SEIS with NNSA officials. Comments can also be mailed to
Mr. Chambellan as noted in this Notice under ADDRESSES. The SEIS
scoping meeting will include an informal open house from 6:30-7 p.m. to
facilitate dialogue between NNSA and the public. Once the formal
scoping meeting begins at 7:00 pm, NNSA will present a brief overview
of the SEIS process and provide individuals the opportunity to give
written or oral statements. NNSA welcomes specific scoping comments or
suggestions on the SEIS. Copies of written comments and transcripts of
oral comments provided to NNSA during the scoping period will be
available on the Internet at http://nnsa.energy.gov/nepa/clwrseis.
    After the close of the public scoping period, NNSA will begin
preparing the Draft SEIS. NNSA expects to issue the Draft SEIS for
public review in 2012. A Federal Register Notice of Availability, along
with notices placed in local newspapers, will provide dates and
locations for public hearings on the Draft SEIS and the deadline for
comments on the draft document. Persons who submit comments with a
mailing address during the scoping process will receive a copy of or
link to the Draft SEIS. Other persons who would like to receive a copy
of or link to the Draft SEIS for review should notify Mr. Chambellan at
the address noted under ADDRESSES. NNSA will include all comments
received on the Draft SEIS, and responses to those comments in the
Final SEIS.
    Issuance of the Final SEIS is currently anticipated to take place
in 2013. NNSA

[[Page 60020]]

will issue a ROD no sooner than 30 days after publication of EPA's
Notice of Availability of the Final SEIS.

    Issued in Washington, DC, this 23rd day of September 2011.
Thomas P. D'Agostino,
Administrator, National Nuclear Security Administration.
[FR Doc. 2011-24947 Filed 9-27-11; 8:45 am]
BILLING CODE 6450-01-P

“DUBIOSE DOPPELROLLE” – SPIEGEL ÜBER “GoMoPa”-Gründer STASI-Oberst Stelzer und mutmasslichen “GoMoPa”-Boss Resch

http://www.spiegel.de/spiegel/print/d-65717414.html

DUBIOS ! DUBIOS ! DUBIOS !

Anscheinend inspiriert das Wort “Dubios” die fingierte “GoMoPa”…

DIE WELT ÜBER DIE ZUSAMMENARBEIT ZWISCHEN STASI UND RAF BEI DEN RAF-MORDEN

http://www.welt.de/print/die_welt/debatte/article13627702/Mauer-aus-Schweigen.html

STASIOPFER FRAGEN – VON Ruf-MÖRDERN u. Serienbetrügern erfundene “GoMoPa-SJB”: “Wer stoppt Google-Rufmorde ?”

http://www.victims-opfer.com/?p=16359

State Department’s search for a WikiLeaks scapegoat

Hillary Clinton at the state department

Hillary Clinton at the State Department condemned the WikiLeaks release of US embassy cables, but has not commented on the department’s lax security. Photograph: Win Mcnamee/Getty Images

On the same day that more than 250,000 unredacted State Department cables hemorrhaged out onto the internet, I was interrogated for the first time in my 23-year State Department career by State’s Bureau of Diplomatic Security (DS) and told I was under investigation for allegedly disclosing classified information. The evidence of my crime? A posting on my blog from the previous month that included a link to a WikiLeaks document already available elsewhere on the web.

As we sat in a small, gray, windowless room, resplendent with a two-way mirror, multiple ceiling-mounted cameras, and iron rungs on the table to which handcuffs could be attached, the two DS agents stated that the inclusion of that link amounted to disclosing classified material. In other words, a link to a document posted by who-knows-who on a public website available at this moment to anyone in the world was the legal equivalent of me stealing a top secret report, hiding it under my coat and passing it to a Chinese spy in a dark alley.

The agents demanded to know who might be helping me with my blog (“Name names!”), if I had donated any money from my upcoming book on my wacky, year-long State Department assignment to a forward military base in Iraq, and if so, to which charities, the details of my contract with my publisher, how much money (if any) I had been paid, and – by the way – whether I had otherwise “transferred” classified information.

Had I, they asked, looked at the WikiLeaks site at home on my own time on my own computer? Every blog post, every Facebook post and every tweet by every State Department employee, they told me, must be pre-cleared by the department prior to “publication”. Then they called me back for a second 90-minute interview, stating that my refusal to answer questions would lead to my being fired, never mind the fifth (or the first) amendments.

Why me? It’s not like the Bureau of Diplomatic Security has the staff or the interest to monitor the hundreds of blogs, thousands of posts and millions of tweets by Foreign Service personnel. The answer, undoubtedly, is my new book, We Meant Well: How I Helped Lose the Battle for the Hearts and Minds of the Iraqi People. Its unvarnished portrait of State’s efforts and the US at work in Iraq has clearly angered someone, even though one part of State signed off on the book under internal clearance procedures some 13 months ago. I spent a year in Iraq leading a State Department Provincial Reconstruction Team (PRT) and, sadly, know exactly what I am talking about. DS monitoring my blog is like a small-town cop pulling over every African American driver: vindictive, selective prosecution. “Ya’ll be careful in these parts, ‘hear, ’cause we’re gonna set an example for your kind of people.”

Silly as it seems, such accusations carry a lot of weight if you work for the government. DS can unilaterally, and without any right of appeal or oversight, suspend your security clearance and for all intents and purposes end your career. The agents questioning me reminded me of just that, as well as of the potential for criminal prosecution – and all because of a link to a website, nothing more.

It was implied as well that even writing about the interrogation I underwent, as I am doing now, might morph into charges of “interfering with a government investigation”. They labelled routine documents in use in my interrogation as “law enforcement sensitive” to penalise me should I post them online. Who knew such small things actually threatened the security of the United States? Are these words so dangerous, or is our nation so fragile that legitimate criticism becomes a firing offense?

Let’s think through this disclosure of classified info thing, even if State won’t. Every website on the internet includes links to other websites. It’s how the web works. If you include a link to say, a CNN article about Libya, you are not “disclosing” that information – it’s already there. You’re just saying: “Have a look at this.” It’s like pointing out a newspaper article of interest to a guy next to you on the bus. (Careful, though, if it’s an article from the New York Times or the Washington Post: it might quote stuff from WikiLeaks and then you could be endangering national security.)

Security at State: hamburgers and mud

Security and the State Department go together like hamburgers and mud. Over the years, State has leaked like an old boot. One of its most hilarious security breaches took place when an unknown person walked into the secretary of State’s outer office and grabbed a pile of classified documents. From the vast trove of missing classified laptops to bugging devices found in its secure conference rooms, from high-ranking officials trading secrets in Vienna to top diplomats dallying with spies in Taiwan, even the publicly available list is long and ugly.

Of course, nothing compares to what history will, no doubt, record as the most significant outpouring of classified material ever: the dump of hundreds of thousands of cables that are now on display on WikiLeaks and its mushroom-like mirror sites. The Bureau of Diplomatic Security (an oxymoron if ever there was one) is supposed to protect our American diplomats by securing State’s secrets, and over time, they just haven’t done very well at that.

Bradley Manning, left, is accused of stealing classified files released by Julian Assange, rightUS soldier Bradley Manning, left, who is accused of stealing the huge database of classified files released by the WikiLeaks website of Julian Assange, right. Photograph: Associated Press/AFP/Getty ImagesThe State Department and its Bureau of Diplomatic Security never took responsibility for their part in the loss of all those cables, never acknowledged their own mistakes or porous security measures. No one will ever be fired at State because of WikiLeaks – except, at some point, possibly me. Instead, State joined in the federal mugging of army Private Bradley Manning, the person alleged to have copied the cables onto a Lady Gaga CD while sitting in the Iraqi desert.

That all those cables were available electronically to everyone from the secretary of State to a lowly army private was the result of a clumsy post-9/11 decision at the highest levels of the State Department to quickly make up for information-sharing shortcomings. Trying to please an angry Bush White House, State went from sharing almost nothing to sharing almost everything overnight. They flung their whole library onto the government’s classified intranet, SIPRnet, making it available to hundreds of thousands of federal employees worldwide. It is usually not a good idea to make classified information that broadly available when you cannot control who gets access to it outside your own organisation. The intelligence agencies and the military certainly did no such thing on SIPRnet, before or after 9/11.

State did not restrict access. If you were in, you could see it all. There was no safeguard to ask why someone in the army in Iraq in 2010 needed to see reporting from 1980s Iceland. Even inside their own organisation, State requires its employees to “subscribe” to classified cables by topic, creating a record of what you see and limiting access by justifiable need. A guy who works on trade issues for Morocco might need to explain why he asked for political-military reports from Chile.

Most for-pay porn sites limit the amount of data that can be downloaded. Not State. Once those cables were available on SIPRnet, no alarms or restrictions were implemented so that low-level users couldn’t just download terabytes of classified data. If any activity logs were kept, it does not look like anyone checked them.

A few classified State Department cables will include sourcing, details on from whom or how information was collected. This source data allows an informed reader to judge the veracity of the information – was the source on a country’s nuclear plans a street vendor or a high military officer? Despite the sometimes life-or-death nature of protecting sources (though some argue this is overstated), State simply dumped its hundreds of thousands of cables online unredacted, leaving source names there, all pink and naked in the sun.

Then again, history shows that technical security is just not State’s game, which means the WikiLeaks uproar is less of a surprise in context. For example, in 2006, news reports indicated that State’s computer systems were massively hacked by Chinese computer geeks. In 2008, State data disclosures led to an identity theft scheme only uncovered through a fluke arrest by the Washington, DC cops. Before it was closed down in 2009, snooping on private passport records was a popular intramural activity at the State Department, widely known and casually accepted. In 2011, contractors using fake identities appear to have downloaded 250,000 internal medical of State Department employees, including mine.

Wishing isn’t a strategy, hope isn’t a plan

Despite their own shortcomings, State and its Bureau of Diplomatic Security take this position: if we shut our eyes tightly enough, there is no WikiLeaks. (The morning news summary at State includes this message: “Due to the security classification of many documents, the daily addendum will not include news clips that are generated by leaked cables by the website WikiLeaks.”) The corollary to such a position evidently goes something like this: since we won’t punish our own technical security people or the big shots who approved the whole flawed scheme in the first place, and the damned first amendment doesn’t allow us to punish the New York Times, let’s just punish one of our own employees for looking at, creating links to and discussing stuff on the web – and while he was at it, writing an accurate, first-hand and critical account of the disastrous, if often farcical, American project in Iraq.

That’s what frustrated bullies do – they pick on the ones they think they can get away with beating up. The advantage of all this? It gets rid of a “troublemaker”, and the Bureau of Diplomatic Security people can claim that they are “doing something” about the WikiLeaks drip that continues even while they fiddle. Of course, it also chills free speech, sending a message to other employees about the price of speaking plainly.

Now does that make sense? Only inside the world of Diplomatic Security, where historically, it always has.

For example, Diplomatic Security famously took into custody the color slides reproduced in the Foreign Service Journal showing an open copy of one of the government’s most sensitive intelligence documents, albeit only after the photos were published and distributed in the thousands. Similarly, DS made it a crime to take photos of the giant US Embassy compound in Baghdad, but only after the architecture firm building it posted sketches of the embassy online; a Google search will still reveal many of those images; others who served in Iraq have posted them on their unsecured Facebook pages.

Imagine this: State’s employees are still blocked by a firewall from looking at websites that carry, or simply write about and refer to, WikiLeaks documents, including TomDispatch.com, which is publishing this piece. (That, in turn, means my colleagues at State won’t be able to read this – except on the sly.)

In the belly of the beast

Back in that windowless room for a second time, I faced the two DS agents clumsily trying to play semi-bad cop and altogether-bad cop. They once again reminded me of my obligation to protect classified information, and studiously ignored my response – that I indeed do take that obligation seriously; enough, in fact, to distinguish between actual disclosure and a witch-hunt.

As they raised their voices and made uncomfortable eye contact just like it says to do in any Interrogation 101 manual, you could almost imagine the hundreds of thousands of unredacted cables physically spinning through the air around us, heading – splat, splot, splat – for the web. Despite the Hollywood-style theatrics and the grim surroundings, the interrogation was less police state or 1984-style nightmare than a Brazil-like dark comedy.

In the end, though, it’s no joke. I’ve been a blogger since April, but my meeting with the DS agents somehow took place only a week before the publication date of my book. Days after my second interrogation, the principal deputy secretary of State wrote my publisher demanding small redactions in my book – already shipped to the bookstores – to avoid “harm to US security”. One demand: to cut a vignette based on a scene from the movie version of Black Hawk Down.

The link to WikiLeaks is still on my blog. The Bureau of Diplomatic Security declined my written offer to remove it, certainly an indication that however much my punishment mattered to them, the actual link mattered little. I may lose my job in State’s attempt to turn us all into mini-Bradley Mannings and so make America safe.

These are not people steeped in, or particularly appreciative of, the finer points of irony. Still, would anyone claim that there isn’t irony in the way the State Department regularly crusades for the rights of bloggers abroad in the face of all kinds of government oppression, crediting their voices for the Arab Spring, while going after one of its own bloggers at home for saying nothing that wasn’t truthful?

Here’s the best advice my friends in Diplomatic Security have to offer, as far as I can tell: slam the door after the cow has left the barn, then beat your wife as punishment. She didn’t do anything wrong, but she deserved it, and don’t you feel better now?

Süddeutsche Zeitung über die kriminellen Machenschaften der “GoMoPa”

SZ_03.09.2010_Am_virtuellen_Pranger

SPIEGEL über die Giftstudie des “GoMoPa”-Masterminds und Resch-Protege´s STASI-Oberst Ehrenfried Stelzer

http://www.spiegel.de/spiegel/print/d-13395385.html

DIE GIFTSTUDIE “TOXDAT” DES RESCH-PROTEGE´S STASI-OBERST EHRENFRIED STELZER

http://www.immobilien-vertraulich.com/law/7279-die-killer-bibel-toxdat–die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html

SPIEGEL über die STASI-Connection des mutmasslichen “GoMoPa”-Chefs Jochen Resch

http://www.spiegel.de/spiegel/print/d-65717414.html

Julian Assange: The Unauthorised Autobiography – review

Julian Assange outside the High Court in July

‘It vexes me when the world won’t listen’: Assange arrives at the High Court in July to appeal against his extradition to Sweden on sexual assault charges. Photograph: Andy Rain/EPA

Marsupials are pouched animals, mostly from Australia, that give birth to their young in an unfinished state. What we have here is a weird marsupial hybrid. It’s part Australian WikiLeaks founder Julian Assange, and part Scottish novelist and ghostwriter Andrew O’Hagan. This mixed-up creature has given birth to an unfinished draft, dragged out of its pouch and published before its maturity under the wacky title The Unauthorised Autobiography. Assange hasn’t really been well-served by his publisher’s behaviour. It’s the result of what seems to be a characteristic Assange imbroglio in which he will neither give back his £412,000 publisher’s advance, nor deliver a finally approved manuscript. But the decision by Canongate’s Jamie Byng to publish regardless, although understandable, has produced an unsatisfactory book.

The ghostwriter and his subject hadn’t yet really gelled by the time of this draft. It’s easy to see the fictionalising hand of O’Hagan in an early chapter about Assange’s hippy boyhood in northern Queensland. It begins, soulfully: “For most people, childhood is a climate. In my case, it is perfectly hot and humid with nothing above us but blue sky …” But a later section on the Aussie hacker’s souring partnership with the journalists who were to print his leaked US secrets is much more raw. The opening reads like Assange sounding off verbatim on a bad day, in a sentence full of bile and misogyny: “Vanity in a newspaper man is like perfume on a whore: they use it to fend off a dark whiff of themselves.” For by the time we reach this second half of the book, O’Hagan’s mediating intelligence seems to have retreated, and the digital recorder is doing much of the work. Perhaps the ghost got weary, locked up in a chilly East Anglian winter with his monologuing subject, who is currently confined there on bail, fighting extradition on Swedish sex allegations.

The lack of a final edit does other disservices to Assange’s story. The narrative stops too abruptly, before publication in the Guardian and the New York Times of the third and most important set of leaks he had acquired (the state department cables), and the subsequent legal pursuit of Assange on the sex complaints. It’s padded out instead with unnecessary chunks of the cables themselves, which can be read elsewhere. The unresolved criminal allegations, inevitably, make him censor a defensive account of sex with two Swedish fans. It’s all very well calling a woman “neurotic”, but did he deliberately tear a condom as she alleged?

Furthermore, a nervous Canongate libel lawyer, no longer able presumably to rely on Assange as a future witness, appears to have simply chopped out chunks of detail when Assange abuses those he doesn’t like. This censorship muddies what could have been a lively, if defamatory, narrative, and pointlessly withholds many of the names. I myself, for example, who clashed with Assange during the Guardian saga, and co-authored a book he didn’t care for, am anonymised throughout, transparently enough, as “the news reporter”. Yet Bill Keller, then editor of the New York Times and considered presumably to be libel-proof under US free-speech laws, remains relentlessly vituperated against under his own name.

A final fact-check would have removed a crop of stupid errors. It must have been a transcription mistake that turned Heather Brooke into “the ‘Independent’ journalist” rather than the independent journalist she is. And Oscar Wilde with his rent-boys was not “sleeping with panthers”, he was feasting with panthers.

For all its drawbacks, the memoir does add some good detail to the increasingly well-trodden field of Assange studies (it’s the fifth book so far). The passage in which he meets his biological father, a bohemian Sydney actor, for the first time in his 20s, is genuinely poignant: “I found myself getting sort of angry … There on shelf after shelf were the exact same books as those I had bought and read myself … If I had only known him, I might just have picked his books down from the shelf … I was forced to make myself up as I went along.”

And there’s a telling section in which Assange, perhaps unwittingly, reveals why he seeks out unquestioning disciples, and quarrels with so many others: “Opponents past and present have the same essential weakness about them – first they want to use you, then they want to be you, then they want to snuff you out. It’s a pattern that stretches in my life from toytown feds to hacks at the Guardian … Usually it ends with these people enumerating one’s personal faults, a shocking, ungrateful, unmanly effort, to be filed under despicable in my book … I’ve been meeting [these people] all my life.”

This seems to be a cry coming from a truly threatened personality, in fear of being overwhelmed and extinguished. People have criticised Assange for being preposterously grandiose and lashing out at imagined “enemies”. Perhaps they should have been kinder, for there is clearly something else at work here.

It’s a shame Assange couldn’t get on with the Guardian. As he has the grace occasionally to recognise in this book, people there share some of his beliefs – free speech, investigative journalism, standing up to big corporations and murderous governments, the potentially liberating quality of the internet. And his idea for WikiLeaks provided an exhilarating addition to the world’s journalistic possibilities. It was a neat tool – as an uncensorable global publisher of last resort, and as an electronic outlet for leaking the new kinds of huge database the computer age is bringing into existence. But unmediated leaking on a random basis, even of gigabits of purloined documents, cannot ever revolutionise all the world’s power relationships. There Assange shows, regrettably, that he is living in a fantasy world.

Behind his high-sounding talk of quantum mechanics and global conspiracies, there lies a more familiar and heartfelt cry: “If only people knew what was really going on, they’d do something about it!” One sympathises. But these very memoirs demonstrate the opposite. Nothing much happened after Assange threw back the curtain to reveal his sensationally leaked Baghdad helicopter gunship video, with US pilots mowing down Reuters employees and young children in a burst of incompetent cannon-fire. As Assange (or O’Hagan) concedes: “It vexes me when the world won’t listen.”

That was what forced him to accept an offer from some of the world’s major newspapers to make sense of the rest of his material, publish it under the authority of their own names and grant him a share of the credibility slowly built up over 190 years of reputable reporting. Thanks to that imaginative transaction, he rocketed briefly to worldwide fame. These marsupial memoirs of his seem unlikely to increase his prospects of becoming the messiah of the information age. Maybe, sadly, even the reverse.

David Leigh is the co-author of WikiLeaks: Inside Julian Assange’s War on Secrecy (Guardian Books).

Meridian Capital zu “GoMoPa”

http://meridiancapital.blogspot.com/2011/04/meridian-capital-klaus-dieter.html

TOP-SECRET – CIA Alec Station Memo of 9/11 Commission 02

alec-station-02

TOP-SECRET – CIA Alec Station Memo of 9/11 Commission 01

alec-station-01

TOP-SECRET – Localizar y detener al Dr. Goiburú

Documentos del Archivo del Terror de Paraguay implican a Fuerzas de Seguridad paraguayas y argentinas en el secuestro

National Security Archive Electronic Briefing Book No. 239 – Part III

Editado por Carlos Osorio y Marianna Enamoneta

Publicado – Diciembre 21, 2007

Para más información contactar a:
Carlos Osorio: (202) 994-7061

cosorio@gwu.edu

Peter Kornbluh: (202) 994-7116

peter.kornbluh@gmail.com

 

Menos de un mes antes de su desaparición, un agente de la inteligencia argentina remitió al Paraguay una serie de fotografías del seguimiento al Dr. Goiburú, incluyendo esta que muestra su casa y su automóvil.

Lazos Relacionados

En el 15 Aniversario del Archive del Terror
El National Security Archive pone en linea 60,000 registros de la Policia Secreta del Dictador Stroessner

Operación Cóndor en el Archivo del Terror
Evidencia contra la coordinación represiva de los militares en el Cono Sur

Centro de Documentación y Archivo para la Defensa de los Derechos Humanos (CDyA)
Repositorio del Archivo del Terror

CDyA [Sitio espejo]
en el National Security Archive

Catálogo en línea

60,000 registros del Archivo del Terror

CDyA [Sitio UNESCO]
Kansas State University 
AI Group 254 on Archive of Terror

Memoria Abierta
Catálogo de Archivos de Operación Cóndor

Archivo del Terror en YouTube

Video1

Video2

Video3

Washington D.C., Septiembre 25, 2011 – En el marco de la celebración del 15 aniversario del descubrimiento del Archivo del Terror, el National Security Archive publica hoy evidencias que las autoridades Paraguayas y Argentinas están implicadas en la desaparición del  Doctor paraguayo refugiado en Argentina, Agustín Goiburú, el 9 de febrero de 1977. Los documentos demuestran que perpetradores daban un seguimiento minucioso a Goiburú desde un año atrás hasta solo horas antes que este fuera secuestrado.

La selección aquí presentada incluye desde un informe de la inteligencia militar paraguaya, requiriendo la “localización  y detención del Dr. Agustín Goiburú” en Argentina  a finales de 1975, pasando por una reunión de coordinación entre la Policía Federal Argentina con la Policía de Asunción en 1976, hasta el seguimiento día a día de la inteligencia argentina en enero de 1977 y los informes del Cónsul paraguayo  solo 48 horas antes de la desaparición de Goiburú. A decir del Director del Proyecto del Cono Sur del National Security Archive, Carlos Osorio, “Los documentos no dejan duda que las autoridades paraguayas tuvieron los medios, la motivación y la oportunidad de secuestrar al Dr. Goiburú”.

Goiburú que por años fuera dirigente de la oposición a la dictadura del General Alfredo Stroessner, se escapó de prisión del Paraguay y se refugió en Argentina en 1970. Para 1977 se encontraba viviendo en la ciudad argentina de Paraná y era dirigente del Movimiento Popular Colorado (MOPOCO) al momento de desaparecer. Según el informe de los testigos a la policía de la ciudad de Paraná, el 9 de febrero de 1977, personas desconocidas secuestraron al Dr. Agustín Goiburú; el  automóvil de este estacionado frente a su casa fue embestido y al salir a ver que ocurría, Goiburú “fue reducido mediante armas de fuego cortas por el conductor… [Goiburú] fue introducido al automóvil Ford Falcon desapareciendo con rumbo o desconocido.”

Los documentos se encuentran entre la voluminosa evidencia albergada en el Archivo del Terror de Paraguay que sirve hoy de prueba en el caso de extradición contra el ex Ministro de Interior Paraguayo en la época, actualmente viviendo en Honduras, Sabino Montanaro, y en la reciente condena a diez años de cárcel del ex Cónsul paraguayo en la ciudad de Posadas, Argentina, Francisco Ortiz Téllez,

La evidencia ha sido acumulada gracias a la excelente pesquisa en el Archivo del Terror por  los investigadores paraguayos Rosa Palau, Alfredo Boccia Paz y Miriam Gonzalez y resumida en su libro “Es mi informe: los archivos secretos de la policía de Stroessner (Asunción : CDE, 1994)”. Esta gacetilla electrónica fue estructurada en base a este libro que aun continua siendo referencia investigativa obligada sobre el Archivo del Terror.

La selección que presentamos hoy aquí, se complementa con nuevos documentos encontrados por medio de la máquina de búsqueda del Archivo del Terror Digital (ATD), instalada por el National Security Archive en convenio con La Corte Suprema de Paraguay, en apoyo del trabajo del Centro de Documentación y Archivo (CDyA) que alberga el Archivo del Terror del Paraguay. Entre la nueva evidencia, se encuentra informes del agente de inteligencia paraguayo basado en Argentina, alias “Gendar”, que entre otros  informa que en el control del tráfico fronterizo entre Argentina y Paraguay el día de la desaparición “Hay un coche que no figura el ingreso ni egreso. Esto tiene que ver algo con el caso Goiburú (secuestro)”.


Documentos
Los documentos están en formato  PDF.
Se necesita bajar e instalar el programa gratuito Adobe Acrobat Reader para visionarlos.

Octubre 8, 1975 – Informe [Confidencial] Número 62
(Fotograma: 00050F 2475)

[Publicado originalmente en “Es mi Informe”]

El agudo interés de todo el aparataje de seguridad paraguayo por atrapar al Dr. Goiburú refugiado hacia cinco años en Argentina, transpira de este informe de agentes especiales paraguayos basados en Buenos Aires. Retransmitido por la  Dirección de Inteligencia del Estado Mayor General de las Fuerzas Armadas de Paraguay (D-2 ESMAGENFA) el informe requiere la “localización  y detención del Dr. Agustín Goiburú”  y termina diciendo  que si  Goiburú es capturado, “se solicita informar de inmediato a fin de viajar personal de esta que trabaja especialmente en este caso.”

Circa Junio, 1976 – Memorando del jefe de Investigaciones para su Excelencia, el Señor Presidente de la República
(Fotograma: 00088F 0171-0172)

[Publicado originalmente en “Es mi Informe”]

 

A pocos meses que el golpe de estado instalara la dictadura militar y desatara una ofensiva contrainsurgente en Argentina, el Jefe del Departamento de Investigaciones de Asunción Pastor Coronel, informa directamente al dictador Alfredo Stroessner que dos altos delegados de la Policía Federal Argentina han llegado a Asunción a “buscar la forma de coordinar labores.”  Pastor Coronel da cuenta que estableció con los Argentinos que “con mucho gusto intercambiaríamos  informaciones e incluso detenidos”.  “Que elementos subversivos de conocida militancia comunista… como Agustín Goiburú, trabajaron y trabajan libremente, en la Argentina…” “Que no tendríamos probablemente ningún inconveniente de entregarlo a [Amílcar] Santucho [hermano del líder guerrillero argentino Roberto Santucho,  capturado y detenido en Asunción desde mediados de 1975]  siempre y cuando también de parte de ellos tengamos la misma respuesta sobre algunos subversivos nuestros…” La coordinación entre la inteligencia paraguaya y argentina para monitorear y capturar al Dr. Agustín Goiburú dará un salto a mediados de 1976 luego de producido este Memorando y producirá numerosos informes de seguimiento al Dr. Goiburú.

Junio 18, 1976 – Antecedentes
(Fotograma: 00008F 0007-0009)

[Publicado originalmente en “Es mi Informe”]

 

En este informe de inteligencia del Departamento de Investigaciones de la Policía de Asunción, Paraguay sobre la historia política de Agustín Goiburú, se informa que el Dr. Goiburú es miembro del Ejército Popular Revolucionario (EPR), “apoyado económicamente por la Junta Coordinadora Revolucionaria [JCR]” y que ha mantenido contacto con sus miembros a través del MIR chileno, ERP argentino, ELN uruguayo e incluso con el dirigente del MLN boliviano “General Juan Jose Torres recientemente fallecido” [el subrayado es del original]. La coordinación de los  aparatos de seguridad e inteligencia de Chile, Argentina, Uruguay, Paraguay y Bolivia conocida como Operación Cóndor, tenía planteado destruir a la JCR. Así, al mismo tiempo que este Memorando era escrito, en Junio de 1976, en operaciones conjuntas en Buenos Aires, fueron asesinados el Senador uruguayo  Zelmar Michellini, el ex presidente boliviano, Juan José Torres y varios opositores de izquierda chilenos, uruguayos y bolivianos refugiados en Argentina.

Enero 1977 – [Seguimiento a Agustín Goiburú Giménez]
(Fotograma: 00050F 2445-2447)
[Fotografías de espionaje]
(Fotograma: 00050F 2448-2455)

[Publicado originalmente en “Es mi Informe”]

 

A mediados de Enero de 1977,  un par de semanas antes de la desaparición del Dr. Goiburú, un documento probablemente de la inteligencia Argentina enumera  información detallada sobre sus antecedentes, su familia, su cuenta bancaria, su horario de actividades, las personas con quien trabajaba, amistades personales, y sus actividades cotidianas. El documento que consta de 3 páginas, concluye con una descripción de sus actividades diarias descritas por una persona que lo siguió durante 5 días consecutivos entre el viernes 7 y el martes 11 de enero de 1977. El agente que escribe informa que los paraguayos residentes en Paraná, Argentina, realizaran una reunión “la próxima semana… lo que será auscultado convenientemente.” El documento es también acompañado por 8 fotografías de espionaje al  Dr. Goiburú en Paraná, su ciudad de exilio en Argentina: El Dr. y su hijo caminando por la calle, su lugar de residencia, las clínicas donde trabajaba y su automóvil.

Febrero 6, 1977 – Remitir Informe e Impartir Orden
(Fotograma: 00050F 1830)

[Inédito. Publicado por primera vez aquí]

 

Un documento de inteligencia “reservado” de origen desconocido redactado el 6 de febrero en la ciudad de Corrientes, Argentina, tres días antes de la desaparición del Dr. Goiburú, requiere que se eleve el nivel de control del paso de personas entre Paraguay y Argentina. El documento cita otro informe de inteligencia donde da cuenta de una reunión sostenida en la ciudad de Paraná, Argentina por opositores al régimen Paraguayo el 29 y 30 de enero de 1977 en la que habría participado el Dr. Goiburú. El documento da cuenta que los participantes venidos de Paraguay viajaban en tres vehículos “con patente de Asunción, Nros: 18559 – 18572 y 18573” y termina diciendo que “Se continuara investigando, se ampliara”

Febrero 7, 1977 – [Informe del Cónsul Paraguayo en Posadas]
(Fotograma: 00050F2460-1)

[Publicado originalmente en “Es mi Informe”]

 

Dos días antes de la desaparición del Doctor Goiburú, el Cónsul de  Paraguay en Posadas, Argentina,  Francisco Ortiz Téllez, informa al Ministro del Interior del Paraguay, Sabino Montanaro,  que según información del Servicio de Inteligencia del Ejército, los paraguayos de oposición residentes en la Ciudad de Paraná, Argentina, sostuvieron una reunión a finales de Enero  y se han organizado en un frente común incluyendo al MOPOCO (Movimiento Popular Colorado), Partido Comunista Paraguayo y Febrerista Liberal. “Entre las personas más conocidas se encontraban el Dr. Agustín Goiburú…” Según el informe, los opositores estarían planeando iniciar un movimiento de guerrilla armada en el Paraguay. La descripción relatada por el Cónsul paraguayo de la reunión durante la cual se formó el ‘Frente de Paraguayos Unidos’ coincide exactamente palabra por palabra, con el documento de inteligencia fechado el 6 de febrero de 1977.

Circa Marzo, 1977 – [Los Mopocos Tienen Miedo]
(Fotograma: 00153F 0155-0156)

[Inédito. Publicado por primera vez aqui]

 

Gendar, un agente secreto del Paraguay que informa regularmente al jefe del Departamento de Investigaciones Pastor Coronel sobre las actividades en las ciudades argentinas fronterizas con Paraguay, Clorinda y Formosa, envía un informe diciendo que los refugiados paraguayos del MOPOCO “se encuentran muy preocupados por el secuestro de Goiburú [en la ciudad de Paraná], que los de acá corren igual peligro.” Gendar, quien está infiltrado en la Gendarmería argentina y firma regularmente como “G5” y en una ocasión como “Benites”, termina informando que “se está controlando los elementos que arriban de otros puntos.”

Circa Marzo 1977 – [Tránsito fronterizo el día del secuestro]
(Fotograma: 00153F0149)

[Inédito. Publicado por primera vez aqui]

 

Gendar envía al jefe del Departamento de Investigaciones, “la nomina de las personas que pasaron a la Argentina en enero 1977 y que probablemente tendrían algo que ver con la reunión en Paraná” a la que asistió el Dr. Goiburú a finales de enero. Gendar confirma los números de las patentes de los automóviles en que se desplazaron los opositores Paraguayos que asistieron a la reunión, tal como lo indican informes de inteligencia previos. Sin embargo, de manera remarcable, termina diciendo “Hay un coche que no figura el ingreso ni egreso. Esto tiene que ver algo con el caso Goiburú (secuestro)”.

Septiembre 1º, 1977 – [Informe del Cónsul Paraguayo en Posadas]
(Fotograma: 0050F 2476-8)

[Publicado originalmente en “Es mi Informe”]

Siete meses tras el secuestro y desaparición del Doctor Goiburú, el Cónsul de  Paraguay en Posadas, Argentina, Francisco Ortiz Téllez informa sobre  “la versión elevada a este Consulado Nacional, por las Autoridades Militares del Servicio de Inteligencia del Ejército, sobre el supuesto secuestro del extremista Agustín Goiburú.” En lo que pareciera contradecir informes anteriores del cónsul Ortiz Téllez, la versión del Servicio de Inteligencia del Ejército en Argentina da a entender que este no tuvo nada que ver en el seguimiento los días previos al secuestro del Dr. Goiburú, y que solo tiene información policial recabada entre testigos sobre el caso del secuestro del Dr. Goiburú en la ciudad de Paraná. La aparente contradicción no es posible aclararla sin más documentación que explique el contexto de este documento. Mas allá de la contradicción sin embargo, el documento muestra el profundo interés que aun suscitaba el secuestro del Dr. Goiburú, y los esfuerzos de los aparatos de inteligencia de Argentina y Paraguay en desligarse del mismo. Por otra parte, el  informe policial contenido en este documento da una idea cabal de lo ocurrido: “El día 091115-Feb-1977, personas desconocidas secuestraron… al Dr. Agustín Goiburú…” El  automóvil de este estacionado frente a su casa fue embestido, dice el documento, y que al salir a ver que ocurría, Goiburú “fue reducido mediante armas de fuego cortas por el conductor… [Goiburú] fue introducido al automóvil Ford Falcon desapareciendo con rumbo o desconocido.”

Meridian Capital über die STASI-FÄLSCHUNGEN DER “GoMoPa”

http://meridiancapital.wordpress.com/

TOP-SECRET – EN EL 15 ANIVERSARIO DEL ARCHIVO DEL TERROR

EN EL 15 ANIVERSARIO DEL ARCHIVO DEL TERROR

EL NATIONAL SECURITY ARCHIVE PONE EN LINEA 60,000 REGISTROS DE LA POLICIA SECRETA DEL DICTADOR STROESSNER

Bajo convenio de cooperación con la Corte Suprema de Justicia del Paraguay,
el Archive lanza simultáneamente en Asunción el Archivo del Terror Digital (ATD)

Más de 300,000 documentos digitalizados para fortalecer al Centro de Documentación y Archivo para la Defensa de los Derechos Humanos (CDyA)

National Security Archive Electronic Briefing Book No. 239 – Part I

 

 

 

Washington, D.C., Septiembre 24, 2011 – En conmemoración del 15 aniversario del Archivo del Terror, el National Security Archive pone  hoy en línea el catálogo público de 60,000 registros de documentos del acervo y devela en Asunción el sistema Archivo del Terror Digital (ATD) con más de 300,000 documentos digitalizados. Acompañando la celebración el National Security Archive lanza una serie de iniciativas para dar más acceso a este acervo único en América Latina.

Carta del Jefe de la Inteligencia Chilena  al Jefe de Investigaciones Pastor Coronel del Paraguay en el marco de Operación Cóndor.

El catálogo puesto hoy en línea gracias a la cooperación del National Security Archive y la Biblioteca de la George Washington University, permite a los usuarios hacer búsquedas por nombres y fechas sobre 60,000 registros e identificar los documentos a consultar por su código de fotograma de microfilmación. Por su parte, el Archivo del Terror Digital (ATD) instalado  en las oficinas del Centro de Documentación y Archivo para la Defensa de los Derechos Humanos (CDyA), repositorio del Archivo del Terror, permite buscar sobre el acervo total de 300,000 documentos. Desde que fuera instalado como prueba en 2006, el ATD permitió doblar el número de respuestas documentales al público por el CDyA. Las dos iniciativas son el  resultado de varios convenios entre la Corte Suprema de Justicia de Paraguay y el National Security Archive, en apoyo y del CDyA.

Simultáneamente, hoy el National Security Archive pone en línea una imagen espejo del sitio web del CDyA y presenta dos gacetillas electrónicas conmemorativas con nuevas evidencias de la participación de los estados del Cono Sur en la desaparición de sus ciudadanos obtenidas con estas herramientas electrónicas junto a documentos famosos encontrados previamente en el Archivo del Terror sobre Operación Cóndor, y la desaparición del Doctor Paraguayo Agustin Goiburú en 1977.

El catálogo en línea fue originalmente desarrollado en 2002 bajo el  convenio Memoria Histórica, Democracia y Derechos Humanos (MHDDH) entre la Corte Suprema, la Universidad Católica de Asunción y el National Security Archive como un instrumento para apoyar el trabajo del CDyA. Desde entonces ha ayudado a multiplicar el número de respuesta al público. Los 60,000 documentos cuyos registros están en el MHDDH fueron  identificados por el personal experto del CDyA como más susceptibles de contener información pertinente en respuesta a peticiones de Habeas Data.

“La documentación del Archivo de Terror da prueba de cómo los estados del Cono Sur en su ceguera antiterrorista cometieron detenciones ilegales, torturas y extradiciones clandestinas. Hoy, en momentos en que estas prácticas son de común uso en aras de la guerra contra el terrorismo y cuando se destruyen documentos de este tipo por agencias de inteligencia en los Estados Unidos, es de encomiar el esfuerzo de la Corte Suprema de Justicia por preservar y hacer público este acervo para que estos abusos no se repitan.” Dice Carlos Osorio, Director del Proyecto de Documentación del Cono Sur del National Security Archive.

El National Security Archive se complace en unirse a la celebración de este 15 aniversario y se congratula de ser parte de aquellos que han apoyado a través de los años los esfuerzos de los paraguayos victimas, organismos de derechos humanos, investigadores y  jueces por preservar y dar acceso al Archivo del Terror.

***

COOPERACIÓN
National Security Archive – Corte Suprema de Justicia

En apoyo al Archivo del Terror

Carlos Osorio del National Security Archive, el Presidente de la Corte Suprema de Justicia Raúl Sapena Brugada, la Decana de Ciencias Sociales de la UCA, Carmen Quintana de Horak, y la Co-Directora del CDyA Rosa Palau durante el lanzamiento del proyecto MHDDH  

2000

Primer convenio de cooperación

El 17 de Febrero 2000 el National Security Archive y la Corte Suprema de Justicia lanzaron una iniciativa de cooperación a fin de recaudar fondos y recursos para digitalizar el acervo del CDyA, adquirir el hardware y software necesarios para hacer accesible el acervo a través del internet y capacitar al personal del CDyA. En esa ocasión se adquirió un nuevo equipo de computación y se estableció el acceso a internet del CDyA

2001 – 2002

Memoria Histórica, Democracia y Derechos Humanos (MHDDH)

En 2001, La Corte Suprema de Justicia y la Universidad Católica de Asunción, con el apoyo del National Security Archive en Washington DC, lanzaron un proyecto de dos años diseñado  para atender a los desafíos de responder al incremento de peticiones de habeas data y del público en general y el acelerado desarrollo  la tecnología digital y el internet.  El proyecto “Memoria Histórica, Democracia y Derechos Humanos (MHDDH)”. El proyecto fue financiado por el Fondo para la Democracia y los Derechos Humanos del Departamento de Estado de los Estados Unidos  y fue administrado por la US AID.  Un equipo asesor de la Corte Suprema de Justicia coordino el proyecto y sus miembros fueron Rosa Palau, Co-Directora del CDyA, el Embajador Jorge Lara Castro, catedrático de la UCA, y Carlos Osorio, Director del Proyecto de Documentación del Cono Sur del National Security Archive. Entre Septiembre 2001 y Diciembre 2002, el proyecto logro:

1)      Microfilmar 200,000 páginas del Acervo del CDyA.

El apoyo inicial proveído por US AID y la Corte Suprema de Justicia en 1993 permitió microfilmar el 60% del acervo del Archivo. El proyecto MHDDH proveyó los recursos financieros que permitieron al personal cualificado de la Corte Suprema de Justicia llevar a cabo el resto de la microfilmación. El proyecto ayudo a pagar salarios de operadores y técnicos, adquirir rollos y materiales para reencuadernar los libros microfilmados.

2) Catalogación de Sesenta Mil Documentos para responder a Habeas Data

Catálogo de 60,000 de los documentos mas pedidos

Un equipo supervisado por la Universidad Católica y dirigido por un archivista profesional, catálogo 60,000 documentos considerados los más pertinentes para responder a los centenares de peticiones de Habeas Data que recibe el CDyA anualmente. El catálogo montado en una base de datos WinIsis, permite realizar búsquedas en los campos básicos siguientes: Fecha, Nombres, Organizaciones, Términos Geográficos, Tipo de Documento, Fondo, Ubicación Física y Rollo y Número de Fotograma.

3) Acceso público al catálogo de 60,000 documentos

El proyecto diseñó el sistema para publicar este catálogo en el internet como una manera de facilitar el acceso del público al acervo del CDyA.

4) Digitalización de 300,000 documentos

El proyecto MHDDH financio la producción de más de 500,000 imágenes digitales de los documentos del acervo del CDyA, estableciendo así las bases para una futura instalación de un sistema de administración y búsqueda de un archivo digital.

5) Re equipamiento del CDyA

Se instalaron estanterías metálicas deslizantes y se adquirió material de computación

6) Gira por Washington DC

En diciembre 2002, el National Security Archive organizó una gira de capacitación para el personal del CDyA que incluyo visitas y talleres en la Universidad George Washington, el Instituto por una Sociedad Abierta, el Archivo Nacional, la Biblioteca del Congreso y la Biblioteca de la Corte Suprema de Justicia de los Estados Unidos.

 

2003 – 2007

Convenio de Archivo Digital

Se firma convenio de Cooperación entre la Corte Suprema de Justicia y el National Security Archive que busca construir el Archivo del Terror Digital (ATD) a fin de disminuir o eliminar la manipulación y así preservar los textos del acervo del CDyA: procesar las imágenes de los 300,000 documentos del acervo del CDyA por OCR, montar un sistema de administración y búsqueda sobre las imágenes, e instalar equipo  de computación e impresoras. El convenio establece las pautas para la publicación de análisis de documentación del CDyA en gacetillas electrónicas en la página web del National Security Archive. Se instaló el sistema ATD y se obtuvo impresora laser.

2007

Catálogo en Línea y Sitio Espejo

 

Se firma convenio de Cooperación entre la Corte Suprema de Justicia y el National Security Archive a fin de poner en línea el catálogo de 60,000 documentos con el apoyo de la Gelman Library de la George Washington University. El convenio incluye la puesta en línea de una imagen espejo del sitio web del CDyA

Die gesamte deutsche Presse verabscheut “GoMoPa”, deren “Kinderportal” und deren Tarnblogs wie “Schei**hausblog” sowie Extremnews und Die Bewertung

https://berndpulch.org/die-gesamte-deutsche-presse-verabscheut-die-tatsachlich-vorbestraften-%E2%80%9Cgomopa%E2%80%9D-tater-und-ihr-%E2%80%9Ckinderportal%E2%80%9D/

Published – Abbas, Netanyahu & Obama at the U.N. : responses from a Palestinian and a Jew

From: Tikkun <magazine[at]tikkun.org>
Subject: Abbas, Netanyahu & Obama at the U.N. : responses from a Palestinian and a Jew

Editor’s Note: As we often do in the magazine, the website, and these emails, here are responses you are unlikely to read or hear or see in the mass media to the President of Palestine Abbas and the Prime Minister of Israel Netanyahu in relationship to what they have been doing at the U.N. Our first respondent is a Palestinian activist in Ramallah, the second a Jewish columnist in NYC.

Kudos Mr. Abbas

Reply

Mazin Qumsiyeh mazin[at]qumsiyeh.org to rabbilerner, Human show details 11:18 AM (1 hour ago)

http://popular-resistance.blogspot.com/2011/09/kudos-mr-abbas.html

Mahmoud Abbas gave a brilliant speech at the United Nations, getting rounds of applause from most of the representatives.  I think it demonstrated clearly and unambiguously that the Palestinian leadership has been “unreasonably reasonable” and has instead seen the hopes of peace and of millions of Palestinians suffering for 63 years dashed on the rock of Israeli expansionist, colonial, and apartheid policies.  He explained that Israel has been taking one unilateral action after another each resulting in more pain and suffering for our people. Going to the UN, he explained is putting things back where the problems started (he did not use the last two words but I do).  He said a word that I think he should defend strongly that no person or country with an iota of logic or conscience should reject the Palestinian state membership in the UN or its formation in the 22% of historic Palestine that is the West Bank and Gaza.  I think he took a courageous step and gave a good performance.  Now we here on the ground in Palestine hope and will push for additional follow-up steps.  From our own perspective, three things are critical:

1)  That he and his administration now implement quickly the reconciliation agreement signed by all Palestinian factions most notably the one about creating a representative Palestinian National Council. In his speech he said he hopes this will be done in a few weeks.  We hope this  will be done quickly and not any longer than four weeks.

2) That he and his administration act quickly and decisively to really promote popular unarmed resistance throughout Palestine and among Palestinians in exile.  In forming a new government, the ministry that is now in charge of walls and settlements should be either a) dismantled or b) reconfigured.  A new strategy to encourage real nonviolent resistance must be adopted.  We must end the practice of holding a few demonstrative actions that do not disturb the occupation and that are used to enrich a few people. We must instead allow the kind of popular resistance that have been effective from our history (see my book that details challenges and opportunities learned from this history and available in Arabic and English). He also said he will pursue this.

3) The Palestinian people are waiting to see clear evidence of change; a new Palestinian Spring as Mr. Abbas called it.  This requires seeing visibly what Mr. Abbas talked about: transparency, accountability, democracy, and freedom.

There were those who worried that going to the UN will raise the expectations of the Palestinian people who then may turn to despair and more if they do not see a change on the ground.  I say a) it is great to raise the expectations, and b) we, the Palestinian people will never turn to despair but we will revolt if we do not see real changes and stronger steps. I share Abu Mazen’s hope that the international community steps up to the plate.  But I also hope that we all go back to our people and take those steps that will ensure our freedom.

I also listened to Netanyahu’s speech and was just amazed at how many lies can be packed in one speech. It is not even worth detailing except to refer you to this link: http://www.qumsiyeh.org/liesandtruths/

In this occasion, it might be worth comparing Israel and the Palestinians.

                          Israel                     Palestinians
Population----------------5.5 million Jewish---------11 million (7 million
refugees or displaced)
Land controlled ----------91.7%----------------------8.3% of historic
Palestine
Nature--------------------Occupier/colonizer---------Occupied people
Military Personnel--------Regular 175,000------------None
--------------------------Reserves, 500,000
Irregulars----------------10-50,000------------------3-5,000
--------------------------Armed settlers-------------Armed underground forces
Police/other security-----30,000---------------------50,000
Tanks----------------------3,800---------------------0
Artillery------------------1500 large----------------0
Submarines-----------------6 ------------------------0
Warships-------------------20-30---------------------0
Combat airplanes-----------2000----------------------0
Nuclear Weapons----------->300-----------------------0
GDP-----------------------$195 billion--------------$4 billion
Military expenditure------$10 billion----------------Negligible (security services)
Casuaties (63 years)-------6,000 killed--------------75,000 killed
---------------------------20,000 injured------------300,000 injured
Abducted/jailed------------30------------------------400,000
Homes demolished-----------0-------------------------50,000
Refugees created-----------0------------------------>6 million people

Mr. President, we don’t want a shortcut, we want our freedom by Abir Kopty

http://mondoweiss.net/2011/09/mr-president-we-dont-want-a-shortcut-we-want-our-freedom.html

Palestinians on statehood: ‘We want action, not votes at the UN’ Villagers who have often been at the sharp end of Palestinian-Israeli relations are skeptical about the UN route

http://www.guardian.co.uk/world/2011/sep/14/palestinian-statehood-action-un

*************************************************************************

On Israel And Palestine, Obama Is Rick Perry

President Barack Obama’s speech to the U.N. General Assembly succeeded in making clear why the Palestinians had no other choice but to take their statehood bid to the U.N. and why the United States can no longer pretend to be an “honest broker” in the conflict.

For the first time since the U.N. conferred statehood on Israel 63 years ago, the sitting U.S president told the world body that the United States will back Israel, right or wrong. The president’s speech was so one-sided, in fact, that he sounded a lot like Texas Gov. Rick Perry, who gave a similar speech to a group of “pro-Israel” right-wingers one day earlier. Perry is not the president, so his speech was different, except for the motivation, which was same.

Both speeches were standard “pro-Israel” bloviating, but Perry gave his on the campaign trail and not in front of the entire world. (I hesitate to call a speech opposing Palestinian statehood “pro-Israel” when the latest comprehensive poll on the subject says that 70 percent of Israelis say Israel should support the U.N.’s decision if statehood is granted.)

The very best explanation of what Obama did at the United Nations came from Daniel Levy, a Brit who moved to Israel right out of college 18 years ago. Levy’s quote appeared on page one of the Washington Post.

“There is virtually no thread of reason running between the way he [Obama] related to the rest of the world and its developments, particularly in the Middle East, and the positions he espoused on Israel-Palestine a conflict apparently occurring on another planet,” said Daniel Levy, co-director of the Middle East Task Force at the New America Foundation. “Palestinian freedoms, rights and self-determination are somehow supposed to be attained without the recourse to leverage, international law or meaningful international support, considered to be necessary and legitimate virtually everywhere else.”

Of course, there is one “thread,” although it is not of “reason.” Every word in Obama’s speech was designed not to advance a resolution of the Israeli-Palestinian conflict but to keep single-issue donors and, to a lesser extent, single-issue voters in his camp for the 2012 election. Not a week goes by without the Obama team sending emails out to people it deems Israel voters to remind them of all the wonderful things this president has done for Israel. One recently was dedicated to citing quotes from Prime Minister Netanyahu praising Obama, the first time I can remember that a president sought to validate himself by citing the praise of a foreign leader.

Obama isn’t lying about his “pro-Israel” record, however. This administration has been the most one-sided supporter of everything Israel asks for since 1948. There is no competition. Not even George W. Bush comes close.

When the Israelis, following Obama’s election, asked Bush to give Israel permission to bomb Iran, he said no, despite his vice president and neoconservative aides pushing the Israeli position hard. Bush also did more than Obama to advance the peace process that the Israeli right hates so much, convening an international summit at Aqaba and being the first president to say, in unambiguous terms, that the United States supports “two states, living side by side in peace and security.”

On Israel, Obama is to the right of Bush, to the right of Reagan, and certainly to the right of Clinton. On Israel and Palestine, Barack Obama is Rick Perry.

Of course, Obama’s outrageous surrender to Netanyahu still won’t impress the Israel-Firsters. They have despised him from day one, for all kinds of reasons, and predictably condemned the speech. Meanwhile, Israel’s thuggish far-right foreign minister, Avigdor Lieberman, told reporters that “I am ready to sign on this speech with both hands.”

Lieberman is telling the truth he could have written Obama’s speech and the neocons are lying. But neocons are adherents of the Sen. Mitch McConnell (R-KY) school: They have only one goal, which is to defeat this president. And although privately they celebrate their amazing success at intimidating Obama into submission, publicly they denounce him and send scary emails to senior citizens in Florida and New Jersey warning them that Obama wants to destroy Israel.

But these speeches and love-ins with Netanyahu accomplish nothing for Obama. The single-issue Israel voters and donors (3 percent of the Jewish community) will take their money and votes elsewhere.

And Netanyahu will, working from Jerusalem, do everything he can to help the Republicans win the next election. It’s almost funny how these people would exchange the person who is the most “pro-Israel” president ever (looking at it from their “maintain-the-occupation-at-all-costs” vantage point) for an unknown quantity like Perry or Romney. After all, a Republican whose main constituency is Wall Street would likely turn out to approach Israel with more skepticism than Obama does.

But it’s a game. Netanyahu and the lobby want to defeat Obama to demonstrate, yet again, who calls the shots on U.S. Middle East policy.

But forget the campaign for a moment which is what Obama should have done when addressing the U.N. The president’s speech was an embarrassing disaster. Since 2009, 1,600 Palestinians (overwhelmingly civilians and over 400 children) have been killed by the Israeli army. Thirteen Israelis have been killed over the same period. Despite that, Obama devoted 120 words of his speech to Israeli suffering (even going so far as to cite the Holocaust) and not one word to Palestinian suffering.

Example: An Australian newspaper reports on a new film about the tragedy of Palestinian women in Gaza (under full Israeli blockade) who are suffering with breast cancer but are not permitted by Israel to leave Gaza for treatment. (They used to go to Israeli hospitals or hospitals in the Arab states and Europe.) Nor does Israel permit the import of the radioactive isotopes used to treat breast cancers. So they die.

One could go on and on about the horrors of the occupation but it won’t matter to the politicians who determine U.S. foreign policy. They know which side their bread is buttered on, as Obama demonstrated at the U.N. this week.

But, I’m surprised to say, Obama did Palestinians and the 70 percent of Israelis who support statehood a big favor. By demonstrating that the United States refuses to play the role of “honest broker” and by telling the U.N. that we are Israel and Israel is us, the United States is yielding the role of Middle East peacemaker to others. The French, Turks, Indians, Brazilians, Chinese, South Africans, and Russians don’t agree on much. But they do agree on the urgency of the creation of a Palestinian state in the areas occupied in 1967. And they agree that the United States, no longer the superpower it once was, should move over and let countries not fully invested in one side play a more constructive role.

Those who wonder how these “other countries” could exert the leadership the U.S. has abdicated might consider the issue of economics, trade, etc. Israel does not live on an island with the United States. It is part of the world and not even the United States and the $3.5 billion it hands over to Israel each year (no strings attached) can save Israel if the rest of the world says “enough.”

Obama has chosen to abdicate. The rest of the world is eager to step up.

And that is why I have no doubt that the state of Palestine was created this week at the United Nations. By opting out, Obama did a tremendous favor to Palestinians and Israelis both. Palestinians will have their fully sovereign, contiguous state.  And the Jewish state of Israel will finally be secure. As Israelis like to say, “yhiyeh tov.” Or as Arabs say, “insha’Allah khair.” Everything will be fine.

———————————————–

If these emails are helpful to you, perhaps you could subscribe to Tikkun at http://www.tikkun.org so that we could afford to continue provide this service? or join our Network of Spiritual Progressives at http://www.spiritualprogressives.org.

unsubscribe: Click here

if you are having trouble unsubscribing Click here

Copyright 2010 Tikkun Magazine. Tikkun is a registered trademark.
2342 Shattuck Avenue, #1200
Berkeley, CA 94704
510-644-1200
Fax 510-644-1255

HANDELSBLATT ÜBER DIE KRIMINELLEN BETRÜGER DER “GoMoPa”

http://www.handelsblatt.com/finanzen/boerse-maerkte/boerse-inside/finanzaufsicht-untersucht-kursachterbahn-bei-wirecard/3406252.html

Zu den fingierten Betrügern der “GoMoPa” gehören auch der “Schei**hausblog” (Nomen est Omen), “Extremnews” und “Die Bewertung aus Leipzig

TOP-SECRET – EN EL 15 ANIVERSARIO DEL ARCHIVO DEL TERROR

EN EL 15 ANIVERSARIO DEL ARCHIVO DEL TERROR

EL NATIONAL SECURITY ARCHIVE PONE EN LINEA 60,000 REGISTROS DE LA POLICIA SECRETA DEL DICTADOR STROESSNER


National Security Archive Electronic Briefing Book No. 239 – Part I

 

 

 

Washington, D.C., Septiembre 23 2011 – En conmemoración del 15 aniversario del Archivo del Terror, el National Security Archive pone  hoy en línea el catálogo público de 60,000 registros de documentos del acervo y devela en Asunción el sistema Archivo del Terror Digital (ATD) con más de 300,000 documentos digitalizados. Acompañando la celebración el National Security Archive lanza una serie de iniciativas para dar más acceso a este acervo único en América Latina.

Carta del Jefe de la Inteligencia Chilena  al Jefe de Investigaciones Pastor Coronel del Paraguay en el marco de Operación Cóndor.

El catálogo puesto hoy en línea gracias a la cooperación del National Security Archive y la Biblioteca de la George Washington University, permite a los usuarios hacer búsquedas por nombres y fechas sobre 60,000 registros e identificar los documentos a consultar por su código de fotograma de microfilmación. Por su parte, el Archivo del Terror Digital (ATD) instalado  en las oficinas del Centro de Documentación y Archivo para la Defensa de los Derechos Humanos (CDyA), repositorio del Archivo del Terror, permite buscar sobre el acervo total de 300,000 documentos. Desde que fuera instalado como prueba en 2006, el ATD permitió doblar el número de respuestas documentales al público por el CDyA. Las dos iniciativas son el  resultado de varios convenios entre la Corte Suprema de Justicia de Paraguay y el National Security Archive, en apoyo y del CDyA.

Simultáneamente, hoy el National Security Archive pone en línea una imagen espejo del sitio web del CDyA y presenta dos gacetillas electrónicas conmemorativas con nuevas evidencias de la participación de los estados del Cono Sur en la desaparición de sus ciudadanos obtenidas con estas herramientas electrónicas junto a documentos famosos encontrados previamente en el Archivo del Terror sobre Operación Cóndor, y la desaparición del Doctor Paraguayo Agustin Goiburú en 1977.

El catálogo en línea fue originalmente desarrollado en 2002 bajo el  convenio Memoria Histórica, Democracia y Derechos Humanos (MHDDH) entre la Corte Suprema, la Universidad Católica de Asunción y el National Security Archive como un instrumento para apoyar el trabajo del CDyA. Desde entonces ha ayudado a multiplicar el número de respuesta al público. Los 60,000 documentos cuyos registros están en el MHDDH fueron  identificados por el personal experto del CDyA como más susceptibles de contener información pertinente en respuesta a peticiones de Habeas Data.

“La documentación del Archivo de Terror da prueba de cómo los estados del Cono Sur en su ceguera antiterrorista cometieron detenciones ilegales, torturas y extradiciones clandestinas. Hoy, en momentos en que estas prácticas son de común uso en aras de la guerra contra el terrorismo y cuando se destruyen documentos de este tipo por agencias de inteligencia en los Estados Unidos, es de encomiar el esfuerzo de la Corte Suprema de Justicia por preservar y hacer público este acervo para que estos abusos no se repitan.” Dice Carlos Osorio, Director del Proyecto de Documentación del Cono Sur del National Security Archive.

El National Security Archive se complace en unirse a la celebración de este 15 aniversario y se congratula de ser parte de aquellos que han apoyado a través de los años los esfuerzos de los paraguayos victimas, organismos de derechos humanos, investigadores y  jueces por preservar y dar acceso al Archivo del Terror.

***

COOPERACIÓN
National Security Archive – Corte Suprema de Justicia

En apoyo al Archivo del Terror

Carlos Osorio del National Security Archive, el Presidente de la Corte Suprema de Justicia Raúl Sapena Brugada, la Decana de Ciencias Sociales de la UCA, Carmen Quintana de Horak, y la Co-Directora del CDyA Rosa Palau durante el lanzamiento del proyecto MHDDH

2000

Primer convenio de cooperación

El 17 de Febrero 2000 el National Security Archive y la Corte Suprema de Justicia lanzaron una iniciativa de cooperación a fin de recaudar fondos y recursos para digitalizar el acervo del CDyA, adquirir el hardware y software necesarios para hacer accesible el acervo a través del internet y capacitar al personal del CDyA. En esa ocasión se adquirió un nuevo equipo de computación y se estableció el acceso a internet del CDyA

2001 – 2002

Memoria Histórica, Democracia y Derechos Humanos (MHDDH)

En 2001, La Corte Suprema de Justicia y la Universidad Católica de Asunción, con el apoyo del National Security Archive en Washington DC, lanzaron un proyecto de dos años diseñado  para atender a los desafíos de responder al incremento de peticiones de habeas data y del público en general y el acelerado desarrollo  la tecnología digital y el internet.  El proyecto “Memoria Histórica, Democracia y Derechos Humanos (MHDDH)”. El proyecto fue financiado por el Fondo para la Democracia y los Derechos Humanos del Departamento de Estado de los Estados Unidos  y fue administrado por la US AID.  Un equipo asesor de la Corte Suprema de Justicia coordino el proyecto y sus miembros fueron Rosa Palau, Co-Directora del CDyA, el Embajador Jorge Lara Castro, catedrático de la UCA, y Carlos Osorio, Director del Proyecto de Documentación del Cono Sur del National Security Archive. Entre Septiembre 2001 y Diciembre 2002, el proyecto logro:

1)      Microfilmar 200,000 páginas del Acervo del CDyA.

El apoyo inicial proveído por US AID y la Corte Suprema de Justicia en 1993 permitió microfilmar el 60% del acervo del Archivo. El proyecto MHDDH proveyó los recursos financieros que permitieron al personal cualificado de la Corte Suprema de Justicia llevar a cabo el resto de la microfilmación. El proyecto ayudo a pagar salarios de operadores y técnicos, adquirir rollos y materiales para reencuadernar los libros microfilmados.

2) Catalogación de Sesenta Mil Documentos para responder a Habeas Data

Catálogo de 60,000 de los documentos mas pedidos

Un equipo supervisado por la Universidad Católica y dirigido por un archivista profesional, catálogo 60,000 documentos considerados los más pertinentes para responder a los centenares de peticiones de Habeas Data que recibe el CDyA anualmente. El catálogo montado en una base de datos WinIsis, permite realizar búsquedas en los campos básicos siguientes: Fecha, Nombres, Organizaciones, Términos Geográficos, Tipo de Documento, Fondo, Ubicación Física y Rollo y Número de Fotograma.

3) Acceso público al catálogo de 60,000 documentos

El proyecto diseñó el sistema para publicar este catálogo en el internet como una manera de facilitar el acceso del público al acervo del CDyA.

4) Digitalización de 300,000 documentos

El proyecto MHDDH financio la producción de más de 500,000 imágenes digitales de los documentos del acervo del CDyA, estableciendo así las bases para una futura instalación de un sistema de administración y búsqueda de un archivo digital.

5) Re equipamiento del CDyA

Se instalaron estanterías metálicas deslizantes y se adquirió material de computación

6) Gira por Washington DC

En diciembre 2002, el National Security Archive organizó una gira de capacitación para el personal del CDyA que incluyo visitas y talleres en la Universidad George Washington, el Instituto por una Sociedad Abierta, el Archivo Nacional, la Biblioteca del Congreso y la Biblioteca de la Corte Suprema de Justicia de los Estados Unidos.

 

2003 – 2007

Convenio de Archivo Digital

Se firma convenio de Cooperación entre la Corte Suprema de Justicia y el National Security Archive que busca construir el Archivo del Terror Digital (ATD) a fin de disminuir o eliminar la manipulación y así preservar los textos del acervo del CDyA: procesar las imágenes de los 300,000 documentos del acervo del CDyA por OCR, montar un sistema de administración y búsqueda sobre las imágenes, e instalar equipo  de computación e impresoras. El convenio establece las pautas para la publicación de análisis de documentación del CDyA en gacetillas electrónicas en la página web del National Security Archive. Se instaló el sistema ATD y se obtuvo impresora laser.

2007

Catálogo en Línea y Sitio Espejo

 

Se firma convenio de Cooperación entre la Corte Suprema de Justicia y el National Security Archive a fin de poner en línea el catálogo de 60,000 documentos con el apoyo de la Gelman Library de la George Washington University. El convenio incluye la puesta en línea de una imagen espejo del sitio web del CDyA

 

TOP-SECRET – FCC Preserving Open Internet

[Federal Register Volume 76, Number 185 (Friday, September 23, 2011)]
[Rules and Regulations]
[Pages 59192-59235]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-24259]

[[Page 59191]]

Vol. 76

Friday,

No. 185

September 23, 2011

Part II

Federal Communications Commission

-----------------------------------------------------------------------

47 CFR Parts 0 and 8

Preserving the Open Internet; Final Rule

Federal Register / Vol. 76 , No. 185 / Friday, September 23, 2011 /
Rules and Regulations

[[Page 59192]]

-----------------------------------------------------------------------

FEDERAL COMMUNICATIONS COMMISSION

47 CFR Parts 0 and 8

[GN Docket No. 09-191; WC Docket No. 07-52; FCC 10-201]

Preserving the Open Internet

AGENCY: Federal Communications Commission.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: This Report and Order establishes protections for broadband
service to preserve and reinforce Internet freedom and openness. The
Commission adopts three basic protections that are grounded in broadly
accepted Internet norms, as well as our own prior decisions. First,
transparency: fixed and mobile broadband providers must disclose the
network management practices, performance characteristics, and
commercial terms of their broadband services. Second, no blocking:
fixed broadband providers may not block lawful content, applications,
services, or non-harmful devices; mobile broadband providers may not
block lawful Web sites, or block applications that compete with their
voice or video telephony services. Third, no unreasonable
discrimination: fixed broadband providers may not unreasonably
discriminate in transmitting lawful network traffic. These rules,
applied with the complementary principle of reasonable network
management, ensure that the freedom and openness that have enabled the
Internet to flourish as an engine for creativity and commerce will
continue. This framework thus provides greater certainty and
predictability to consumers, innovators, investors, and broadband
providers, as well as the flexibility providers need to effectively
manage their networks. The framework promotes a virtuous circle of
innovation and investment in which new uses of the network--including
new content, applications, services, and devices--lead to increased
end-user demand for broadband, which drives network improvements that
in turn lead to further innovative network uses.

DATES: Effective Date: These rules are effective November 20, 2011.

FOR FURTHER INFORMATION CONTACT: Matt Warner, (202) 418-2419 or e-mail,
matthew.warner@fcc.gov.

SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Report
and Order (Order) in GN Docket No. 09-191, WC Docket No. 07-52, FCC 10-
201, adopted December 21, 2010 and released December 23, 2010. The
complete text of this document is available on the Commission's Web
site at http://www.fcc.gov. It is also available for inspection and
copying during normal business hours in the FCC Reference Information
Center, Portals II, 445 12th Street, SW., Room CY-A257, Washington, DC
20554. This document may also be purchased from the Commission's
duplicating contractor, Best Copy and Printing, Inc., 445 12th Street,
SW., Room CY-B402, Washington, DC 20554, telephone (800) 378-3160 or
(202) 863-2893, facsimile (202) 863-2898, or via e-mail at http://www.bcpiweb.com.

Synopsis of the Order

I. Preserving the Free and Open Internet

    In this Order the Commission takes an important step to preserve
the Internet as an open platform for innovation, investment, job
creation, economic growth, competition, and free expression. To provide
greater clarity and certainty regarding the continued freedom and
openness of the Internet, we adopt three basic rules that are grounded
in broadly accepted Internet norms, as well as our own prior decisions:
    i. Transparency. Fixed and mobile broadband providers must disclose
the network management practices, performance characteristics, and
terms and conditions of their broadband services;
    ii. No blocking. Fixed broadband providers may not block lawful
content, applications, services, or non-harmful devices; mobile
broadband providers may not block lawful Web sites, or block
applications that compete with their voice or video telephony services;
and
    iii. No unreasonable discrimination. Fixed broadband providers may
not unreasonably discriminate in transmitting lawful network traffic.

We believe these rules, applied with the complementary principle of
reasonable network management, will empower and protect consumers and
innovators while helping ensure that the Internet continues to
flourish, with robust private investment and rapid innovation at both
the core and the edge of the network. This is consistent with the
National Broadband Plan goal of broadband access that is ubiquitous and
fast, promoting the global competitiveness of the United States.
    In late 2009, we launched a public process to determine whether and
what actions might be necessary to preserve the characteristics that
have allowed the Internet to grow into an indispensable platform
supporting our nation's economy and civic life, and to foster continued
investment in the physical networks that enable the Internet. Since
then, more than 100,000 commenters have provided written input.
Commission staff held several public workshops and convened a
Technological Advisory Process with experts from industry, academia,
and consumer advocacy groups to collect their views regarding key
technical issues related to Internet openness.
    This process has made clear that the Internet has thrived because
of its freedom and openness--the absence of any gatekeeper blocking
lawful uses of the network or picking winners and losers online.
Consumers and innovators do not have to seek permission before they use
the Internet to launch new technologies, start businesses, connect with
friends, or share their views. The Internet is a level playing field.
Consumers can make their own choices about what applications and
services to use and are free to decide what content they want to
access, create, or share with others. This openness promotes
competition. It also enables a self-reinforcing cycle of investment and
innovation in which new uses of the network lead to increased adoption
of broadband, which drives investment and improvements in the network
itself, which in turn lead to further innovative uses of the network
and further investment in content, applications, services, and devices.
A core goal of this Order is to foster and accelerate this cycle of
investment and innovation.
    The record and our economic analysis demonstrate, however, that the
openness of the Internet cannot be taken for granted, and that it faces
real threats. Indeed, we have seen broadband providers endanger the
Internet's openness by blocking or degrading content and applications
without disclosing their practices to end users and edge providers,
notwithstanding the Commission's adoption of open Internet principles
in 2005.\1\ In light of these considerations, as well as the limited
choices most consumers have for broadband service, broadband

[[Page 59193]]

providers' financial interests in telephony and pay television services
that may compete with online content and services, and the economic and
civic benefits of maintaining an open and competitive platform for
innovation and communication, the Commission has long recognized that
certain basic standards for broadband provider conduct are necessary to
ensure the Internet's continued openness. The record also establishes
the widespread benefits of providing greater clarity in this area--
clarity that the Internet's openness will continue, that there is a
forum and procedure for resolving alleged open Internet violations, and
that broadband providers may reasonably manage their networks and
innovate with respect to network technologies and business models. We
expect the costs of compliance with our prophylactic rules to be small,
as they incorporate longstanding openness principles that are generally
in line with current practices and with norms endorsed by many
broadband providers. Conversely, the harms of open Internet violations
may be substantial, costly, and in some cases potentially irreversible.
---------------------------------------------------------------------------

    \1\ In this Order we use ``broadband'' and ``broadband Internet
access service'' interchangeably, and ``broadband provider'' and
``broadband Internet access provider'' interchangeably. ``End user''
refers to any individual or entity that uses a broadband Internet
access service; we sometimes use ``subscriber'' or ``consumer'' to
refer to those end users that subscribe to a particular broadband
Internet access service. We use ``edge provider'' to refer to
content, application, service, and device providers, because they
generally operate at the edge rather than the core of the network.
These terms are not mutually exclusive.
---------------------------------------------------------------------------

    The rules we proposed in the Open Internet NPRM and those we adopt
in this Order follow directly from the Commission's bipartisan Internet
Policy Statement, adopted unanimously in 2005 and made temporarily
enforceable for certain broadband providers in 2005 and 2007; openness
protections the Commission established in 2007 for users of certain
wireless spectrum; and a notice of inquiry in 2007 that asked, among
other things, whether the Commission should add a principle of
nondiscrimination to the Internet Policy Statement. Our rules build
upon these actions, first and foremost by requiring broadband providers
to be transparent in their network management practices, so that end
users can make informed choices and innovators can develop, market, and
maintain Internet-based offerings. The rules also prevent certain forms
of blocking and discrimination with respect to content, applications,
services, and devices that depend on or connect to the Internet.
    An open, robust, and well-functioning Internet requires that
broadband providers have the flexibility to reasonably manage their
networks. Network management practices are reasonable if they are
appropriate and tailored to achieving a legitimate network management
purpose. Transparency and end-user control are touchstones of
reasonableness.
    We recognize that broadband providers may offer other services over
the same last-mile connections used to provide broadband service. These
``specialized services'' can benefit end users and spur investment, but
they may also present risks to the open Internet. We will closely
monitor specialized services and their effects on broadband service to
ensure, through all available mechanisms, that they supplement but do
not supplant the open Internet.
    Mobile broadband is at an earlier stage in its development than
fixed broadband and is evolving rapidly. For that and other reasons
discussed below, we conclude that it is appropriate at this time to
take measured steps in this area. Accordingly, we require mobile
broadband providers to comply with the transparency rule, which
includes enforceable disclosure obligations regarding device and
application certification and approval processes; we prohibit providers
from blocking lawful Web sites; and we prohibit providers from blocking
applications that compete with providers' voice and video telephony
services. We will closely monitor the development of the mobile
broadband market and will adjust the framework we adopt in this Order
as appropriate.
    These rules are within our jurisdiction over interstate and foreign
communications by wire and radio. Further, they implement specific
statutory mandates in the Communications Act (``Act'') and the
Telecommunications Act of 1996 (``1996 Act''), including provisions
that direct the Commission to promote Internet investment and to
protect and promote voice, video, and audio communications services.
    The framework we adopt aims to ensure the Internet remains an open
platform--one characterized by free markets and free speech--that
enables consumer choice, end-user control, competition through low
barriers to entry, and the freedom to innovate without permission. The
framework does so by protecting openness through high-level rules,
while maintaining broadband providers' and the Commission's flexibility
to adapt to changes in the market and in technology as the Internet
continues to evolve.

II. The Need for Open Internet Protections

    In the Open Internet NPRM (FCC 09-93 published at 74 FR 62638,
November 30, 2009), we sought comment on the best means for preserving
and promoting a free and open Internet. We noted the near-unanimous
view that the Internet's openness and the transparency of its protocols
have been critical to its unparalleled success. Citing evidence of
broadband providers covertly blocking or degrading Internet traffic,
and concern that broadband providers have the incentive and ability to
expand those practices in the near future, we sought comment on
prophylactic rules designed to preserve the Internet's prevailing norms
of openness. Specifically, we sought comment on whether the Commission
should codify the four principles stated in the Internet Policy
Statement, plus proposed nondiscrimination and transparency rules, all
subject to reasonable network management.\2\
---------------------------------------------------------------------------

    \2\ The Open Internet NPRM recast the Internet Policy Statement
principles as rules rather than consumer entitlements, but did not
change the fact that protecting and empowering end users is a
central purpose of open Internet protections.
---------------------------------------------------------------------------

    Commenters agree that the open Internet is an important platform
for innovation, investment, competition, and free expression, but
disagree about whether there is a need for the Commission to take
action to preserve its openness. Commenters who favor Commission action
emphasize the risk of harmful conduct by broadband providers, and
stress that failing to act could result in irreversible damage to the
Internet. Those who favor inaction contend that the Internet generally
is open today and is likely to remain so, and express concern that
rules aimed at preventing harms may themselves impose significant
costs. In this part, we assess these conflicting views. We conclude
that the benefits of ensuring Internet openness through enforceable,
high-level, prophylactic rules outweigh the costs. The harms that could
result from threats to openness are significant and likely
irreversible, while the costs of compliance with our rules should be
small, in large part because the rules appear to be consistent with
current industry practices. The rules are carefully calibrated to
preserve the benefits of the open Internet and increase certainty for
all Internet stakeholders, with minimal burden on broadband providers.

A. The Internet's Openness Promotes Innovation, Investment,
Competition, Free Expression, and Other National Broadband Goals

    Like electricity and the computer, the Internet is a ``general
purpose technology'' that enables new methods of production that have a
major impact on the entire economy. The Internet's founders
intentionally built a network that is open, in the sense that it has no
gatekeepers limiting innovation and

[[Page 59194]]

communication through the network.\3\ Accordingly, the Internet enables
an end user to access the content and applications of her choice,
without requiring permission from broadband providers. This
architecture enables innovators to create and offer new applications
and services without needing approval from any controlling entity, be
it a network provider, equipment manufacturer, industry body, or
government agency. End users benefit because the Internet's openness
allows new technologies to be developed and distributed by a broad
range of sources, not just by the companies that operate the network.
For example, Sir Tim Berners-Lee was able to invent the World Wide Web
nearly two decades after engineers developed the Internet's original
protocols, without needing changes to those protocols or any approval
from network operators. Startups and small businesses benefit because
the Internet's openness enables anyone connected to the network to
reach and do business with anyone else, allowing even the smallest and
most remotely located businesses to access national and global markets,
and contribute to the economy through e-commerce \4\ and online
advertising.\5\ Because Internet openness enables widespread innovation
and allows all end users and edge providers (rather than just the
significantly smaller number of broadband providers) to create and
determine the success or failure of content, applications, services,
and devices, it maximizes commercial and non-commercial innovations
that address key national challenges--including improvements in health
care, education, and energy efficiency that benefit our economy and
civic life.
---------------------------------------------------------------------------

    \3\ The Internet's openness is supported by an ``end-to-end''
network architecture that was formulated and debated in standard-
setting organizations and foundational documents. See, e.g., WCB
Letter 12/10/10, Attach. at 17-29, Vinton G. Cerf & Robert E. Kahn,
A Protocol for Packet Network Interconnection, COM-22 IEEE
Transactions of Commc'ns Tech. 637-48 (1974); WCB Letter 12/10/10,
Attach. at 30-39, J.H. Saltzer et al., End to End Arguments in
System Design, Second Int'l Conf. on Distributed Computing Systems,
509-12 (1981); WCB Letter 12/10/10, Attach. at 49-55, B. Carpenter,
Internet Engineering Task Force (``IETF''), Architectural Principles
of the Internet, RFC 1958, 1-8 (June 1996), http://www.ietf.org/rfc/rfc1958.txt; Lawrence Roberts, Multiple Computer Networks and
Intercomputer Communication, ACM Symposium on Operation System
Principles (1967). Under the end-to-end principle, devices in the
middle of the network are not optimized for the handling of any
particular application, while devices at network endpoints perform
the functions necessary to support networked applications and
services. See generally WCB Letter 12/10/10, Attach. at 40-48, J.
Kempf & R. Austein, IETF, The Rise of the Middle and the Future of
End-to-End: Reflections on the Evolution of the Internet
Architecture, RFC 3724, 1-14 (March 2004), ftp://ftp.rfc-editor.org/in-notes/rfc3724.txt.
    \4\ Business-to-consumer e-commerce was estimated to total $135
billion in 2009. See WCB Letter 12/10/10, Attach. at 81-180, Robert
D. Atkinson et al., The Internet Economy 25 Years After.com, Info.
Tech. & Innovation Found., at 24 (March 2010), available at http://www.itif.org/files/2010-25-years.pdf.
    \5\ The advertising-supported Internet sustains about $300
billion of U.S. GDP. See Google Comments at 7.
---------------------------------------------------------------------------

    The Internet's openness is critical to these outcomes, because it
enables a virtuous circle of innovation in which new uses of the
network--including new content, applications, services, and devices--
lead to increased end-user demand for broadband, which drives network
improvements, which in turn lead to further innovative network uses.
Novel, improved, or lower-cost offerings introduced by content,
application, service, and device providers spur end-user demand and
encourage broadband providers to expand their networks and invest in
new broadband technologies.\6\ Streaming video and e-commerce
applications, for instance, have led to major network improvements such
as fiber to the premises, VDSL, and DOCSIS 3.0. These network
improvements generate new opportunities for edge providers, spurring
them to innovate further.\7\ Each round of innovation increases the
value of the Internet for broadband providers, edge providers, online
businesses, and consumers. Continued operation of this virtuous circle,
however, depends upon low barriers to innovation and entry by edge
providers, which drive end-user demand. Restricting edge providers'
ability to reach end users, and limiting end users' ability to choose
which edge providers to patronize, would reduce the rate of innovation
at the edge and, in turn, the likely rate of improvements to network
infrastructure. Similarly, restricting the ability of broadband
providers to put the network to innovative uses may reduce the rate of
improvements to network infrastructure.
---------------------------------------------------------------------------

    \6\ We note that broadband providers can also be edge providers.
    \7\ For example, the increasing availability of multimedia
applications on the World Wide Web during the 1990s was one factor
that helped create demand for residential broadband services.
Internet service providers responded by adopting new network
infrastructure, modem technologies, and network protocols, and
marketed broadband to residential customers. See, e.g., WCB Letter
12/13/10, Attach. at 250-72, Chetan Sharma, Managing Growth and
Profits in the Yottabyte Era (2009), http://www.chetansharma.com/yottabyteera.htm (Yottabyte). By the late 1990s, a residential end
user could download content at speeds not achievable even on the
Internet backbone during the 1980s. See, e.g., WCB Letter 12/13/10,
Attach. at 226-32, Susan Harris & Elise Gerich, The NSFNET Backbone
Service: Chronicling the End of an Era, 10 ConneXions (April 1996),
available at http://www.merit.edu/networkresearch/projecthistory/nsfnet/nsfnet_article.php. Higher speeds and broadband's ``always
on'' capability, in turn, stimulated more innovation in
applications, from gaming to video streaming, which in turn
encouraged broadband providers to increase network speeds. WCB
Letter 12/13/10, Attach. at 233-34, Link Hoewing, Twitter, Broadband
and Innovation, PolicyBlog, Dec. 4, 2010, policyblog.verizon.com/BlogPost/626/TwitterBroadbandandInnovation.aspx.
---------------------------------------------------------------------------

    Openness also is essential to the Internet's role as a platform for
speech and civic engagement. An informed electorate is critical to the
health of a functioning democracy, and Congress has recognized that the
Internet ``offer[s] a forum for a true diversity of political
discourse, unique opportunities for cultural development, and myriad
avenues for intellectual activity.'' Due to the lack of gatekeeper
control, the Internet has become a major source of news and
information, which forms the basis for informed civic discourse. Many
Americans now turn to the Internet to obtain news,\8\ and its openness
makes it an unrivaled forum for free expression. Furthermore, local,
State, and Federal government agencies are increasingly using the
Internet to communicate with the public, including to provide
information about and deliver essential services.
---------------------------------------------------------------------------

    \8\ See WCB Letter 12/10/10, Attach. at 133-41, Pew Research
Ctr. for People and the Press, Americans Spend More Time Following
the News; Ideological News Sources: Who Watches and Why 17, 22
(Sept. 12, 2010), people-press.org/report/652/ (stating that ``44%
of Americans say they got news through one or more Internet or
mobile digital source yesterday''); WCB Letter 12/10/10, Attach. at
131-32, TVB Local Media Marketing Solutions, Local News: Local TV
Stations are the Top Daily News Source, http://www.tvb.org/planning_buying/120562 (estimating that 61% of Americans get news
from the Internet) (``TVB''). However, according to the Pew Project
for Excellence in Journalism, the majority of news that people
access online originates from legacy media. See Pew Project for
Excellence in Journalism, The State of the News Media: An Annual
Report on American Journalism (2010), http://www.stateofthemedia.org/2010/overview_key_findings.php (``Of news
sites with half a million visitors a month (or the top 199 news
sites once consulting, government and information data bases are
removed), 67% are from legacy media, most of them (48%)
newspapers.'').
---------------------------------------------------------------------------

    Television and radio broadcasters now provide news and other
information online via their own Web sites, online aggregation Web
sites such as Hulu, and social networking platforms. Local broadcasters
are experimenting with new approaches to delivering original content,
for example by creating neighborhood-focused Web sites; delivering news
clips via online video programming aggregators, including AOL and
Google's YouTube; and offering news from citizen journalists. In
addition, broadcast networks license their full-length entertainment
programs for downloading or streaming to edge providers such as Netflix
and Apple.

[[Page 59195]]

Because these sites are becoming increasingly popular with the public,
online distribution has a strategic value for broadcasters, and is
likely to provide an increasingly important source of funding for
broadcast news and entertainment programming.
    Unimpeded access to Internet distribution likewise has allowed new
video content creators to create and disseminate programs without first
securing distribution from broadcasters and multichannel video
programming distributors (MVPDs) such as cable and satellite television
companies. Online viewing of video programming content is growing
rapidly.\9\
---------------------------------------------------------------------------

    \9\ See Google Comments at 28; Motorola Comments at 5; MPAA
Comments at 5-6; DISH Reply at 4-5; WCB Letter 12/10/10, Attach. at
22-23, Online Video Goes Mainstream, eMarketer, Apr. 28, 2010,
http://www.emarketer.com/Article.aspx?R=1007664 (estimating that 29%
of Internet users younger than 25 say they watch all or most of
their TV online, that as of April 2010 67% of U.S. Internet users
watch online video each month, and that this figure will increase to
77% by 2014); WCB Letter 12/10/10, Attach. at 20-21, Chris Nuttall,
Web TVs bigger for manufacturers than 3D, Financial Times, Aug. 29,
2010, http://www.ft.com/cms/s/2/0b34043a-9fe3-11df-8cc5-00144feabdc0.html (stating that 28 million Internet-enabled TV sets
are expected to be sold in 2010, an increase of 125% from 2009); WCB
Letter 12/13/10, Attach. at 291-92, Sandvine, News and Events: Press
Releases, http://www.sandvine.com/news/pr_detail.asp?ID=288
(estimating that Netflix represents more than 20% of peak downstream
Internet traffic). Cisco expects online viewing to exert significant
influence on future demand for broadband capacity, ranking as the
top source of Internet traffic by the end of 2010 and accounting for
91% of global Internet traffic by 2014. WCB Letter 12/10/10, Attach.
at 40-42, Press Release, Cisco, Annual Cisco Visual Networking Index
Forecast Projects Global IP Traffic To Increase More than Fourfold
by 2014 (June 10, 2010), http://www.cisco.com/web/MT/news/10/news_100610.html.
---------------------------------------------------------------------------

    In the Open Internet NPRM, the Commission sought comment on
possible implications that the proposed rules might have ``on efforts
to close the digital divide and encourage robust broadband adoption and
participation in the Internet community by minorities and other
socially and economically disadvantaged groups.'' As we noted in the
Open Internet NPRM, according to a 2009 study, broadband adoption
varies significantly across demographic groups.\10\ We expect that open
Internet protections will help close the digital divide by maintaining
relatively low barriers to entry for underrepresented groups and
allowing for the development of diverse content, applications, and
services.\11\
---------------------------------------------------------------------------

    \10\ See Pew Internet & Am. Life Project, Home Broadband
Adoption (June 2009). Approximately 14 to 24 million Americans
remain without broadband access capable of meeting the requirements
set forth in Section 706 of the Telecommunications Act of 1996, as
amended. Inquiry Concerning the Deployment of Advanced
Telecommunications Capability to All Americans in a Reasonable and
Timely Fashion, and Possible Steps to Accelerate Such Deployment
Pursuant to Section 706 of the Telecommunications Act of 1996, as
Amended by the Broadband Data Improvement Act et al., Sixth
Broadband Deployment Report, 25 FCC Rcd 9556, 9557, para. 1 (2010)
(Sixth Broadband Deployment Report).
    \11\ For example, Jonathan Moore founded Rowdy Orbit IPTV, an
online platform featuring original programming for minority
audiences, because he was frustrated by the lack of representation
of people of color in traditional media. Dec. 15, 2009 Workshop Tr.
at 39-40, video available at http://www.openinternet.gov/workshops/speech-democratic-engagement-and-the-open-internet.html. The
Internet's openness--and the low costs of online entry--enables
businesses like Rowdy Orbit to launch without having to gain
approval from traditional media gatekeepers. Id. We will closely
monitor the effects of the open Internet rules we adopt in this
Order on the digital divide and on minority and disadvantaged
consumers. See generally ColorOfChange Comments; Dec. 15, 2009
Workshop Tr. at 52-60 (remarks of Ruth Livier, YLSE); 100 Black Men
of America et al. Comments at 1-2; Free Press Comments at 134-36;
Center for Media Justice et al. Comments at 7-9.
---------------------------------------------------------------------------

    For all of these reasons, there is little dispute in this
proceeding that the Internet should continue as an open platform.
Accordingly, we consider below whether we can be confident that the
openness of the Internet will be self-perpetuating, or whether there
are threats to openness that the Commission can effectively mitigate.

B. Broadband Providers Have the Incentive and Ability to Limit Internet
Openness

    For purposes of our analysis, we consider three types of Internet
activities: providing broadband Internet access service; providing
content, applications, services, and devices accessed over or connected
to broadband Internet access service (``edge'' products and services);
and subscribing to a broadband Internet access service that allows
access to edge products and services. These activities are not mutually
exclusive. For example, individuals who generate and share content such
as personal blogs or Facebook pages are both end users and edge
providers, and a single firm could both provide broadband Internet
access service and be an edge provider, as with a broadband provider
that offers online video content. Nevertheless, this basic taxonomy
provides a useful model for evaluating the risk and magnitude of harms
from loss of openness.
    The record in this proceeding reveals that broadband providers
potentially face at least three types of incentives to reduce the
current openness of the Internet. First, broadband providers may have
economic incentives to block or otherwise disadvantage specific edge
providers or classes of edge providers, for example by controlling the
transmission of network traffic over a broadband connection, including
the price and quality of access to end users. A broadband provider
might use this power to benefit its own or affiliated offerings at the
expense of unaffiliated offerings.
    Today, broadband providers have incentives to interfere with the
operation of third-party Internet-based services that compete with the
providers' revenue-generating telephony and/or pay-television services.
This situation contrasts with the first decade of the public Internet,
when dial-up was the primary form of consumer Internet access.
Independent companies such as America Online, CompuServe, and Prodigy
provided access to the Internet over telephone companies' phone lines.
As broadband has replaced dial-up, however, telephone and cable
companies have become the major providers of Internet access service.
Online content, applications, and services available from edge
providers over broadband increasingly offer actual or potential
competitive alternatives to broadband providers' own voice and video
services, which generate substantial profits. Interconnected Voice-
over-Internet-Protocol (VoIP) services, which include some over-the-top
VoIP services,\12\ ``are increasingly being used as a substitute for
traditional telephone service,'' \13\ and over-the-top

[[Page 59196]]

VoIP services represent a significant share of voice-calling minutes,
especially for international calls. Online video is rapidly growing in
popularity, and MVPDs have responded to this trend by enabling their
video subscribers to use the Internet to view their programming on
personal computers and other Internet-enabled devices. Online video
aggregators such as Netflix, Hulu, YouTube, and iTunes that are
unaffiliated with traditional MVPDs continue to proliferate and
innovate, offering movies and television programs (including broadcast
programming) on demand, and earning revenues from advertising and/or
subscriptions. Several MVPDs have stated publicly that they view these
services as a potential competitive threat to their core video
subscription service. Thus, online edge services appear likely to
continue gaining subscribers and market significance,\14\ which will
put additional competitive pressure on broadband providers' own
services. By interfering with the transmission of third parties'
Internet-based services or raising the cost of online delivery for
particular edge providers, telephone and cable companies can make those
services less attractive to subscribers in comparison to their own
offerings.
---------------------------------------------------------------------------

    \12\ The Commission's rules define interconnected VoIP as ``a
service that: (1) Enables real-time, two-way voice communications;
(2) requires a broadband connection from the user's location; (3)
requires Internet protocol-compatible customer premises equipment
(CPE); and (4) permits users generally to receive calls that
originate on the public switched telephone network and to terminate
calls to the public switched telephone network.'' 47 CFR 9.3. Over-
the-top VoIP services require the end user to obtain broadband
transmission from a third-party provider, and providers of over-the-
top VoIP can vary in terms of the extent to which they rely on their
own facilities. See SBC Commc'ns Inc. and AT&T Corp. Applications
for Approval of Transfer of Control, WC Docket No, 05-65, Memorandum
Opinion and Order, 20 FCC Rcd 18290, 18337-38, para. 86 (2005).
    \13\ Tel. Number Requirements for IP-Enabled Servs. Providers,
Report and Order, Declaratory Ruling, Order on Remand, and NPRM, 22
FCC Rcd 19531, 19547, para. 28 (2007); see also Vonage Comments at
3-4. In merger reviews and forbearance petitions, the Commission has
found the record ``inconclusive regarding the extent to which
various over-the-top VoIP services should be included in the
relevant product market for [mass market] local services.'' See,
e.g., Verizon Commc'ns Inc. and MCI, Inc. Application for Approval
of Transfer of Control, Memorandum Opinion and Order, 20 FCC Rcd
18433, 18480, para. 89 (2005); see also Petition of Qwest Corp. for
Forbearance Pursuant to 47 U.S.C. sec. 160(c) in the Phoenix,
Arizona Metropolitan Statistical Area, Memorandum Opinion and Order,
25 FCC Rcd 8622, 8650, para. 54 (2010) (Qwest Phoenix Order). In
contrast to those proceedings, we are not performing a market power
analysis in this proceeding, so we need not and do not here
determine with specificity whether, and to what extent, particular
over-the-top VoIP services constrain particular practices and/or
rates of services governed by Section 201. Cf. Qwest Phoenix Order,
25 FCC Rcd at 8647-48, paras. 46-47 (discussing the general approach
to product market definition); id. at 8651-52, paras. 55-56
(discussing the need for evidence that one service constrains the
price of another service to include them in the same product market
for purposes of a market power analysis).
    \14\ See, e.g., WCB Letter 12/10/10, Attach. at 5763, Ryan
Fleming, New Report Shows More People Dropping Cable TV for Web
Broadcasts, Digital Trends, Apr. 16, 2010, available at http://www.digitaltrends.com/computing/new-report-shows-that-more-and-more-people-are-dropping-cable-tv-in-favor-of-web-broadcasts. Congress
recently recognized these developments by expanding disabilities
access requirements to include advanced communications services. See
Twenty-First Century Communications and Video Accessibility Act,
Public Law 111-260; see also 156 CONG. REC. 6005 (daily ed. July 26,
2010) (remarks of Rep. Waxman) (this legislation before us * * *
ensur[es] that Americans with disabilities can access the latest
communications technology.); id. at 6004 (remarks of Rep. Markey)
(``[T]he bill we are considering today significantly increases
accessibility for Americans with disabilities to the indispensable
telecommunications * * * tools of the 21st century.''); Letter from
Rick Chessen, NCTA, to Marlene H. Dortch, Secretary, FCC, GN Docket
No. 09-191 at 2 n.6 (filed Dec. 10, 2010).
---------------------------------------------------------------------------

    In addition, a broadband provider may act to benefit edge providers
that have paid it to exclude rivals (for example, if one online video
site were to contract with a broadband provider to deny a rival video
site access to the broadband provider's subscribers). End users would
be harmed by the inability to access desired content, and this conduct
could lead to reduced innovation and fewer new services.\15\ Consistent
with these concerns, delivery networks that are vertically integrated
with content providers, including some MVPDs, have incentives to favor
their own affiliated content.\16\ If broadband providers had
historically favored their own affiliated businesses or those incumbent
firms that paid for advantageous access to end users, some innovative
edge providers that have today become major Internet businesses might
not have been able to survive.
---------------------------------------------------------------------------

    \15\ See generally WCB Letter 12/10/10, Attach. at 23-27, Steven
C. Salop & David Scheffman, Raising Rivals' Cost, 73 Am. Econ. Rev.
267-71 (1983); WCB Letter 12/10/10, Attach. at 1-23, Steven C. Salop
& Thomas Krattenmaker, Anticompetitive Exclusion: Raising Rivals'
Costs to Achieve Power over Price, 96 Yale L.J. 214 (1986). See also
Andrew I. Gavil et al., Antitrust Law in Perspective: Cases,
Concepts and Problems in Competition Policy 1153-92 (2d ed. 2008)
(describing how policies fostering competition spur innovation). To
similar effect, a broadband provider may raise access fees to
disfavored edge providers, reducing their ability to profit by
raising their costs and limiting their ability to compete with
favored edge providers.
    \16\ See Google Comments at 30-31; Netflix Comments at 7 n.10;
Vonage Reply at 4; WCB Letter 12/10/10, Attach. at 28-78, Austan
Goolsbee, Vertical Integration and the Market for Broadcast and
Cable Television Programming, Paper for the Federal Communications
Commission 31-32 (Sept. 5, 2007) (Goolsbee Study) (finding that
MVPDs excluded networks that were rivals of affiliated channels for
anticompetitive reasons). Cf. WCB Letter 12/10/10, Attach. at 85-87,
David Waterman & Andrew Weiss, Vertical Integration in Cable
Television 142-143 (1997) (MVPD exclusion of unaffiliated content
during an earlier time period); see also H.R. Rep. 102-628 (2d
Sess.) at 41 (1992) (``The Committee received testimony that
vertically integrated companies reduce diversity in programming by
threatening the viability of rival cable programming services.'').
In addition to the examples of actual misconduct that we provide,
the Goolsbee Study provides empirical evidence that cable providers
have acted in the past on anticompetitive incentives to foreclose
rivals, supporting our concern that these and other broadband
providers would act on analogous incentives in the future. We thus
disagree that we rely on ``speculative harms alone'' or have failed
to adduce ``empirical evidence.'' Baker Statement at * 1, * 4
(citing AT&T Reply Exh. 2 at 45 (J. Gregory Sidak & David J. Teece,
Innovation Spillovers and the ``Dirt Road'' Fallacy: The
Intellectual Bankruptcy of Banning Optional Transactions for
Enhanced Delivery over the Internet, 6 J. Competition L. & Econ.
521, 571-72 (2010)). To the contrary, the empirical evidence and the
misconduct that we describe below validate the economic theories
that inform our decision in this Order. Moreover, as we explain
below, by comparison to the benefits of the prophylactic measures we
adopt, the costs associated with these open Internet rules are
likely small.
---------------------------------------------------------------------------

    Second, broadband providers may have incentives to increase
revenues by charging edge providers, who already pay for their own
connections to the Internet, for access or prioritized access to end
users. Although broadband providers have not historically imposed such
fees, they have argued they should be permitted to do so. A broadband
provider could force edge providers to pay inefficiently high fees
because that broadband provider is typically an edge provider's only
option for reaching a particular end user.\17\ Thus broadband providers
have the ability to act as gatekeepers.\18\
---------------------------------------------------------------------------

    \17\ Some end users can be reached through more than one
broadband connection, sometimes via the same device (e.g., a
smartphone that has Wi-Fi and cellular connectivity). Even so, the
end user, not the edge provider, chooses which broadband provider
the edge provider must rely on to reach the end user.
    \18\ Also known as a ``terminating monopolist.'' See, e.g., CCIA
Comments at 7; Skype Comments at 10-11; Vonage Comments at 9-10;
Google Reply at 8-14. A broadband provider can act as a gatekeeper
even if some edge providers would have bargaining power in
negotiations with broadband providers over access or prioritization
fees.
---------------------------------------------------------------------------

    Broadband providers would be expected to set inefficiently high
fees to edge providers because they receive the benefits of those fees
but are unlikely to fully account for the detrimental impact on edge
providers' ability and incentive to innovate and invest, including the
possibility that some edge providers might exit or decline to enter the
market. The unaccounted-for harms to innovation are negative
externalities,\19\ and are likely to be particularly large because of
the rapid pace of Internet innovation, and wide-ranging because of the
role of the Internet as a general purpose technology. Moreover, fees
for access or prioritized access could trigger an ``arms race'' within
a given edge market segment. If one edge provider pays for access or
prioritized access to end users, subscribers may tend to favor that
provider's services, and competing edge providers may feel that they
must respond by paying, too.
---------------------------------------------------------------------------

    \19\ A broadband provider may hesitate to impose costs on its
own subscribers, but it will typically not take into account the
effect that reduced edge provider investment and innovation has on
the attractiveness of the Internet to end users that rely on other
broadband providers--and will therefore ignore a significant
fraction of the cost of foregone innovation. See, e.g., OIC Comments
at 20-24. If the total number of broadband subscribers shrinks,
moreover, the social costs unaccounted for by the broadband provider
could also include the lost ability of the remaining end users to
connect with the subscribers that departed (foregone direct network
effects) and a smaller potential audience for edge providers. See,
e.g., id. at 23. Broadband providers are also unlikely to fully
account for the open Internet's power to enhance civic discourse
through news and information, or for its ability to enable
innovations that help address key national challenges such as
education, public safety, energy efficiency, and health care. See
ARL et al. Comments at 3; Google Reply at 39; American Recovery and
Reinvestment Act of 2009, Public Law 111-5, 123 Stat. 115 (2009).
---------------------------------------------------------------------------

    Fees for access or prioritization to end users could reduce the
potential profit

[[Page 59197]]

that an edge provider would expect to earn from developing new
offerings, and thereby reduce edge providers' incentives to invest and
innovate.\20\ In the rapidly innovating edge sector, moreover, many new
entrants are new or small ``garage entrepreneurs,'' not large and
established firms. These emerging providers are particularly sensitive
to barriers to innovation and entry, and may have difficulty obtaining
financing if their offerings are subject to being blocked or
disadvantaged by one or more of the major broadband providers. In
addition, if edge providers need to negotiate access or prioritized
access fees with broadband providers,\21\ the resulting transaction
costs could further raise the costs of introducing new products and
might chill entry and expansion.\22\
---------------------------------------------------------------------------

    \20\ See, e.g., ALA Comments at 3-4; ColorOfChange Comments at
3; Free Press Comments at 69; Google Comments at 34; Netflix
Comments at 4; OIC Comments at 29-30; DISH Reply at 10. Such fees
could also reduce an edge provider's incentive to invest in existing
offerings, assuming the fees would be expected to increase to the
extent improvements increased usage of the edge provider's
offerings.
    \21\ Negotiations impose direct expenses and delay. See Google
Comments at 34. There may also be significant costs associated with
the possibility that the negotiating parties would reach an impasse.
See ALA Comments at 2 (``The cable TV industry offers a telling
example of the `pay to play' environment where some cable companies
do not offer their customers access to certain content because the
company has not successfully negotiated financial compensation with
the content provider.''). Edge providers may also bear costs arising
from their need to monitor the extent to which they actually receive
prioritized delivery.
    \22\ See, e.g., Google Comments at 34-35; Shane Greenstein
Notice of Ex Parte, GN Docket No. 09-191, Transaction Cost,
Transparency, and Innovation for the Internet at 19, available at
http://www.openinternet.gov/workshops/innovation-investment-and-the-open-internet.html; van Schewick Jan. 19, 2010 Ex Parte Letter,
Opening Statement at 7 (arguing that the low costs of innovation not
only make many more applications worth pursuing, but also allow a
large and diverse group of people to become innovators, which in
turn increases the overall amount and quality of innovation). There
are approximately 1,500 broadband providers in the United States.
See Wireline Competition Bureau, FCC, Internet Access Services:
Status as of December 31, 2009 at 7, tbl. 13 (Dec. 2010) (FCC
Internet Status Report), available at http://www.fcc.gov/Daily_Releases/Daily_Business/2010/db1208/DOC-303405A1.pdf. The
innovative process frequently generates a large number of attempts,
only a few of which turn out to be highly successful. Given the
likelihood of failure, and that financing is not always readily
available to support research and development, the innovation
process in many sectors of the Internet's edge is likely to be
highly sensitive to the upfront costs of developing and introducing
new products. PIC Comments at 50 (``[I]t is unlikely that new
entrants will have the ability (both financially and with regard to
information) to negotiate with every ISP that serves the markets
that they are interested in.'').
---------------------------------------------------------------------------

    Some commenters argue that an end user's ability to switch
broadband providers eliminates these problems. But many end users may
have limited choice among broadband providers, as discussed below.
Moreover, those that can switch broadband providers may not benefit
from switching if rival broadband providers charge edge providers
similarly for access and priority transmission and prioritize each edge
provider's service similarly. Further, end users may not know whether
charges or service levels their broadband provider is imposing on edge
providers vary from those of alternative broadband providers, and even
if they do have this information may find it costly to switch. For
these reasons, a dissatisfied end user, observing that some edge
provider services are subject to low transmission quality, might not
switch broadband providers (though they may switch to a rival edge
provider in the hope of improving quality).
    Some commenters contend that, in the absence of open Internet
rules, broadband providers that earn substantial additional revenue by
assessing access or prioritization charges on edge providers could
avoid increasing or could reduce the rates they charge broadband
subscribers, which might increase the number of subscribers to the
broadband network. Although this scenario is possible,\23\ no broadband
provider has stated in this proceeding that it actually would use any
revenue from edge provider charges to offset subscriber charges. In
addition, these commenters fail to account for the likely detrimental
effects of access and prioritization charges on the virtuous circle of
innovation described above. Less content and fewer innovative offerings
make the Internet less attractive for end users than would otherwise be
the case. Consequently, we are unable to conclude that the possibility
of reduced subscriber charges outweighs the risks of harm described
herein.\24\
---------------------------------------------------------------------------

    \23\  Economics literature recognizes that access charges could
be harmful under some circumstances and beneficial under others.
See, e.g., WCB Letter 12/10/10, Attach. at 1-62, E. Glen Weyl, A
Price Theory of Multi-Sided Platforms, 100 Am. Econ. Rev. 1642,
1642-72 (2010) (the effects of allowing broadband providers to
charge terminating rates to content providers are ambiguous); see
also WCB Letter 12/10/10, Attach. at 180-215, John Musacchio et al.,
A Two-Sided Market Analysis of Provider Investment Incentives with
an Application to the Net-Neutrality Issue, 8 Rev. of Network Econ.
22, 22-39 (2009) (noting that there are conditions under which ``a
zero termination price is socially beneficial''). Moreover, the
economic literature on two-sided markets is at an early stage of
development. AT&T Comments, Exh. 3, Schwartz Decl. at 16; Jeffrey A.
Eisenach (Eisenach) Reply at 11-12; cf., e.g., WCB Letter 12/10/10,
Attach. at 156-79, Mark Armstrong, Competition in Two-Sided Markets,
37 Rand J. of Econ. 668 (2006); WCB Letter 12/10/10, Attach. at 216-
302, Jean-Charles Rochet & Jean Tirole, Platform Competition in Two-
Sided Markets, 1 J. Eur. Econ. Ass'n 990 (2003).
    \24\ Indeed, demand for broadband Internet access service might
decline even if subscriber fees fell, if the conduct of broadband
providers discouraged demand by blocking end user access to
preferred edge providers, slowing non-prioritized transmission, and
breaking the virtuous circle of innovation.
---------------------------------------------------------------------------

    Third, if broadband providers can profitably charge edge providers
for prioritized access to end users, they will have an incentive to
degrade or decline to increase the quality of the service they provide
to non-prioritized traffic. This would increase the gap in quality
(such as latency in transmission) between prioritized access and non-
prioritized access, induce more edge providers to pay for prioritized
access, and allow broadband providers to charge higher prices for
prioritized access. Even more damaging, broadband providers might
withhold or decline to expand capacity in order to ``squeeze'' non-
prioritized traffic, a strategy that would increase the likelihood of
network congestion and confront edge providers with a choice between
accepting low-quality transmission or paying fees for prioritized
access to end users.
    Moreover, if broadband providers could block specific content,
applications, services, or devices, end users and edge providers would
lose the control they currently have over whether other end users and
edge providers can communicate with them through the Internet. Content,
application, service, and device providers (and their investors) could
no longer assume that the market for their offerings included all U.S.
end users. And broadband providers might choose to implement
undocumented practices for traffic differentiation that undermine the
ability of developers to create generally usable applications without
having to design to particular broadband providers' unique practices or
business arrangements.\25\
---------------------------------------------------------------------------

    \25\ See OIC Comments at 24; Free Press Comments at 45. The
transparency and reasonable network management guidelines we adopt
in this Order, in particular, should reduce the likelihood of such
fragmentation of the Internet.
---------------------------------------------------------------------------

    All of the above concerns are exacerbated by broadband providers'
ability to make fine-grained distinctions in their handling of network
traffic as a result of increasingly sophisticated network management
tools. Such tools may be used for beneficial purposes, but they also
increase broadband providers' ability to act on incentives to engage in

[[Page 59198]]

network practices that would erode Internet openness.\26\
---------------------------------------------------------------------------

    \26\ See CCIA/CEA Comments at 4; Free Press Comments at 29-30,
143-46; Google Comments at 32-34; Netflix Comments at 3; OIC
Comments at 14, 79-82; DISH Reply at 8-9; IPI Reply at 9; Vonage
Reply at 5. For examples of network management tools, see, for
example, WCB Letter 12/10/10, Attach. at 1-8, Allot Service Gateway,
Pushing the DPI Envelope: An Introduction, at 2 (June 2007),
available at http://www.sysob.com/download/AllotServiceGateway.pdf
(``Reduce the performance of applications with negative influence on
revenues (e.g. competitive VoIP services).''); WCB Letter 12/13/10,
Attach. at 289-90, Procera Networks, PLR, http://www.proceranetworks.com/customproperties/tag/Products-PLR.html; WCB
Letter 12/13/10, Attach. at 283-88, Cisco, http//:www.cisco.com/en/US/prod/collateral/ps7045/ps6129/ps6133/ps6150/prod_brochure0900aecd8025258e.pdf (marketing the ability of equipment to
identify VoIP, video, and other traffic types). Vendors market their
offerings as enabling broadband providers to ``make only modest
incremental infrastructure investments and to control operating
costs.'' WCB Letter 12/13/10, Attach. at 283, Cisco.
---------------------------------------------------------------------------

    Although these threats to Internet-enabled innovation, growth, and
competition do not depend upon broadband providers having market power
with respect to end users,\27\ most would be exacerbated by such market
power. A broadband provider's incentive to favor affiliated content or
the content of unaffiliated firms that pay for it to do so, its
incentive to block or degrade traffic or charge edge providers for
access to end users, and its incentive to squeeze non-prioritized
transmission will all be greater if end users are less able to respond
by switching to rival broadband providers. The risk of market power is
highest in markets with few competitors, and most residential end users
today have only one or two choices for wireline broadband Internet
access service. As of December 2009, nearly 70 percent of households
lived in census tracts where only one or two wireline or fixed wireless
firms provided advertised download speeds of at least 3 Mbps and upload
speeds of at least 768 Kbps \28\--the closest observable benchmark to
the minimum download speed of 4 Mbps and upload speed of 1 Mbps that
the Commission has used to assess broadband deployment. About 20
percent of households are in census tracts with only one provider
advertising at least 3 Mbps down and 768 Kbps up. For Internet service
with advertised download speeds of at least 10 Mbps down and upload
speeds of at least 1.5 Mbps up, nearly 60 percent of households lived
in census tracts served by only one wireline or fixed wireless
broadband provider, while nearly 80 percent lived in census tracts
served by no more than two wireline or fixed wireless broadband
providers.
---------------------------------------------------------------------------

    \27\ Because broadband providers have the ability to act as
gatekeepers even in the absence of market power with respect to end
users, we need not conduct a market power analysis.
    \28\ See FCC Internet Status Report at 7, fig. 3(a). A broadband
provider's presence in a census tract does not mean it offers
service to all potential customers within that tract. And the data
reflect subscriptions, not network capability.
---------------------------------------------------------------------------

    Including mobile broadband providers does not appreciably change
these numbers.\29\ The roll-out of next generation mobile services is
at an early stage, and the future of competition in residential
broadband is unclear.\30\ The record does not enable us to make a
predictive judgment that the future will be more competitive than the
past. Although wireless providers are increasingly offering faster
broadband services, we do not know, for example, how end users will
value the trade-offs between the benefits of wireless service (e.g.,
mobility) and the benefits of fixed wireline service (e.g., higher
download and upload speeds).\31\ We note that the two largest mobile
broadband providers also offer wireline or fixed service; \32\ this
could dampen their incentive to compete aggressively with wireline (or
fixed) services.\33\
---------------------------------------------------------------------------

    \29\ In December 2009, nearly 60% of households lived in census
tracts where no more than two broadband providers offered service
with 3 Mbps down and 768 Kbps up, while no mobile broadband
providers offered service with 10 Mbps down and 1.5 Mbps up. Id. at
8, fig. 3(b). Mobile broadband providers generally have offered
bandwidths lower than those available from fixed providers. See
Yottabyte at 13-14.
    \30\ See National Broadband Plan at 40-42. A number of
commenters discuss impediments to increased competition. See, e.g.,
Ad Hoc Comments at 9; Google Comments, at 18-22; IFTA Comments at
10-11; see also WCB Letter 12/10/10, Attach. at 9-16, Thomas Monath
et al., Economics of Fixed Broadband Network Strategies, 41 IEEE
Comm. Mag. 132, 132-39 (Sept. 2003).
    \31\ See Ad Hoc Comments at 9; Google Comments at 21; Vonage
Comments at 8; IPI Reply at 14; WCB Letter 12/10/10, Attach. at 56-
65, Vikram Chandrasekhar & Jeffrey G. Andrews, Femtocell Networks: A
Survey, 46 IEEE Comm. Mag., Sept. 2008, 59, at 59-60 (explaining
mobile spectrum alone cannot compete with wireless connections to
fixed networks). We also do not know how offers by a single wireless
broadband provider for both fixed and mobile broadband services will
perform in the marketplace.
    \32\ See OIC Comments at 71-72. Large cable companies that
provide fixed broadband also have substantial ownership interests in
Clear, the 4G wireless venture in which Sprint has a majority
ownership interest.
    \33\ OIC Comments at 71-72; Skype Comments at 10. In cellular
telephony, multimarket conduct has been found to dampen competition.
See WCB Letter 12/10/10, Attach. at 1-24, P.M. Parker and L.H.
R[ouml]ller, Collusive conduct in duopolies: Multimarket contact and
cross ownership in the mobile telephone industry, 28 Rand J. Of
Econ. 304, 304-322 (Summer 1997); WCB Letter 12/10/10, Attach. at
25-58, Meghan R. Busse, Multimarket contact and price coordination
in the cellular telephone industry, 9 J. of Econ. & Mgmt. Strategy
287, 287-320 (Fall 2000). Moreover, some fixed broadband providers
also provide necessary inputs to some mobile providers' offerings,
such as backhaul transport to wireline facilities.
---------------------------------------------------------------------------

    In addition, customers may incur significant costs in switching
broadband providers \34\ because of early termination fees; \35\ the
inconvenience of ordering, installation, and set-up, and associated
deposits or fees; possible difficulty returning the earlier broadband
provider's equipment and the cost of replacing incompatible customer-
owned equipment; the risk of temporarily losing service; the risk of
problems learning how to use the new service; and the possible loss of
a provider-specific e-mail address or Web site.
---------------------------------------------------------------------------

    \34\ ARL et al. Comments at 5; Google Comments at 21-22; Netflix
Comments at 5; New Jersey Rate Counsel (NJRC) Comments at 17; OIC
Comments at 40, 73; PIC Comments at 23; Skype Comments at 12; OIC
Reply at 20-21; Paul Misener (Amazon.com) Comments at 2; see also
WCB Letter 12/10/10, Attach. at 59-76, Patrick Xavier & Dimitri
Ypsilanti, Switching Costs and Consumer Behavior: Implications for
Telecommunications Regulation, 10(4) Info 2008, 13, 13-29 (2008).
Churn is a function of many factors. See, e.g., WCB Letter 12/10/10,
Attach. at 1-53, 97-153, AT&T Comments, WT Docket No. 10-133, at 51
(Aug. 2, 2010). The evidence in the record, e.g., AT&T Comments at
83, is not probative as to the extent of competition among broadband
providers because it does not appropriately isolate a connection
between churn levels and the extent of competition.
    \35\ Google Comments at 21-22. Of broadband end users with a
choice of broadband providers, 32% said paying termination fees to
their current provider was a major reason why they have not switched
service. FCC, Broadband Decision: What Drives Consumers to Switch--
Or Stick With--Their Broadband Internet Provider 8 (Dec. 2010) (FCC
Internet Survey), available at hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-303264A1.pdf.
---------------------------------------------------------------------------

C. Broadband Providers Have Acted To Limit Openness

    These dangers to Internet openness are not speculative or merely
theoretical. Conduct of this type has already come before the
Commission in enforcement proceedings. As early as 2005, a broadband
provider that was a subsidiary of a telephone company paid $15,000 to
settle a Commission investigation into whether it had blocked Internet
ports used for competitive VoIP applications. In 2008, the Commission
found that Comcast disrupted certain peer-to-peer (P2P) uploads of its
subscribers, without a reasonable network management justification and
without disclosing its actions. Comparable practices have been observed
in the provision of mobile broadband services. After entering into a
contract with a company to handle online payment services, a mobile
wireless provider allegedly blocked customers' attempts to use
competing services to make purchases using their mobile phones. A
nationwide mobile provider restricted the types of lawful applications
that could be accessed over its 3G mobile wireless network.

[[Page 59199]]

    There have been additional allegations of blocking, slowing, or
degrading P2P traffic. We do not determine in this Order whether any of
these practices violated open Internet principles, but we note that
they have raised concerns among edge providers and end users,
particularly regarding lack of transparency. For example, in May 2008 a
major cable broadband provider acknowledged that it had managed the
traffic of P2P services. In July 2009, another cable broadband provider
entered into a class action settlement agreement stating that it had
``ceased P2P Network Management Practices,'' but allowing the provider
to resume throttling P2P traffic.\36\ There is evidence that other
broadband providers have engaged in similar degradation.\37\ In
addition, broadband providers' terms of service commonly reserve to the
provider sweeping rights to block, degrade, or favor traffic. For
example, one major cable provider reserves the right to engage,
``without limitation,'' in ``port blocking, * * * traffic
prioritization and protocol filtering.'' Further, a major mobile
broadband provider prohibits use of its wireless service for
``downloading movies using peer-to-peer file sharing services'' and
VoIP applications. And a cable modem manufacturer recently filed a
formal complaint with the Commission alleging that a major broadband
Internet access service provider has violated open Internet principles
through overly restrictive device approval procedures.
---------------------------------------------------------------------------

    \36\ See RCN Settlement Agreement sec. 3.2. RCN denied any
wrongdoing, but it acknowledges that in order to ease network
congestion, it targeted specific P2P applications. See Letter from
Jean L. Kiddo, RCN, to Marlene Dortch, Secretary, FCC, GN Docket No.
09-191, WC Docket No. 07-52, at 2-5 (filed May 7, 2010).
    \37\ A 2008 study by the Max Planck Institute revealed
significant blocking of BitTorrent applications in the United
States. Comcast and Cox were both cited as examples of providers
blocking traffic. See generally WCB Letter 12/10/10, Attach. at 75-
80, Marcel Dischinger et al., Max Planck Institute, Detecting
BitTorrent Blocking (2008), available at broadband.mpi-sws.org/transparency/results/08_imc_blocking.pdf; see also WCB Letter 12/
13/10, Attach. at 235-39, Max Planck Institute for Software Systems,
Glasnost: Results from Tests for BitTorrent Traffic Blocking,
broadband.mpi-sws.org/transparency/results; WCB Letter 12/13/10,
Attach. at 298-315, Christian Kreibich et al., Netalyzr:
Illuminating Edge Network Neutrality, Security, and Performance 15
(2010), available at http://www.icsi.berkeley.edu/pubs/techreports/TR-10-006.pdf.
---------------------------------------------------------------------------

    These practices have occurred notwithstanding the Commission's
adoption of open Internet principles in the Internet Policy Statement;
enforcement proceedings against Madison River Communications and
Comcast for their interference with VoIP and P2P traffic, respectively;
Commission orders that required certain broadband providers to adhere
to open Internet obligations; longstanding norms of Internet openness;
and statements by major broadband providers that they support and are
abiding by open Internet principles.

D. The Benefits of Protecting the Internet's Openness Exceed the Costs

    Widespread interference with the Internet's openness would likely
slow or even break the virtuous cycle of innovation that the Internet
enables, and would likely cause harms that may be irreversible or very
costly to undo. For example, edge providers could make investments in
reliance upon exclusive preferential arrangements with broadband
providers, and network management technologies may not be easy to
change.\38\ If the next revolutionary technology or business is not
developed because broadband provider practices chill entry and
innovation by edge providers, the missed opportunity may be
significant, and lost innovation, investment, and competition may be
impossible to restore after the fact. Moreover, because of the
Internet's role as a general purpose technology, erosion of Internet
openness threatens to harm innovation, investment in the core and at
the edge of the network, and competition in many sectors, with a
disproportionate effect on small, entering, and non-commercial edge
providers that drive much of the innovation on the Internet.\39\
Although harmful practices are not certain to become widespread, there
are powerful reasons for immediate concern, as broadband providers have
interfered with the open Internet in the past and have incentives and
an increasing ability to do so in the future. Effective open Internet
rules can prevent or reduce the risk of these harms, while helping to
assure Americans unfettered access to diverse sources of news,
information, and entertainment, as well as an array of technologies and
devices that enhance health, education, and the environment.
---------------------------------------------------------------------------

    \38\ As one example, Comcast's transition to a protocol-agnostic
network management practice took almost nine months to complete. See
Letter from Kathryn A. Zachem, V.P., Regulatory Affairs, Comcast
Corp., to Marlene Dortch, Secretary, FCC, WC Docket No. 07-52 at 2
(filed July 10, 2008); Letter from Kathryn A. Zachem, V.P.,
Regulatory Affairs, Comcast Corp., to Marlene Dortch, Secretary,
FCC, WC Docket No. 07-52 at Attach. B at 3, 9 (filed Sept. 19, 2008)
(noting that the transition required ``lab tests, technical trials,
customer feedback, vendor evaluations, and a third-party consulting
analysis,'' as well as trials in five markets).
    \39\ See, e.g., ALA Comments at 2; IFTA Comments at 14. Even
some who generally oppose open Internet rules agree that extracting
access fees from entities that produce content or services without
the anticipation of financial reward would have significant adverse
effects. See WCB Letter 12/10/10, Attach. at 35-80, C. Scott
Hemphill, Network Neutrality and the False Promise of Zero-Price
Regulation, 25 Yale J. on Reg. 135, 161-62 (2008) (``[S]ocial
production has distinctive features that make it unusually valuable,
but also unusually vulnerable, to a particular form of exclusion.
That mechanism of exclusion is not subject to the prohibitions of
antitrust law, moreover, presenting a relatively stronger argument
for regulation.''), cited in Prof. Tim Wu Comments at 9 n.22.
---------------------------------------------------------------------------

    By comparison to the benefits of these prophylactic measures, the
costs associated with the open Internet rules adopted here are likely
small. Broadband providers generally endorse openness norms--including
the transparency and no blocking principles--as beneficial and in line
with current and planned business practices (though they do not
uniformly support rules making them enforceable).\40\ Even to the
extent rules require some additional disclosure of broadband providers'
practices, the costs of compliance should be modest. In addition, the
high-level rules we adopt carefully balance preserving the open
Internet against avoiding unduly burdensome regulation. Our rules
against blocking and unreasonable discrimination are subject to
reasonable network management, and our rules do not prevent broadband
providers from offering specialized services such as facilities-based
VoIP. In short, rules that reinforce the openness that has supported
the growth of the Internet, and do not substantially change this highly
successful status quo, should not entail significant compliance costs.
---------------------------------------------------------------------------

    \40\ We note that many broadband providers are, or soon will be,
subject to open Internet requirements in connection with grants
under the Broadband Technology Opportunities Program (BTOP). The
American Recovery and Reinvestment Act of 2009 required that
nondiscrimination and network interconnection obligations be
``contractual conditions'' of all BTOP grants. Public Law 111-5,
sec. 6001(j), 123 Stat. 115 (codified at 47 U.S.C. sec. 1305). These
nondiscrimination and interconnection conditions require BTOP
grantees, among other things, to adhere to the principles in the
Internet Policy Statement; to display any network management
policies in a prominent location on the service provider's Web site;
and to offer interconnection where technically feasible.
---------------------------------------------------------------------------

    Some commenters contend that open Internet rules are likely to
reduce investment in broadband deployment. We disagree. There is no
evidence that prior open Internet obligations have discouraged
investment; \41\ and

[[Page 59200]]

numerous commenters explain that, by preserving the virtuous circle of
innovation, open Internet rules will increase incentives to invest in
broadband infrastructure. Moreover, if permitted to deny access, or
charge edge providers for prioritized access to end users, broadband
providers may have incentives to allow congestion rather than invest in
expanding network capacity. And as described in Part III, below, our
rules allow broadband providers sufficient flexibility to address
legitimate congestion concerns and other network management
considerations. Nor is there any persuasive reason to believe that in
the absence of open Internet rules broadband providers would lower
charges to broadband end users, or otherwise change their practices in
ways that benefit innovation, investment, competition, or end users.
---------------------------------------------------------------------------

    \41\ See, e.g., Free Press Comments at 4, 23-25; Google Comments
at 38-39; XO Comments at 12. In making prior investment decisions,
broadband providers could not have reasonably assumed that the
Commission would abstain from regulating in this area, as the
Commission's decisions classifying cable modem service and wireline
broadband Internet access service as information services included
notices of proposed rulemaking seeking comment on whether the
Commission should adopt rules to protect consumers. See Appropriate
Framework for Broadband Access to the Internet Over Wireline
Facilities et al., Report and Order and NPRM, 20 FCC Rcd 14853,
14929-35, paras. 146-59 (2005); Inquiry Concerning High-Speed Access
to the Internet Over Cable & Other Facilities et al., Declaratory
Ruling and NPRM, 17 FCC-- Rcd 4798, 4839-48, paras. 72-95 (2002)
(seeking comment on whether the Commission should require cable
operators to give unaffiliated ISPs access to broadband cable
networks); see also AT&T Comments at 8 (``[T]he existing principles
already address any blocking or degradation of traffic and thus
eliminate any theoretical leverage providers may have to impose
[unilateral `tolls'].'').
---------------------------------------------------------------------------

    The magnitude and character of the risks we identify make it
appropriate to adopt prophylactic rules now to preserve the openness of
the Internet, rather than waiting for substantial, pervasive, and
potentially irreversible harms to occur before taking any action. The
Supreme Court has recognized that even if the Commission cannot
``predict with certainty'' the future course of a regulated market, it
may ``plan in advance of foreseeable events, instead of waiting to
react to them.'' Moreover, as the Commission found in another context,
``[e]xclusive reliance on a series of individual complaints,'' without
underlying rules, ``would prevent the Commission from obtaining a clear
picture of the evolving structure of the entire market, and addressing
competitive concerns as they arise. * * * Therefore, if the Commission
exclusively relied on individual complaints, it would only become aware
of specific * * * problems if and when the individual complainant's
interests coincided with those of the interest of the overall `public.'
''
    Finally, we note that there is currently significant uncertainty
regarding the future enforcement of open Internet principles and what
constitutes appropriate network management, particularly in the wake of
the court of appeals' vacatur of the Comcast Network Management
Practices Order. A number of commenters, including leading broadband
providers, recognize the benefits of greater predictability regarding
open Internet protections.\42\ Broadband providers benefit from
increased certainty that they can reasonably manage their networks and
innovate with respect to network technologies and business models. For
those who communicate and innovate on the Internet, and for investors
in edge technologies, there is great value in having confidence that
the Internet will remain open, and that there will be a forum available
to bring complaints about violations of open Internet standards.\43\
End users also stand to benefit from assurances that services on which
they depend ``won't suddenly be pulled out from under them, held ransom
to extra payments either from the sites or from them.'' Providing clear
yet flexible rules of the road that enable the Internet to continue to
flourish is the central goal of the action we take in this Order.\44\
---------------------------------------------------------------------------

    \42\ For example, AT&T has recognized that open Internet rules
``would reduce regulatory uncertainty, and should encourage
investment and innovation in next generation broadband services and
technologies.'' See WCB Letter 12/10/10, Attach. at 94, AT&T
Statement on Proposed FCC Rules to Preserve an Open Internet, AT&T
Public Policy Blog, Dec. 1, 2010, attpublicpolicy.com/government-policy/att-statement-on-proposed-fcc-rules-to-preserve-an-open-internet. Similarly, Comcast acknowledged that our proposed rules
would strike ``a workable balance between the needs of the
marketplace and the certainty that carefully-crafted and limited
rules can provide to ensure that Internet freedom and openness are
preserved.'' See David L. Cohen, FCC Proposes Rules to Preserve an
Open Internet, comcastvoices, Dec. 1, 2010, blog.comcast.com/2010/12/fcc-proposes-rules-to-preserve-an-open-internet.html; see also,
e.g., Final Brief for Intervenors NCTA and NBC Universal, Inc. at
11-13; 19-22, Comcast Corp. v. FCC, 600 F.3d 642 (DC Cir. 2010) (No.
08-1291). In addition to broadband providers, an array of industry
leaders, venture capitalists, and public interest groups have
concluded that our rules will promote investment in the Internet
ecosystem by removing regulatory uncertainty. See Free Press
Comments at 10; Google Comments at 40; PIC Comments at 28; WCB
Letter 12/10/10, Attach. at 91 (statement of CALinnovates.org), 96
(statement of Larry Cohen, president of the Communications Workers
of America), 98 (statement of Ron Conway, founder of SV Angel), 99
(statement of Craig Newmark, founder of craigslist), 105 (statement
of Dean Garfield, president and CEO of the Information Technology
Industry Council), 111 (Dec. 8, 2010 letter from Jeremy Liew,
Managing Director, Lightspeed Venture Partners to Julius
Genachowski, FCC Chairman), 112 (Dec. 1, 2010 letter from Jed Katz,
Managing Director, Javelin Venture Partners to Julius Genachowski,
FCC Chairman), 127 (statement of Gary Shapiro, president and CEO of
the Consumer Electronics Association), 128 (statement of Ram
Shriram, founder of Sherpalo Ventures), 132 (statements of Rey
Ramsey, President and CEO of TechNet, and John Chambers, Chairman
and CEO of Cisco), 133 (statement of John Doerr, Kleiner Perkins
Caufield & Byers); XO Reply at 6.
    \43\ For this reason, we are not persuaded that alternative
approaches, such as rules that lack a formal enforcement mechanism,
a transparency rule alone, or reliance entirely on technical
advisory groups to resolve disputes, would adequately address the
potential harms and be less burdensome than the rules we adopt here.
See, e.g., Verizon Comments at 130-34. In particular, we reject the
notion that Commission action is unnecessary because the Department
of Justice and the Federal Trade Commission (FTC) ``are well
equipped to cure any market ills.'' Id. at 9. Our statutory
responsibilities are broader than preventing antitrust violations or
unfair competition. See, e.g., News Corp. and DIRECTV Group, Inc.,
23 FCC Rcd 3265, 3277-78, paras. 23-25 (2008). We must, for example,
promote deployment of advanced telecommunications capability, ensure
that charges in connection with telecommunications services are just
and reasonable, ensure the orderly development of local television
broadcasting, and promote the public interest through spectrum
licensing. See CDT Comments at 8-9; Comm'r Jon Liebowitz, FTC,
Concurring Statement of Commissioner Jon Leibowitz Regarding the
Staff Report: ``Broadband Connectivity Competition Policy'' (2007),
available at http://www.ftc.gov/speeches/leibowitz/V070000statement.pdf (``[T]here is little agreement over whether
antitrust, with its requirements for ex post case by case analysis,
is capable of fully and in a timely fashion resolving many of the
concerns that have animated the net neutrality debate.'').
    \44\ Contrary to the suggestion of some, neither the Department
of Justice nor the FTC has concluded that the broadband market is
competitive or that open Internet rules are unnecessary. See
McDowell Statement at *4; Baker Statement at *3. In the submission
in question, the Department observed that: (1) The wireline
broadband market is highly concentrated, with most consumers served
by at most two providers; (2) the prospects for additional wireline
competition are dim due to the high fixed and sunk costs required to
provide wireline broadband service; and (3) the extent to which
mobile wireless offerings will compete with wireline offerings is
unknown. See DOJ Ex Parte Jan. 4, 2010, GN Dkt. No. 09-51, at 8, 10,
13-14. The Department specifically endorsed requiring greater
transparency by broadband providers, id. at 25-27, and recognized
that in concentrated markets, like the broadband market, it is
appropriate for policymakers to limit ``business practices that
thwart innovation.'' Id. at 11. Finally, although the Department
cautioned that care must be taken to avoid stifling infrastructure
investment, it expressed particular concern about price regulation,
which we are not adopting. Id. at 28. In 2007, the FTC issued a
staff report on broadband competition policy. See FTC, Broadband
Connectivity Competition Policy (June 2007). Like the Department,
the FTC staff did not conclude that the broadband market is
competitive. To the contrary, the FTC staff made clear that it had
not studied the state of competition in any specific markets. Id. at
8, 105, 156. With regard to the merits of open Internet rules, the
FTC staff report recited arguments pro and con, see, e.g., id. at
82, 105, 147-54, and called for additional study, id. at 7, 9-10,
157.
---------------------------------------------------------------------------

III. Open Internet Rules

    To preserve the Internet's openness and broadband providers'
ability to manage and expand their networks, we adopt high-level rules
embodying four core principles: transparency, no blocking, no
unreasonable discrimination, and reasonable network management. These
rules are generally consistent with, and should not require

[[Page 59201]]

significant changes to, broadband providers' current practices, and are
also consistent with the common understanding of broadband Internet
access service as a service that enables one to go where one wants on
the Internet and communicate with anyone else online.\45\
---------------------------------------------------------------------------

    \45\ The definition of ``broadband Internet access service''
proposed in the Open Internet NPRM encompassed any ``Internet
Protocol data transmission between an end user and the Internet.''
Open Internet NPRM, 24 FCC Rcd at 13128, App. A. Some commenters
argued that this definition would cover a variety of services that
do not constitute broadband Internet access service as end users and
broadband providers generally understand that term, but that merely
offer data transmission between a discrete set of Internet endpoints
(for example, virtual private networks, or videoconferencing
services). See, e.g., AT&T Comments at 96-100; Communications
Workers of America (CWA) Comments at 10-12; Sprint Reply at 16-17;
see also CDT Comments at 49-50 (distinguishing managed (or
specialized) services from broadband Internet access service by
defining the former, in part, as data transmission ``between an end
user and a limited group of parties or endpoints'') (emphasis
added).
---------------------------------------------------------------------------

A. Scope of the Rules

    We find that open Internet rules should apply to ``broadband
Internet access service,'' which we define as:

    A mass-market retail service by wire or radio that provides the
capability to transmit data to and receive data from all or
substantially all Internet endpoints, including any capabilities
that are incidental to and enable the operation of the
communications service, but excluding dial-up Internet access
service. This term also encompasses any service that the Commission
finds to be providing a functional equivalent of the service
described in the previous sentence, or that is used to evade the
protections set forth in this Part.

The term ``broadband Internet access service'' includes services
provided over any technology platform, including but not limited to
wire, terrestrial wireless (including fixed and mobile wireless
services using licensed or unlicensed spectrum), and satellite.\46\
---------------------------------------------------------------------------

    \46\ In the Open Internet NPRM, we proposed separate definitions
of the terms ``broadband Internet access,'' and ``broadband Internet
access service.'' Open Internet NPRM, 24 FCC Rcd at 13128, App. A
sec. 8.3. For purposes of these rules, we find it simpler to define
just the service.
---------------------------------------------------------------------------

    ``Mass market'' means a service marketed and sold on a standardized
basis to residential customers, small businesses, and other end-user
customers such as schools and libraries. For purposes of this
definition, ``mass market'' also includes broadband Internet access
services purchased with the support of the E-rate program that may be
customized or individually negotiated. The term does not include
enterprise service offerings, which are typically offered to larger
organizations through customized or individually negotiated
arrangements.
    ``Broadband Internet access service'' encompasses services that
``provide the capability to transmit data to and receive data from all
or substantially all Internet endpoints.'' To ensure the efficacy of
our rules in this dynamic market, we also treat as a ``broadband
Internet access service'' any service the Commission finds to be
providing a functional equivalent of the service described in the
previous sentence, or that is used to evade the protections set forth
in these rules.
    A key factor in determining whether a service is used to evade the
scope of the rules is whether the service is used as a substitute for
broadband Internet access service. For example, an Internet access
service that provides access to a substantial subset of Internet
endpoints based on end users preference to avoid certain content,
applications, or services; Internet access services that allow some
uses of the Internet (such as access to the World Wide Web) but not
others (such as e-mail); or a ``Best of the Web'' Internet access
service that provides access to 100 top Web sites could not be used to
evade the open Internet rules applicable to ``broadband Internet access
service.'' Moreover, a broadband provider may not evade these rules
simply by blocking end users' access to some Internet endpoints.
Broadband Internet access service likely does not include services
offering connectivity to one or a small number of Internet endpoints
for a particular device, e.g., connectivity bundled with e-readers,
heart monitors, or energy consumption sensors, to the extent the
service relates to the functionality of the device.\47\ Nor does
broadband Internet access service include virtual private network
services, content delivery network services, multichannel video
programming services, hosting or data storage services, or Internet
backbone services (if those services are separate from broadband
Internet access service). These services typically are not mass market
services and/or do not provide the capability to transmit data to and
receive data from all or substantially all Internet endpoints.\48\
---------------------------------------------------------------------------

    \47\ To the extent these services are provided by broadband
providers over last-mile capacity shared with broadband Internet
access service, they would be specialized services.
    \48\ We also note that our rules apply only as far as the limits
of a broadband provider's control over the transmission of data to
or from its broadband customers.
---------------------------------------------------------------------------

    Although one purpose of our open Internet rules is to prevent
blocking or unreasonable discrimination in transmitting online traffic
for applications and services that compete with traditional voice and
video services, we determine that open Internet rules applicable to
fixed broadband providers should protect all types of Internet traffic,
not just voice or video Internet traffic. This reflects, among other
things, our view that it is generally preferable to neither require nor
encourage broadband providers to examine Internet traffic in order to
discern which traffic is subject to the rules. Even if we were to limit
our rules to voice or video traffic, moreover, it is unlikely that
broadband providers could reliably identify such traffic in all
circumstances, particularly if the voice or video traffic originated
from new services using uncommon protocols.\49\ Indeed, limiting our
rules to voice and video traffic alone could spark a costly and
wasteful cat-and-mouse game in which edge providers and end users
seeking to obtain the protection of our rules could disguise their
traffic as protected communications.\50\
---------------------------------------------------------------------------

    \49\ This is true notwithstanding the increasing sophistication
of network management tools, described above in Part II.B. See
Arthur Callado et al., A Survey on Internet Traffic Identification,
11 IEEE Commnc'ns Surveys & Tutorials 37, 49 (2009).
    \50\ See IETF, Reflections on Internet Transparency, RFC 4924 at
5 (Jul. 2007) (RFC 4924) (``In practice, filtering intended to block
or restrict application usage is difficult to successfully implement
without customer consent, since over time developers will tend to
re-engineer filtered protocols so as to avoid the filters. Thus over
time, filtering is likely to result in interoperability issues or
unnecessary complexity. These costs come without the benefit of
effective filtering. * * *''); IETF, Considerations on the Use of a
Service Identifier in Packet Headers, RFC 3639 at 3 (Oct. 2003) (RFC
3639) (``Attempts by intermediate systems to impose service-based
controls on communications against the perceived interests of the
end parties to the communication are often circumvented. Services
may be tunneled within other services, proxied by a collaborating
external host (e.g., an anonymous redirector), or simply run over an
alternate port (e.g., port 8080 vs port 80 for HTTP).''). Cf. RFC
3639 at 4 (``From this perspective of network and application
utility, it is preferable that no action or activity be undertaken
by any agency, carrier, service provider, or organization which
would cause end-users and protocol designers to generally obscure
service identification information from the IP packet header.'').
Our rules are nationwide and do not vary by geographic area,
notwithstanding potential variations across local markets for
broadband Internet access service. Uniform national rules create a
more predictable policy environment for broadband providers, many of
which offer services in multiple geographic areas. See, e.g., Level
3 Comments at 13; Charter Comments at iv. Edge providers will
benefit from uniform treatment of their traffic in different
localities and by different broadband providers. Broadband end users
will also benefit from uniform rules, which protect them regardless
of where they are located or which broadband provider they obtain
service from.
---------------------------------------------------------------------------

    We recognize that there is one Internet (although it is comprised
of a multitude of different networks), and that it should remain open
and

[[Page 59202]]

interconnected regardless of the technologies and services end users
rely on to access it. However, for reasons discussed in Part III.E
below related to mobile broadband--including the fact that it is at an
earlier stage and more rapidly evolving--we apply open Internet rules
somewhat differently to mobile broadband than to fixed broadband at
this time. We define ``fixed broadband Internet access service'' as a
broadband Internet access service that serves end users primarily at
fixed endpoints using stationary equipment, such as the modem that
connects an end user's home router, computer, or other Internet access
device to the network. This term encompasses fixed wireless broadband
services (including services using unlicensed spectrum) and fixed
satellite broadband services. We define ``mobile broadband Internet
access service'' as a broadband Internet access service that serves end
users primarily using mobile stations. Mobile broadband Internet access
includes services that use smartphones as the primary endpoints for
connection to the Internet.\51\ The discussion in this Part applies to
both fixed and mobile broadband, unless specifically noted. Part III.E
further discusses application of open Internet rules to mobile
broadband.
---------------------------------------------------------------------------

    \51\ We note that Section 337(f)(1) of the Act excludes public
safety services from the definition of mobile broadband Internet
access service.
---------------------------------------------------------------------------

    For a number of reasons, these rules apply only to the provision of
broadband Internet access service and not to edge provider activities,
such as the provision of content or applications over the Internet.
First, the Communications Act particularly directs us to prevent harms
related to the utilization of networks and spectrum to provide
communication by wire and radio. Second, these rules are an outgrowth
of the Commission's Internet Policy Statement.\52\ The Statement was
issued in 2005 when the Commission removed key regulatory protections
from DSL service, and was intended to protect against the harms to the
open Internet that might result from broadband providers' subsequent
conduct. The Commission has always understood those principles to apply
to broadband Internet access service only, as have most private-sector
stakeholders.\53\ Thus, insofar as these rules translate existing
Commission principles into codified rules, it is appropriate to limit
the application of the rules to broadband Internet access service.
Third, broadband providers control access to the Internet for their
subscribers and for anyone wishing to reach those subscribers.\54\ They
are therefore capable of blocking, degrading, or favoring any Internet
traffic that flows to or from a particular subscriber.
---------------------------------------------------------------------------

    \52\ When the Commission adopted the Internet Policy Statement,
it promised to incorporate the principles into ``ongoing
policymaking activities.'' Internet Policy Statement, 20 FCC Rcd at
14988, para. 5.
    \53\ See, e.g., Appropriate Framework for Broadband Access to
the Internet over Wireline Facilities, Report and Order and Notice
of Proposed Rulemaking, 20 FCC Rcd 14853, 14976 (2005) (Wireline
Broadband Order) (separate statement of Chairman Martin); id. at
14980 (Statement of Commissioner Copps, concurring); id. at 14983
(Statement of Commissioner Adelstein, concurring); Verizon June 8,
2009 Comments, GN Docket No. 09-51, at 86 (``These principles have
helped to guide wireline providers' practices and to ensure that
consumers' expectations for their public Internet access services
are met.''). The Commission has conditioned wireline broadband
provider merger approvals on the merged entity's compliance with
these obligations. See, e.g., SBC Commc'ns Inc. and AT&T Corp.
Applications for Approval of Transfer of Control, Memorandum Opinion
and Order, 20 FCC Rcd 18290, 18392, para. 211 (2005).
    \54\ We thus find broadband providers distinguishable from other
participants in the Internet marketplace. See, e.g., Verizon
Comments at 36-39 (discussing a variety of other participants in the
Internet ecosystem); Verizon Reply at 36-37 (same); NCTA Comments at
47-49 (same); NCTA Reply at 22 (same).
---------------------------------------------------------------------------

    We also do not apply these rules to dial-up Internet access service
because telephone service has historically provided the easy ability to
switch among competing dial-up Internet access services. Moreover, the
underlying dial-up Internet access service is subject to protections
under Title II of the Communications Act. The Commission's
interpretation of those protections has resulted in a market for dial-
up Internet access that does not present the same concerns as the
market for broadband Internet access. No commenters suggested extending
open Internet rules to dial-up Internet access service.
    Finally, we decline to apply our rules directly to coffee shops,
bookstores, airlines, and other entities when they acquire Internet
service from a broadband provider to enable their patrons to access the
Internet from their establishments (we refer to these entities as
``premise operators'').\55\ These services are typically offered by the
premise operator as an ancillary benefit to patrons. However, to
protect end users, we include within our rules broadband Internet
access services provided to premise operators for purposes of making
service available to their patrons.\56\ Although broadband providers
that offer such services are subject to open Internet rules, we note
that addressing traffic unwanted by a premise operator is a legitimate
network management purpose.\57\
---------------------------------------------------------------------------

    \55\ See Communications Assistance for Law Enforcement Act and
Broadband Access and Services, First Report and Order and Further
Notice of Proposed Rulemaking, 20 FCC Rcd 14989, 15006-07, para. 36,
n.99 (2005) (CALEA Order). Consistent with the Commission's approach
in the CALEA Order, ``[w]e note * * * that the provider of
underlying [broadband service] facilities to such an establishment
would be subject to [the rules].'' Id. at 15007, para. 36.
    \56\ We note that the premise operator that purchases the
Internet service remains the end user for purposes of our rules,
however. Moreover, although not bound by our rules, we encourage
premise operators to disclose relevant restrictions on broadband
service they make available to their patrons.
    \57\ We also do not include within the rules free access to
individuals' wireless networks, even if those networks are
intentionally made available to others. See Electronic Frontier
Foundation (EFF) Comments at 25-28. No commenter argued that open
Internet rules should apply to individual operators of wireless
networks in these circumstances.
---------------------------------------------------------------------------

B. Transparency

    Promoting competition throughout the Internet ecosystem is a
central purpose of these rules. Effective disclosure of broadband
providers' network management practices and the performance and
commercial terms of their services promotes competition--as well as
innovation, investment, end-user choice, and broadband adoption--in at
least five ways. First, disclosure ensures that end users can make
informed choices regarding the purchase and use of broadband service,
which promotes a more competitive market for broadband services and can
thereby reduce broadband providers' incentives and ability to violate
open Internet principles.\58\ Second, and relatedly, as end users'
confidence in broadband providers' practices increases, so too should
end users' adoption of broadband services--leading in turn to
additional investment in Internet infrastructure as contemplated by
Section 706 of the 1996 Act and other provisions of the communications
laws.\59\ Third,

[[Page 59203]]

disclosure supports innovation, investment, and competition by ensuring
that startups and other edge providers have the technical information
necessary to create and maintain online content, applications,
services, and devices, and to assess the risks and benefits of
embarking on new projects. Fourth, disclosure increases the likelihood
that broadband providers will abide by open Internet principles, and
that the Internet community will identify problematic conduct and
suggest fixes.\60\ Transparency thereby increases the chances that
harmful practices will not occur in the first place and that, if they
do, they will be quickly remedied, whether privately or through
Commission oversight. Fifth, disclosure will enable the Commission to
collect information necessary to assess, report on, and enforce the
other open Internet rules. For all of these reasons, most commenters
agree that informing end users, edge providers, and the Commission
about the network management practices, performance, and commercial
terms of broadband Internet access service is a necessary and
appropriate step to help preserve an open Internet.
---------------------------------------------------------------------------

    \58\ Broadband providers may have an incentive not to provide
such information to end users, as doing so can lessen switching
costs for end users. Third-party information sources such as
Consumer Reports and the trade press do not routinely provide such
information. See CDT Comments at 31; CWA Comments at 21; DISH
Comments at 2; Google Comments at ii, 64-66; Level 3 Comments at 13;
Sandoval Reply at 60. Economic literature in this area also confirms
that policies requiring firms to disclose information generally
benefit competition and consumers. See, e.g., Mark Armstrong,
Interactions Between Competition and Consumer Policy, 4 Competition
Policy Int'l 97 113-16 (Spring 2008), eprints.ucl.ac.uk/7634/1/7634.pdf.
    \59\ See PIC Reply at 16-18; Free Press Comments at 43-45; Ad
Hoc Comments at ii; CDT Comments at 5-7; ALA Comments at 3; National
Hispanic Media Coalition (NHMC) Comments at 8; National Broadband
Plan at 168, 174 (lack of trust in Internet is significant factor
preventing non-adopters from subscribing to broadband services); 47
U.S.C. secs. 151, 230, 254, 1302. A recent FCC survey found that
among non-broadband end users, 46% believed that the Internet is
dangerous for kids, and 57% believed that it was too easy for
personal information to be stolen online. John B. Horrigan, FCC
Survey: Broadband Adoption & Use in America 17 (Mar. 2010),
available at http://www.fcc.gov/DiversityFAC/032410/consumer-survey-horrigan.pdf.
    \60\ On a number of occasions, broadband providers have blocked
lawful traffic without informing end users or edge providers. In
addition to the Madison River and Comcast-BitTorrent incidents
described above, broadband providers appear to have covertly blocked
thousands of BitTorrent uploads in the United States throughout
early 2008. See Marcel Dischinger et al.; Catherine Sandoval,
Disclosure, Deception, and Deep-Packet Inspection, 78 Fordham L.
Rev. 641, 666-84 (2009).
---------------------------------------------------------------------------

    The Open Internet NPRM sought comment on what end users and edge
providers need to know about broadband service, how this information
should be disclosed, when disclosure should occur, and where
information should be available. The resulting record supports adoption
of the following rule:

    A person engaged in the provision of broadband Internet access
service shall publicly disclose accurate information regarding the
network management practices, performance, and commercial terms of
its broadband Internet access services sufficient for consumers to
make informed choices regarding use of such services and for
content, application, service, and device providers to develop,
market, and maintain Internet offerings.\61\
---------------------------------------------------------------------------

    \61\ For purposes of these rules, ``consumer'' includes any
subscriber to the broadband provider's broadband Internet access
service, and ``person'' includes any ``individual, group of
individuals, corporation, partnership, association, unit of
government or legal entity, however organized,'' cf. 47 CFR
54.8(a)(6). We also expect broadband providers to disclose
information about the impact of ``specialized services,'' if any, on
last-mile capacity available for, and the performance of, broadband
Internet access service.

    The rule does not require public disclosure of competitively
sensitive information or information that would compromise network
security or undermine the efficacy of reasonable network management
practices.\62\ For example, a broadband provider need not publicly
disclose information regarding measures it employs to prevent spam
practices at a level of detail that would enable a spammer to defeat
those measures.
---------------------------------------------------------------------------

    \62\ Commenters disagree on the risks of requiring disclosure of
information regarding technical, proprietary, and security-related
management practices. Compare, e.g., American Cable Association
(ACA) Comments at 17; AFTRA et al. Comments at ii, 16; Cox Comments
at 11; Fiber-to-the-Home Council (FTTH) Comments at 3, 27; Libove
Comments at 4; Sprint Comments at 16; T-Mobile Comments at 39, with,
e.g., Free Press Comments at 117-18; Free Press Reply at 17-19;
Digital Education Coalition (DEC) Comments at 14; NJRC Comments at
20-21. We may subsequently require disclosure of such information to
the Commission; to the extent we do, we will ensure that such
information is protected consistent with existing Commission
procedures for treatment of confidential information.
---------------------------------------------------------------------------

    Despite broad agreement that broadband providers should disclose
information sufficient to enable end users and edge providers to
understand the capabilities of broadband services, commenters disagree
about the appropriate level of detail required to achieve this goal. We
believe that at this time the best approach is to allow flexibility in
implementation of the transparency rule, while providing guidance
regarding effective disclosure models. We expect that effective
disclosures will likely include some or all of the following types of
information, timely and prominently disclosed in plain language
accessible to current and prospective end users and edge providers, the
Commission, and third parties who wish to monitor network management
practices for potential violations of open Internet principles: \63\
---------------------------------------------------------------------------

    \63\ In setting forth the following categories of information
subject to the transparency principle, we assume that the broadband
provider has chosen to offer its services on standardized terms,
although providers of ``information services'' are not obligated to
do so. If the provider tailors its terms of service to meet the
requirements of an individual end user, those terms must at a
minimum be disclosed to the end user in accordance with the
transparency principle.
---------------------------------------------------------------------------

Network Practices
     Congestion Management: If applicable, descriptions of
congestion management practices; types of traffic subject to practices;
purposes served by practices; practices' effects on end users'
experience; criteria used in practices, such as indicators of
congestion that trigger a practice, and the typical frequency of
congestion; usage limits and the consequences of exceeding them; and
references to engineering standards, where appropriate.\64\
---------------------------------------------------------------------------

    \64\ We note that the description of congestion management
practices provided by Comcast in the wake of the Comcast-BitTorrent
incident likely satisfies the transparency rule with respect to
congestion management practices. See Comcast, Network Management
Update, http://www.comcast.net/terms/network/update; Comcast,
Comcast Corporation Description of Planned Network Management
Practices to be Deployed Following the Termination of Current
Practices, downloads.comcast.net/docs/Attachment_B_Future_Practices.pdf.
---------------------------------------------------------------------------

     Application-Specific Behavior: If applicable, whether and
why the provider blocks or rate-controls specific protocols or protocol
ports, modifies protocol fields in ways not prescribed by the protocol
standard, or otherwise inhibits or favors certain applications or
classes of applications.
     Device Attachment Rules: If applicable, any restrictions
on the types of devices and any approval procedures for devices to
connect to the network. (For further discussion of required disclosures
regarding device and application approval procedures for mobile
broadband providers, see infra.)
     Security: If applicable, practices used to ensure end-user
security or security of the network, including types of triggering
conditions that cause a mechanism to be invoked (but excluding
information that could reasonably be used to circumvent network
security).
Performance Characteristics
     Service Description: A general description of the service,
including the service technology, expected and actual access speed and
latency, and the suitability of the service for real-time applications.
     Impact of Specialized Services: If applicable, what
specialized services, if any, are offered to end users, and whether and
how any specialized services may affect the last-mile capacity
available for, and the performance of, broadband Internet access
service.
Commercial Terms
     Pricing: For example, monthly prices, usage-based fees,
and fees for early termination or additional network services.
     Privacy Policies: For example, whether network management
practices entail inspection of network traffic, and

[[Page 59204]]

whether traffic information is stored, provided to third parties, or
used by the carrier for non-network management purposes.
     Redress Options: Practices for resolving end-user and edge
provider complaints and questions.

We emphasize that this list is not necessarily exhaustive, nor is it a
safe harbor--there may be additional information, not included above,
that should be disclosed for a particular broadband service to comply
with the rule in light of relevant circumstances. Broadband providers
should examine their network management practices and current
disclosures to determine what additional information, if any, should be
disclosed to comply with the rule.
    In the Open Internet NPRM, we proposed that broadband providers
publicly disclose their practices on their Web sites and in promotional
materials. Most commenters agree that a provider's Web site is a
natural place for end users and edge providers to find disclosures, and
several contend that a broadband provider's only obligation should be
to post its practices on its Web site. Others assert that disclosures
should also be displayed prominently at the point-of-sale, in bill
inserts, and in the service contract. We agree that broadband providers
must, at a minimum, prominently display or provide links to disclosures
on a publicly available, easily accessible Web site that is available
to current and prospective end users and edge providers as well as to
the Commission, and must disclose relevant information at the point of
sale. Current end users must be able to easily identify which
disclosures apply to their service offering. Broadband providers'
online disclosures shall be considered disclosed to the Commission for
purposes of monitoring and enforcement. We may require additional
disclosures directly to the Commission.
    We anticipate that broadband providers may be able to satisfy the
transparency rule through a single disclosure, and therefore do not at
this time require multiple disclosures targeted at different
audiences.\65\ We also decline to adopt a specific format for
disclosures, and instead require that disclosure be sufficiently clear
and accessible to meet the requirements of the rule.\66\ We will,
however, continue to monitor compliance with this rule, and may require
adherence to a particular set of best practices in the future.\67\
---------------------------------------------------------------------------

    \65\ But we expect that broadband providers will make
disclosures in a manner accessible by people with disabilities.
    \66\ Some commenters advocate for a standard disclosure format.
See, e.g., Adam Candeub et al. Reply at 7; Level 3 Comments at 13;
Sprint Comments at 17. Others support a plain language requirement.
See, e.g., NATOA Comments at 7; NJRC Comments at 19; IFTA Comments
at 16. Other commenters, however, argue against the imposition of a
standard format as inflexible and difficult to implement. See, e.g.,
Cox Comments at 10; National Telecommunications Cooperative
Association (NTCA) Comments at 9; Qwest Comments at 11. The approach
we adopt is similar to the approach adopted in the Commission's
Truth-in-Billing Proceeding, where we set out basic guidelines.
Truth-in-Billing and Billing Format, First Report and Order and
Further NPRM, 14 FCC Rcd 7492, 7495-96, paras. 3-5 (1999).
    \67\ We may address this issue as part of a separate, ongoing
proceeding regarding transparency for communications services more
generally. Consumer Information and Disclosure, Notice of Inquiry,
FCC 09-68 (rel. Aug. 28, 2010). Relatedly, the Commission has begun
an effort, in partnership with broadband providers, to measure the
actual speed and performance of broadband service, and we expect
that the data generated by this effort will inform Commission
efforts regarding disclosure. See Comment Sought on Residential
Fixed Broadband Services Testing and Measurement Solution, Pleading
Cycle Established, Public Notice, 25 FCC Rcd 3836 (2010) (SamKnows
project); Comment Sought on Measurement of Mobile Broadband Network
Performance and Coverage, Public Notice, 25 FCC Rcd 7069 (2010)
(same).
---------------------------------------------------------------------------

    Although some commenters assert that a disclosure rule will impose
significant burdens on broadband providers, no commenter cites any
particular source of increased costs, or attempts to estimate costs of
compliance. For a number of reasons, we believe that the costs of the
disclosure rule we adopt in this Order are outweighed by the benefits
of empowering end users and edge providers to make informed choices and
of facilitating the enforcement of the other open Internet rules.
First, we require only that providers post disclosures on their Web
sites and provide disclosure at the point of sale, not that they bear
the cost of printing and distributing bill inserts or other paper
documents to all existing customers.\68\ Second, although we may
subsequently determine that it is appropriate to require that specific
information be disclosed in particular ways, the transparency rule we
adopt in this Order gives broadband providers some flexibility to
determine what information to disclose and how to disclose it. We also
expressly exclude from the rule competitively sensitive information,
information that would compromise network security, and information
that would undermine the efficacy of reasonable network management
practices. Third, as discussed below, by setting the effective date of
these rules as November 20, 2011, we give broadband providers adequate
time to develop cost effective methods of compliance.
---------------------------------------------------------------------------

    \68\ In a separate proceeding, the Commission has determined
that the costs of making disclosure materials available on a service
provider's Web site are outweighed by the public benefits where the
disclosure requirement applies only to entities already using the
Internet for other purposes. See Standardized and Enhanced
Disclosure Requirements for Television Broadcast Licensee Public
Interest Obligations, Report and Order, 23 FCC Rcd 1274, 1277-78,
paras. 7-10 (2008).
---------------------------------------------------------------------------

    A key purpose of the transparency rule is to enable third-party
experts such as independent engineers and consumer watchdogs to monitor
and evaluate network management practices, in order to surface concerns
regarding potential open Internet violations. We also note the
existence of free software tools that enable Internet end users and
edge providers to monitor and detect blocking and discrimination by
broadband providers.\69\ Although current tools cannot detect all
instances of blocking or discrimination and cannot substitute for
disclosure of network management policies, such tools may help
supplement the transparency rule we adopt in this Order.\70\
---------------------------------------------------------------------------

    \69\ See Sandoval Comments at 4-5. For example, the Max Planck
Institute analyzed data collected by the Glasnost tool from
thousands of end user, and found that broadband providers were
discriminating against application-specific traffic. See WCB Letter
12/13/10, Attach. at 235-39, Max Planck Institute for Software
Systems, Glasnost: Results from Tests for BitTorrent Traffic
Blocking, broadband.mpi-sws.org/transparency/results. Netalyzr is a
National Science Foundation-funded project that tests a wide range
of network characteristics. See International Computer Science
Institute, Netalyzer, netalyzr.icsi.berkeley.edu. Similar tools are
being developed for mobile broadband services. See, e.g., WindRider,
Mobile Network Neutrality Monitoring System, http://
www.cs.northwestern.edu/~ict992/mobile.htm.
    \70\ For an example of a public-private partnership that could
encourage the development of new tools to assess network management
practices, see FCC Open Internet Apps Challenge, http://www.openinternet.gov/challenge.
---------------------------------------------------------------------------

    Although transparency is essential for preserving Internet
openness, we disagree with commenters that suggest it is alone
sufficient to prevent open Internet violations. The record does not
convince us that a transparency requirement by itself will adequately
constrain problematic conduct, and we therefore adopt two additional
rules, as discussed below.

C. No Blocking and No Unreasonable Discrimination

1. No Blocking
    The freedom to send and receive lawful content and to use and
provide applications and services without fear of blocking is essential
to the Internet's openness and to competition in adjacent markets such
as voice communications and video and audio programming. Similarly, the
ability to connect and use

[[Page 59205]]

any lawful devices that do not harm the network helps ensure that end
users can enjoy the competition and innovation that result when device
manufacturers can depend on networks' openness.\71\ Moreover, the no-
blocking principle has been broadly accepted since its inclusion in the
Commission's Internet Policy Statement. Major broadband providers
represent that they currently operate consistent with this principle
and are committed to continuing to do so.\72\
---------------------------------------------------------------------------

    \71\ The Commission has long protected end users' rights to
attach lawful devices that do not harm communications networks. See,
e.g., Use of the Carterfone Device in Message Toll Telephone
Service, 13 FCC 2d 420, 424 (1968); Amendment of Section 64.702 of
the Commission's Rules and Regulations (Second Computer Inquiry),
Final Decision, 77 FCC 2d 384, 388 (1980); see also Michael T.
Hoeker, From Carterfone to the iPhone: Consumer Choice in the
Wireless Telecommunications Marketplace, 17 CommLaw Conspectus 187,
192 (2008); Kevin Werbach, The Federal Computer Commission, 84 N.C.
L. Rev. 1, 21 (2005).
    \72\ As Qwest states, ``Qwest and virtually all major broadband
providers have supported the FCC Internet Policy Principles and
voluntarily abide by those principles as good policy.'' Qwest PN
Comments at 2-3, 5; see also, e.g., Comcast Comments at 27;
Clearwire Comments at 1; Margaret Boles, AT&T on Comcast v. FCC
Decision, AT&T Pub. Pol'y Blog (Apr. 6, 2010), attpublicpolicy.com/broadband-policy/att-statement-on-comcast-v-fcc-decision.
---------------------------------------------------------------------------

    In the Open Internet NPRM, the Commission proposed codifying the
original three Internet Policy Statement principles that addressed
blocking of content, applications and services, and devices. After
consideration of the record, we consolidate the proposed rules into a
single rule for fixed broadband providers: \73\
---------------------------------------------------------------------------

    \73\ As described below, we adopt a tailored version of this
rule for mobile broadband providers.

    A person engaged in the provision of fixed broadband Internet
access service, insofar as such person is so engaged, shall not
block lawful content, applications, services, or non-harmful
---------------------------------------------------------------------------
devices, subject to reasonable network management.

    The phrase ``content, applications, services'' refers to all
traffic transmitted to or from end users of a broadband Internet access
service, including traffic that may not fit cleanly into any of these
categories.\74\ The rule protects only transmissions of lawful content,
and does not prevent or restrict a broadband provider from refusing to
transmit unlawful material such as child pornography.\75\
---------------------------------------------------------------------------

    \74\ See William Lehr et al. Comments at 27 (``While the
proposed rules of the FCC appear to make a clear distinction between
applications and services on the one hand (rule 3) and content (rule
1), we believe that there will be some activities that do not fit
cleanly into these two categories''); PIC Comments at 39; RFC 4924
at 5. For this reason the rule may prohibit the blocking of a port
or particular protocol used by an application, without blocking the
application completely, unless such practice is reasonable network
management. See Distributed Computing Industry Ass'n (DCIA) Comments
at 7 (discussing work-arounds by P2P companies facing port blocking
or other practices); Sandvine Reply at 3; RFC 4924. The rule also is
neutral with respect to where in the protocol stack or in the
network blocking could occur.
    \75\ The ``no blocking'' rule does not impose any independent
legal obligation on broadband Internet access service providers to
be the arbiter of what is lawful. See, e.g., WISPA Comments at 12-
13.
---------------------------------------------------------------------------

    We also note that the rule entitles end users to both connect and
use any lawful device of their choice, provided such device does not
harm the network.\76\ A broadband provider may require that devices
conform to widely accepted and publicly-available standards applicable
to its services.\77\
---------------------------------------------------------------------------

    \76\ We note that MVPDs, pursuant to Section 629 and the
Commission's implementing regulations, are already subject to
similar requirements that give end users the right to attach devices
to an MVPD system provided that the attached equipment does not
cause electronic or physical harm or assist in the unauthorized
receipt of service. See Implementation of Section 304 of the
Telecommunications Act of 1996, Commercial Availability of
Navigation Devices, Report and Order, 13 FCC Rcd 14775 (1998); 47
U.S.C.. 549; 47 CFR 76.1201-03. Nothing in this Order is intended to
alter those existing rules.
    \77\ For example, a DOCSIS-based broadband provider is not
required to support a DSL modem. See ACA Comments at 13-14; see also
Satellite Broadband Commenters Comments at 8-9 (noting that an
antenna and associated modem must comply with equipment and protocol
standards set by satellite companies, but that ``consumers can
[then] attach * * * any personal computer or wireless router they
wish'').
---------------------------------------------------------------------------

    We make clear that the no-blocking rule bars broadband providers
from impairing or degrading particular content, applications, services,
or non-harmful devices so as to render them effectively unusable
(subject to reasonable network management).\78\ Such a prohibition is
consistent with the observation of a number of commenters that
degrading traffic can have the same effects as outright blocking, and
that such an approach is consistent with the traditional interpretation
of the Internet Policy Statement. The Commission has recognized that in
some circumstances the distinction between blocking and degrading (such
as by delaying) traffic is merely ``semantic.''
---------------------------------------------------------------------------

    \78\ We do not find it appropriate to interpret our rule to
impose a blanket prohibition on degradation of traffic more
generally. Congestion ordinarily results in degradation of traffic,
and such an interpretation could effectively prohibit broadband
providers from permitting congestion to occur on their networks.
Although we expect broadband providers to continue to expand the
capacity of their networks--and we believe our rules help ensure
that they continue to have incentives to do so--we recognize that
some network congestion may be unavoidable. See, e.g., AT&T Comments
at 65; TWC Comments at 16-18; Internet Freedom Coalition Reply at 5.
---------------------------------------------------------------------------

    Some concerns have been expressed that broadband providers may seek
to charge edge providers simply for delivering traffic to or carrying
traffic from the broadband provider's end-user customers. To the extent
that a content, application, or service provider could avoid being
blocked only by paying a fee, charging such a fee would not be
permissible under these rules.\79\
---------------------------------------------------------------------------

    \79\ We do not intend our rules to affect existing arrangements
for network interconnection, including existing paid peering
arrangements.
---------------------------------------------------------------------------

2. No Unreasonable Discrimination
    Based on our findings that fixed broadband providers have
incentives and the ability to discriminate in their handling of network
traffic in ways that can harm innovation, investment, competition, end
users, and free expression, we adopt the following rule:

    A person engaged in the provision of fixed broadband Internet
access service, insofar as such person is so engaged, shall not
unreasonably discriminate in transmitting lawful network traffic
over a consumer's broadband Internet access service. Reasonable
network management shall not constitute unreasonable discrimination.

    The rule strikes an appropriate balance between restricting harmful
conduct and permitting beneficial forms of differential treatment. As
the rule specifically provides, and as discussed below, discrimination
by a broadband provider that constitutes ``reasonable network
management'' is ``reasonable'' discrimination.\80\ We provide further
guidance regarding distinguishing reasonable from unreasonable
discrimination:
---------------------------------------------------------------------------

    \80\ We also make clear that open Internet protections coexist
with other legal and regulatory frameworks. Except as otherwise
described in this Order, we do not address the possible application
of the no unreasonable discrimination rule to particular
circumstances, despite the requests of certain commenters. See,
e.g., AT&T Comments at 64-77, 108-12; PAETEC Comments at 13; see
also AT&T Comments at 56 (arguing that some existing agreements
could be at odds with limitations on pay for priority arrangements).
Rather, we find it more appropriate to address the application of
our rule in the context of an appropriate Commission proceeding with
the benefit of a more comprehensive record.
---------------------------------------------------------------------------

    Transparency. Differential treatment of traffic is more likely to
be reasonable the more transparent to the end user that treatment is.
The Commission has previously found broadband provider practices to
violate open Internet principles in part because they were not
disclosed to end users. Transparency is particularly important with
respect to the discriminatory treatment of traffic as it is often
difficult for end users to determine the causes of slow or poor
performance of content, applications, services, or devices.
    End-User Control. Maximizing end-user control is a policy goal
Congress

[[Page 59206]]

recognized in Section 230(b) of the Communications Act, and end-user
choice and control are touchstones in evaluating the reasonableness of
discrimination.\81\ As one commenter observes, ``letting users choose
how they want to use the network enables them to use the Internet in a
way that creates more value for them (and for society) than if network
providers made this choice,'' and ``is an important part of the
mechanism that produces innovation under uncertainty.'' Thus, enabling
end users to choose among different broadband offerings based on such
factors as assured data rates and reliability, or to select quality-of-
service enhancements on their own connections for traffic of their
choosing, would be unlikely to violate the no unreasonable
discrimination rule, provided the broadband provider's offerings were
fully disclosed and were not harmful to competition or end users.\82\
We recognize that there is not a binary distinction between end-user
controlled and broadband-provider controlled practices, but rather a
spectrum of practices ranging from more end-user controlled to more
broadband provider-controlled.\83\ And we do not suggest that practices
controlled entirely by broadband providers are by definition
unreasonable.
---------------------------------------------------------------------------

    \81\ ``The rapidly developing array of Internet and other
interactive computer services * * * offer[ ] users a great degree of
control over the information that they receive, as well as the
potential for even greater control in the future as technology
develops.'' 47 U.S.C. 230(a)(1)-(2) (emphasis added).
    \82\ In these types of arrangements ``[t]he broadband provider
does not get any particular leverage, because the ability to select
which traffic gets priority lies with individual subscribers.
Meanwhile, an entity providing content, applications, or services
does not need to worry about striking up relationships with various
broadband providers to obtain top treatment. All it needs to worry
about is building relationships with users and explaining to those
users whether and how they may want to select the particular
content, application, or service for priority treatment.'' CDT
Comments at 27; see also Amazon Comments at 2-3; SureWest Comments
at 32-33.
    \83\ We note that default settings set by broadband providers
would likely be considered more broadband provider-controlled than
end-user controlled. See generally Jason Scott Johnston, Strategic
Bargaining and the Economic Theory of Contract Default Rules, 100
Yale L.J. 615 (1990); Daniel Kahneman et al., Anomalies: The
Endowment Effect, Loss Aversion, and Status Quo Bias, 5 J. Econ.
Persp. 193, 197-99 (1991).
---------------------------------------------------------------------------

    Some commenters suggest that open Internet protections would
prohibit broadband providers from offering their subscribers different
tiers of service or from charging their subscribers based on bandwidth
consumed. We are, of course, always concerned about anti-consumer or
anticompetitive practices, and we remain so here. However, prohibiting
tiered or usage-based pricing and requiring all subscribers to pay the
same amount for broadband service, regardless of the performance or
usage of the service, would force lighter end users of the network to
subsidize heavier end users. It would also foreclose practices that may
appropriately align incentives to encourage efficient use of networks.
The framework we adopt in this Order does not prevent broadband
providers from asking subscribers who use the network less to pay less,
and subscribers who use the network more to pay more.
    Use-Agnostic Discrimination. Differential treatment of traffic that
does not discriminate among specific uses of the network or classes of
uses is likely reasonable. For example, during periods of congestion a
broadband provider could provide more bandwidth to subscribers that
have used the network less over some preceding period of time than to
heavier users. Use-agnostic discrimination (sometimes referred to as
application-agnostic discrimination) is consistent with Internet
openness because it does not interfere with end users' choices about
which content, applications, services, or devices to use. Nor does it
distort competition among edge providers.
    Standard Practices. The conformity or lack of conformity of a
practice with best practices and technical standards adopted by open,
broadly representative, and independent Internet engineering,
governance initiatives, or standards-setting organizations is another
factor to be considered in evaluating reasonableness. Recognizing the
important role of such groups is consistent with Congress's intent that
our rules in the Internet area should not ``fetter[ ]'' the free market
with unnecessary regulation,\84\ and is consistent with broadband
providers' historic reliance on such groups.\85\ We make clear,
however, that we are not delegating authority to interpret or implement
our rules to outside bodies.
---------------------------------------------------------------------------

    \84\ 47 U.S.C. 230(b)(2).
    \85\ Broadband providers' practices historically have relied on
the efforts of such groups, which follow open processes conducive to
broad participation. See, e.g., William Lehr et al. Comments at 24;
Comcast Comments at 53-59; FTTH Comments at 12; Internet Society
(ISOC) Comments at 1-2; OIC Comments at 50-52; Comcast Reply at 5-7.
Moreover, Internet community governance groups develop and encourage
widespread implementation of best practices, supporting an
environment that facilitates innovation.
---------------------------------------------------------------------------

    In evaluating unreasonable discrimination, the types of practices
we would be concerned about include, but are not limited to,
discrimination that harms an actual or potential competitor to the
broadband provider (such as by degrading VoIP applications or services
when the broadband provider offers telephone service), that harms end
users (such as by inhibiting end users from accessing the content,
applications, services, or devices of their choice), or that impairs
free expression (such as by slowing traffic from a particular blog
because the broadband provider disagrees with the blogger's message).
    For a number of reasons, including those discussed above in Part
II.B, a commercial arrangement between a broadband provider and a third
party to directly or indirectly favor some traffic over other traffic
in the broadband Internet access service connection to a subscriber of
the broadband provider (i.e., ``pay for priority'') would raise
significant cause for concern.\86\ First, pay for priority would
represent a significant departure from historical and current practice.
Since the beginning of the Internet, Internet access providers have
typically not charged particular content or application providers fees
to reach the providers' retail service end users or struck pay-for-
priority deals, and the record does not contain evidence that U.S.
broadband providers currently engage in such arrangements. Second this
departure from longstanding norms could cause great harm to innovation
and investment in and on the Internet. As discussed above, pay-for-
priority arrangements could raise barriers to entry on the Internet by
requiring fees from edge providers, as well as transaction costs
arising from the need to reach agreements with one or more broadband
providers to access a critical mass of potential end users. Fees
imposed on edge providers may be excessive because few edge providers
have the ability to bargain for lesser fees, and because no broadband
provider internalizes the full costs of reduced innovation and the exit
of edge providers from the market. Third, pay-for-priority arrangements
may particularly harm non-commercial end users, including individual
bloggers, libraries, schools, advocacy organizations, and other
speakers, especially those who communicate through video or other
content sensitive

[[Page 59207]]

to network congestion. Even open Internet skeptics acknowledge that pay
for priority may disadvantage non-commercial uses of the network, which
are typically less able to pay for priority, and for which the Internet
is a uniquely important platform. Fourth, broadband providers that
sought to offer pay-for-priority services would have an incentive to
limit the quality of service provided to non-prioritized traffic. In
light of each of these concerns, as a general matter, it is unlikely
that pay for priority would satisfy the ``no unreasonable
discrimination'' standard. The practice of a broadband Internet access
service provider prioritizing its own content, applications, or
services, or those of its affiliates, would raise the same significant
concerns and would be subject to the same standards and considerations
in evaluating reasonableness as third-party pay-for-priority
arrangements.\87\
---------------------------------------------------------------------------

    \86\ The Open Internet NPRM proposed a flat ban on
discrimination and interpreted that requirement to prohibit
broadband providers from ``charg[ing] a content, application, or
service provider for enhanced or prioritized access to the
subscribers of the broadband Internet access service provider.''
Open Internet NPRM, 24 FCC Rcd at 13104-05, paras. 104, 106. In the
context of a ``no unreasonable discrimination'' rule that leaves
interpretation to a case-by-case process, we instead adopt the
approach to pay for priority described in this paragraph.
    \87\ We reject arguments that our approach to pay-for-priority
arrangements is inconsistent with allowing content-delivery networks
(CDNs). See, e.g., Cisco Comments at 11-12; TWC Comments at 21-22,
65, 89-90; AT&T Reply at 49-53; Bright House Reply at 9. CDN
services are designed to reduce the capacity requirements and costs
of the CDN's edge provider clients by hosting the content for those
clients closer to end users. Unlike broadband providers, third-party
CDN providers do not control the last-mile connection to the end
user. And CDNs that do not deploy within an edge provider's network
may still reach an end user via the user's broadband connection. See
CDT Comments at 25 n.84; George Ou Comments (Preserving the Open and
Competitive Bandwidth Market) at 3; see also Cisco Comments at 11;
FTTH Comments at 23-24. Moreover, CDNs typically provide a benefit
to the sender and recipient of traffic without causing harm to
third-party traffic. Though we note disagreement regarding the
impact of CDNs on other traffic, the record does not demonstrate
that the use of CDNs has any material adverse effect on broadband
end users' experience of traffic that is not delivered via a CDN.
Compare Letter from S. Derek Turner, Free Press, to Chairman
Genachowski et al., FCC, GN Docket No. 09-191, WC Docket No. 07-52,
at 1-2 (filed July 29, 2010) with Letter from Richard Bennett, ITIF,
to Chairman Genachowski et al., FCC, GN Docket No. 09-191, WC Docket
No. 07-52, Attach. at 12 (filed Aug. 9, 2010). Indeed, the same
benefits derived from using CDNs can be achieved if an edge
provider's own servers happen to be located in close proximity to
end users. Everything on the Internet that is accessible to an end
user is not, and cannot be, in equal proximity from that end user.
See John Staurulakis Inc. Comments at 5; Bret T. Swanson Reply at 4.
Finally, CDN providers unaffiliated with broadband providers
generally do not compete with edge providers and thus generally lack
economic incentives (or the ability) to discriminate against edge
providers. See Akamai Comments at 12; NASUCA Reply at 7; NCTA Reply
at 25. We likewise reject proposals to limit our rules to actions
taken at or below the ``network layer.'' See, e.g., Google Comments
at 24-26; Vonage Reply at 2; CDT Reply at 18; Prof. Scott Jordan
(Jordan) Comments at 3; see also Scott Jordan, A Layered Network
Approach to Net Neutrality, Int'l J. of Commc'n 427, 432-33 (2007)
(describing the OSI layers model and the actions of routers at and
below the network layer) attached to Letter from Scott Jordan,
Professor, University of California-Irvine, to Office of the
Secretary, FCC, GN Docket No. 09-191, WC Docket No. 07-52 (filed
Mar. 22, 2010). We are not persuaded that the proposed limitation is
necessary or appropriate in this context.
---------------------------------------------------------------------------

    Because we agree with the diverse group of commenters who argue
that any nondiscrimination rule should prohibit only unreasonable
discrimination, we decline to adopt the more rigid nondiscrimination
rule proposed in the Open Internet NPRM. A strict nondiscrimination
rule would be in tension with our recognition that some forms of
discrimination, including end-user controlled discrimination, can be
beneficial. The rule we adopt provides broadband providers' sufficient
flexibility to develop service offerings and pricing plans, and to
effectively and reasonably manage their networks. We disagree with
commenters who argue that a standard based on ``reasonableness'' or
``unreasonableness'' is too vague to give broadband providers fair
notice of what is expected of them. This is not so. ``Reasonableness''
is a well-established standard for regulatee conduct.\88\ As other
commenters have pointed out, the term ``reasonable'' is ``both
administrable and indispensable to the sound administration of the
nation's telecommunications laws.''\89\
---------------------------------------------------------------------------

    \88\ As recently as 1995, Congress adopted the venerable
``reasonableness'' standard when it recodified provisions of the
Interstate Commerce Act. ICC Termination Act of 1995, Public Law
104-88, sec. 106(a) (now codified at 49 U.S.C. 15501).
    \89\ AT&T Reply at 33-34 (``And no one has seriously suggested
that Section 202 should itself be amended to remove the
`unreasonable' qualifier on the ground that the qualifier is too
`murky' or `complex.' Seventy-five years of experience have shown
that qualifier to be both administrable and indispensable to the
sound administration of the nation's telecommunications laws.'');
see also Comcast Reply at 26 (``[T]he Commission should embrace the
strong guidance against an overbroad rule and, instead, develop a
standard based on `unreasonable and anticompetitive discrimination.'
''); Sprint Reply at 23 (``The unreasonable discrimination standard
contained in Section 202(a) of the Act contains the very flexibility
the Commission needs to distinguish desirable from improper
discrimination.''); Thomas v. Chicago Park District, 534 U.S. 316,
324 (2002) (holding that denial of a permit ``when the intended use
would present an unreasonable danger to the health and safety of
park users or Park District employees'' is a standard that is
``reasonably specific and objective, and do[es] not leave the
decision `to the whim of the administrator' '') (citation omitted);
Cameron v. Johnson, 390 U.S. 611, 615-16 (1968) (stating that
``unreasonably'' ``is a widely used and well understood word, and
clearly so when juxtaposed with `obstruct' and `interfere' '').
---------------------------------------------------------------------------

    We also reject the argument that only ``anticompetitive''
discrimination yielding ``substantial consumer harm'' should be
prohibited by our rules. We are persuaded those proposed limiting terms
are unduly narrow and could allow discriminatory conduct that is
contrary to the public interest. The broad purposes of this rule--to
encourage competition and remove impediments to infrastructure
investment while protecting consumer choice, free expression, end-user
control, and the ability to innovate without permission--cannot be
achieved by preventing only those practices that are demonstrably
anticompetitive or harmful to consumers. Rather, the rule rests on the
general proposition that broadband providers should not pick winners
and losers on the Internet--even for reasons that may be independent of
providers' competitive interests or that may not immediately or
demonstrably cause substantial consumer harm.\90\
---------------------------------------------------------------------------

    \90\ For example, slowing BitTorrent packets might only affect a
few end users, but it would harm BitTorrent. More significantly, it
would raise concerns among other end users and edge providers that
their traffic could be slowed for any reason--or no reason at all--
which could in turn reduce incentives to innovate and invest, and
change the fundamental nature of the Internet as an open platform.
---------------------------------------------------------------------------

    We disagree with commenters who argue that a rule against
unreasonable discrimination violates Section 3(51) of the
Communications Act for those broadband providers that are
telecommunications carriers but do not provide their broadband Internet
access service as a telecommunications service.\91\ Section 3(51)
provides that a ``telecommunications carrier shall be treated as a
common carrier under this Act only to the extent that it is engaged in
providing telecommunications services.'' \92\ This limitation is not
relevant to the Commission's actions here.\93\ The hallmark of common

[[Page 59208]]

carriage is an ``undertak[ing] to carry for all people indifferently.''
\94\ An entity ``will not be a common carrier where its practice is to
make individualized decisions, in particular cases, whether and on what
terms to deal'' with potential customers.\95\ The customers at issue
here are the end users who subscribe to broadband Internet access
services.\96\ With respect to those customers, a broadband provider may
make individualized decisions. A broadband provider that chooses not to
offer its broadband Internet access service on a common carriage basis
can, for instance, decide on a case-by-case basis whether to serve a
particular end user, what connection speed(s) to offer, and at what
price. The open Internet rules become effective only after such a
provider has voluntarily entered into a mutually satisfactory
arrangement with the end user, which may be tailored to that user. Even
then, as discussed above, the allowance for reasonable disparities
permits customized service features such as those that enhance end user
control over what Internet content is received. This flexibility to
customize service arrangements for a particular customer is the
hallmark of private carriage, which is the antithesis of common
carriage.\97\
---------------------------------------------------------------------------

    \91\ See, e.g., AT&T Comments at 209-11; Verizon Comments at 93-
95; CTIA PN Reply at 20-21. We do not read the Supreme Court's
decision in FCC v. Midwest Video Corp. as addressing rules like the
rules we adopt in this Order. 440 U.S. 689 (1979). There, the Court
held that obligations on cable providers to ``hold out dedicated
channels on a first-come, nondiscriminatory basis * * * relegated
cable systems, pro tanto, to common-carrier status.'' Id. at 700-01.
None of the rules adopted in this Order requires a broadband
provider to ``hold out'' any capacity for the exclusive use of third
parties or make a public offering of its service.
    \92\ 47 U.S.C. 153(51). Section 332(c)(2) contains a restriction
similar to that of sec. 3(51): ``A person engaged in the provision
of a service that is a private mobile service shall not, insofar as
such person is so engaged, be treated as a common carrier for any
purpose under this Act.'' Id. sec. 332(c)(2). Because we are not
imposing any common carrier obligations on any broadband provider,
including providers of ``private mobile service'' as defined in
Section 332(d)(3), our requirements do not violate the limitation in
Section 332(c)(2).
    \93\ Courts have acknowledged that the Commission is entitled to
deference in interpreting the definition of ``common carrier.'' See
AT&T v. FCC, 572 F.2d 17, 24 (2d Cir. 1978) (citing Red Lion Broad.
Co. v. FCC, 395 U.S. 367, 381 (1969)). In adopting the rule against
unreasonable discrimination, we rely, in part, on our authority
under section 706, which is not part of the Communications Act.
Congress enacted section 706 as part of the Telecommunications Act
of 1996 and more recently codified the provision in Chapter 12 of
Title 47, at 47 U.S.C. 1302. The seven titles that comprise the
Communications Act appear in Chapter 5 of Title 47. Consequently,
even if the rule against unreasonable discrimination were
interpreted to require common carriage in a particular case, that
result would not run afoul of Section 3(51) because a network
operator would be treated as a common carrier pursuant to Section
706, not ``under'' the Communications Act.
    \94\ Nat'l Ass'n of Reg. Util. Comm'rs v. FCC, 525 F.2d 630, 641
(DC Cir. 1976) (NARUC I) (quoting Semon v. Royal Indemnity Co., 279
F.2d 737, 739 (5th Cir. 1960) and other cases); see also Verizon
Comments at 93 (`` `[T]he primary sine qua non of common carrier
status is a quasi-public character, which arises out of the
undertaking `to carry for all people indifferently * * *.' ''
(quoting Nat'l Ass'n of Reg. Util. Comm'rs v. FCC, 533 F.2d 601, 608
(DC Cir. 1976) (NARUC II)). But see CTIA Reply at 57 (suggesting
that nondiscrimination is the sine qua non of common carrier
regulation referred to in NARUC II).
    \95\ NARUC I, 525 F.2d at 641 (citing Semon, 279 F.2d at 739-
40). Commenters assert that any obligation that is similar to an
obligation that appears in Title II of the Act is a ``common
carrier'' obligation. See, e.g., AT&T Comments at 210-11. We
disagree. Just because an obligation appears within Title II does
not mean that the imposition of that obligation or a similar one
results in ``treating'' an entity as a common carrier. For the
meaning of common carriage treatment, which is not defined in the
Act, we look to caselaw as discussed in the text.
    \96\ Even if edge providers were considered ``customers'' of the
broadband provider, the broadband provider would not be a common
carrier with regard to the role it plays in transmitting edge
providers' traffic. Our rules permit broadband providers to engage
in reasonable network management and, under certain circumstances,
block traffic and devices, engage in reasonable discrimination, and
prioritize traffic at subscribers' request. Blocking or
deprioritizing certain traffic is far from ``undertak[ing] to carry
for all [edge providers] indifferently.'' See NARUC I, 525 F.2d at
641.
    \97\ See Sw. Bell Tel. Co. v. FCC, 19 F.3d 1475, 1481 (DC Cir.
1994) (``If the carrier chooses its clients on an individual basis
and determines in each particular case whether and on what terms to
serve and there is no specific regulatory compulsion to serve all
indifferently, the entity is a private carrier for that particular
service and the Commission is not at liberty to subject the entity
to regulation as a common carrier.'') (internal quotation marks
omitted). Although promoting competition throughout the Internet
ecosystem is a central purpose of these rules, we decline to adopt
as a rule the Internet Policy Statement principle regarding
consumers' entitlement to competition. We agree with those
commenters that argue that the principle is too vague to be reduced
to a rule and that the proposed rule as stated failed to provide any
meaningful guidance regarding what conduct is and is not
permissible. See, e.g., Verizon Comments at 4, 53; TPPF Comments at
7. A rule barring broadband providers from depriving end users of
their entitlement to competition does not appear to be a viable
method of promoting competition. We also do not wish to duplicate
competitive analyses carried out by the Department of Justice, the
FTC, or the Commission's merger review process.
---------------------------------------------------------------------------

D. Reasonable Network Management

    Since at least 2005, when the Commission adopted the Internet
Policy Statement, we have recognized that a flourishing and open
Internet requires robust, well-functioning broadband networks, and
accordingly that open Internet protections require broadband providers
to be able to reasonably manage their networks. The open Internet rules
we adopt in this Order expressly provide for and define ``reasonable
network management'' in order to provide greater clarity to broadband
providers, network equipment providers, and Internet end users and edge
providers regarding the types of network management practices that are
consistent with open Internet protections.
    In the Open Internet NPRM, the Commission proposed that open
Internet rules be subject to reasonable network management, consisting
of ``reasonable practices employed by a provider of broadband Internet
access service to: (1) Reduce or mitigate the effects of congestion on
its network or to address quality-of-service concerns; (2) address
traffic that is unwanted by users or harmful; (3) prevent the transfer
of unlawful content; or (4) prevent the unlawful transfer of content.''
The proposed definition also stated that reasonable network management
consists of ``other reasonable network management practices.''
    Upon reviewing the record, we conclude that the definition of
reasonable network management should provide greater clarity regarding
the standard used to gauge reasonableness, expressly account for
technological differences among networks that may affect reasonable
network management, and omit elements that do not relate directly to
network management functions and are therefore better handled elsewhere
in the rules--for example, measures to prevent the transfer of unlawful
content. We therefore adopt the following definition of reasonable
network management:

    A network management practice is reasonable if it is appropriate
and tailored to achieving a legitimate network management purpose,
taking into account the particular network architecture and
technology of the broadband Internet access service.

Legitimate network management purposes include: ensuring network
security and integrity, including by addressing traffic that is harmful
to the network; addressing traffic that is unwanted by end users
(including by premise operators), such as by providing services or
capabilities consistent with an end user's choices regarding parental
controls or security capabilities; and reducing or mitigating the
effects of congestion on the network. The term ``particular network
architecture and technology'' refers to the differences across access
platforms such as cable, DSL, satellite, and fixed wireless.
    As proposed in the Open Internet NPRM, we will further develop the
scope of reasonable network management on a case-by-case basis, as
complaints about broadband providers' actual practices arise. The
novelty of Internet access and traffic management questions, the
complex nature of the Internet, and a general policy of restraint in
setting policy for Internet access service providers weigh in favor of
a case-by-case approach.
    In taking this approach, we recognize the need to balance clarity
with flexibility.\98\ We discuss below certain

[[Page 59209]]

principles and considerations that will inform the Commission's case-
by-case analysis. Further, although broadband providers are not
required to seek permission from the Commission before deploying a
network management practice, they or others are free to do so, for
example by seeking a declaratory ruling.\99\
---------------------------------------------------------------------------

    \98\ Some parties contend that there will be uncertainty
associated with open Internet rules, subject to reasonable network
management, which will limit provider flexibility, stifle
innovation, and slow providers' response time in managing their
networks. See, e.g., ADTRAN Comments at 11-13; Barbara Esbin (Esbin)
Comments at 7. For example, some parties express concern that that
the definition proposed in the Open Internet NPRM provided
insufficient guidance regarding what standard will be used to
determine whether a given practice is ``reasonable.'' See, e.g.,
ADTRAN Comments at 13; AT&T Comments at 13; CDT Comments at 38; PIC
Comments at 35-36, 39; Texas PUC Comments at 6-7; Verizon Reply at
8, 75, 78. Others contend that although clarity is needed, the
Commission should not list categories of activities considered
reasonable. See, e.g., Free Press Comments at 82, 85-86. We seek to
balance these interests through general rules designed to give
providers sufficient flexibility to implement necessary network
management practices, coupled with guidance regarding certain
principles and considerations that will inform the Commission's
case-by-case analysis.
    \99\ See 47 CFR 1.2 (providing for ``a declaratory ruling
terminating a controversy or removing uncertainty'').
---------------------------------------------------------------------------

    We reject proposals to define reasonable network management
practices more expansively or more narrowly than stated above. We agree
with commenters that the Commission should not adopt the ``narrowly or
carefully tailored'' standard discussed in the Comcast Network
Management Practices Order.\100\ We find that this standard is
unnecessarily restrictive and may overly constrain network engineering
decisions. Moreover, the ``narrowly tailored'' language could be read
to import strict scrutiny doctrine from constitutional law, which we
are not persuaded would be helpful here. Broadband providers may employ
network management practices that are appropriate and tailored to the
network management purpose they seek to achieve, but they need not
necessarily employ the most narrowly tailored practice theoretically
available to them.
---------------------------------------------------------------------------

    \100\ See Comcast Network Management Practices Order, 23 FCC Rcd
at 13055-56, para. 47 (stating that, to be considered ``reasonable''
a network management practice ``should further a critically
important interest and be narrowly or carefully tailored to serve
that interest''); see also AT&T Comments at 186-87 (arguing that the
Comcast standard is too narrow); Level 3 Comments at 14; PAETEC
Comments at 17-18. But see Free Press Comments at 91-92 (stating
that the Commission should not retreat from the fundamental
framework of the Comcast standard). A ``reasonableness'' standard
also has the advantage of being administrable and familiar.
---------------------------------------------------------------------------

    We also acknowledge that reasonable network management practices
may differ across platforms. For example, practices needed to manage
congestion on a fixed satellite network may be inappropriate for a
fiber-to-the-home network. We also recognize the unique network
management challenges facing broadband providers that use unlicensed
spectrum to deliver service to end users. Unlicensed spectrum is shared
among multiple users and technologies and no single user can control or
assure access to the spectrum. We believe the concept of reasonable
network management is sufficiently flexible to afford such providers
the latitude they need to effectively manage their networks.\101\
---------------------------------------------------------------------------

    \101\ See Appendix A, sec. 8.11. We recognize that the standards
for fourth-generation (4G) wireless networks include the capability
to prioritize particular types of traffic, and that other broadband
Internet access services may incorporate similar features. Whether
particular uses of these technologies constitute reasonable network
management will depend on whether they are appropriate and tailored
to achieving a legitimate network management purpose.
---------------------------------------------------------------------------

    The principles guiding case-by-case evaluations of network
management practices are much the same as those that guide assessments
of ``no unreasonable discrimination,'' and include transparency, end-
user control, and use- (or application-) agnostic treatment. We also
offer guidance in the specific context of the legitimate network
management purposes listed above.
    Network Security or Integrity and Traffic Unwanted by End Users.
Broadband providers may implement reasonable practices to ensure
network security and integrity, including by addressing traffic that is
harmful to the network.\102\ Many commenters strongly support allowing
broadband providers to implement such network management practices.
Some commenters, however, express concern that providers might
implement anticompetitive or otherwise problematic practices in the
name of protecting network security. We make clear that, for the
singling out of any specific application for blocking or degradation
based on harm to the network to be a reasonable network management
practice, a broadband provider should be prepared to provide a
substantive explanation for concluding that the particular traffic is
harmful to the network, such as traffic that constitutes a denial-of-
service attack on specific network infrastructure elements or exploits
a particular security vulnerability.
---------------------------------------------------------------------------

    \102\ In the context of broadband Internet access service,
techniques to ensure network security and integrity are designed to
protect the access network and the Internet against actions by
malicious or compromised end systems. Examples include spam,
botnets, and distributed denial of service attacks. Unwanted traffic
includes worms, malware, and viruses that exploit end-user system
vulnerabilities; denial of service attacks; and spam. See IETF,
Report from the IAB workshop on Unwanted Traffic March 9-10, 2006,
RFC 4948, at 31 (Aug. 2007), available at http://www.rfc-editor.org/rfc/rfc4948.txt.
---------------------------------------------------------------------------

    Broadband providers also may implement reasonable practices to
address traffic that a particular end user chooses not to receive.
Thus, for example, a broadband provider could provide services or
capabilities consistent with an end user's choices regarding parental
controls, or allow end users to choose a service that provides access
to the Internet but not to pornographic Web sites. Likewise, a
broadband provider serving a premise operator could restrict traffic
unwanted by that entity, though such restrictions should be disclosed.
Our rule will not impose liability on a broadband provider where such
liability is prohibited by Section 230(c)(2) of the Act.\103\
---------------------------------------------------------------------------

    \103\ See 47 U.S.C. 230(c)(2) (no provider of an interactive
computer service shall be held liable on account of ``(A) any action
voluntarily taken in good faith to restrict access to or
availability of material that the provider or user considers to be
obscene, lewd, lascivious, filthy, excessively violent, harassing,
or otherwise objectionable, whether or not such material is
constitutionally protected; or (B) any action taken to enable or
make available to information content providers or others the
technical means to restrict access to material described in
[subparagraph (A)]'').
---------------------------------------------------------------------------

    We note that, in some cases, mechanisms that reduce or eliminate
some forms of harmful or unwanted traffic may also interfere with
legitimate network traffic. Such mechanisms must be appropriate and
tailored to the threat; should be evaluated periodically as to their
continued necessity; and should allow end users to opt-in or opt-out if
possible.\104\ Disclosures of network management practices used to
address network security or traffic a particular end user does not want
to receive should clearly state the objective of the mechanism and, if
applicable, how an end user can opt in or out of the practice.
---------------------------------------------------------------------------

    \104\ For example, a network provider might be able to assess a
network endpoint's posture--see IETF, Network Endpoint Assessment
(NEA): Overview and Requirements, RFC 5209 (Jun. 2008); Internet
Engineering Task Force, PA-TNC: A Posture Attribute (PA) Protocol
Compatible with Trusted Network Connect (TNC), RFC 5792 (Mar.
2010)--and tailor port blocking accordingly. With the posture
assessment, an end user might then opt out of the network management
mechanism by upgrading the operating system or installing a suitable
firewall.
---------------------------------------------------------------------------

    Network Congestion. Numerous commenters support permitting the use
of reasonable network management practices to address the effects of
congestion, and we agree that congestion management may be a legitimate
network management purpose. For example, broadband providers may need
to take reasonable steps to ensure that heavy users do not crowd out
others. What constitutes congestion and what measures are reasonable to
address it may vary depending on the technology platform for a
particular broadband Internet access service. For example, if cable
modem subscribers in a particular neighborhood are experiencing
congestion, it may be reasonable for a broadband provider to
temporarily limit

[[Page 59210]]

the bandwidth available to individual end users in that neighborhood
who are using a substantially disproportionate amount of bandwidth.
    We emphasize that reasonable network management practices are not
limited to the categories described here, and that broadband providers
may take other reasonable steps to maintain the proper functioning of
their networks, consistent with the definition of reasonable network
management we adopt. As we stated in the Open Internet NPRM, ``we do
not presume to know now everything that providers may need to do to
provide robust, safe, and secure Internet access to their subscribers,
much less everything they may need to do as technologies and usage
patterns change in the future.'' Broadband providers should have
flexibility to experiment, innovate, and reasonably manage their
networks.

E. Mobile Broadband

    There is one Internet, which should remain open for consumers and
innovators alike, although it may be accessed through different
technologies and services. The record demonstrates the importance of
freedom and openness for mobile broadband networks, and the rationales
for adopting high-level open Internet rules, discussed above, are for
the most part as applicable to mobile broadband as they are to fixed
broadband. Consumer choice, freedom of expression, end-user control,
competition, and the freedom to innovate without permission are as
important when end users are accessing the Internet via mobile
broadband as via fixed. And there have been instances of mobile
providers blocking certain third-party applications, particularly
applications that compete with the provider's own offerings; relatedly,
concerns have been raised about inadequate transparency regarding
network management practices. We also note that some mobile broadband
providers affirmatively state they do not oppose the application of
openness rules to mobile broadband.
    However, as explained in the Open Internet NPRM and subsequent
Public Notice, mobile broadband presents special considerations that
suggest differences in how and when open Internet protections should
apply. Mobile broadband is an earlier-stage platform than fixed
broadband, and it is rapidly evolving. For most of the history of the
Internet, access has been predominantly through fixed platforms--first
dial-up, then cable modem and DSL services. As of a few years ago, most
consumers used their mobile phones primarily to make phone calls and
send text messages, and most mobile providers offered Internet access
only via ``walled gardens'' or stripped down Web sites. Today, however,
mobile broadband is an important Internet access platform that is
helping drive broadband adoption, and data usage is growing rapidly.
The mobile ecosystem is experiencing very rapid innovation and change,
including an expanding array of smartphones, aircard modems, and other
devices that enable Internet access; the emergence and rapid growth of
dedicated-purpose mobile devices like e-readers; the development of
mobile application (``app'') stores and hundreds of thousands of mobile
apps; and the evolution of new business models for mobile broadband
providers, including usage-based pricing.
    Moreover, most consumers have more choices for mobile broadband
than for fixed (particularly fixed wireline) broadband.\105\ Mobile
broadband speeds, capacity, and penetration are typically much lower
than for fixed broadband, though some providers have begun offering 4G
service that will enable offerings with higher speeds and capacity and
lower latency than previous generations of mobile service.\106\ In
addition, existing mobile networks present operational constraints that
fixed broadband networks do not typically encounter. This puts greater
pressure on the concept of ``reasonable network management'' for mobile
providers, and creates additional challenges in applying a broader set
of rules to mobile at this time. Further, we recognize that there have
been meaningful recent moves toward openness in and on mobile broadband
networks, including the introduction of third-party devices and
applications on a number of mobile broadband networks, and more open
mobile devices. In addition, we anticipate soon seeing the effects on
the market of the openness conditions we imposed on mobile providers
that operate on upper 700 MHz C Block (``C Block'') spectrum,\107\
which includes Verizon Wireless, one of the largest mobile wireless
carriers in the U.S.
---------------------------------------------------------------------------

    \105\ Compare National Broadband Plan at 37 (Exh. 4-A) with 39-
40 (Exh. 4-E). However, in many areas of the country, particularly
in rural areas, there are fewer options for mobile broadband. See
Fourteenth Wireless Competition Report at para. 355, tbl. 39 & chart
48. This may result in some consumers having fewer options for
mobile broadband than for fixed.
    \106\ Some fixed broadband providers contend that current mobile
broadband offerings directly compete with their offerings. See
Letter from Michael D. Saperstein, Jr., Director of Regulatory
Affairs, Frontier Communications, to Marlene Dortch, Secretary, FCC,
GN Docket No. 09-191 (filed Dec. 15, 2010) (discussing entry of
wireless service into the broadband market and its effect on
wireline broadband subscribership) and Attach. at 1 (citing reports
that LTE is ``a very practical and encouraging substitution for DSL,
particularly when you look at rural markets''); Letter from Malena
F. Barzilai, Federal Government Affairs, Windstream Communications,
Inc., to Marlene Dortch, Secretary, FCC, GN Docket No. 09-191 (filed
Dec. 15, 2010). As part of our ongoing monitoring, we will track
such competition and any impact these rules may have on it.
    \107\ The first network using spectrum subject to these rules
has recently started offering service. See Press Release, Verizon
Wireless, Blazingly Fast: Verizon Wireless Launches The World's
Largest 4G LTE Wireless Network On Sunday, Dec. 5 (Dec. 5, 2010),
available at news.vzw.com/news/2010/12/pr2010-12-03.html.
Specifically, licensees subject to the rule must provide an open
platform for third-party applications and devices. See 700 MHz
Second Report and Order, 22 FCC Rcd 15289; 47 CFR 27.16. The rules
we adopt in this Order are independent of those open platform
requirements. We expect our observations of how the 700 MHz open
platform rules affect the mobile broadband sector to inform our
ongoing analysis of the application of openness rules to mobile
broadband generally. 700 MHz Second Report and Order, 22 FCC Rcd at
15364-65, 15374, paras. 205, 229. A number of commenters support the
Commission's waiting to determine whether to apply openness rules to
mobile wireless until the effects of the C Block openness
requirement can be observed. See, e.g., AT&T PN Reply, at 32-37;
Cricket PN Reply at 11. We also note that some providers tout
openness as a competitive advantage. See, e.g., Clearwire Comments
at 7; Verizon Reply at 47-52.
---------------------------------------------------------------------------

    In light of these considerations, we conclude it is appropriate to
take measured steps at this time to protect the openness of the
Internet when accessed through mobile broadband. We apply certain of
the open Internet rules, requiring compliance with the transparency
rule and a basic no-blocking rule.\108\
---------------------------------------------------------------------------

    \108\ We note that section 332(a) requires us, ``[i]n taking
actions to manage the spectrum to be made available for use by the
private mobile service,'' to consider various factors, including
whether our actions will ``improve the efficiency of spectrum use
and reduce the regulatory burden,'' and ``encourage competition.''
47 U.S.C. 332(a)(2), (3). To the extent section 332(a) applies to
our actions in this Order, we note that we have considered these
factors.
---------------------------------------------------------------------------

1. Application of Openness Principles to Mobile Broadband
a. Transparency
    The wide array of commenters who support a disclosure requirement
generally agree that all broadband providers, including mobile
broadband providers, should be required to disclose their network
management practices. Although some mobile broadband providers argue
that the dynamic nature of mobile network management makes meaningful
disclosure difficult, we conclude that end users need a clear
understanding of network management practices, performance, and
commercial terms, regardless of the broadband platform they use to
access the Internet. Although a number of mobile broadband

[[Page 59211]]

providers have adopted voluntary codes of conduct regarding disclosure,
we believe that a uniform rule applicable to all mobile broadband
providers will best preserve Internet openness by ensuring that end
users have sufficient information to make informed choices regarding
use of the network; and that content, application, service, and device
providers have the information needed to develop, market, and maintain
Internet offerings. The transparency rule will also aid the Commission
in monitoring the evolution of mobile broadband and adjusting, as
appropriate, the framework adopted in this Order.
    Therefore, as stated above, we require mobile broadband providers
to follow the same transparency rule applicable to fixed broadband
providers. Further, although we do not require mobile broadband
providers to allow third-party devices or all third-party applications
on their networks, we nonetheless require mobile broadband providers to
disclose their third-party device and application certification
procedures, if any; to clearly explain their criteria for any
restrictions on use of their network; and to expeditiously inform
device and application providers of any decisions to deny access to the
network or of a failure to approve their particular devices or
applications. With respect to the types of disclosures required to
satisfy the rule, we direct mobile broadband providers to the
discussion in Part III.B, above. Additionally, mobile broadband
providers should follow the guidance the Commission provided to
licensees of the upper 700 MHz C Block spectrum regarding compliance
with their disclosure obligations, particularly regarding disclosure to
third-party application developers and device manufacturers of criteria
and approval procedures (to the extent applicable).\109\ For example,
these disclosures include, to the extent applicable, establishing a
transparent and efficient approval process for third parties, as set
forth in Section 27.16(d).\110\
---------------------------------------------------------------------------

    \109\ 700 MHz Second Report and Order, 22 FCC Rcd at 15371-72,
para. 224 (``[A] C Block licensee must publish [for example, by
posting on the provider's Web site] standards no later than the time
at which it makes such standards available to any preferred vendors
(i.e., vendors with whom the provider has a relationship to design
products for the provider's network). We also require the C Block
licensee to provide to potential customers notice of the customers'
rights to request the attachment of a device or application to the
licensee's network, and notice of the licensee's process for
customers to make such requests, including the relevant network
criteria.'').
    \110\ See 47 CFR 27.16(d) (``Access requests. (1) Licensees
shall establish and publish clear and reasonable procedures for
parties to seek approval to use devices or applications on the
licensees' networks. A licensee must also provide to potential
customers notice of the customers' rights to request the attachment
of a device or application to the licensee's network, and notice of
the licensee's process for customers to make such requests,
including the relevant network criteria. (2) If a licensee
determines that a request for access would violate its technical
standards or regulatory requirements, the licensee shall
expeditiously provide a written response to the requester specifying
the basis for denying access and providing an opportunity for the
requester to modify its request to satisfy the licensee's
concerns.'').
---------------------------------------------------------------------------

b. No Blocking
    We adopt a no blocking rule that guarantees end users' access to
the Web and protects against mobile broadband providers' blocking
applications that compete with their other primary service offering--
voice and video telephony--while ensuring that mobile broadband
providers can engage in reasonable network management:

    A person engaged in the provision of mobile broadband Internet
access service, insofar as such person is so engaged, shall not
block consumers from accessing lawful Web sites, subject to
reasonable network management; nor shall such person block
applications that compete with the provider's voice or video
telephony services, subject to reasonable network management.

We understand a ``provider's voice or video telephony services'' to
include a voice or video telephony service provided by any entity in
which the provider has an attributable interest.\111\ We emphasize that
the rule protects any and all applications that compete with a mobile
broadband provider's voice or video telephony services. Further,
degrading a particular Web site or an application that competes with
the provider's voice or video telephony services so as to render the
Web site or application effectively unusable would be considered
tantamount to blocking (subject to reasonable network management).
---------------------------------------------------------------------------

    \111\ For the purposes of these rules, an attributable interest
includes equity ownership interest in or de facto control of, or by,
the entity that provides the voice or video telephony service. An
attributable interest also includes any exclusive arrangement for
such voice or video telephony service, including de facto exclusive
arrangements.
---------------------------------------------------------------------------

    End users expect to be able to access any lawful Web site through
their broadband service, whether fixed or mobile. Web browsing
continues to generate the largest amount of mobile data traffic, and
applications and services are increasingly being provisioned and used
entirely through the Web, without requiring a standalone application to
be downloaded to a device. Given that the mobile Web is well-developed
relative to other mobile applications and services, and enjoys similar
expectations of openness that characterize Web use through fixed
broadband, we find it appropriate to act here. We also recognize that
accessing a Web site typically does not present the same network
management issues that downloading and running an app on a device may
present. At this time, a prohibition on blocking access to lawful Web
sites (including any related traffic transmitted or received by any
plug-in, scripting language, or other browser extension) appropriately
balances protection for the ability of end users to access content,
applications, and services through the Web and assurance that mobile
broadband providers can effectively manage their mobile broadband
networks.
    Situations have arisen in which mobile wireless providers have
blocked third-party applications that arguably compete with their
telephony offerings.\112\ This type of blocking confirms that mobile
broadband providers may have strong incentives to limit Internet
openness when confronted with third-party applications that compete
with their telephony services. Some commenters express concern that
wireless providers could favor their own applications over the
applications of unaffiliated developers, under the guise of reasonable
network management. A number of commenters assert that blocking or
hindering the delivery of services that compete with those offered by
the mobile broadband provider, such as over-the-top VoIP, should be
prohibited. According to Skype, for example, there is ``a consensus
that at a minimum, a `no blocking' rule should apply to voice and video
applications that compete with broadband network operators' own service
offerings.'' Clearwire argues that the Commission should restrict only
practices that appear to have an element of anticompetitive intent.
Although some commenters support a broader no-blocking rule, we believe
that a targeted prophylactic rule is appropriate at this

[[Page 59212]]

time,\113\ and necessary to deter this type of behavior in the future.
---------------------------------------------------------------------------

    \112\  See, e.g., Letter from James W. Cicconi, AT&T Services,
Inc., to Ruth Milkman, Chief, Wireless Telecommunications Bureau,
FCC, RM-11361, RM-11497 at 6-8 (filed Aug. 21, 2009); DISH PN Reply
at 7 (``VoIP operators such as Skype have faced significant
difficulty in gaining access across wireless Internet
connections.''). Mobile providers blocking VoIP services is an issue
not only in the United States, but worldwide. In Europe, the Body of
European Regulators for Electronic Communications reported, among
other issues, a number of cases of blocking or charging extra for
VoIP services by certain European mobile operators. See European
Commission, Information Society and Media Directorate-General Report
on the Public Consultation on ``The Open Internet and Net Neutrality
in Europe'' 2, (Nov. 9, 2010), ec.europa.eu/information--society/
policy/ecomm/library/public--consult/net--neutrality/index--en.htm.
    \113\ See Letter from Jonathan Spalter, Chairman, Mobile Future,
to Marlene H. Dortch, Secretary, FCC, GN Docket Nos. 09-191 & 10-
127, at 3 n.16 (filed Dec. 13, 2010) (supporting tailored
prohibition on blocking applications), citing AT&T Comments at 65;
T-Mobile Comments, Declaration of Grant Castle at 4. The no blocking
rule that we adopt for mobile broadband involves distinct treatment
of applications that compete with the provider's voice and video
telephony services, whereas we have adopted a broader traffic-based
approach for fixed broadband. We acknowledge that this rule for
mobile broadband may lead in some limited measure to the traffic-
identification difficulties discussed with respect to fixed
broadband. We find, however, that the reasons for taking our
cautious approach to mobile broadband outweigh this concern,
particularly in light of our intent to monitor developments
involving mobile broadband, including this and other aspects of the
practical implementation of our rules.
---------------------------------------------------------------------------

    The prohibition on blocking applications that compete with a
broadband provider's voice or video telephony services does not apply
to a broadband provider's operation of application stores or their
functional equivalent. In operating app stores, broadband providers
compete directly with other types of entities, including device
manufacturers and operating system developers,\114\ and we do not
intend to limit mobile broadband providers' flexibility to curate their
app stores similar to app store operators that are not subject to these
rules.
---------------------------------------------------------------------------

    \114\ For example, app stores are operated by manufacturers and
operating system developers such as Nokia, Apple, RIM, Google,
Microsoft, and third parties such as GetJar. See also AT&T PN
Comments at 63-66 (emphasizing the competitiveness of the market for
mobile apps, including the variety of sources from which consumers
may obtain applications); T-Mobile PN Comments at 21 (``The
competitive wireless marketplace will continue to discipline app
store owners * * * that exclude third-party apps from their app
stores entirely, eliminating the need for Commission action.''). We
note, however, that for a few devices, such as Apple's iPhone, there
may be fewer options for accessing and distributing apps.
---------------------------------------------------------------------------

    As indicated in Part III.D above, the reasonable network management
definition takes into account the particular network architecture and
technology of the broadband Internet access service. Thus, in
determining whether a network management practice is reasonable, the
Commission will consider technical, operational, and other differences
between wireless and other broadband Internet access platforms,
including differences relating to efficient use of spectrum. We
anticipate that conditions in mobile broadband networks may necessitate
network management practices that would not be necessary in most fixed
networks, but conclude that our definition of reasonable network
management is flexible enough to accommodate such differences.
2. Ongoing Monitoring
    Although some commenters support applying the no unreasonable
discrimination rule to mobile broadband,\115\ for the reasons discussed
above, we decline to do so, preferring at this time to put in place
basic openness protections and monitor the development of the mobile
broadband marketplace. We emphasize that our decision to proceed
incrementally with respect to mobile broadband at this time should not
suggest that we implicitly approve of any provider behavior that runs
counter to general open Internet principles. Beyond those practices
expressly prohibited by our rules, other conduct by mobile broadband
providers, particularly conduct that would violate our rules for fixed
broadband, may not necessarily be consistent with Internet openness and
the public interest.
---------------------------------------------------------------------------

    \115\ See, e.g, Free Press Comments at 125-26; OIC Comments at
36-39. See also, e.g., Leap Comments at 17-22; Sprint Reply at 24-
26. A number of commenters suggest that openness rules should be
applied identically to all broadband platforms. See, e.g.,
CenturyLink Comments at 22-23; Comcast Comments at 32; DISH Network
PN Comments at 17; NCTA PN Comments at 11; Qwest PN Comments at 12-
19; SureWest PN Comments at 18-20; TWC PN Comments at 33-35; Vonage
PN Comments at 10-18; Windstream PN Comments at 6-19.
---------------------------------------------------------------------------

    We are taking measured steps to protect openness for mobile
broadband at this time in part because we want to better understand how
the mobile broadband market is developing before determining whether
adjustments to this framework are necessary. To that end, we will
closely monitor developments in the mobile broadband market, with a
particular focus on the following issues: (1) The effects of these
rules, the C Block conditions, and market developments related to the
openness of the Internet as accessed through mobile broadband; (2) any
conduct by mobile broadband providers that harms innovation,
investment, competition, end users, free expression or the achievement
of national broadband goals; (3) the extent to which differences
between fixed and mobile rules affect fixed and mobile broadband
markets, including competition among fixed and mobile broadband
providers; and (4) the extent to which differences between fixed and
mobile rules affect end users for whom mobile broadband is their only
or primary Internet access platform.\116\ We will investigate and
evaluate concerns as they arise. We also will adjust our rules as
appropriate. To aid the Commission in these tasks, we will create an
Open Internet Advisory Committee, as discussed below, with a mandate
that includes monitoring and regularly reporting on the state of
Internet openness for mobile broadband.
---------------------------------------------------------------------------

    \116\ We note that mobile broadband is the only or primary
broadband Internet access platform used by many Americans.
---------------------------------------------------------------------------

    Further, we reaffirm our commitment to enforcing the open platform
requirements applicable to upper 700 MHz C Block licensees. The first
networks using this spectrum are now becoming operational.

F. Other Laws and Considerations

    Open Internet rules are not intended to expand or contract
broadband providers' rights or obligations with respect to other laws
or safety and security considerations, including the needs of emergency
communications and law enforcement, public safety, and national
security authorities. Similarly, open Internet rules protect only
lawful content, and are not intended to inhibit efforts by broadband
providers to address unlawful transfers of content. For example, there
should be no doubt that broadband providers can prioritize
communications from emergency responders, or block transfers of child
pornography. To make clear that open Internet protections can and must
coexist with these other legal frameworks, we adopt the following
clarifying provisions:

    Nothing in this part supersedes any obligation or authorization
a provider of broadband Internet access service may have to address
the needs of emergency communications or law enforcement, public
safety, or national security authorities, consistent with or as
permitted by applicable law, or limits the provider's ability to do
so.
    Nothing in this part prohibits reasonable efforts by a provider
of broadband Internet access service to address copyright
infringement or other unlawful activity.
1. Emergency Communications and Safety and Security Authorities
    Commenters are broadly supportive of our proposal to state that
open Internet rules do not supersede any obligation a broadband
provider may have--or limit its ability--to address the needs of
emergency communications or law enforcement, public safety, or homeland
or national security authorities (together, ``safety and security
authorities''). Broadband providers have obligations under statutes
such as the Communications Assistance for Law Enforcement Act, the
Foreign Intelligence Surveillance Act, and the Electronic
Communications Privacy Act that could in some circumstances intersect
with open Internet protections, and most commenters recognize the
benefits of clarifying that these obligations are not inconsistent with
open Internet rules. Likewise, in connection with an emergency, there

[[Page 59213]]

may be Federal, state, Tribal, and local public safety entities;
homeland security personnel; and other authorities that need guaranteed
or prioritized access to the Internet in order to coordinate disaster
relief and other emergency response efforts, or for other emergency
communications. In the Open Internet NPRM we proposed to address the
needs of law enforcement in one rule and the needs of emergency
communications and public safety, national, and homeland security
authorities in a separate rule. We are persuaded by the record that
these rules should be combined, as the interests at issue are
substantially similar.\117\ We also agree that the rule should focus on
the needs of ``law enforcement * * * authorities'' rather than the
needs of ``law enforcement.'' The purpose of the safety and security
provision is first to ensure that open Internet rules do not restrict
broadband providers in addressing the needs of law enforcement
authorities, and second to ensure that broadband providers do not use
the safety and security provision without the imprimatur of a law
enforcement authority, as a loophole to the rules. As such, application
of the safety and security rule should be tied to invocation by
relevant authorities rather than to a broadband provider's independent
notion of law enforcement.
---------------------------------------------------------------------------

    \117\ See PIC Comments at 42-44. We intend the term ``national
security authorities'' to include homeland security authorities.
---------------------------------------------------------------------------

    Some commenters urge us to limit the scope of the safety and
security rule, or argue that it is unnecessary because other statutes
give broadband providers the ability and responsibility to assist law
enforcement. Several commenters urge the Commission to revise its
proposal to clarify that broadband providers may not take any voluntary
steps that would be inconsistent with open Internet principles, beyond
those steps required by law. They argue, for example, that a broad
exception for voluntary efforts could swallow open Internet rules by
allowing broadband providers to cloak discriminatory practices under
the guise of protecting safety and security.\118\
---------------------------------------------------------------------------

    \118\ See EFF Comments at 20-22. EFF would require a pre-
deployment waiver from the Commission if the needs of law
enforcement would require broadband providers to act inconsistently
with open Internet rules. Id. at 22.
---------------------------------------------------------------------------

    We agree with commenters that the safety and security rule should
be tailored to avoid the possibility of broadband providers using their
discretion to mask improper practices. But it would be a mistake to
limit the rule to situations in which broadband providers have an
obligation to assist safety and security personnel. For example, such a
limitation would prevent broadband providers from implementing the
Cellular Priority Access Service (also known as the Wireless Priority
Service (WPS)), which allows for but does not legally require the
prioritization of public safety communications on wireless networks. We
do not think it necessary or advisable to provide for pre-deployment
review by the Commission, particularly because time may be of the
essence in meeting safety and security needs.\119\
---------------------------------------------------------------------------

    \119\ The National Emergency Number Association (NENA) would
encourage or require network managers to provide public safety users
with advance notice of changes in network management that could
affect emergency services. See NENA Comments at 5-6. Although we do
not adopt such a requirement, we encourage broadband providers to be
mindful of the potential impact on emergency services when
implementing network management policies, and to coordinate major
changes with providers of emergency services when appropriate.
---------------------------------------------------------------------------

2. Transfers of Unlawful Content and Unlawful Transfers of Content
    In the NPRM, we proposed to treat as reasonable network management
``reasonable practices to * * * prevent the transfer of unlawful
content; or * * * prevent the unlawful transfer of content.'' For
reasons explained above we decline to include these practices within
the scope of ``reasonable network management.'' However, we conclude
that a clear statement that open Internet rules do not prohibit
broadband providers from making reasonable efforts to address the
transfer of unlawful content or unlawful transfers of content is
helpful to ensure that open Internet rules are not used as a shield to
enable unlawful activity or to deter prompt action against such
activity. For example, open Internet rules should not be invoked to
protect copyright infringement, which has adverse consequences for the
economy, nor should they protect child pornography. We emphasize that
open Internet rules do not alter copyright laws and are not intended to
prohibit or discourage voluntary practices undertaken to address or
mitigate the occurrence of copyright infringement.\120\
---------------------------------------------------------------------------

    \120\ See, e.g., Stanford University--DMCA Complaint Resolution
Center; User Generated Content Principles, http://www.ugcprinciples.com (cited in Letter from Linda Kinney, MPAA, to
Marlene H. Dortch, Secretary, FCC, GN Docket Nos. 09-191, 10-137, WC
Docket No. 07-52 at 1 (filed Nov. 29, 2010)). Open Internet rules
are not intended to affect the legal status of cooperative efforts
by broadband Internet access service providers and other service
providers that are designed to curtail infringement in response to
information provided by rights holders in a manner that is timely,
effective, and accommodates the legitimate interests of providers,
rights holders, and end users.
---------------------------------------------------------------------------

G. Specialized Services

    In the Open Internet NPRM, the Commission recognized that broadband
providers offer services that share capacity with broadband Internet
access service over providers' last-mile facilities, and may develop
and offer other such services in the future. These ``specialized
services,'' such as some broadband providers' existing facilities-based
VoIP and Internet Protocol-video offerings, differ from broadband
Internet access service and may drive additional private investment in
broadband networks and provide end users valued services, supplementing
the benefits of the open Internet. At the same time, specialized
services may raise concerns regarding bypassing open Internet
protections, supplanting the open Internet, and enabling
anticompetitive conduct. For example, open Internet protections may be
weakened if broadband providers offer specialized services that are
substantially similar to, but do not meet the definition of, broadband
Internet access service, and if consumer protections do not apply to
such services. In addition, broadband providers may constrict or fail
to continue expanding network capacity allocated to broadband Internet
access service to provide more capacity for specialized services. If
this occurs, and particularly to the extent specialized services grow
as substitutes for the delivery of content, applications, and services
over broadband Internet access service, the Internet may wither as an
open platform for competition, innovation, and free expression. These
concerns may be exacerbated by consumers' limited choices for broadband
providers, which may leave some end users unable to effectively
exercise their preferences for broadband Internet access service (or
content, applications, or services available through broadband Internet
access service) over specialized services.
    We agree with the many commenters who advocate that the Commission
exercise its authority to closely monitor and proceed incrementally
with respect to specialized services, rather than adopting policies
specific to such services at this time. We will carefully observe
market developments to verify that specialized services promote
investment, innovation, competition, and end-user benefits without
undermining or threatening the open Internet.\121\ We note also that
our rules

[[Page 59214]]

define broadband Internet access service to encompass ``any service
that the Commission finds to be providing a functional equivalent of
[broadband Internet access service], or that is used to evade the
protections set forth in these rules.'' \122\
---------------------------------------------------------------------------

    \121\ Our decision not to adopt rules regarding specialized
services at this time involves an issue distinct from the regulatory
classification of services such as VoIP and IPTV under the
Communications Act, a subject we do not address in this Order.
Likewise, the Commission's actions here do not affect any existing
obligation to provide interconnection, unbundled network elements,
or special access or other wholesale access under Sections 201, 251,
256, and 271 of the Act. 47 U.S.C. 201, 251, 256, 271.
    \122\ Some commenters, including Internet engineering experts
and analysts, emphasize the importance of distinguishing between the
open Internet and specialized services and state that ``this
distinction must continue as a most appropriate and constructive
basis for pursuing your policy goals.'' Various Advocates for the
Open Internet PN Reply at 3; see also id. at 2.
---------------------------------------------------------------------------

    We will closely monitor the robustness and affordability of
broadband Internet access services, with a particular focus on any
signs that specialized services are in any way retarding the growth of
or constricting capacity available for broadband Internet access
service. We fully expect that broadband providers will increase
capacity offered for broadband Internet access service if they expand
network capacity to accommodate specialized services. We would be
concerned if capacity for broadband Internet access service did not
keep pace. We also expect broadband providers to disclose information
about specialized services' impact, if any, on last-mile capacity
available for, and the performance of, broadband Internet access
service. We may consider additional disclosure requirements in this
area in our related proceeding regarding consumer transparency and
disclosure. We would also be concerned by any marketing, advertising,
or other messaging by broadband providers suggesting that one or more
specialized services, taken alone or together, and not provided in
accordance with our open Internet rules, is ``Internet'' service or a
substitute for broadband Internet access service. Finally, we will
monitor the potential for anticompetitive or otherwise harmful effects
from specialized services, including from any arrangements a broadband
provider may seek to enter into with third parties to offer such
services. The Open Internet Advisory Committee will aid us in
monitoring these issues.

IV. The Commission's Authority To Adopt Open Internet Rules

    Congress created the Commission ``[f]or the purpose of regulating
interstate and foreign commerce in communication by wire and radio so
as to make available, so far as possible, to all people of the United
States * * * a rapid, efficient, Nation-wide, and world-wide wire and
radio communication service with adequate facilities at reasonable
charges, for the purpose of the national defense, [and] for the purpose
of promoting safety of life and property through the use of wire and
radio communication.'' Section 2 of the Communications Act grants the
Commission jurisdiction over ``all interstate and foreign communication
by wire or radio.'' As the Supreme Court explained in the radio
context, Congress charged the Commission with ``regulating a field of
enterprise the dominant characteristic of which was the rapid pace of
its unfolding'' and therefore intended to give the Commission
sufficiently ``broad'' authority to address new issues that arise with
respect to ``fluid and dynamic'' communications technologies.\123\
Broadband Internet access services are clearly within the Commission's
subject matter jurisdiction and historically have been supervised by
the Commission. Furthermore, as explained below, our adoption of basic
rules of the road for broadband providers implements specific statutory
mandates in the Communications Act and the Telecommunications Act of
1996.
---------------------------------------------------------------------------

    \123\ Nat'l Broad. Co., Inc. v. United States, 319 U.S. 190,
219-20 (1943) (Congress did not ``attempt[] an itemized catalogue of
the specific manifestations of the general problems'' that it
entrusted to the Commission); see also FCC v. Pottsville Broad. Co.,
309 U.S. 134, 137, 138 (1940) (the Commission's statutory
responsibilities and authority amount to ``a unified and
comprehensive regulatory system'' for the communications industry
that allows a single agency to ``maintain, through appropriate
administrative control, a grip on the dynamic aspects'' of that
ever-changing industry).
---------------------------------------------------------------------------

    Congress has demonstrated its awareness of the importance of the
Internet and advanced services to modern interstate communications. In
Section 230 of the Act, for example, Congress announced ``the policy of
the United States'' concerning the Internet, which includes
``promot[ing] the continued development of the Internet'' and
``encourag[ing] the development of technologies which maximize user
control over what information is received by individuals, families, and
schools who use the Internet,'' while also ``preserv[ing] the vibrant
and competitive free market that presently exists for the Internet and
other interactive computer services'' and avoiding unnecessary
regulation. Other statements of congressional policy further confirm
the Commission's statutory authority. In Section 254 of the Act, for
example, Congress charged the Commission with designing a Federal
universal program that has as one of several objectives making
``[a]ccess to advanced telecommunications and information services''
available ``in all regions of the Nation,'' and particularly to
schools, libraries, and health care providers. To the same end, in
Section 706 of the 1996 Act, Congress instructed the Commission to
``encourage the deployment on a reasonable and timely basis of advanced
telecommunications capability to all Americans (including, in
particular, elementary and secondary schools and classrooms)'' and, if
it finds that advanced telecommunications capability is not being
deployed to all Americans ``on a reasonable and timely basis,'' to
``take immediate action to accelerate deployment of such capability.''
This mandate provides the Commission both ``authority'' and
``discretion'' ``to settle on the best regulatory or deregulatory
approach to broadband.'' As the legislative history of the 1996 Act
confirms, Congress believed that the laws it drafted would compel the
Commission to protect and promote the Internet, while allowing the
agency sufficient flexibility to decide how to do so.\124\ As explained
in detail below, Congress did not limit its instructions to the
Commission to one Section of the communications laws. Rather, it
expressed its instructions in multiple Sections which, viewed as a
whole, provide broad authority to promote competition, investment,
transparency, and an open Internet through the rules we adopt in this
Order.
---------------------------------------------------------------------------

    \124\ S. Rep. No. 104-23, at 51 (1995) (``The goal is to
accelerate deployment of an advanced capability that will enable
subscribers in all parts of the United States to send and receive
information in all its forms--voice, data, graphics, and video--over
a high-speed switched, interactive, broadband, transmission
capability.'').
---------------------------------------------------------------------------

A. Section 706 of the 1996 Act Provides Authority for the Open Internet
Rules

    As noted, Section 706 of the 1996 Act directs the Commission (along
with state commissions) to take actions that encourage the deployment
of ``advanced telecommunications capability.'' ``[A]dvanced
telecommunications capability,'' as defined in the statute, includes
broadband Internet access.\125\

[[Page 59215]]

Under Section 706(a), the Commission must encourage the deployment of
such capability by ``utilizing, in a manner consistent with the public
interest, convenience, and necessity,'' various tools including
``measures that promote competition in the local telecommunications
market, or other regulating methods that remove barriers to
infrastructure investment.'' For the reasons stated in Parts II.A, II.D
and III.B, above, our open Internet rules will have precisely that
effect.
---------------------------------------------------------------------------

    \125\ 47 U.S.C. 1302(d)(1) (defining ``advanced
telecommunications capability'' as ``high-speed, switched, broadband
telecommunications capability that enables users to originate and
receive high-quality voice, data, graphics, and video
telecommunications using any technology''). See National Broadband
Plan for our Future, Notice of Inquiry, 24 FCC Rcd 4342, 4309, App.
para. 13 (2009) (``advanced telecommunications capability'' includes
broadband Internet access); Inquiry Concerning the Deployment of
Advanced Telecomms. Capability to All Americans in a Reasonable and
Timely Fashion, 14 FCC Rcd 2398, 2400, para. 1 (Section 706
addresses ``the deployment of broadband capability''), 2406 para. 20
(same). Even when broadband Internet access is provided as an
``information service'' rather than a ``telecommunications
service,'' see Nat'l Cable & Telecomm. Ass'n v. Brand X Internet
Servs., 545 U.S. 967, 977-78 (2005), it involves
``telecommunications.'' 47 U.S.C. 153(24). Given Section 706's
explicit focus on deployment of broadband access to voice, data, and
video communications, it is not important that the statute does not
use the exact phrase ``Internet network management.''
---------------------------------------------------------------------------

    In Comcast, the DC Circuit identified Section 706(a) as a provision
that ``at least arguably * * * delegate[s] regulatory authority to the
Commission,'' and in fact ``contain[s] a direct mandate--the Commission
`shall encourage.' '' \126\ The court, however, regarded the Commission
as ``bound by'' a prior order that, in the court of appeals'
understanding, had held that Section 706(a) is not a grant of
authority. In the Advanced Services Order, to which the court referred,
the Commission held that Section 706(a) did not permit it to encourage
advanced services deployment through the mechanism of forbearance
without complying with the specific requirements for forbearance set
forth in Section 10 of the Communications Act. The issue presented in
the 1998 proceeding was whether the Commission could rely on the broad
terms of Section 706(a) to trump those specific requirements. In the
Advanced Services Order, the Commission ruled that it could not do so,
noting that it would be ``unreasonable'' to conclude that Congress
intended Section 706(a) to ``allow the Commission to eviscerate
[specified] forbearance exclusions after having expressly singled out
[those exclusions] for different treatment in Section 10.'' The
Commission accordingly concluded that Section 706(a) did not give it
independent authority--in other words, authority over and above what it
otherwise possessed \127\--to forbear from applying other provisions of
the Act. The Commission's holding thus honored the interpretive canon
that ``[a] specific provision * * * controls one[ ] of more general
application.''
---------------------------------------------------------------------------

    \126\ See Comcast, 600 F.3d at 658; see also 47 U.S.C. 1302(a)
(``The Commission * * * shall encourage the deployment on a
reasonable and timely basis of advanced telecommunications
capability to all Americans * * * by utilizing * * * price cap
regulation, regulatory forbearance, measures that promote
competition in the local telecommunications market, or other
regulating methods that remove barriers to infrastructure
investment.''). Because Section 706 contains a ``direct mandate,''
we reject the argument pressed by some commenters (see, e.g., AT&T
Comments at 217-18; Verizon Comments at 100-01; Qwest Comments at
58-59; Letter from Rick Chessen, Senior Vice President, Law and
Regulatory Policy, NCTA, to Marlene H. Dortch, Secretary, FCC, GN
Docket Nos. 09-191 & 10-127, WC Docket No. 07-52, at 7 (filed Dec.
10, 2010) (NCTA Dec. 10, 2010 Ex Parte Letter)) that Section 706
confers no substantive authority.
    \127\ Consistent with longstanding Supreme Court precedent, we
have understood this authority to include our ancillary jurisdiction
to further congressional policy. See, e.g., Amendment of Section
64.702 of the Commission's Rules and Regulations (Second Computer
Inquiry), Final Decision, 77 FCC 2d 384, 474 (1980), aff'd, Computer
& Commc'ns Indus. Ass'n. v. FCC, 693 F.2d 198, 211-14 (DC Cir. 1982)
(CCIA).
---------------------------------------------------------------------------

    While disavowing a reading of Section 706(a) that would allow the
agency to trump specific mandates of the Communications Act, the
Commission nonetheless affirmed in the Advanced Services Order that
Section 706(a) ``gives this Commission an affirmative obligation to
encourage the deployment of advanced services'' using its existing
rulemaking, forbearance and adjudicatory powers, and stressed that
``this obligation has substance.'' The Advanced Services Order is,
therefore, consistent with our present understanding that Section
706(a) authorizes the Commission (along with state commissions) to take
actions, within their subject matter jurisdiction and not inconsistent
with other provisions of law, that encourage the deployment of advanced
telecommunications capability by any of the means listed in the
provision.\128\
---------------------------------------------------------------------------

    \128\ To the extent the Advanced Services Order can be construed
as having read Section 706(a) differently, we reject that reading of
the statute for the reasons discussed in the text.
---------------------------------------------------------------------------

    In directing the Commission to ``encourage the deployment on a
reasonable and timely basis of advanced telecommunications capability
to all Americans * * * by utilizing * * * price cap regulation,
regulatory forbearance, measures that promote competition in the local
telecommunications market, or other regulating methods that remove
barriers to infrastructure investment,'' Congress necessarily invested
the Commission with the statutory authority to carry out those acts.
Indeed, the relevant Senate Report explained that the provisions of
Section 706 are ``intended to ensure that one of the primary objectives
of the [1996 Act]--to accelerate deployment of advanced
telecommunications capability--is achieved,'' and stressed that these
provisions are ``a necessary fail-safe'' to guarantee that Congress's
objective is reached. It would be odd indeed to characterize Section
706(a) as a ``fail-safe'' that ``ensures'' the Commission's ability to
promote advanced services if it conferred no actual authority. Here,
under our reading, Section 706(a) authorizes the Commission to address
practices, such as blocking VoIP communications, degrading or raising
the cost of online video, or denying end users material information
about their broadband service, that have the potential to stifle
overall investment in Internet infrastructure and limit competition in
telecommunications markets.
    This reading of Section 706(a) obviates the concern of some
commenters that our jurisdiction under the provision could be
``limitless'' or ``unbounded.'' To the contrary, our Section 706(a)
authority is limited in three critical respects. First, our mandate
under Section 706(a) must be read consistently with Sections 1 and 2 of
the Act, which define the Commission's subject matter jurisdiction over
``interstate and foreign commerce in communication by wire and radio.''
\129\ As a result, our authority under Section 706(a) does not, in our
view, extend beyond our subject matter jurisdiction under the
Communications Act. Second, the Commission's actions

[[Page 59216]]

under Section 706(a) must ``encourage the deployment on a reasonable
and timely basis of advanced telecommunications capability to all
Americans.'' Third, the activity undertaken to encourage such
deployment must ``utilize[e], in a manner consistent with the public
interest, convenience, and necessity,'' one (or more) of various
specified methods. These include: ``price cap regulation, regulatory
forbearance, measures that promote competition in the local
telecommunications market, or other regulating methods that remove
barriers to infrastructure investment.'' Actions that do not fall
within those categories are not authorized by Section 706(a). Thus, as
the DC Circuit has noted, while the statutory authority granted by
Section 706(a) is broad, it is ``not unfettered.'' \130\
---------------------------------------------------------------------------

    \129\ 47 U.S.C. 151, 152. The Commission historically has
recognized that services carrying Internet traffic are
jurisdictionally mixed, but generally subject to Federal regulation.
See, e.g., Nat'l Ass'n of Regulatory Util. Comm'rs Petition for
Clarification or Declaratory Ruling that No FCC Order or Rule Limits
State Authority to Collect Broadband Data, Memorandum Opinion and
Order, 25 FCC Rcd 5051, 5054, paras. 8-9 & n. 24 (2010). Where, as
here, ``it is not possible to separate the interstate and intrastate
aspects of the service,'' the Commission may preempt state
regulation where ``Federal regulation is necessary to further a
valid Federal regulatory objective, i.e., state regulation would
conflict with Federal regulatory policies.'' Minn. Pub. Utils.
Comm'n v. FCC, 483 F.3d 570, 578 (8th Cir. 2007); see also La. Pub.
Serv. Comm'n v. FCC, 476 U.S. 355, 375 n. 4 (1986). Except to the
extent a state requirement conflicts on its face with a Commission
decision herein, the Commission will evaluate preemption in light of
the fact-specific nature of the relevant inquiry, on a case-by-case
basis. We recognize, for example, that states play a vital role in
protecting end users from fraud, enforcing fair business practices,
and responding to consumer inquiries and complaints. See, e.g.,
Vonage Order, 19 FCC Rcd at 22404-05, para. 1. We have no intention
of impairing states' or local governments' ability to carry out
these duties unless we find that specific measures conflict with
Federal law or policy. In determining whether state or local
regulations frustrate Federal policies, we will, among other things,
be guided by the overarching congressional policies described in
Section 230 of the Act and Section 706 of the 1996 Act. 47 U.S.C.
230, 1302.
    \130\ Ad Hoc Telecomms. Users Comm., 572 F.3d at 906-07 (``The
general and generous phrasing of sec. 706 means that the FCC
possesses significant albeit not unfettered, authority and
discretion to settle on the best regulatory or deregulatory approach
to broadband.'').
---------------------------------------------------------------------------

    Section 706(a) accordingly provides the Commission a specific
delegation of legislative authority to promote the deployment of
advanced services, including by means of the open Internet rules
adopted in this Order. Our understanding of Section 706(a) is,
moreover, harmonious with other statutory provisions that confer a
broad mandate on the Commission. Section 706(a)'s directive to
``encourage the deployment [of advanced telecommunications capability]
on a reasonable and timely basis'' using the methods specified in the
statute is, for example, no broader than other provisions of the
Commission's authorizing statutes that command the agency to ensure
``just'' and ``reasonable'' rates and practices, or to regulate
services in the ``public interest.'' Indeed, our authority under
Section 706(a) is generally consistent with--albeit narrower than--the
understanding of ancillary jurisdiction under which this Commission
operated for decades before the Comcast decision.\131\ The similarities
between the two in fact explain why the Commission has not heretofore
had occasion to describe Section 706(a) in this way: In the particular
proceedings prior to Comcast, setting out the understanding of Section
706(a) that we articulate in this Order would not meaningfully have
increased the authority that we understood the Commission already to
possess.\132\
---------------------------------------------------------------------------

    \131\ In Comcast, the court stated that `` `[t]he Commission * *
* may exercise ancillary jurisdiction only when two conditions are
satisfied: (1) The Commission's general jurisdictional grant under
Title I [of the Communications Act] covers the regulated subject and
(2) the regulations are reasonably ancillary to the Commission's
effective performance of its statutorily mandated responsibilities.'
'' 600 F.3d at 646 (quoting Am. Library Ass'n v. FCC, 406 F.3d 689,
691-92 (DC Cir. 2005)) (alterations in original). The court further
ruled that the second prong of this test requires the Commission to
rely on specific delegations of statutory authority. 600 F.3d at
644, 654.
    \132\ Ignoring that Section 706(a) expressly contemplates the
use of ``regulating methods'' such as price regulation, some
commenters read prior Commission orders as suggesting that Section
706 authorizes only deregulatory actions. See AT&T Comments at 216
(citing Petition for Declaratory Ruling that pulver.com's Free World
Dialup is Neither Telecomm. Nor A Telecomms. Serv., Memorandum
Opinion and Order, 19 FCC Rcd 3307, 3319, para. 19 n. 69 (2004)
(Pulver Order)); Esbin Comments at 52 (citing Inquiry Concerning
High-Speed Access to the Internet Over Cable and Other Facilities et
al., Declaratory Ruling and Notice of Proposed Rulemaking, 17 FCC
Rcd 4798, 4801, 4826, 4840, paras. 4, 47, 73, (2002) (Cable Modem
Declaratory Ruling) and Appropriate Framework for Broadband Access
to the Internet Over Wireline Facilities et al., Report and Order
and Notice of Proposed Rulemaking, 20 FCC Rcd 14853, 14894 para. 77
(2005) (Wireline Broadband Report and Order)). They are mistaken.
The Pulver Order stated only that Section 706 did not contemplate
the application of ``economic and entry/exit regulation inherent in
Title II'' to information service Internet applications. Pulver
Order, 19 FCC Rcd at 3379, para. 19 n. 69 (emphasis added). The open
Internet rules that we adopt in this Order do not regulate Internet
applications, much less impose Title II (i.e., common carrier)
regulation on such applications. Moreover, at the same time the
Commission determined in the Cable Modem Declaratory Ruling and the
Wireline Broadband Report and Order that cable modem service and
wireline broadband services (such as DSL) could be provided as
information services not subject to Title II, it proposed new
regulations under other sources of authority including Section 706.
See Cable Modem Declaratory Ruling, 17 FCC Rcd at 4840, para. 73;
Wireline Broadband Report and Order, 20 FCC Rcd at 14929-30, 14987,
para. 146. On the same day the Commission adopted the Wireline
Broadband Report and Order, it also adopted the Internet Policy
Statement, which rested in part on Section 706. 20 FCC Rcd 14986,
para. 2 (2005). Our prior orders therefore do not construe Section
706 as exclusively deregulatory. And to the extent that any prior
order does suggest such a construction, we now reject it. See Ad Hoc
Telecomms. Users Comm., 572 F.3d at 908 (Section 706 ``direct[s] the
FCC to make the major policy decisions and to select the mix of
regulatory and deregulatory tools the Commission deems most
appropriate in the public interest to facilitate broadband
deployment and competition'') (emphasis added).
---------------------------------------------------------------------------

    Section 706(b) of the 1996 Act provides additional authority to
take actions such as enforcing open Internet principles. It directs the
Commission to undertake annual inquiries concerning the availability of
advanced telecommunications capability to all Americans and requires
that, if the Commission finds that such capability is not being
deployed in a reasonable and timely fashion, it ``shall take immediate
action to accelerate deployment of such capability by removing barriers
to infrastructure investment and by promoting competition in the
telecommunications market.'' In July 2010, the Commission ``conclude[d]
that broadband deployment to all Americans is not reasonable and
timely'' and noted that ``[a]s a consequence of that conclusion,''
Section 706(b) was triggered. Section 706(b) therefore provides express
authority for the pro-investment, pro-competition rules we adopt in
this Order.

B. Authority To Promote Competition and Investment in, and Protect End
Users of, Voice, Video, and Audio Services

    The Commission also has authority under the Communications Act to
adopt the open Internet rules in order to promote competition and
investment in voice, video, and audio services. Furthermore, for the
reasons stated in Part II, above, even if statutory provisions related
to voice, video, and audio communications were the only sources of
authority for the open Internet rules (which is not the case), it would
not be sound policy to attempt to implement rules concerning only
voice, video, or audio transmissions over the Internet.\133\
---------------------------------------------------------------------------

    \133\ Many broadband providers offer their service on a common
carriage basis under Title II of the Act. See Framework for
Broadband Internet Serv., Notice of Inquiry, 25 FCC Rcd 7866, 7875,
para. 21 (2010). With respect to these providers, the rules we adopt
in this Order are additionally supported on that basis. With the
possible exception of transparency requirements, however, the open
Internet rules are unlikely to create substantial new duties for
these providers in practice.
---------------------------------------------------------------------------

1. The Commission Has Authority To Adopt Open Internet Rules To Further
Its Responsibilities Under Title II of the Act
    Section 201 of the Act delegates to the Commission ``express and
expansive authority'' to ensure that the ``charges [and] practices * *
* in connection with'' telecommunications services are ``just and
reasonable.'' As described in Part II.B, interconnected VoIP services,
which include some over-the-top VoIP services, ``are increasingly being
used as a substitute for traditional telephone service.''\134\ Over-
the-top services therefore do, or will, contribute to the marketplace
discipline of voice telecommunications services regulated under Section
201.\135\ Furthermore,

[[Page 59217]]

companies that provide both voice communications and broadband Internet
access services (for example, telephone companies that are broadband
providers) have the incentive and ability to block, degrade, or
otherwise disadvantage the services of their online voice competitors.
Because the Commission may enlist market forces to fulfill its Section
201 responsibilities, we possess authority to prevent these
anticompetitive practices through open Internet rules.\136\
---------------------------------------------------------------------------

    \134\ Tel. No. Requirements for IP-Enabled Servs. Providers,
Report and Order, Declaratory Ruling, Order on Remand, and NPRM, 22
FCC Rcd 19531, 19547, para. 28 (2007). By definition, interconnected
VoIP services allow calls to and from traditional phone networks.
    \135\ See NCTA Dec. 10, 2010 Ex Parte Letter (arguing that the
Commission could exercise authority ancillary to several provisions
of Title II of the Act, including Sections 201 and 202, ``to ensure
that common carrier services continue to be offered on just and
reasonable terms and conditions'' and to ``facilitate consumer
access to broadband-based alternatives to common carrier services
such as Voice over Internet Protocol''); Vonage Comments at 11-12
(``The Commission's proposed regulations would help preserve the
competitive balance between providers electing to operate under
Title II and those operating under Title I.''); Google Comments at
45-46 (``The widespread use of VoIP and related services as cheaper
and more feature-rich alternatives to Title II services has
significant effects on traditional telephone providers' practices
and pricing, as well [as] on network interconnection between Title
II and IP networks that consumers use to reach each other, going to
the heart of the Commission's Title II responsibilities.'')
(footnotes and citations omitted); Letter from Devendra T. Kumar,
Counsel to Skype Communications S.A.R.L., to Marlene H. Dortch,
Secretary, FCC, GN Docket No. 09-191, WC Docket No. 07-52 (filed
Nov. 30, 2010) (arguing that the Commission has authority ancillary
to Section 201 to protect international VoIP calling); XO Comments
at 20 (noting the impact of, inter alia, VoIP on the Commission's
``traditional framework'' for regulating voice services under Title
II); Letter from Alan Inouye et al., on behalf of ALA, ARL and
EDUCAUSE, to Chairman Julius Genachowski et al., GN Docket No. 09-
191, WC Docket No. 07-52 at 4-5 (filed Dec. 13, 2010) (citing
examples of how libraries and higher education institutions are
using broadband services, including VoIP, to replace traditional
common carrier services). In previous orders, the Commission has
embraced the use of VoIP to avoid or constrain high international
calling rates. See Universal Serv. Contribution Methodology et al.,
Report and Order and Notice of Proposed Rulemaking, 21 FCC Rcd 7518,
7546, para. 55 & n.187 (2006) (``[I]nterconnected VoIP service is
often marketed as an economical way to make interstate and
international calls, as a lower-cost substitute for wireline toll
service.''), rev'd in part sub nom. Vonage Holdings Corp. v. FCC,
489 F.3d 1232 (DC Cir. 2007); Reporting Requirements for U.S.
Providers of Int'l Telecomms. Servs., Notice of Proposed Rulemaking,
19 FCC Rcd 6460, 6470, para. 22 (2004) (``Improvements in the
packet-switched transmission technology underlying the Internet now
allow providers of VoIP to offer international voice transmission of
reasonable quality at a price lower than current IMTS rates.'')
(footnote omitted); Int'l Settlements Policy Reform, Notice of
Proposed Rulemaking, 17 FCC Rcd 19954, 19964, para. 13 (2002)
(``This ability to engage in least-cost routing, as well as
alternative, non-traditional services such as IP Telephony or Voice-
Over-IP, in conjunction with the benchmarks policy have created a
market dynamic that is pressuring international settlement rates
downward.''). In addition, NCTA has explained that, ``[b]y enabling
consumers to make informed choices regarding broadband Internet
access service,'' the Commission could conclude that transparency
requirements ``would help promote the competitiveness of VoIP and
other broadband-based communications services'' and ``thereby
facilitate the operation of market forces to discipline the charges
and other practices of common carriers, in fulfillment of the
Commission's obligations under Sections 201 and 202'' of the Act.
NCTA Dec. 10, 2010 Ex Parte Letter at 2-3.
    \136\ We reject the argument asserted by some commenters (see,
e.g., AT&T Comments at 218-19; Verizon Comments at 98-99) that the
various grants of rulemaking authority in the Act, including the
express grant of rulemaking authority in Section 201(b) itself, do
not authorize the promulgation of rules pursuant to Section 201(b).
See AT&T Corp. v. Iowa Utils. Bd., 525 U.S. 366, 378 (1999) (``We
think that the grant in sec. 201(b) means what it says: The FCC has
rulemaking authority to carry out the `provisions of this Act.' '').
---------------------------------------------------------------------------

    Section 251(a)(1) of the Act imposes a duty on all
telecommunications carriers ``to interconnect directly or indirectly
with the facilities of other telecommunications carriers.'' Many over-
the-top VoIP services allow end users to receive calls from and/or
place calls to traditional phone networks operated by
telecommunications carriers. The Commission has not determined whether
any such VoIP providers are telecommunications carriers. To the extent
that VoIP services are information services (rather than
telecommunications services), any blocking or degrading of a call from
a traditional telephone customer to a customer of a VoIP provider, or
vice-versa, would deny the traditional telephone customer the intended
benefits of telecommunications interconnection under Section 251(a)(1).
Over-the-top VoIP customers account for a growing share of telephone
usage. If calls to and from these VoIP customers were not delivered
efficiently and reliably by broadband providers, all users of the
public switched telephone network would be limited in their ability to
communicate, and Congress's goal of ``efficient, Nation-wide, and
world-wide'' communications across interconnected networks would be
frustrated. To the extent that VoIP services are telecommunications
services, a broadband provider's interference with traffic exchanged
between a provider of VoIP telecommunications services and another
telecommunications carrier would interfere with interconnection between
two telecommunications carriers under Section 251(a)(1).\137\
---------------------------------------------------------------------------

    \137\ See also 47 U.S.C. 256(b)(1) (directing the Commission to
``establish procedures for * * * oversight of coordinated network
planning by telecommunications carriers and other providers of
telecommunications service for the effective and efficient
interconnection of public telecommunications networks used to
provide telecommunications service''); Comcast, 600 F.3d at 659
(acknowledging Section 256's objective, while adding that Section
256 does not `` `expand[ ] * * * any authority that the Commission'
otherwise has under law'') (quoting 47 U.S.C. 256(c)).
---------------------------------------------------------------------------

2. The Commission Has Authority To Adopt Open Internet Rules To Further
Its Responsibilities Under Titles III and VI of the Act
    ``The Commission has been charged with broad responsibilities for
the orderly development of an appropriate system of local television
broadcasting,'' \138\ which arise from the Commission's more general
public interest obligation to ``ensure the larger and more effective
use of radio.'' \139\ Similarly, the Commission has broad jurisdiction
to oversee MVPD services, including direct-broadcast satellite
(DBS).\140\ Consistent with these mandates, our jurisdiction over video
and audio services under Titles III and VI of the Communications Act
provides additional authority for open Internet rules.
---------------------------------------------------------------------------

    \138\ See United States v. Sw. Cable Co., 392 U.S. 157, 177
(1968); see also id. at 174 (``[T]hese obligations require for their
satisfaction the creation of a system of local broadcasting
stations, such that `all communities of appreciable size (will) have
at least one television station as an outlet for local self-
expression.' ''); 47 U.S.C. 307(b) (Commission shall ``make such
distribution of licenses, * * * among the several States and
communities as to provide a fair, efficient, and equitable
distribution of radio service to each of the same''), 303(f) & (h)
(authorizing the Commission to allocate broadcasting zones or areas
and to promulgate regulations ``as it may deem necessary'' to
prevent interference among stations) (cited in Sw. Cable, 392 U.S.
at 173-74).
    \139\ Nat'l Broad. Co., 319 U.S. at 216 (public interest to be
served is the ``larger and more effective use of radio'') (citation
and internal quotation marks omitted).
    \140\ See 47 U.S.C. 303(v); see also N.Y. State Comm'n on Cable
Television v. FCC, 749 F.2d 804, 807-12 (DC Cir. 1984) (upholding
the Commission's exercise of ancillary authority over satellite
master antenna television service); 47 U.S.C. 548 (discussed below).
---------------------------------------------------------------------------

    First, such rules are necessary to the effective performance of our
Title III responsibilities to ensure the ``orderly development * * * of
local television broadcasting'' \141\ and the ``more effective use of
radio.'' \142\ As discussed in Parts II.A and II.B, Internet video
distribution is increasingly important to all video programming
services, including local television broadcast service. Radio stations
also are providing audio and video content on the Internet. At the same
time,

[[Page 59218]]

broadband providers--many of which are also MVPDs--have the incentive
and ability to engage in self-interested practices that may include
blocking or degrading the quality of online programming content,
including broadcast content, or charging unreasonable additional fees
for faster delivery of such content. Absent the rules we adopt in this
Order, such practices jeopardize broadcasters' ability to offer news
(including local news) and other programming over the Internet, and, in
turn, threaten to impair their ability to offer high-quality broadcast
content.\143\
---------------------------------------------------------------------------

    \141\ Sw. Cable, 392 U.S. at 177; see 47 U.S.C. 303(f) & (h)
(establishing Commission's authority to allocate broadcasting zones
or areas and to promulgate regulations ``as it may deem necessary''
to prevent interference among stations) (cited in Sw. Cable, 392
U.S. at 173-74).
    \142\ Nat'l Broad. Co., 319 U.S. at 216; see also 47 U.S.C.
303(g) (establishing Commission's duty to ``generally encourage the
larger and more effective use of radio in the public interest''),
307(b) (``[T]he Commission shall make such distribution of licenses
* * * among the several States and communities as to provide a fair,
efficient, and equitable distribution of radio service to each of
the same.'').
    \143\ NCTA has noted that ``[t]he Commission could decide that,
based on the growing importance of broadcast programming distributed
over broadband networks to both television viewers and the business
of broadcasting itself, ensuring that broadcast video content made
available over broadband networks is not subject to unreasonable
discrimination or anticompetitive treatment is necessary to preserve
and strengthen the system of local broadcasting.'' NCTA Dec. 10,
2010 Ex Parte Letter at 3; see also id. (``Facilitating the
availability of broadcast content on the Internet may also help to
foster more efficient and intensive use of spectrum, thereby
supporting the Commission's duty in Section 303(g) to `generally
encourage the larger and more effective use of radio in the public
interest.' '') (quoting 47 U.S.C. 303(g)).
---------------------------------------------------------------------------

    The Commission likewise has authority under Title VI of the Act to
adopt open Internet rules that protect competition in the provision of
MVPD services. A cable or telephone company's interference with the
online transmission of programming by DBS operators or stand-alone
online video programming aggregators that may function as competitive
alternatives to traditional MVPDs \144\ would frustrate Congress's
stated goals in enacting Section 628 of the Act, which include
promoting ``competition and diversity in the multichannel video
programming market''; ``increase[ing] the availability of satellite
cable programming and satellite broadcast programming to persons in
rural and other areas not currently able to receive such programming'';
and ``spur[ring] the development of communications technologies.''
\145\
---------------------------------------------------------------------------

    \144\ The issue whether online-only video programming
aggregators are themselves MVPDs under the Communications Act and
our regulations has been raised in pending program access complaint
proceedings. See, e.g., VDC Corp. v. Turner Network Sales, Inc.,
Program Access Complaint (Jan. 18, 2007); Sky Angel U.S., LLC v.
Discovery Commc'ns LLC, Program Access Complaint (Mar. 24, 2010).
Nothing in this Order should be read to state or imply any
determination on this issue.
    \145\ 47 U.S.C. sec. 548(a). The Act defines ``video
programming'' as ``programming provided by, or generally considered
comparable to programming provided by, a television broadcast
station.'' 47 U.S.C. sec. 522(20). Although the Commission stated
nearly a decade ago that video `` `streamed' over the Internet'' had
``not yet achieved television quality'' and therefore did not
constitute ``video programming'' at that time, see Cable Modem
Declaratory Ruling, 17 FCC Rcd at 4834, para. 63 n.236, intervening
improvements in streaming technology and broadband availability
enable such programming to be ``comparable to programming provided
by * * * a television broadcast station,'' 47 U.S.C. sec. 522(20).
This finding is consistent with our prediction more than five years
ago that ``[a]s video compression technology improves, data transfer
rates increase, and media adapters that link TV to a broadband
connection become more widely used, * * * video over the Internet
will proliferate and improve in quality.'' Ann. Assessment of the
Status of Competition in the Mkt. for the Delivery of Video
Programming, Notice of Inquiry, 19 FCC Rcd 10909, 10932, para. 74
(2004) (citation omitted).
---------------------------------------------------------------------------

    When Congress enacted Section 628 in 1992, it was specifically
concerned about the incentive and ability of cable operators to use
their control of video programming to impede competition from the then-
nascent DBS industry.\146\ Since that time, the Internet has opened a
new competitive arena in which MVPDs that offer broadband service have
the opportunity and incentive to impede DBS providers and other
competing MVPDs--and the statute reaches this analogous arena as well.
Section 628(b) prohibits cable operators from engaging in ``unfair or
deceptive acts or practices the purpose or effect of which is to
prevent or hinder significantly the ability of an MVPD to deliver
satellite cable programming or satellite broadcast programming to
consumers.'' An ``unfair method of competition or unfair act or
practice'' under Section 628(b) includes acts that can be
anticompetitive.\147\ Thus, Section 628(b) proscribes practices by
cable operators that (i) can impede competition, and (ii) have the
purpose or effect of preventing or significantly hindering other MVPDs
from providing consumers their satellite-delivered programming (i.e.,
programming transmitted to MVPDs via satellite for retransmission to
subscribers).\148\ Section 628(c)(1), in turn, directs the Commission
to adopt rules proscribing unfair practices by cable operators and
their affiliated satellite cable programming vendors. Section 628(j)
provides that telephone companies offering video programming services
are subject to the same rules as cable operators.
---------------------------------------------------------------------------

    \146\ See Cable Act of 1992, Public Law 102-385, sec. 2(a)(5),
106 Stat. 1460, 1461 (``Vertically integrated program suppliers * *
* have the incentive and ability to favor their affiliated cable
operators over nonaffiliated cable operators and programming
distributors using other technologies.''); H.R. Rep. No. 102-862, at
93 (1992) (Conf. Rep.), reprinted in 1992 U.S.C.C.A.N. 1231, 1275
(``In adopting rules under this section, the conferees expect the
Commission to address and resolve the problems of unreasonable cable
industry practices, including restricting the availability of
programming and charging discriminatory prices to non-cable
technologies.''); S. Rep. No. 102-92, at 26 (1991), reprinted in
1992 U.S.C.C.A.N. 1133, 1159 (``[C]able programmers may simply
refuse to sell to potential competitors. Small cable operators,
satellite dish owners, and wireless cable operators complain that
they are denied access to, or charged more for, programming than
large, vertically integrated cable operators.'').
    \147\ Review of the Commission's Program Access Rules and
Examination of Programming Tying Arrangements, First Report and
Order, 25 FCC Rcd 746, 779, para. 48 & n. 190 (2010) (citing
Exclusive Contracts for Provision of Video Serv. in Multiple
Dwelling Units and Other Real Estate Devs., Report and Order and
Further Notice of Proposed Rulemaking, 22 FCC Rcd 20235, 20255,
para. 43, aff'd, NCTA, 567 F.3d 659); see also NTCA, 567 F.3d at
664-65 (referring to ``unfair dealing'' and ``anticompetitive
practices'').
    \148\ See 47 U.S.C. 548(b); NCTA, 567 F.3d at 664. In NCTA, the
court held that the Commission reasonably concluded that the ``broad
and sweeping terms'' of Section 628(b) authorized it to ban
exclusive agreements between cable operators and building owners
that prevented other MVPDs from providing their programming to
residents of those buildings. The court observed that ``the words
Congress chose [in Section 628(b)] focus not on practices that
prevent MVPDs from obtaining satellite cable or satellite broadcast
programming, but on practices that prevent them from `providing'
that programming `to subscribers or consumers.' '' NCTA, 567 F.3d at
664 (emphasis in original).
---------------------------------------------------------------------------

    The open Internet rules directly further our mandate under Section
628. Cable operators, telephone companies, and DBS operators alike are
seeking to keep and win customers by expanding their MVPD offerings to
include online access to their programming.\149\ For example, in
providing its MVPD service, DISH (one of the nation's two DBS
providers) relies significantly on online dissemination of programming,
including video-on-demand and other programming, that competes with
similar offerings by cable operators.\150\

[[Page 59219]]

As DISH explains, ``[a]s more and more video consumption moves online,
the competitive viability of stand-alone MVPDs depends on their ability
to offer an online video experience of the same quality as the online
video offerings of integrated broadband providers.'' The open Internet
rules will prevent practices by cable operators and telephone
companies, in their role as broadband providers, that have the purpose
or effect of significantly hindering (or altogether preventing)
delivery of video programming protected under Section 628(b).\151\ The
Commission therefore is authorized to adopt open Internet rules under
Section 628(b), (c)(1), and (j).\152\
---------------------------------------------------------------------------

    \149\ DISH Reply at 4-5 (``Pay-TV services continue to evolve at
a rapid pace and providers increasingly are integrating their vast
offerings of linear channels with online content,'' while
``consumers are adopting online video services as a complement to
traditional, linear pay-TV services'' and ``specifically desire
Internet video as a complement to * * * [MVPDs'] traditional TV
offerings.'') (footnotes and citations omitted). We find
unpersuasive the contention that this Order fails to ``grapple with
the implications of the market forces that are driving MVPDs * * *
to add Internet connectivity to their multichannel video
offerings.'' McDowell Statement at *24 (footnote omitted). Our
analysis takes account of these developments, which are discussed at
length in Part II.A, above.
    \150\ Id. at 5-8 & n. 20 (discussing ``DishOnline service,''
which ``allows DISH to offer over 3,000 movies and TV shows through
its `DishOnline' Internet video service,'' and noting that ``the
success of DishOnline is critically dependent on broadband access
provided and controlled by DISH's competitors in the MVPD market'');
DISH PN Comments at 2-3; DISH Network, Watch Live TV Online OR
Recorded Programs with DishOnline, http://www.dish-systems.com/products/dish_online.php (`` `DISHOnline.com integrates DISH
Network's expansive TV programming lineup with the vast amount of
online video content, adding another dimension to our `pay once,
take your TV everywhere' product platform.' ''). Much of the regular
subscription programming that DISH offers online is satellite-
delivered programming. See DISH Network, Watch Live TV Online OR
Recorded Programs with DishOnline, http://www.dish-systems.com/products/dish_online.php (noting that customers can watch content
from cable programmers such as the Discovery Channel and MTV). Thus,
we reject NCTA's argument that ``[t]here is no basis for asserting
that any cable operator or common carrier's practices with respect
to Internet-delivered video could * * * `prevent or significantly
hinder' an MVPD from providing satellite cable programming.'' NCTA
Dec. 10, 2010 Ex Parte Letter at 5.
    \151\ Notwithstanding suggestions to the contrary, the
Commission is not required to wait until anticompetitive harms are
realized before acting. Rather, the Commission may exercise its
ancillary jurisdiction to ``plan in advance of foreseeable events,
instead of waiting to react to them.'' Sw. Cable, 392 U.S. at 176-77
(citation and internal quotation marks omitted); see also Star
Wireless, LLC v. FCC, 522 F.3d at 475.
    \152\ See Open Internet NRPM, 24 FCC Rcd at 13099, para. 85
(discussing role of the Internet in fostering video programming
competition and the Commission's authority to regulate video
services).
---------------------------------------------------------------------------

    Similarly, open Internet rules enable us to carry out our
responsibilities under Section 616(a) of the Act, which confers
additional express statutory authority to combat discriminatory network
management practices by broadband providers. Section 616(a) directs the
Commission to adopt regulations governing program carriage agreements
``and related practices'' between cable operators or other MVPDs and
video programming vendors.\153\ The program carriage regulations must
include provisions that prevent MVPDs from ``unreasonably restrain[ing]
the ability of an unaffiliated video programming vendor to compete
fairly by discriminating in video programming distribution,'' on the
basis of a vendor's affiliation or lack of affiliation with the MVPD,
in the selection, terms, or conditions of carriage of the vendor's
programming.\154\ MVPD practices that discriminatorily impede competing
video programming vendors' online delivery of programming to consumers
affect the vendors' ability to ``compete fairly'' for viewers, just as
surely as MVPDs' discriminatory selection of video programming for
carriage on cable systems has this effect. We find that discriminatory
practices by MVPDs in their capacity as broadband providers, such as
blocking or charging fees for termination of online video programming
to end users, are ``related'' to program carriage agreements and within
our mandate to adopt regulations under Section 616(a).\155\
---------------------------------------------------------------------------

    \153\ An MVPD is ``a person such as, but not limited to, a cable
operator, a multichannel multipoint distribution service, a direct
broadcast satellite service, or a television receive-only satellite
program distributor, who makes available for purchase, by
subscribers or customers, multiple channels of video programming.''
47 U.S.C. 522(13). A ``video programming vendor'' is any ``person
engaged in the production, creation, or wholesale distribution of
video programming for sale.'' 47 U.S.C. 536(b). A number of video
programming vendors make their programming available online. See,
e.g., Hulu.com, http://www.hulu.com/about; Biography Channel, http://www.biography.com; Hallmark Channel, http://www.hallmarkchannel.com.
    \154\ 47 U.S.C. 536(a)(1)-(3); see also 47 CFR 76.1301
(implementing regulations to address practices specified in Section
616(a)(1)-(3)).
    \155\ The Act does not define ``related practices'' as that
phrase is used in Section 616(a). Because the term is neither
explicitly defined in the statute nor susceptible of only one
meaning, we construe it, consistent with dictionary definitions, to
cover practices that are ``akin'' or ``connected'' to those
specifically identified in Section 616(a)(1)-(3). See Black's Law
Dictionary 1158 (5th ed. 1979); Webster's Third New Int'l Dictionary
1916 (1993). The argument that Section 616(a) has no application to
Internet access service overlooks that the statute expressly covers
these ``related practices.''
---------------------------------------------------------------------------

C. Authority To Protect the Public Interest Through Spectrum Licensing

    Open Internet rules for wireless services are further supported by
our authority, under Title III of the Communications Act, to protect
the public interest through spectrum licensing. Congress has entrusted
the Commission with ``maintain[ing] the control of the United States
over all the channels of radio transmission.'' Licensees hold
Commission-granted authorizations to use that spectrum subject to
conditions the Commission imposes on that use.\156\ In considering
whether to grant a license to use spectrum, therefore, the Commission
must ``determine * * * whether the public interest, convenience, and
necessity will be served by the granting of such application.'' \157\
Likewise, when identifying classes of licenses to be awarded by auction
and the characteristics of those licenses, the Commission ``shall
include safeguards to protect the public interest'' and must seek to
promote a number of goals, including ``the development and rapid
deployment of new technologies, products, and services.'' Even after
licenses are awarded, the Commission may change the license terms ``if
in the judgment of the Commission such action will promote the public
interest, convenience, and necessity.'' The Commission may exercise
this authority on a license-by-license basis or through a rulemaking,
even if the affected licenses were awarded at auction.
---------------------------------------------------------------------------

    \156\ 47 U.S.C. 304, 316(a)(1). We thus disagree with commenters
who suggest in general that there is nothing in Title III to support
the imposition of open Internet rules. See, e.g., EFF Comments at 6
n. 13.
    \157\ 47 U.S.C. 309(a); see also 47 U.S.C. 307(a) (``The
Commission, if public convenience, interest, or necessity will be
served thereby, subject to the limitations of this [Act], shall
grant to any applicant therefor a station license provided for by
this [Act].'').
---------------------------------------------------------------------------

    The Commission previously has required wireless licensees to comply
with open Internet principles, as appropriate in the particular
situation before it. In 2007, when it modified the service rules for
the 700 MHz band, the Commission took ``a measured step to encourage
additional innovation and consumer choice at this critical stage in the
evolution of wireless broadband services.'' Specifically, the
Commission required C block licensees ``to allow customers, device
manufacturers, third-party application developers, and others to use or
develop the devices and applications of their choosing in C Block
networks, so long as they meet all applicable regulatory requirements
and comply with reasonable conditions related to management of the
wireless network (i.e., do not cause harm to the network).'' The open
Internet conditions we adopt in this Order likewise are necessary to
advance the public interest in innovation and investment.\158\
---------------------------------------------------------------------------

    \158\ In addition, the use of mobile VoIP applications is likely
to constrain prices for CMRS voice services, similar to what we
described earlier with regard to VoIP and traditional phone
services.
---------------------------------------------------------------------------

    AT&T contends that the Commission cannot apply ``neutrality''
regulations to wireless broadband services outside the upper 700 MHz C
Block spectrum because any such regulations ``would unlawfully rescind
critical rulings in the Commission's 700 MHz Second Report and Order on
which providers relied in making multi-billion dollar investments,''
\159\ and that adopting these regulations more broadly to all mobile
providers would violate the Administrative Procedure Act. We disagree.
As explained above, the Commission retains the statutory authority to
impose new requirements on existing licenses beyond those that were in
place at the time of grant, whether the licenses were assigned by

[[Page 59220]]

auction or by other means.\160\ In this case, parties were made well
aware that the agency might extend openness requirements beyond the C
Block, diminishing any reliance interest they might assert.\161\ To the
extent that AT&T argues that application of openness principles reduced
auction bids on the C Block spectrum, we find that the reasons for the
price differences between the C Block and other 700 MHz spectrum blocks
are far more complex. A number of factors, including unique auction
dynamics and significant differences between the C Block spectrum and
other blocks of 700 MHz spectrum contributed to these price
differences. In balancing the public interest factors we are required
to consider, we have determined that adopting a targeted set of rules
that apply to all mobile broadband providers is necessary at this time.
---------------------------------------------------------------------------

    \159\ AT&T PN Reply at 32. AT&T asserts that winners of non-C-
Block licenses paid a premium for licenses not subject to the open
platform requirements that applied to the upper 700 MHz C Block
licenses. Id. at 33-34.
    \160\ The Commission may act by rulemaking to modify or impose
rules applicable to all licensees or licensees in a particular
class; in order to modify specific licenses held by particular
licensees, however, the Commission generally is required to follow
the modification procedure set forth in 47 U.S.C. 316. See Comm. for
Effective Cellular Rules v. FCC, 53 F.3d 1309, 1319-20 (DC Cir.
1995).
    \161\ See generally 700 MHz Second Report and Order, 22 FCC Rcd
at 15358-65. In the 700 MHz Second Report and Order, the Commission
stated that its decision to limit open-platform requirements to the
C Block was based on the record before it ``at this time,'' id. at
15361, and noted that openness issues in the wireless industry were
being considered more broadly in other proceedings. Id. at 15363.
The public notice setting procedures for the 2008 auction advised
bidders that the rules governing auctioned licenses would be subject
to ``pending and future proceedings'' before the Commission. See
Auction of 700 MHz Band Licenses Scheduled for January 24, 2008,
Public Notice, 22 FCC Rcd 18141, 18156, para. 42 (2007).
---------------------------------------------------------------------------

D. Authority To Collect Information To Enable the Commission To Perform
Its Reporting Obligations to Congress

    Additional sections of the Communications Act provide authority for
our transparency requirement in particular. Section 4(k) provides for
an annual report to Congress that ``shall contain * * * such
information and data collected by the Commission as may be considered
of value in the determination of questions connected with the
regulation of interstate * * * wire and radio communication'' and
provide ``recommendations to Congress as to additional legislation
which the Commission deems necessary or desirable.'' \162\ The
Commission has previously relied on Section 4(k), among other
provisions, as a basis for its authority to gather information.\163\
The Comcast court, moreover, ``readily accept[ed]'' that ``certain
assertions of Commission authority could be `reasonably ancillary' to
the Commission's statutory responsibility to issue a report to
Congress. For example, the Commission might impose disclosure
requirements on regulated entities in order to gather data needed for
such a report.'' \164\ We adopt such disclosure requirements here.
---------------------------------------------------------------------------

    \162\ 47 U.S.C. 154(k). In a similar vein, Section 257 of the
Act directs the Commission to report to Congress every three years
on ``market entry barriers'' that the Commission recommends be
eliminated, including ``barriers for entrepreneurs and other small
businesses in the provision and ownership of telecommunications
services and information services.'' 47 U.S.C. 257(a) & (c); see
also Comcast, 600 F.3d at 659; NCTA Dec. 10, 2010 Ex Parte Letter at
3 (``[S]ection 257's reporting mandate provides a basis for the
Commission to require providers of broadband Internet access service
to disclose the terms and conditions of service in order to assess
whether such terms hamper small business entry and, if so, whether
any legislation may be required to address the problem.'') (footnote
omitted).
    \163\ See, e.g., New Part 4 of the Commission's Rules Concerning
Disruptions to Commc'ns, Report and Order and Further Notice of
Proposed Rulemaking, 19 FCC Rcd 16830, 16837, paras. 1, 12 (2004)
(extending Commission's reporting requirements for communications
disruptions to certain providers of non-wireline communications, in
part based on Section 4(k)); DTV Consumer Educ. Initiative, Report &
Order, 23 FCC Rcd 4134, 4147, paras. 1, 2, 28 (2008) (requiring
various entities, including broadcasters, to submit quarterly
reports to the Commission detailing their consumer education efforts
related to the DTV transition, in part based on section 4(k));
Review of the Commission's Broad. Cable and Equal Emp't Opportunity
Rules and Policies, Second Report and Order and Third Notice of
Proposed Rulemaking, 17 FCC Rcd 24018, 24077, paras. 5, 195 (2002)
(promulgating recordkeeping and reporting requirements for broadcast
licensees and other regulated entities to show compliance with equal
opportunities hiring rules, in part based on section 4(k)).
    \164\ 600 F.3d at 659. All, or nearly all, providers of
broadband Internet access service are regulated by the Commission
insofar as they operate under certificates to provide common
carriage service, or under licenses to use radio spectrum.
---------------------------------------------------------------------------

    Finally, the Commission has broad authority under Section 218 of
the Act to obtain ``full and complete information'' from common
carriers and their affiliates. To the extent broadband providers are
affiliated with communications common carriers, Section 218 allows the
Commission to require the provision of information such as that covered
by the transparency rule we adopt in this Order.\165\ We believe that
these disclosure requirements will assist us in carrying out our
reporting obligations to Congress.
---------------------------------------------------------------------------

    \165\ Cf. US West, Inc. v. FCC, 778 F.2d 23, 26-27 (DC Cir.
1985) (acknowledging Commission's authority under Section 218 to
impose reporting requirements on holding companies that owned local
telephone companies).
---------------------------------------------------------------------------

E. Constitutional Issues

    Some commenters contend that open Internet rules violate the First
Amendment and amount to an unconstitutional taking under the Fifth
Amendment. We examine these constitutional arguments below, and find
them unfounded.
1. First Amendment
    Several broadband providers argue that open Internet rules are
inconsistent with the free speech guarantee of the First Amendment.
These commenters generally contend that because broadband providers
distribute their own and third-party content to customers, they are
speakers entitled to First Amendment protections. Therefore, they
argue, rules that prevent broadband providers from favoring the
transmission of some content over other content violate their free
speech rights. Other commenters contend that none of the proposed rules
implicate the First Amendment, because providing broadband service is
conduct that is not correctly understood as speech.
    In arguing that broadband service is protected by the First
Amendment, AT&T compares its provision of broadband service to the
operation of a cable television system, and points out that the Supreme
Court has determined that cable programmers and cable operators engage
in speech protected by the First Amendment. The analogy is inapt. When
the Supreme Court held in Turner I that cable operators were protected
by the First Amendment, the critical factor that made cable operators
``speakers'' was their production of programming and their exercise of
``editorial discretion over which programs and stations to include''
(and thus which to exclude).
    Unlike cable television operators, broadband providers typically
are best described not as ``speakers,'' but rather as conduits for
speech. The broadband Internet access service at issue here does not
involve an exercise of editorial discretion that is comparable to cable
companies' choice of which stations or programs to include in their
service. In this proceeding broadband providers have not, for instance,
shown that they market their services as benefiting from an editorial
presence.\166\ To the contrary, Internet end users expect that they can
obtain access to all or substantially all content that is available on
the Internet, without the editorial

[[Page 59221]]

intervention of their broadband provider.\167\
---------------------------------------------------------------------------

    \166\ See, e.g., AT&T, AT&T U-verse, http://www.att-services.net/att-u-verse.html (AT&T U-verse: ``Customers can get the
information they want, when they want it''); Verizon, FiOS Internet,
http://www22.verizon.com/Residential/FiOSInternet/Overview.htm and
Verizon, High Speed Internet, http://www22.verizon.com/Residential/HighSpeedInternet (Verizon FiOS and High Speed Internet: ``Internet,
plus all the free extras'').
    \167\ See Verizon Comments at 117 (``[B]roadband providers today
provide traditional Internet access services that offer subscribers
access to all lawful content and have strong economic incentives to
continue to do so.'') (emphasis added).
---------------------------------------------------------------------------

    Consistent with that understanding, broadband providers maintain
that they qualify for statutory immunity from liability for copyright
violations or the distribution of offensive material precisely because
they lack control over what end users transmit and receive.\168\ In
addition, when defending themselves against subpoenas in litigation
involving alleged copyright violations, broadband providers typically
take the position that they are simply conduits of information provided
by others.\169\
---------------------------------------------------------------------------

    \168\ See 17 U.S.C. 512(a) (a ``service provider shall not be
liable * * * for infringement of copyright by reason of the
provider's transmitting, routing, or providing connections for''
material distributed by others on its network); 47 U.S.C. 230(c)(1)
(``[N]o provider or user of an interactive computer service shall be
treated as the publisher or speaker of any information provided by
another information content provider''); see also Recording Indus.
Ass'n of Am., Inc. v. Verizon Internet Servs., Inc., 351 F.3d 1229,
1234 (DC Cir. 2003) (discussing in context of subpoena issued to
Verizon under the Digital Millennium Copyright Act Section 512(a)'s
``four safe harbors, each of which immunizes ISPs from liability
from copyright infringement''), cert. denied, 543 U.S. 924 (2004).
For example ``Verizon.net, the home page for Verizon Internet
customers, contains a notice explicitly claiming copyright over the
contents of the page. In contrast, the terms of service of Verizon
Internet access explicitly disclaim any affiliation with content
transmitted over the network.'' PK Reply at 22.
    \169\ See, e.g., Charter Commc'ns, Inc., Subpoena Enforcement
Matter, 393 F.3d 771, 777 (8th Cir. 2005) (subpoenas served on
Charter were not authorized because ``Charter's function'' as a
broadband provider ``was limited to acting as a conduit for the
allegedly copyright protected material'' at issue); Verizon Internet
Servs., 351 F.3d at 1237 (accepting Verizon's argument that Federal
copyright law ``does not authorize the issuance of a subpoena to an
ISP acting as a mere conduit for the transmission of information
sent by others'').
---------------------------------------------------------------------------

    To be sure, broadband providers engage in network management
practices designed to protect their Internet services against spam and
malicious content, but that practice bears little resemblance to an
editor's choosing which programs, among a range of programs, to
carry.\170\ Furthermore, this Order does not limit broadband providers'
ability to modify their own Web pages, or transmit any lawful message
that they wish, just like any other speaker. Broadband providers are
also free under this Order to offer a wide range of ``edited''
services. If, for example, a broadband provider wanted to offer a
service limited to ``family friendly'' materials to end users who
desire only such content, it could do so under the rules we promulgate
in this Order.
---------------------------------------------------------------------------

    \170\ We recognize that in two cases, Federal district courts
have concluded that the provision of broadband service is ``speech''
protected by the First Amendment. In Itasca, the district court
reasoned that broadband providers were analogous to cable and
satellite television companies, which are protected by the First
Amendment. Ill. Bell Tel. Co. v. Vill. of Itasca, 503 F. Supp. 2d
928, 947-49 (N.D. Ill. 2007). And in Broward County, the district
court determined that the transmission function provided by
broadband service could not be separated from the content of the
speech being transmitted. Comcast Cablevision of Broward Cnty., Inc.
v. Broward Cnty., 124 F. Supp. 2d 685, 691-92 (S.D. Fla. 2000). For
the reasons stated, we disagree with the reasoning of those
decisions.
---------------------------------------------------------------------------

    AT&T and NCTA argue that open Internet rules interfere with the
speech rights of content and application providers to the extent they
are prevented from paying broadband providers for higher quality
service. Purchasing a higher quality of termination service for one's
own Internet traffic, though, is not speech--just as providing the
underlying transmission service is not. Telephone common carriers, for
instance, transmit users' speech for hire, but no court has ever
suggested that regulation of common carriage arrangements triggers
First Amendment scrutiny.
    Even if open Internet rules did implicate expressive activity, they
would not violate the First Amendment. Because the rules are based on
the characteristics of broadband Internet access service, independent
of content or viewpoint, they would be subject to intermediate First
Amendment scrutiny.\171\ The regulations in this Order are triggered by
a broadband provider offering broadband Internet access, not by the
message of any provider. Indeed, the point of open Internet rules is to
protect traffic regardless of its content. Verizon's argument that such
regulation is presumptively suspect because it makes speaker-based
distinctions likewise lacks merit: Our action is based on the
transmission service provided by broadband providers rather than on
what providers have to say. In any event, speaker-based distinctions
are permissible so long as they are ```justified by some special
characteristic of' the particular medium being regulated''--here the
ability of broadband providers to favor or disfavor Internet traffic to
the detriment of innovation, investment, competition, public discourse,
and end users.
---------------------------------------------------------------------------

    \171\ See Turner I, 512 U.S. at 642. Regulations generally are
content neutral if justified without reference to content or
viewpoint. Id. at 643; BellSouth Corp. v. FCC, 144 F.3d 58, 69 (DC
Cir. 1998); Time Warner Entm't Co., L.P. v. FCC, 93 F.3d 957, 966-67
(DC Cir. 1996).
---------------------------------------------------------------------------

    Under intermediate scrutiny, a content-neutral regulation will be
sustained if ``it furthers an important or substantial government
interest * * * unrelated to the suppression of free expression,'' and
if ``the means chosen'' to achieve that interest ``do not burden
substantially more speech than is necessary.'' The government interests
underlying this Order--preserving an open Internet to encourage
competition and remove impediments to infrastructure investment while
enabling consumer choice, end-user control, free expression, and the
freedom to innovate without permission--ensure the public's access to a
multiplicity of information sources and maximize the Internet's
potential to further the public interest. As a result, these interests
satisfy the intermediate-scrutiny standard.\172\ Indeed, the interest
in keeping the Internet open to a wide range of information sources is
an important free speech interest in its own right. As Turner I
affirmed, ``assuring that the public has access to a multiplicity of
information sources is a governmental purpose of the highest order, for
it promotes values central to the First Amendment.'' \173\ This Order
protects the speech interests of all Internet speakers.
---------------------------------------------------------------------------

    \172\ These interests are consistent with the Communications
Act's charge to the Commission to make available a ``rapid and
efficient'' national communications infrastructure, 47 U.S.C. 151;
to promote, consistent with a ``vibrant and competitive free
market,'' ``the continued development of the Internet and other
interactive computer services''; and to ``encourage the development
of technologies which maximize user control over what information is
received,'' 47 U.S.C. 230(b)(1)-(3). Indeed, AT&T concedes that
``[t]here is little doubt that preservation of an open and free
Internet is an `important or substantial government interest.' ''
AT&T Comments at 237 (quoting Turner I, 512 U.S. at 662).
    \173\ 512 U.S. at 663. The Turner I Court continued: ``Indeed,
it has long been a basic tenet of national communications policy
that the widest possible dissemination of information from diverse
and antagonistic sources is essential to the welfare of the
public.'' Id. (internal quotation marks omitted). See also FCC v.
Nat'l Citizens Comm. for Broad., 436 U.S. 775, 795 (1978) (NCCB)
(quoting Associated Press v. United States, 326 U.S. 1, 20 (1945)).
---------------------------------------------------------------------------

    Time Warner and Verizon contend that the government lacks important
or substantial interests because the harms from prohibited practices
supposedly are speculative. This ignores actual instances of harmful
practices by broadband providers, as discussed in Part II.B. In any
event, the Commission is not required to stay its hand until
substantial harms already have occurred. On the contrary, the
Commission's predictive judgments as to the development of a problem
and likely injury to the public interest are entitled to great
deference.
    In sum, the rules we adopt are narrowly tailored to advance the
important government interests at stake.

[[Page 59222]]

The rules apply only to that portion of the end user's link to the
Internet over which the end user's broadband provider has control. They
forbid only those actions that could unfairly impede the public's use
of this important resource. Broadband providers are left with ample
opportunities to transmit their own content, to maintain their own Web
sites, and to engage in reasonable network management. In addition,
they can offer edited services to their end users. The rules are
narrowly tailored because they address the problem at hand, and go no
farther.\174\
---------------------------------------------------------------------------

    \174\ AT&T contends (AT&T Comments at 219-20) that our rules
would conflict with prohibitions contained in Section 326 of the Act
against ``censorship'' of ``radio communications'' or interference
with ``the right of free speech by means of radio communication.''
47 U.S.C. 326. For the same reasons that our rules do not violate
the First Amendment, they do not violate Section 326's statutory
prohibition.
---------------------------------------------------------------------------

2. Fifth Amendment Takings
    Contrary to the claims of some broadband providers, open Internet
rules pose no issue under the Fifth Amendment's Takings Clause. Our
rules do not compel new services or limit broadband providers'
flexibility in setting prices for their broadband Internet access
services, but simply require transparency and prevent broadband
providers--when they voluntarily carry Internet traffic--from blocking
or unreasonably discriminating in their treatment of that traffic.
Moreover, this Order involves setting policies for communications
networks, an activity that has been one of this Commission's central
duties since it was established in 1934.
    Absent compelled permanent physical occupations of property,\175\
takings analysis involves ``essentially ad hoc, factual inquiries''
regarding such factors as the degree of interference with ``investment-
backed expectations,'' the ``economic impact of the regulation'' and
``the character of the government action.'' In this regard, takings law
makes clear that property owners cannot, as a general matter, expect
that existing legal requirements regarding their property will remain
entirely unchanged. As discussed in Part II, the history of broadband
Internet access services offers no basis for reasonable reliance on a
policy regime in which providers are free to conceal or discriminate
without limit, and the rules we adopt in this Order should not impose
substantial new costs on broadband providers.\176\ Accordingly, our
Order does not raise constitutional concerns under regulatory takings
analysis.
---------------------------------------------------------------------------

    \175\ Verizon contends that ``[t]o the extent the proposed rules
would prohibit the owner of a broadband network from setting the
terms on which other providers can occupy its property, the rule
would give those providers the equivalent of a permanent easement on
the network--a form of physical occupation.'' Verizon Comments at
119 (citing Loretto v. Teleprompter Manhattan CATV Corp., 458 U.S.
419, 430 (1982)). Not so. Such transmissions are neither
``occupations'' nor ``permanent.'' See Loretto, 458 U.S. at 435
n.12; see also Cablevision Sys. Corp. v. FCC, 570 F.3d 83, 98 (2d
Cir. 2009) (upholding Commission's finding that a must-carry
obligation did not constitute a physical occupation because ``the
transmission of WRNN's signal does not involve a physical occupation
of Cablevision's equipment or property''). In addition, to the
extent broadband providers voluntarily allow any customer to
transmit or receive information, the imposition of reasonable non-
discrimination requirements would not be a taking under Loretto. See
Hilton Washington Corp. v. District of Columbia, 777 F.2d 47 (DC
Cir. 1985); Yee v. City of Escondido, 503 U.S. 519, 531 (1992).
    \176\ This history likewise refutes the assertion that prior
Commission decisions ``engendered serious reliance interests'' that
would be unsettled by our adoption of open Internet rules. Baker
Statement at *11 n.41 (citation and internal quotation marks
omitted).
---------------------------------------------------------------------------

V. Enforcement

    Prompt and effective enforcement of the rules adopted in this Order
is crucial to preserving an open Internet and providing clear guidance
to stakeholders. We anticipate that many of the disputes that will
arise regarding alleged open Internet violations--particularly those
centered on engineering-focused questions--will be resolvable by the
parties without Commission involvement. We thus encourage parties to
endeavor to resolve disputes through direct negotiation focused on
relevant technical issues, and to consult with independent technical
bodies. Many commenters endorse this approach.\177\
---------------------------------------------------------------------------

    \177\ See, e.g., Bright House Networks Comments at 10; CCIA
Comments at 2, 34; Google-Verizon Joint Comments at 4 (``A robust
role for technical and industry groups should be encouraged to
address any challenges or problems that may arise and to help guide
the practices of all players. * * *''); WISPA Comments at 14-16;
DISH Network Reply at 24-26; Qwest Reply at 32.
---------------------------------------------------------------------------

    Should issues develop that are not resolved through private
processes, the Commission will provide backstop mechanisms to address
such disputes.\178\ In the Open Internet NPRM, the Commission proposed
to enforce open Internet rules through case-by-case adjudication, a
proposal that met with almost universal support among commenters. The
Commission also sought comment on whether it should adopt complaint
procedures specifically governing alleged violations of open Internet
rules, and whether any of the Commission's existing rules provide a
suitable model.
---------------------------------------------------------------------------

    \178\ Providers and other parties may also seek guidance from
the Commission on questions about the application of the open
Internet rules in particular contexts, for instance by requesting a
declaratory ruling. See 47 CFR 1.2.
---------------------------------------------------------------------------

A. Informal Complaints

    Many commenters urge the Commission to adopt informal complaint
procedures that equip end users and edge providers with a simple and
cost-effective option for calling attention to open Internet rule
violations. We agree that end users, edge providers, and others should
have an efficient vehicle to bring potential open Internet violations
to the Commission, and indeed, such a vehicle is already available.
Parties may submit complaints to the Commission pursuant to Section
1.41 of the Commission's rules. Unlike formal complaints, no filing fee
is required. We recommend that end users and edge providers submit any
complaints through the Commission's Web site, at http://esupport.fcc.gov/complaints.htm. The Consumer and Governmental Affairs
Bureau will also make available resources explaining these rules and
facilitating the filing of informal complaints. Although individual
informal complaints will not typically result in written Commission
orders, the Enforcement Bureau will examine trends or patterns in
complaints to identify potential targets for investigation and
enforcement action.\179\
---------------------------------------------------------------------------

    \179\ As with our other complaint rules, the availability of
complaint procedures does not bar the Commission from initiating
separate and independent enforcement proceedings for potential
violations. See 47 CFR 0.111(a)(16).
---------------------------------------------------------------------------

B. Formal Complaints

    Many commenters propose that the Commission adopt formal complaint
procedures to address open Internet disputes. We agree that such
procedures should be available in the event an open Internet dispute
cannot be resolved through other means. Formal complaint processes
permit anyone--including individual end users and edge providers--to
file a claim alleging that another party has violated a statute or
rule, and asking the Commission to rule on the dispute. A number of
commenters suggest that existing Commission procedural rules could
readily be utilized to govern open Internet complaints.
    We conclude that adopting a set of procedures based on our Part 76
cable access complaint rules will best suit the needs of open Internet
disputes that may arise.\180\ Although similar to the

[[Page 59223]]

complaint rules under Section 208, we find that the part 76 rules are
more streamlined and thus preferable.\181\
---------------------------------------------------------------------------

    \180\ The Commission is authorized to resolve formal
complaints--and adopt procedural rules governing the process--
pursuant to Sections 4(i) and 4(j) of the Act. 47 U.S.C.. 154(i),
154(j). In addition, Section 403 of the Act enables the Commission
to initiate inquiries and enforce orders on its own motion. 47
U.S.C. 403. Inherent in such authority is the ability to resolve
disputes concerning violations of the open Internet rules.
    \181\ The Part 76 rules were promulgated to address complaints
against cable systems. See 1998 Biennial Regulatory Review--Part
76--Cable Television Service Pleading and Complaint Rules, Report
and Order, 14 FCC Rcd 418, 420, para. 6 (1999) (``1998 Biennial
Review''). For example, a local television station may bring a
complaint, pursuant to the Part 76 rules, claiming that it was
wrongfully denied carriage on a cable system. See 47 CFR 76.61. Some
complaints alleging open Internet violations may be analogous, such
as those brought by a content or application provider claiming that
broadband providers--many of which are cable companies--are
unlawfully blocking or degrading access to end users.
---------------------------------------------------------------------------

    Under the rules we adopt in this Order, any person may file a
formal complaint. Before filing a complaint, a complainant must first
notify the defendant in writing that it intends to file a complaint
with the Commission for violation of rules adopted in this Order.\182\
After the complaint has been filed, the defendant must submit an
answer, and the complainant may submit a reply. In some cases, the
facts might be uncontested, and the proceeding can be completed based
on the pleadings. In other cases, a thorough analysis of the challenged
conduct might require further factual development and briefing.\183\
Based on the record developed, Commission staff (or the Commission
itself) will issue an order determining the lawfulness of the
challenged practice.
---------------------------------------------------------------------------

    \182\ As with other formal complaint procedures, a filing fee
will be required. See 47 CFR 1.1106.
    \183\ The rules give the Commission discretion to order other
procedures as appropriate, including briefing, status conferences,
oral argument, evidentiary hearings, discovery, or referral to an
administrative law judge. See 47 CFR 8.14(e) through (g).
---------------------------------------------------------------------------

    As in other contexts, complainants in open Internet proceedings
will ultimately bear the burden of proof to demonstrate by a
preponderance of the evidence that an alleged violation of the rules
has occurred. A number of commenters propose, however, that once a
complainant makes a prima facie showing that an open Internet rule has
been violated, the burden should shift to the broadband provider to
demonstrate that the challenged practice is reasonable. This approach
is appropriate in the context of certain open Internet complaints, when
the evidence necessary to apply the open Internet rules is
predominantly in the possession of the broadband provider. Accordingly,
we require a complainant alleging a violation of the open Internet
rules to plead fully and with specificity the basis of its claims and
to provide facts, supported when possible by documentation or
affidavit, sufficient to establish a prima facie case of an open
Internet violation. In turn, the broadband provider must answer each
claim with particularity and furnish facts, supported by documentation
or affidavit, demonstrating the reasonableness of the challenged
practice. At that point, the complainant will have the opportunity to
demonstrate that the practice is not reasonable. Should experience
reveal the need to adjust the burden of proof in open Internet
disputes, we will do so as appropriate.
    Several commenters urge the Commission to adopt timelines for the
complaint process. We recognize the need to resolve alleged violations
swiftly, and accordingly will allow requests for expedited treatment of
open Internet complaints under the Enforcement Bureau's Accelerated
Docket procedures.\184\
---------------------------------------------------------------------------

    \184\ See 47 CFR 1.730. Furthermore, for good cause, pursuant to
47 CFR 1.3, the Commission may shorten the deadlines or otherwise
revise the procedures herein to expedite the adjudication of
complaints.
---------------------------------------------------------------------------

    In resolving formal complaints, the Commission will draw on
resources from across the agency--including engineering, economic, and
legal experts--to resolve open Internet complaints in a timely manner.
In addition, we will take into account standards and best practices
adopted by relevant standard-setting organizations, and such
organizations and outside advisory groups also may provide valuable
technical assistance in resolving disputes. Further, in order to
facilitate prompt decision-making, when possible we will resolve open
Internet formal complaints at the bureau level, rather than the
Commission level.\185\
---------------------------------------------------------------------------

    \185\ The rules adopted in this Order explicitly authorize the
Enforcement Bureau to resolve complaints alleging open Internet
violations.
---------------------------------------------------------------------------

C. FCC Initiated Actions

    As noted above, in addition to ruling on complaints, the Commission
has the authority to initiate enforcement actions on its own motion.
For instance, Section 403 of the Act permits the Commission to initiate
an inquiry concerning any question arising under the Act, and Section
503(b) authorizes us to issue citations and impose forfeiture penalties
for violations of our rules. Should the Commission find that a
broadband Internet provider is engaging in activity that violates the
open Internet rules, we will take appropriate enforcement action,
including the issuance of forfeitures.

VI. Effective Date, Open Internet Advisory Committee, and Commission
Review

    Some of the rules adopted in this Order contain new information
collection requirements subject to the Paperwork Reduction Act (PRA).
Our rules addressing transparency are among those requiring PRA
approval. The disclosure rule is essential to the proper functioning of
our open Internet framework, and we therefore make all the rules we
adopt in this Order effective November 20, 2011.
    To assist the Commission in monitoring the state of Internet
openness and the effects of our rules, we intend to create an Open
Internet Advisory Committee. The Committee, to be created in
consultation with the General Services Administration pursuant to the
Federal Advisory Committee Act, will be an inclusive and transparent
body that will hold public meetings. It will be comprised of a balanced
group including consumer advocates; Internet engineering experts;
content, application, and service providers; network equipment and end-
user-device manufacturers and suppliers; investors; broadband service
providers; and other parties the Commission may deem appropriate. The
Committee will aid the Commission in tracking developments with respect
to the freedom and openness of the Internet, in particular with respect
to issues discussed in this Order, including technical standards and
issues relating to mobile broadband and specialized services. The
Committee will report to the Commission and make recommendations it
deems appropriate concerning our open Internet framework.
    In light of the pace of change of technologies and the market for
broadband Internet access service, and to evaluate the efficacy of the
framework adopted in this Order for preserving Internet openness, the
Commission will review all of the rules in this Order no later than two
years from their effective date, and will adjust its open Internet
framework as appropriate.

VII. Procedural Matters

A. Final Regulatory Flexibility Analysis

    As required by the Regulatory Flexibility Act of 1980, as amended
(RFA), an Initial Regulatory Flexibility Analysis (IRFA) was included
in the Open Internet NPRM in GN Docket No. 09-191 and WC Docket No. 07-
52. The Commission sought written public

[[Page 59224]]

comment on the proposals in these dockets, including comment on the
IRFA. This Final Regulatory Flexibility Analysis (FRFA) conforms to the
RFA.
Need for, and Objectives of, the Rules
    In this Order the Commission takes an important step to preserve
the Internet as an open platform for innovation, investment, job
creation, economic growth, competition, and free expression. To provide
greater clarity and certainty regarding the continued freedom and
openness of the Internet, we adopt three basic rules that are grounded
in broadly accepted Internet norms, as well as our own prior decisions:
    i. Transparency. Fixed and mobile broadband providers must disclose
the network management practices, performance characteristics, and
terms and conditions of their broadband services;
    ii. No blocking. Fixed broadband providers may not block lawful
content, applications, services, or non-harmful devices; mobile
broadband providers may not block lawful Web sites, or block
applications that compete with their voice or video telephony services;
and
    iii. No unreasonable discrimination. Fixed broadband providers may
not unreasonably discriminate in transmitting lawful network traffic.

We believe these rules, applied with the complementary principle of
reasonable network management, will empower and protect consumers and
innovators while helping ensure that the Internet continues to
flourish, with robust private investment and rapid innovation at both
the core and the edge of the network. This is consistent with the
National Broadband Plan goal of broadband access that is ubiquitous and
fast, promoting the global competitiveness of the United States.
    In late 2009, we launched a public process to determine whether and
what actions might be necessary to preserve the characteristics that
have allowed the Internet to grow into an indispensable platform
supporting our nation's economy and civic life, and to foster continued
investment in the physical networks that enable the Internet. Since
then, more than 100,000 commenters have provided written input.
Commission staff held several public workshops and convened a
Technological Advisory Process with experts from industry, academia,
and consumer advocacy groups to collect their views regarding key
technical issues related to Internet openness.
    This process has made clear that the Internet has thrived because
of its freedom and openness--the absence of any gatekeeper blocking
lawful uses of the network or picking winners and losers online.
Consumers and innovators do not have to seek permission before they use
the Internet to launch new technologies, start businesses, connect with
friends, or share their views. The Internet is a level playing field.
Consumers can make their own choices about what applications and
services to use and are free to decide what content they want to
access, create, or share with others. This openness promotes
competition. It also enables a self-reinforcing cycle of investment and
innovation in which new uses of the network lead to increased adoption
of broadband, which drives investment and improvements in the network
itself, which in turn lead to further innovative uses of the network
and further investment in content, applications, services, and devices.
A core goal of this Order is to foster and accelerate this cycle of
investment and innovation.
    The record and our economic analysis demonstrate, however, that the
openness of the Internet cannot be taken for granted, and that it faces
real threats. Indeed, we have seen broadband providers endanger the
Internet's openness by blocking or degrading content and applications
without disclosing their practices to end users and edge providers,
notwithstanding the Commission's adoption of open Internet principles
in 2005. In light of these considerations, as well as the limited
choices most consumers have for broadband service, broadband providers'
financial interests in telephony and pay television services that may
compete with online content and services, and the economic and civic
benefits of maintaining an open and competitive platform for innovation
and communication, the Commission has long recognized that certain
basic standards for broadband provider conduct are necessary to ensure
the Internet's continued openness. The record also establishes the
widespread benefits of providing greater clarity in this area--clarity
that the Internet's openness will continue; that there is a forum and
procedure for resolving alleged open Internet violations; and that
broadband providers may reasonably manage their networks and innovate
with respect to network technologies and business models. We expect the
costs of compliance with our prophylactic rules to be small, as they
incorporate longstanding openness principles that are generally in line
with current practices and with norms endorsed by many broadband
providers. Conversely, the harms of open Internet violations may be
substantial, costly, and in some cases potentially irreversible.
    The rules we proposed in the Open Internet NPRM and those we adopt
in this Order follow directly from the Commission's bipartisan Internet
Policy Statement, adopted unanimously in 2005 and made temporarily
enforceable for certain providers in 2005 and 2006; openness
protections the Commission established in 2007 for users of certain
wireless spectrum; and a notice of inquiry in 2007 that asked, among
other things, whether the Commission should add a principle of
nondiscrimination to the Internet Policy Statement. Our rules build
upon these actions, first and foremost by requiring broadband providers
to be transparent in their network management practices, so that end
users can make informed choices and innovators can develop, market, and
maintain Internet-based offerings. The rules also prevent certain forms
of blocking and discrimination with respect to content, applications,
services, and devices that depend on or connect to the Internet.
    An open, robust, and well-functioning Internet requires that
broadband providers have the flexibility to reasonably manage their
networks. Network management practices are reasonable if they are
appropriate and tailored to achieving a legitimate network management
purpose. Transparency and end-user control are touchstones of
reasonableness.
    We recognize that broadband providers may offer other services over
the same last-mile connections used to provide broadband service. These
``specialized services'' can benefit end users and spur investment, but
they may also present risks to the open Internet. We will closely
monitor specialized services and their effects on broadband service to
ensure, through all available mechanisms, that they supplement but do
not supplant the open Internet.
    Mobile broadband is at an earlier stage in its development than
fixed broadband and is evolving rapidly. For that and other reasons
discussed below, we conclude that it is appropriate at this time to
take measured steps in this area. Accordingly, we require mobile
providers to comply with the transparency rule, which includes
enforceable disclosure obligations regarding device and application
certification and approval processes; we prohibit providers from
blocking lawful Web sites; and we prohibit providers from blocking
applications that compete with providers' voice and video telephony
services. We will closely

[[Page 59225]]

monitor the development of the mobile broadband market and will adjust
the framework we adopt in this Order as appropriate.
    These rules are within our jurisdiction over interstate and foreign
communications by wire and radio. Further, they implement specific
statutory mandates in the Communications Act (``Act'') and the
Telecommunications Act of 1996 (``1996 Act''), including provisions
that direct the Commission to promote Internet investment and to
protect and promote voice, video, and audio communications services.
    The framework we adopt in this Order aims to ensure the Internet
remains an open platform--one characterized by free markets and free
speech--that enables consumer choice, end-user control, competition
through low barriers to entry, and the freedom to innovate without
permission. The framework does so by protecting openness through high-
level rules, while maintaining broadband providers' and the
Commission's flexibility to adapt to changes in the market and in
technology as the Internet continues to evolve.
Summary of the Significant Issues Raised by the Public Comments in
Response to the IRFA and Summary of the Assessment of the Agency of
Such Issues
    A few commenters discussed the IRFA from the Open Internet NPRM.
The Center for Regulatory Effectiveness (CRE) argued that the Open
Internet NPRM's IRFA was defective because it ineffectively followed 5
U.S.C. secs. 603(a) (``Such analysis shall describe the impact of the
proposed rule on small entities.'') and 603(c) (``Each initial
regulatory flexibility analysis shall also contain a description of any
significant alternatives to the proposed rule which accomplish the
stated objectives of applicable statutes and which minimize any
significant economic impact of the proposed rule on small entities.'').
CRE does not provide any case law to support its interpretation that
the Commission is in violation of these aspects of the statute, nor
does CRE attempt to argue that SBEs have actually or theoretically been
harmed. Rather, CRE is concerned that by not following its reading of
these parts of the law, the Commission is being hypocritical by not
being transparent enough. CRE recommends that the Commission publish a
revised IRFA for public comment. We disagree: we believe that the IRFA
was adequate and that the opportunity for SBEs to comment in a publicly
accessible docket should remove any potential harm to openness that CRE
is concerned with, as well as any harms to SBEs that could occur by not
following CRE's interpretation of the law.
    The Smithville Telephone Company (Smithville) notes that many ILECs
have vastly fewer employees than the 1500 or less that is required to
be recognized as a small business under the SBA. For instance,
Smithville states that it has seven employees. Smithville also observes
that some other small ILECs in Mississippi have staffs of 8, 4, 2, 3,
and 21. Smithville argues that companies of this size do not have the
resources to fully analyze issues and participate in Commission
proceedings. Smithville would like the Commission to use the data that
it regularly receives from carriers to set a carrier size where
exemptions from proposed rules and less complex reporting requirements
can be set. In the present case, however, we determine that this is not
necessary. We expect the costs of compliance with these rules to be
small, as the high-level rules incorporate longstanding openness
principles that appear to be generally in line with most broadband
providers' current practices. We note that Smithville does not cite any
particular source of increased costs, or attempt to estimate costs of
compliance. Nonetheless, the Commission attempts to ease any burden
that the transparency rule may cause by only requiring disclosure on a
Web site and at the point of sale, making the transparency rule
flexible. In addition, by setting the effective date of these rules as
November 20, 2011, the Order gives broadband providers adequate time to
develop cost-effective methods of compliance. Finally, to the extent
that the transparency rule imposes a new obligation on small
businesses, we find that the flexibility built into the rule addresses
any compliance concerns.
    The American Cable Association (ACA) notes that the Commission has
an obligation to ``include in the FRFA a comprehensive discussion of
the economic impact its actions will have on small cable operators.''
The ACA cites its other comments, which ask the Commission to clarify
that the codified principles would not obligate broadband service
providers to (1) ``employ specific network management practices,'' (2)
``impose affirmative obligations dealing with unlawful content or the
unlawful transfer of content,'' (3) ``accommodate lawful devices that
are not supported by a broadband provider's network,'' and (4)
``provide information regarding a company's network management
practices through any reporting, recordkeeping, or means other than
through a company's Web site or Web page.'' Addressing ACA's arguments
with regard to cable operators, and fixed broadband providers in
particular, (1), the Commission is not requiring specific network
management practices. The Commission only requires that any network
management be reasonable; the Commission does not require that any
specific practice be employed. Regarding (2), the rules do not impose
affirmative obligations dealing with unlawful content or the unlawful
transfer of content. We state that the ``no blocking'' rule does not
prevent or restrict a broadband provider from refusing to transmit
material such as child pornography. In response to (3), the Order
clarifies that the ``no blocking'' rule protects only devices that do
not harm the network and only requires fixed broadband service
providers to allow devices that conform to publicly available industry
standards applicable to the providers' services. Directly addressing
ACA's concern, the Order notes that a DOCSIS-based provider is not
required to support a DSL modem. In response to (4), the disclosure
requirement in this Order does not require additional forms of
disclosure, other than, at a minimum, requiring broadband providers to
prominently display or provide links to disclosures on a publicly
available, easily accessible Web site that is available to current and
prospective end users and edge providers as well as to the Commission,
and disclosing relevant information at the point of sale.
Description and Estimate of the Number of Small Entities to Which the
Rules Apply
    The RFA directs agencies to provide a description of, and, where
feasible, an estimate of, the number of small entities that may be
affected by the rules adopted herein. The RFA generally defines the
term ``small entity'' as having the same meaning as the terms ``small
business,'' ``small organization,'' and ``small governmental
jurisdiction.'' In addition, the term ``small business'' has the same
meaning as the term ``small business concern'' under the Small Business
Act. A ``small business concern'' is one which: (1) Is independently
owned and operated; (2) is not dominant in its field of operation; and
(3) satisfies any additional criteria established by the Small Business
Administration (SBA).
1. Total Small Entities
    Our action may, over time, affect small entities that are not
easily categorized at present. We therefore

[[Page 59226]]

describe here, at the outset, three comprehensive, statutory small
entity size standards. First, nationwide, there are a total of
approximately 27.2 million small businesses, according to the SBA. In
addition, a ``small organization'' is generally ``any not-for-profit
enterprise which is independently owned and operated and is not
dominant in its field.'' Nationwide, as of 2002, there were
approximately 1.6 million small organizations. Finally, the term
``small governmental jurisdiction'' is defined generally as
``governments of cities, towns, townships, villages, school districts,
or special districts, with a population of less than fifty thousand.''
Census Bureau data for 2002 indicate that there were 87,525 local
governmental jurisdictions in the United States. We estimate that, of
this total, 84,377 entities were ``small governmental jurisdictions.''
Thus, we estimate that most governmental jurisdictions are small.
2. Internet Access Service Providers
    Internet Service Providers. The 2007 Economic Census places these
firms, whose services might include voice over Internet Protocol
(VoIP), in either of two categories, depending on whether the service
is provided over the provider's own telecommunications facilities
(e.g., cable and DSL ISPs), or over client-supplied telecommunications
connections (e.g., dial-up ISPs). The former are within the category of
Wired Telecommunications Carriers, which has an SBA small business size
standard of 1,500 or fewer employees. These are also labeled
``broadband.'' The latter are within the category of All Other
Telecommunications, which has a size standard of annual receipts of $25
million or less. These are labeled non-broadband. The most current
Economic Census data for all such firms are 2007 data, which are
detailed specifically for ISPs within the categories above. For the
first category, the data show that 396 firms operated for the entire
year, of which 159 had nine or fewer employees. For the second
category, the data show that 1,682 firms operated for the entire year.
Of those, 1,675 had annual receipts below $25 million per year, and an
additional two had receipts of between $25 million and $ 49,999,999.
Consequently, we estimate that the majority of ISP firms are small
entities.
    The ISP industry has changed since 2007. The 2007 data cited above
may therefore include entities that no longer provide Internet access
service and may exclude entities that now provide such service. To
ensure that this FRFA describes the universe of small entities that our
action might affect, we discuss in turn several different types of
entities that might be providing Internet access service.
3. Wireline Providers
    Incumbent Local Exchange Carriers (Incumbent LECs). Neither the
Commission nor the SBA has developed a small business size standard
specifically for incumbent local exchange services. The appropriate
size standard under SBA rules is for the category Wired
Telecommunications Carriers. Under that size standard, such a business
is small if it has 1,500 or fewer employees. According to Commission
data, 1,311 carriers have reported that they are engaged in the
provision of incumbent local exchange services. Of these 1,311
carriers, an estimated 1,024 have 1,500 or fewer employees and 287 have
more than 1,500 employees. Consequently, the Commission estimates that
most providers of incumbent local exchange service are small businesses
that may be affected by our proposed action.
    Competitive Local Exchange Carriers (Competitive LECs), Competitive
Access Providers (CAPs), Shared-Tenant Service Providers, and Other
Local Service Providers. Neither the Commission nor the SBA has
developed a small business size standard specifically for these service
providers. The appropriate size standard under SBA rules is for the
category Wired Telecommunications Carriers. Under that size standard,
such a business is small if it has 1,500 or fewer employees. According
to Commission data, 1005 carriers have reported that they are engaged
in the provision of either competitive access provider services or
competitive local exchange carrier services. Of these 1005 carriers, an
estimated 918 have 1,500 or fewer employees and 87 have more than 1,500
employees. In addition, 16 carriers have reported that they are
``Shared-Tenant Service Providers,'' and all 16 are estimated to have
1,500 or fewer employees. In addition, 89 carriers have reported that
they are ``Other Local Service Providers.'' Of the 89, all have 1,500
or fewer employees. Consequently, the Commission estimates that most
providers of competitive local exchange service, competitive access
providers, Shared-Tenant Service Providers, and other local service
providers are small entities that may be affected by our action.
    We have included small incumbent LECs in this present RFA analysis.
As noted above, a ``small business'' under the RFA is one that, inter
alia, meets the pertinent small business size standard (e.g., a
telephone communications business having 1,500 or fewer employees), and
``is not dominant in its field of operation.'' The SBA's Office of
Advocacy contends that, for RFA purposes, small incumbent LECs are not
dominant in their field of operation because any such dominance is not
``national'' in scope. We have therefore included small incumbent LECs
in this RFA analysis, although we emphasize that this RFA action has no
effect on Commission analyses and determinations in other, non-RFA
contexts.
    Interexchange Carriers. Neither the Commission nor the SBA has
developed a small business size standard specifically for providers of
interexchange services. The appropriate size standard under SBA rules
is for the category Wired Telecommunications Carriers. Under that size
standard, such a business is small if it has 1,500 or fewer employees.
According to Commission data, 300 carriers have reported that they are
engaged in the provision of interexchange service. Of these, an
estimated 268 have 1,500 or fewer employees and 32 have more than 1,500
employees. Consequently, the Commission estimates that the majority of
IXCs are small entities that may be affected by our action.
    Operator Service Providers (OSPs). Neither the Commission nor the
SBA has developed a small business size standard specifically for
operator service providers. The appropriate size standard under SBA
rules is for the category Wired Telecommunications Carriers. Under that
size standard, such a business is small if it has 1,500 or fewer
employees. According to Commission data, 33 carriers have reported that
they are engaged in the provision of operator services. Of these, an
estimated 31 have 1,500 or fewer employees and 2 has more than 1,500
employees. Consequently, the Commission estimates that the majority of
OSPs are small entities that may be affected by our proposed action.
4. Wireless Providers--Fixed and Mobile
    For reasons discussed above in the text of the Order, the
Commission has distinguished wireless fixed broadband Internet access
service from wireless mobile broadband Internet access service.
Specifically, the Commission decided that fixed broadband Internet
access service providers, whether wireline or wireless, must disclose
their network management practices and the performance characteristics
and commercial terms of their broadband services; may not block lawful
content, applications, services or non-harmful

[[Page 59227]]

devices; and may not unreasonably discriminate in transmitting lawful
network traffic. Also for the reasons discussed above, the Commission
decided that wireless mobile broadband Internet access service
providers must disclose their network management practices and
performance characteristics and commercial terms of their broadband
service and may not block lawful Web sites or block applications that
compete with their voice or video telephony service. Thus, to the
extent the wireless services listed below are used by wireless firms
for fixed and mobile broadband Internet access services, the actions in
this Order may have an impact on those small businesses as set forth
above and further below. In addition, for those services subject to
auctions, we note that, as a general matter, the number of winning
bidders that claim to qualify as small businesses at the close of an
auction does not necessarily represent the number of small businesses
currently in service. Also, the Commission does not generally track
subsequent business size unless, in the context of assignments and
transfers or reportable eligibility events, unjust enrichment issues
are implicated.
    Wireless Telecommunications Carriers (except Satellite). Since
2007, the Census Bureau has placed wireless firms within this new,
broad, economic census category. Prior to that time, such firms were
within the now-superseded categories of ``Paging'' and ``Cellular and
Other Wireless Telecommunications.'' Under the present and prior
categories, the SBA has deemed a wireless business to be small if it
has 1,500 or fewer employees. For the category of Wireless
Telecommunications Carriers (except Satellite), preliminary data for
2007 show that there were 11,927 firms operating that year. While the
Census Bureau has not released data on the establishments broken down
by number of employees, we note that the Census Bureau lists total
employment for all firms in that sector at 281,262. Since all firms
with fewer than 1,500 employees are considered small, given the total
employment in the sector, we estimate that the vast majority of
wireless firms are small.
    Wireless Communications Services. This service can be used for
fixed, mobile, radiolocation, and digital audio broadcasting satellite
uses. The Commission defined ``small business'' for the wireless
communications services (WCS) auction as an entity with average gross
revenues of $40 million for each of the three preceding years, and a
``very small business'' as an entity with average gross revenues of $15
million for each of the three preceding years. The SBA has approved
these definitions. The Commission auctioned geographic area licenses in
the WCS service. In the auction, which commenced on April 15, 1997 and
closed on April 25, 1997, seven bidders won 31 licenses that qualified
as very small business entities, and one bidder won one license that
qualified as a small business entity.
    1670-1675 MHz Services. This service can be used for fixed and
mobile uses, except aeronautical mobile. An auction for one license in
the 1670-1675 MHz band commenced on April 30, 2003 and closed the same
day. One license was awarded. The winning bidder was not a small
entity.
    Wireless Telephony. Wireless telephony includes cellular, personal
communications services, and specialized mobile radio telephony
carriers. As noted, the SBA has developed a small business size
standard for Wireless Telecommunications Carriers (except Satellite).
Under the SBA small business size standard, a business is small if it
has 1,500 or fewer employees. According to Trends in Telephone Service
data, 413 carriers reported that they were engaged in wireless
telephony. Of these, an estimated 261 have 1,500 or fewer employees and
152 have more than 1,500 employees. Therefore, more than half of these
entities can be considered small.
    Broadband Personal Communications Service. The broadband personal
communications services (PCS) spectrum is divided into six frequency
blocks designated A through F, and the Commission has held auctions for
each block. The Commission initially defined a ``small business'' for
C- and F-Block licenses as an entity that has average gross revenues of
$40 million or less in the three previous calendar years. For F-Block
licenses, an additional small business size standard for ``very small
business'' was added and is defined as an entity that, together with
its affiliates, has average gross revenues of not more than $15 million
for the preceding three calendar years. These small business size
standards, in the context of broadband PCS auctions, have been approved
by the SBA. No small businesses within the SBA-approved small business
size standards bid successfully for licenses in Blocks A and B. There
were 90 winning bidders that claimed small business status in the first
two C-Block auctions. A total of 93 bidders that claimed small business
status won approximately 40 percent of the 1,479 licenses in the first
auction for the D, E, and F Blocks. On April 15, 1999, the Commission
completed the reauction of 347 C-, D-, E-, and F-Block licenses in
Auction No. 22. Of the 57 winning bidders in that auction, 48 claimed
small business status and won 277 licenses.
    On January 26, 2001, the Commission completed the auction of 422 C
and F Block Broadband PCS licenses in Auction No. 35. Of the 35 winning
bidders in that auction, 29 claimed small business status. Subsequent
events concerning Auction 35, including judicial and agency
determinations, resulted in a total of 163 C and F Block licenses being
available for grant. On February 15, 2005, the Commission completed an
auction of 242 C-, D-, E-, and F-Block licenses in Auction No. 58. Of
the 24 winning bidders in that auction, 16 claimed small business
status and won 156 licenses. On May 21, 2007, the Commission completed
an auction of 33 licenses in the A, C, and F Blocks in Auction No. 71.
Of the 12 winning bidders in that auction, five claimed small business
status and won 18 licenses. On August 20, 2008, the Commission
completed the auction of 20 C-, D-, E-, and F-Block Broadband PCS
licenses in Auction No. 78. Of the eight winning bidders for Broadband
PCS licenses in that auction, six claimed small business status and won
14 licenses.
    Specialized Mobile Radio Licenses. The Commission awards ``small
entity'' bidding credits in auctions for Specialized Mobile Radio (SMR)
geographic area licenses in the 800 MHz and 900 MHz bands to firms that
had revenues of no more than $15 million in each of the three previous
calendar years. The Commission awards ``very small entity'' bidding
credits to firms that had revenues of no more than $3 million in each
of the three previous calendar years. The SBA has approved these small
business size standards for the 900 MHz Service. The Commission has
held auctions for geographic area licenses in the 800 MHz and 900 MHz
bands. The 900 MHz SMR auction began on December 5, 1995, and closed on
April 15, 1996. Sixty bidders claiming that they qualified as small
businesses under the $15 million size standard won 263 geographic area
licenses in the 900 MHz SMR band. The 800 MHz SMR auction for the upper
200 channels began on October 28, 1997, and was completed on December
8, 1997. Ten bidders claiming that they qualified as small businesses
under the $15 million size standard won 38 geographic area licenses for
the upper 200 channels in the 800 MHz SMR band. A second auction for
the 800 MHz band was held

[[Page 59228]]

on January 10, 2002 and closed on January 17, 2002 and included 23 BEA
licenses. One bidder claiming small business status won five licenses.
    The auction of the 1,053 800 MHz SMR geographic area licenses for
the General Category channels began on August 16, 2000, and was
completed on September 1, 2000. Eleven bidders won 108 geographic area
licenses for the General Category channels in the 800 MHz SMR band and
qualified as small businesses under the $15 million size standard. In
an auction completed on December 5, 2000, a total of 2,800 Economic
Area licenses in the lower 80 channels of the 800 MHz SMR service were
awarded. Of the 22 winning bidders, 19 claimed small business status
and won 129 licenses. Thus, combining all four auctions, 41 winning
bidders for geographic licenses in the 800 MHz SMR band claimed status
as small businesses.
    In addition, there are numerous incumbent site-by-site SMR licenses
and licensees with extended implementation authorizations in the 800
and 900 MHz bands. We do not know how many firms provide 800 MHz or 900
MHz geographic area SMR service pursuant to extended implementation
authorizations, nor how many of these providers have annual revenues of
no more than $15 million. In addition, we do not know how many of these
firms have 1,500 or fewer employees, which is the SBA-determined size
standard. We assume, for purposes of this analysis, that all of the
remaining extended implementation authorizations are held by small
entities, as defined by the SBA.
    Lower 700 MHz Band Licenses. The Commission previously adopted
criteria for defining three groups of small businesses for purposes of
determining their eligibility for special provisions such as bidding
credits. The Commission defined a ``small business'' as an entity that,
together with its affiliates and controlling principals, has average
gross revenues not exceeding $40 million for the preceding three years.
A ``very small business'' is defined as an entity that, together with
its affiliates and controlling principals, has average gross revenues
that are not more than $15 million for the preceding three years.
Additionally, the lower 700 MHz Service had a third category of small
business status for Metropolitan/Rural Service Area (MSA/RSA)
licenses--``entrepreneur''--which is defined as an entity that,
together with its affiliates and controlling principals, has average
gross revenues that are not more than $3 million for the preceding
three years. The SBA approved these small size standards. An auction of
740 licenses (one license in each of the 734 MSAs/RSAs and one license
in each of the six Economic Area Groupings (EAGs)) commenced on August
27, 2002, and closed on September 18, 2002. Of the 740 licenses
available for auction, 484 licenses were won by 102 winning bidders.
Seventy-two of the winning bidders claimed small business, very small
business or entrepreneur status and won a total of 329 licenses. A
second auction commenced on May 28, 2003, closed on June 13, 2003, and
included 256 licenses: 5 EAG licenses and 476 Cellular Market Area
licenses. Seventeen winning bidders claimed small or very small
business status and won 60 licenses, and nine winning bidders claimed
entrepreneur status and won 154 licenses. On July 26, 2005, the
Commission completed an auction of 5 licenses in the Lower 700 MHz band
(Auction No. 60). There were three winning bidders for five licenses.
All three winning bidders claimed small business status.
    In 2007, the Commission reexamined its rules governing the 700 MHz
band in the 700 MHz Second Report and Order. An auction of 700 MHz
licenses commenced January 24, 2008 and closed on March 18, 2008, which
included, 176 Economic Area licenses in the A Block, 734 Cellular
Market Area licenses in the B Block, and 176 EA licenses in the E
Block. Twenty winning bidders, claiming small business status (those
with attributable average annual gross revenues that exceed $15 million
and do not exceed $40 million for the preceding three years) won 49
licenses. Thirty three winning bidders claiming very small business
status (those with attributable average annual gross revenues that do
not exceed $15 million for the preceding three years) won 325 licenses.
    Upper 700 MHz Band Licenses. In the 700 MHz Second Report and
Order, the Commission revised its rules regarding Upper 700 MHz
licenses. On January 24, 2008, the Commission commenced Auction 73 in
which several licenses in the Upper 700 MHz band were available for
licensing: 12 Regional Economic Area Grouping licenses in the C Block,
and one nationwide license in the D Block. The auction concluded on
March 18, 2008, with 3 winning bidders claiming very small business
status (those with attributable average annual gross revenues that do
not exceed $15 million for the preceding three years) and winning five
licenses.
    700 MHz Guard Band Licensees. In 2000, in the 700 MHz Guard Band
Order, the Commission adopted size standards for ``small businesses''
and ``very small businesses'' for purposes of determining their
eligibility for special provisions such as bidding credits and
installment payments. A small business in this service is an entity
that, together with its affiliates and controlling principals, has
average gross revenues not exceeding $40 million for the preceding
three years. Additionally, a very small business is an entity that,
together with its affiliates and controlling principals, has average
gross revenues that are not more than $15 million for the preceding
three years. SBA approval of these definitions is not required. An
auction of 52 Major Economic Area licenses commenced on September 6,
2000, and closed on September 21, 2000. Of the 104 licenses auctioned,
96 licenses were sold to nine bidders. Five of these bidders were small
businesses that won a total of 26 licenses. A second auction of 700 MHz
Guard Band licenses commenced on February 13, 2001, and closed on
February 21, 2001. All eight of the licenses auctioned were sold to
three bidders. One of these bidders was a small business that won a
total of two licenses.
    Air-Ground Radiotelephone Service. The Commission has previously
used the SBA's small business size standard applicable to Wireless
Telecommunications Carriers (except Satellite), i.e., an entity
employing no more than 1,500 persons. There are fewer than 10 licensees
in the Air-Ground Radiotelephone Service, and under that definition, we
estimate that almost all of them qualify as small entities under the
SBA definition. For purposes of assigning Air-Ground Radiotelephone
Service licenses through competitive bidding, the Commission has
defined ``small business'' as an entity that, together with controlling
interests and affiliates, has average annual gross revenues for the
preceding three years not exceeding $40 million. A ``very small
business'' is defined as an entity that, together with controlling
interests and affiliates, has average annual gross revenues for the
preceding three years not exceeding $15 million. These definitions were
approved by the SBA. In May 2006, the Commission completed an auction
of nationwide commercial Air-Ground Radiotelephone Service licenses in
the 800 MHz band (Auction No. 65). On June 2, 2006, the auction closed
with two winning bidders winning two Air-Ground Radiotelephone Services
licenses. Neither of the winning bidders claimed small business status.
    AWS Services (1710-1755 MHz and 2110-2155 MHz bands (AWS-1); 1915-

[[Page 59229]]

1920 MHz, 1995-2000 MHz, 2020-2025 MHz and 2175-2180 MHz bands (AWS-2);
2155-2175 MHz band (AWS-3)). For the AWS-1 bands, the Commission has
defined a ``small business'' as an entity with average annual gross
revenues for the preceding three years not exceeding $40 million, and a
``very small business'' as an entity with average annual gross revenues
for the preceding three years not exceeding $15 million. For AWS-2 and
AWS-3, although we do not know for certain which entities are likely to
apply for these frequencies, we note that the AWS-1 bands are
comparable to those used for cellular service and personal
communications service. The Commission has not yet adopted size
standards for the AWS-2 or AWS-3 bands but proposes to treat both AWS-2
and AWS-3 similarly to broadband PCS service and AWS-1 service due to
the comparable capital requirements and other factors, such as issues
involved in relocating incumbents and developing markets, technologies,
and services.
    3650-3700 MHz band. In March 2005, the Commission released a Report
and Order and Memorandum Opinion and Order that provides for
nationwide, non-exclusive licensing of terrestrial operations,
utilizing contention-based technologies, in the 3650 MHz band (i.e.,
3650-3700 MHz). As of April 2010, more than 1270 licenses have been
granted and more than 7433 sites have been registered. The Commission
has not developed a definition of small entities applicable to 3650-
3700 MHz band nationwide, non-exclusive licensees. However, we estimate
that the majority of these licensees are Internet Access Service
Providers (ISPs) and that most of those licensees are small businesses.
    Fixed Microwave Services. Microwave services include common
carrier, private-operational fixed, and broadcast auxiliary radio
services. They also include the Local Multipoint Distribution Service
(LMDS), the Digital Electronic Message Service (DEMS), and the 24 GHz
Service, where licensees can choose between common carrier and non-
common carrier status. At present, there are approximately 31,428
common carrier fixed licensees and 79,732 private operational-fixed
licensees and broadcast auxiliary radio licensees in the microwave
services. There are approximately 120 LMDS licensees, three DEMS
licensees, and three 24 GHz licensees. The Commission has not yet
defined a small business with respect to microwave services. For
purposes of the IRFA, we will use the SBA's definition applicable to
Wireless Telecommunications Carriers (except satellite)--i.e., an
entity with no more than 1,500 persons. Under the present and prior
categories, the SBA has deemed a wireless business to be small if it
has 1,500 or fewer employees. For the category of Wireless
Telecommunications Carriers (except Satellite), preliminary data for
2007 show that there were 11,927 firms operating that year. While the
Census Bureau has not released data on the establishments broken down
by number of employees, we note that the Census Bureau lists total
employment for all firms in that sector at 281,262. Since all firms
with fewer than 1,500 employees are considered small, given the total
employment in the sector, we estimate that the vast majority of firms
using microwave services are small. We note that the number of firms
does not necessarily track the number of licensees. We estimate that
virtually all of the Fixed Microwave licensees (excluding broadcast
auxiliary licensees) would qualify as small entities under the SBA
definition.
    Broadband Radio Service and Educational Broadband Service.
Broadband Radio Service systems, previously referred to as Multipoint
Distribution Service (MDS) and Multichannel Multipoint Distribution
Service (MMDS) systems, and ``wireless cable,'' transmit video
programming to subscribers and provide two-way high speed data
operations using the microwave frequencies of the Broadband Radio
Service (BRS) and Educational Broadband Service (EBS) (previously
referred to as the Instructional Television Fixed Service (ITFS)). In
connection with the 1996 BRS auction, the Commission established a
small business size standard as an entity that had annual average gross
revenues of no more than $40 million in the previous three calendar
years. The BRS auctions resulted in 67 successful bidders obtaining
licensing opportunities for 493 Basic Trading Areas (BTAs). Of the 67
auction winners, 61 met the definition of a small business. BRS also
includes licensees of stations authorized prior to the auction. At this
time, we estimate that of the 61 small business BRS auction winners, 48
remain small business licensees. In addition to the 48 small businesses
that hold BTA authorizations, there are approximately 392 incumbent BRS
licensees that are considered small entities. After adding the number
of small business auction licensees to the number of incumbent
licensees not already counted, we find that there are currently
approximately 440 BRS licensees that are defined as small businesses
under either the SBA or the Commission's rules. In 2009, the Commission
conducted Auction 86, the sale of 78 licenses in the BRS areas. The
Commission offered three levels of bidding credits: (i) A bidder with
attributed average annual gross revenues that exceed $15 million and do
not exceed $40 million for the preceding three years (small business)
will receive a 15 percent discount on its winning bid; (ii) a bidder
with attributed average annual gross revenues that exceed $3 million
and do not exceed $15 million for the preceding three years (very small
business) will receive a 25 percent discount on its winning bid; and
(iii) a bidder with attributed average annual gross revenues that do
not exceed $3 million for the preceding three years (entrepreneur) will
receive a 35 percent discount on its winning bid. Auction 86 concluded
in 2009 with the sale of 61 licenses. Of the ten winning bidders, two
bidders that claimed small business status won 4 licenses; one bidder
that claimed very small business status won three licenses; and two
bidders that claimed entrepreneur status won six licenses.
    In addition, the SBA's Cable Television Distribution Services small
business size standard is applicable to EBS. There are presently 2,032
EBS licensees. All but 100 of these licenses are held by educational
institutions. Educational institutions are included in this analysis as
small entities. Thus, we estimate that at least 1,932 licensees are
small businesses. Since 2007, Cable Television Distribution Services
have been defined within the broad economic census category of Wired
Telecommunications Carriers; that category is defined as follows:
``This industry comprises establishments primarily engaged in operating
and/or providing access to transmission facilities and infrastructure
that they own and/or lease for the transmission of voice, data, text,
sound, and video using wired telecommunications networks. Transmission
facilities may be based on a single technology or a combination of
technologies.'' The SBA has developed a small business size standard
for this category, which is: all such firms having 1,500 or fewer
employees. To gauge small business prevalence for these cable services
we must, however, use the most current census data that are based on
the previous category of Cable and Other Program Distribution and its
associated size standard; that size standard was: all such firms having
$13.5 million or less in annual receipts. According to Census Bureau
data for 2002, there were a total of 1,191 firms

[[Page 59230]]

in this previous category that operated for the entire year. Of this
total, 1,087 firms had annual receipts of under $10 million, and 43
firms had receipts of $10 million or more but less than $25 million.
Thus, the majority of these firms can be considered small.
5. Satellite Service Providers
    Satellite Telecommunications Providers. Two economic census
categories address the satellite industry. The first category has a
small business size standard of $15 million or less in average annual
receipts, under SBA rules. The second has a size standard of $25
million or less in annual receipts. The most current Census Bureau data
in this context, however, are from the (last) economic census of 2002,
and we will use those figures to gauge the prevalence of small
businesses in these categories.
    The category of Satellite Telecommunications ``comprises
establishments primarily engaged in providing telecommunications
services to other establishments in the telecommunications and
broadcasting industries by forwarding and receiving communications
signals via a system of satellites or reselling satellite
telecommunications.'' For this category, Census Bureau data for 2002
show that there were a total of 371 firms that operated for the entire
year. Of this total, 307 firms had annual receipts of under $10
million, and 26 firms had receipts of $10 million to $24,999,999.
Consequently, we estimate that the majority of Satellite
Telecommunications firms are small entities that might be affected by
our action.
    The second category of All Other Telecommunications comprises,
inter alia, ``establishments primarily engaged in providing specialized
telecommunications services, such as satellite tracking, communications
telemetry, and radar station operation. This industry also includes
establishments primarily engaged in providing satellite terminal
stations and associated facilities connected with one or more
terrestrial systems and capable of transmitting telecommunications to,
and receiving telecommunications from, satellite systems.'' For this
category, Census Bureau data for 2002 show that there were a total of
332 firms that operated for the entire year. Of this total, 303 firms
had annual receipts of under $10 million and 15 firms had annual
receipts of $10 million to $24,999,999. Consequently, we estimate that
the majority of All Other Telecommunications firms are small entities
that might be affected by our action.
6. Cable Service Providers
    Because Section 706 requires us to monitor the deployment of
broadband regardless of technology or transmission media employed, we
anticipate that some broadband service providers may not provide
telephone service. Accordingly, we describe below other types of firms
that may provide broadband services, including cable companies, MDS
providers, and utilities, among others.
    Cable and Other Program Distributors. Since 2007, these services
have been defined within the broad economic census category of Wired
Telecommunications Carriers; that category is defined as follows:
``This industry comprises establishments primarily engaged in operating
and/or providing access to transmission facilities and infrastructure
that they own and/or lease for the transmission of voice, data, text,
sound, and video using wired telecommunications networks. Transmission
facilities may be based on a single technology or a combination of
technologies.'' The SBA has developed a small business size standard
for this category, which is: all such firms having 1,500 or fewer
employees. To gauge small business prevalence for these cable services
we must, however, use current census data that are based on the
previous category of Cable and Other Program Distribution and its
associated size standard; that size standard was: all such firms having
$13.5 million or less in annual receipts. According to Census Bureau
data for 2002, there were a total of 1,191 firms in this previous
category that operated for the entire year. Of this total, 1,087 firms
had annual receipts of under $10 million, and 43 firms had receipts of
$10 million or more but less than $25 million. Thus, the majority of
these firms can be considered small.
    Cable Companies and Systems. The Commission has also developed its
own small business size standards, for the purpose of cable rate
regulation. Under the Commission's rules, a ``small cable company'' is
one serving 400,000 or fewer subscribers, nationwide. Industry data
indicate that, of 1,076 cable operators nationwide, all but eleven are
small under this size standard. In addition, under the Commission's
rules, a ``small system'' is a cable system serving 15,000 or fewer
subscribers. Industry data indicate that, of 7,208 systems nationwide,
6,139 systems have under 10,000 subscribers, and an additional 379
systems have 10,000-19,999 subscribers. Thus, under this second size
standard, most cable systems are small.
    Cable System Operators. The Communications Act of 1934, as amended,
also contains a size standard for small cable system operators, which
is ``a cable operator that, directly or through an affiliate, serves in
the aggregate fewer than 1 percent of all subscribers in the United
States and is not affiliated with any entity or entities whose gross
annual revenues in the aggregate exceed $250,000,000.'' The Commission
has determined that an operator serving fewer than 677,000 subscribers
shall be deemed a small operator, if its annual revenues, when combined
with the total annual revenues of all its affiliates, do not exceed
$250 million in the aggregate. Industry data indicate that, of 1,076
cable operators nationwide, all but ten are small under this size
standard. We note that the Commission neither requests nor collects
information on whether cable system operators are affiliated with
entities whose gross annual revenues exceed $250 million, and therefore
we are unable to estimate more accurately the number of cable system
operators that would qualify as small under this size standard.
7. Electric Power Generators, Transmitters, and Distributors
    Electric Power Generators, Transmitters, and Distributors. The
Census Bureau defines an industry group comprised of ``establishments,
primarily engaged in generating, transmitting, and/or distributing
electric power. Establishments in this industry group may perform one
or more of the following activities: (1) Operate generation facilities
that produce electric energy; (2) operate transmission systems that
convey the electricity from the generation facility to the distribution
system; and (3) operate distribution systems that convey electric power
received from the generation facility or the transmission system to the
final consumer.'' The SBA has developed a small business size standard
for firms in this category: ``A firm is small if, including its
affiliates, it is primarily engaged in the generation, transmission,
and/or distribution of electric energy for sale and its total electric
output for the preceding fiscal year did not exceed 4 million megawatt
hours.'' According to Census Bureau data for 2002, there were 1,644
firms in this category that operated for the entire year. Census data
do not track electric output and we have not determined how many of
these firms fit the SBA size standard for small, with no more than 4
million megawatt hours of electric output. Consequently, we

[[Page 59231]]

estimate that 1,644 or fewer firms may be considered small under the
SBA small business size standard.
Description of Projected Reporting, Recordkeeping, and Other Compliance
Requirements for Small Entities
    As indicated above, the Internet's legacy of openness and
transparency has been critical to its success as an engine for
creativity, innovation, and economic development. To help preserve this
fundamental character of the Internet, the Order requires that
broadband providers must, at a minimum, prominently display or provide
links to disclosures on a publicly available, easily accessible Web
site that is available to current and prospective end users and edge
providers as well as to the Commission, and at the point of sale.
Providers should ensure that all Web site disclosures are accessible by
persons with disabilities. We do not require additional forms of
disclosure. Broadband providers' disclosures to the public include
disclosure to the Commission; that is, the Commission will monitor
public disclosures and may require additional disclosures directly to
the Commission. We anticipate that broadband providers may be able to
satisfy the transparency rule through a single disclosure, and
therefore do not require multiple disclosures targeted at different
audiences. This affects all classes of small entities mentioned in
Appendix B, part C, and requires professional skills of entering
information onto a Web page and an understanding of the entities'
network practices, both of which are easily managed by staff of these
types of small entities.
Steps Taken To Minimize the Significant Economic Impact on Small
Entities, and Significant Alternatives Considered
    The RFA requires an agency to describe any significant alternatives
that it has considered in reaching its proposed approach, which may
include (among others) the following four alternatives: (1) The
establishment of differing compliance or reporting requirements or
timetables that take into account the resources available to small
entities; (2) the clarification, consolidation, or simplification of
compliance or reporting requirements under the rule for small entities;
(3) the use of performance, rather than design, standards; and (4) an
exemption from coverage of the rule, or any part thereof, for small
entities.
    The rules adopted in this Order are generally consistent with
current industry practices, so the costs of compliance should be small.
Although some commenters assert that a disclosure rule will impose
significant burdens on broadband providers, no commenter cites any
particular source of increased costs, or attempts to estimate costs of
compliance. For a number of reasons, we believe that the costs of the
disclosure rule we adopt in this Order are outweighed by the benefits
of empowering end users to make informed choices and of facilitating
the enforcement of the other open Internet rules. First, we require
only that providers post disclosures on their Web sites and at the
point of sale, not that they bear the cost of printing and distributing
bill inserts or other paper documents to all existing customers.
Second, although we may subsequently determine that it is appropriate
to require that specific information be disclosed in particular ways,
the transparency rule we adopt in this Order gives broadband providers
flexibility to determine what information to disclose and how to
disclose it. We also expressly exclude from the rule competitively
sensitive information, information that would compromise network
security, and information that would undermine the efficacy of
reasonable network management practices. Third, by setting the
effective date of these rules as November 20, 2011, we give broadband
providers adequate time to develop cost effective methods of
compliance. Thus, the rule gives broadband providers--including small
entities--sufficient time and flexibility to implement the rules in a
cost-effective manner. Finally, these rules provide certainty and
clarity that are beneficial both to broadband providers and to their
customers.
Report to Congress
    The Commission has sent a copy of the Order, including this FRFA,
in a report to Congress and the Government Accountability Office
pursuant to the Congressional Review Act. In addition, the Commission
will send a copy of the Order, including this FRFA, to the Chief
Counsel for Advocacy of the SBA.

B. Paperwork Reduction Act of 1995 Analysis

    This document contains new information collection requirements
subject to the Paperwork Reduction Act of 1995 (PRA), Public Law 104-
13.

C. Congressional Review Act

    The Commission has sent a copy of this Report and Order to Congress
and the Government Accountability Office pursuant to the Congressional
Review Act, see 5 U.S.C. 801(a)(1)(A).

D. Data Quality Act

    The Commission certifies that it has complied with the Office of
Management and Budget Final Information Quality Bulletin for Peer
Review, 70 FR 2664, January 14 (2005), and the Data Quality Act, Public
Law 106-554 (2001), codified at 44 U.S.C. 3516 note, with regard to its
reliance on influential scientific information in the Report and Order
in GN Docket No. 09-191 and WC Docket No. 07-52.

E. Accessible Formats

    To request materials in accessible formats for people with
disabilities (braille, large print, electronic files, audio format),
send an e-mail to fcc504@fcc.gov or call the Consumer & Governmental
Affairs Bureau at 202-418-0530 (voice), 202-418-0432 (tty). Contact the
FCC to request reasonable accommodations for filing comments
(accessible format documents, sign language interpreters, CARTS, etc.)
by e-mail: FCC504@fcc.gov; phone: (202) 418-0530 (voice), (202) 418-
0432 (TTY).

VIII. Ordering Clauses

    Accordingly, it is ordered that, pursuant to Sections 1, 2, 3, 4,
201, 218, 230, 251, 254, 256, 257, 301, 303, 304, 307, 309, 316, 332,
403, 503, 602, 616, and 628, of the Communications Act of 1934, as
amended, and Section 706 of the Telecommunications Act of 1996, as
amended, 47 U.S.C. secs. 151, 152, 153, 154, 201, 218, 230, 251, 254,
256, 257, 301, 303, 304, 307, 309, 316, 332, 403, 503, 522, 536, 548,
1302, this Report and Order is adopted.
    It is further ordered that Part 0 of the Commission's rules is
amended as set forth in Appendix B.
    It is further ordered that Part 8 of the Commission's Rules, 47 CFR
Part 8, is added as set forth in Appendix A and B.
    It is further ordered that this Report and Order shall become
effective November 20, 2011.
    It is further ordered that the Commission's Consumer and
Governmental Affairs Bureau, Reference Information Center, shall send a
copy of this Report and Order, including the Final Regulatory
Flexibility Analysis, to the Chief Counsel for Advocacy of the Small
Business Administration.

List of Subjects

47 CFR Part 0

    Cable television, Communications, Common carriers, Communications
common carriers, Radio, Satellites, Telecommunications, Telephone.

[[Page 59232]]

47 CFR Part 8

    Cable television, Communications, Common carriers, Communications
common carriers, Radio, Satellites, Telecommunications, Telephone.

Federal Communications Commission.
Marlene H. Dortch,
Secretary.
    For the reasons discussed in the preamble, the Federal
Communications Commission amends 47 CFR part 0 to read as follows:

PART 0--COMMISSION ORGANIZATION

0
1. The authority citation for part 0 continues to read as follows:

    Authority: Sec. 5, 48 Stat. 1068, as amended; 47 U.S.C. 155,
225, unless otherwise noted.

0
2. Section 0.111 is amended by adding paragraph (a)(24) to read as
follows:

Sec.  0.111  Functions of the Bureau.

    (a) * * *
    (24) Resolve complaints alleging violations of the open Internet
rules.
* * * * *

0
3. Add part 8 to read as follows:

PART 8--PRESERVING THE OPEN INTERNET

Sec.
8.1 Purpose.
8.3 Transparency.
8.5 No Blocking.
8.7 No Unreasonable Discrimination.
8.9 Other Laws and Considerations.
8.11 Definitions.
8.12 Formal Complaints.
8.13 General pleading requirements.
8.14 General formal complaint procedures.
8.15 Status conference.
8.16 Confidentiality of proprietary information.
8.17 Review.

    Authority: 47 U.S.C. secs. 151, 152, 153, 154, 201, 218, 230,
251, 254, 256, 257, 301, 303, 304, 307, 309, 316, 332, 403, 503,
522, 536, 548, 1302.

Sec.  8.1  Purpose.

    The purpose of this part is to preserve the Internet as an open
platform enabling consumer choice, freedom of expression, end-user
control, competition, and the freedom to innovate without permission.

Sec.  8.3  Transparency.

    A person engaged in the provision of broadband Internet access
service shall publicly disclose accurate information regarding the
network management practices, performance, and commercial terms of its
broadband Internet access services sufficient for consumers to make
informed choices regarding use of such services and for content,
application, service, and device providers to develop, market, and
maintain Internet offerings.

Sec.  8.5  No Blocking.

    (a) A person engaged in the provision of fixed broadband Internet
access service, insofar as such person is so engaged, shall not block
lawful content, applications, services, or non-harmful devices, subject
to reasonable network management.
    (b) A person engaged in the provision of mobile broadband Internet
access service, insofar as such person is so engaged, shall not block
consumers from accessing lawful Web sites, subject to reasonable
network management; nor shall such person block applications that
compete with the provider's voice or video telephony services, subject
to reasonable network management.

Sec.  8.7  No Unreasonable Discrimination.

    A person engaged in the provision of fixed broadband Internet
access service, insofar as such person is so engaged, shall not
unreasonably discriminate in transmitting lawful network traffic over a
consumer's broadband Internet access service. Reasonable network
management shall not constitute unreasonable discrimination.

Sec.  8.9  Other Laws and Considerations.

    (a) Nothing in this part supersedes any obligation or authorization
a provider of broadband Internet access service may have to address the
needs of emergency communications or law enforcement, public safety, or
national security authorities, consistent with or as permitted by
applicable law, or limits the provider's ability to do so.
    (b) Nothing in this part prohibits reasonable efforts by a provider
of broadband Internet access service to address copyright infringement
or other unlawful activity.

Sec.  8.11  Definitions.

    (a) Broadband Internet access service. A mass-market retail service
by wire or radio that provides the capability to transmit data to and
receive data from all or substantially all Internet endpoints,
including any capabilities that are incidental to and enable the
operation of the communications service, but excluding dial-up Internet
access service. This term also encompasses any service that the
Commission finds to be providing a functional equivalent of the service
described in the previous sentence, or that is used to evade the
protections set forth in this part.
    (b) Fixed broadband Internet access service. A broadband Internet
access service that serves end users primarily at fixed endpoints using
stationary equipment. Fixed broadband Internet access service includes
fixed wireless services (including fixed unlicensed wireless services),
and fixed satellite services.
    (c) Mobile broadband Internet access service. A broadband Internet
access service that serves end users primarily using mobile stations.
    (d) Reasonable network management. A network management practice is
reasonable if it is appropriate and tailored to achieving a legitimate
network management purpose, taking into account the particular network
architecture and technology of the broadband Internet access service.

Sec.  8.12  Formal Complaints.

    Any person may file a formal complaint alleging a violation of the
rules in this part.

Sec.  8.13  General pleading requirements.

    (a) General pleading requirements. All written submissions, both
substantive and procedural, must conform to the following standards:
    (1) A pleading must be clear, concise, and explicit. All matters
concerning a claim, defense or requested remedy should be pleaded fully
and with specificity.
    (2) Pleadings must contain facts that, if true, are sufficient to
warrant a grant of the relief requested.
    (3) Facts must be supported by relevant documentation or affidavit.
    (4) The original of all pleadings and submissions by any party
shall be signed by that party, or by the party's attorney. Complaints
must be signed by the complainant. The signing party shall state his or
her address and telephone number and the date on which the document was
signed. Copies should be conformed to the original. Each submission
must contain a written verification that the signatory has read the
submission and to the best of his or her knowledge, information and
belief formed after reasonable inquiry, it is well grounded in fact and
is warranted by existing law or a good faith argument for the
extension, modification or reversal of existing law; and that it is not
interposed for any improper purpose. If any pleading or other
submission is signed in violation of this provision, the Commission
shall upon motion or upon its own initiative impose appropriate
sanctions.
    (5) Legal arguments must be supported by appropriate judicial,
Commission, or statutory authority.

[[Page 59233]]

Opposing authorities must be distinguished. Copies must be provided of
all non-Commission authorities relied upon which are not routinely
available in national reporting systems, such as unpublished decisions
or slip opinions of courts or administrative agencies.
    (6) Parties are responsible for the continuing accuracy and
completeness of all information and supporting authority furnished in a
pending complaint proceeding. Information submitted, as well as
relevant legal authorities, must be current and updated as necessary
and in a timely manner at any time before a decision is rendered on the
merits of the complaint.
    (7) Parties seeking expedited resolution of their complaint may
request acceptance on the Enforcement Bureau's Accelerated Docket
pursuant to the procedures at Sec.  1.730 of this chapter.
    (b) Copies to be Filed. The complainant shall file an original copy
of the complaint, accompanied by the correct fee, in accordance with
part 1, subpart G (see Sec.  1.1106 of this chapter) and, on the same
day:
    (1) File three copies of the complaint with the Office of the
Commission Secretary;
    (2) Serve two copies on the Market Disputes Resolution Division,
Enforcement Bureau;
    (3) Serve the complaint by hand delivery on either the named
defendant or one of the named defendant's registered agents for service
of process, if available, on the same date that the complaint is filed
with the Commission.
    (c) Prefiling notice required. Any person intending to file a
complaint under this section must first notify the potential defendant
in writing that it intends to file a complaint with the Commission
based on actions alleged to violate one or more of the provisions
contained in this part. The notice must be sufficiently detailed so
that its recipient(s) can determine the specific nature of the
potential complaint. The potential complainant must allow a minimum of
ten (10) days for the potential defendant(s) to respond before filing a
complaint with the Commission.
    (d) Frivolous pleadings. It shall be unlawful for any party to file
a frivolous pleading with the Commission. Any violation of this
paragraph shall constitute an abuse of process subject to appropriate
sanctions.

Sec.  8.14  General formal complaint procedures.

    (a) Complaints. In addition to the general pleading requirements,
complaints must adhere to the following requirements:
    (1) Certificate of service. Complaints shall be accompanied by a
certificate of service on any defendant.
    (2) Statement of relief requested--(i) The complaint shall state
the relief requested. It shall state fully and precisely all pertinent
facts and considerations relied on to demonstrate the need for the
relief requested and to support a determination that a grant of such
relief would serve the public interest.
    (ii) The complaint shall set forth all steps taken by the parties
to resolve the problem.
    (iii) A complaint may, on request of the filing party, be dismissed
without prejudice as a matter of right prior to the adoption date of
any final action taken by the Commission with respect to the petition
or complaint. A request for the return of an initiating document will
be regarded as a request for dismissal.
    (3) Failure to prosecute. Failure to prosecute a complaint, or
failure to respond to official correspondence or request for additional
information, will be cause for dismissal. Such dismissal will be
without prejudice if it occurs prior to the adoption date of any final
action taken by the Commission with respect to the initiating pleading.
    (b) Answers to complaints. Unless otherwise directed by the
Commission, any party who is served with a complaint shall file an
answer in accordance with the following requirements:
    (1) The answer shall be filed within 20 days of service of the
complaint.
    (2) The answer shall advise the parties and the Commission fully
and completely of the nature of any and all defenses, and shall respond
specifically to all material allegations of the complaint. Collateral
or immaterial issues shall be avoided in answers and every effort
should be made to narrow the issues. Any party against whom a complaint
is filed failing to file and serve an answer within the time and in the
manner prescribed by these rules may be deemed in default and an order
may be entered against defendant in accordance with the allegations
contained in the complaint.
    (3) Facts must be supported by relevant documentation or affidavit.
    (4) The answer shall admit or deny the averments on which the
adverse party relies. If the defendant is without knowledge or
information sufficient to form a belief as to the truth of an averment,
the defendant shall so state and this has the effect of a denial. When
a defendant intends in good faith to deny only part of an averment, the
answer shall specify so much of it as is true and shall deny only the
remainder, and state in detail the basis of that denial.
    (5) Averments in a complaint are deemed to be admitted when not
denied in the answer.
    (c) Reply. In addition to the general pleading requirements,
replies must adhere to the following requirements:
    (1) The complainant may file a reply to a responsive pleading that
shall be served on the defendant and shall also contain a detailed full
showing, supported by affidavit, of any additional facts or
considerations relied on. Unless expressly permitted by the Commission,
replies shall not contain new matters.
    (2) Failure to reply will not be deemed an admission of any
allegations contained in the responsive pleading, except with respect
to any affirmative defense set forth therein.
    (3) Unless otherwise directed by the Commission, replies must be
filed within ten (10) days after submission of the responsive pleading.
    (d) Motions. Except as provided in this section, or upon a showing
of extraordinary circumstances, additional motions or pleadings by any
party will not be accepted.
    (e) Additional procedures and written submissions. (1) The
Commission may specify other procedures, such as oral argument or
evidentiary hearing directed to particular aspects, as it deems
appropriate. In the event that an evidentiary hearing is required, the
Commission will determine, on the basis of the pleadings and such other
procedures as it may specify, whether temporary relief should be
afforded any party pending the hearing and the nature of any such
temporary relief.
    (2) The Commission may require the parties to submit any additional
information it deems appropriate for a full, fair, and expeditious
resolution of the proceeding, including copies of all contracts and
documents reflecting arrangements and understandings alleged to violate
the requirements set forth in the Communications Act and in this part,
as well as affidavits and exhibits.
    (3) The Commission may, in its discretion, require the parties to
file briefs summarizing the facts and issues presented in the pleadings
and other record evidence.
    (i) These briefs shall contain the findings of fact and conclusions
of law which that party is urging the Commission to adopt, with
specific citations to the record, and supported by relevant authority
and analysis.
    (ii) The schedule for filing any briefs shall be at the discretion
of the Commission. Unless ordered otherwise

[[Page 59234]]

by the Commission, such briefs shall not exceed fifty (50) pages.
    (iii) Reply briefs may be submitted at the discretion of the
Commission. Unless ordered otherwise by the Commission, reply briefs
shall not exceed thirty (30) pages.
    (f) Discovery. (1) The Commission may in its discretion order
discovery limited to the issues specified by the Commission. Such
discovery may include answers to written interrogatories, depositions,
document production, or requests for admissions.
    (2) The Commission may in its discretion direct the parties to
submit discovery proposals, together with a memorandum in support of
the discovery requested. Such discovery requests may include answers to
written interrogatories, admissions, document production, or
depositions. The Commission may hold a status conference with the
parties, pursuant to Sec.  8.15, to determine the scope of discovery,
or direct the parties regarding the scope of discovery. If the
Commission determines that extensive discovery is required or that
depositions are warranted, the Commission may advise the parties that
the proceeding will be referred to an administrative law judge in
accordance with paragraph (g) of this section.
    (g) Referral to administrative law judge. (1) After reviewing the
pleadings, and at any stage of the proceeding thereafter, the
Commission may, in its discretion, designate any proceeding or discrete
issues arising out of any proceeding for an adjudicatory hearing before
an administrative law judge.
    (2) Before designation for hearing, the Commission shall notify,
either orally or in writing, the parties to the proceeding of its
intent to so designate, and the parties shall be given a period of ten
(10) days to elect to resolve the dispute through alternative dispute
resolution procedures, or to proceed with an adjudicatory hearing. Such
election shall be submitted in writing to the Commission.
    (3) Unless otherwise directed by the Commission, or upon motion by
the Enforcement Bureau Chief, the Enforcement Bureau Chief shall not be
deemed to be a party to a proceeding designated for a hearing before an
administrative law judge pursuant to this paragraph (g).
    (h) Commission ruling. The Commission (or the Enforcement Bureau on
delegated authority), after consideration of the pleadings, shall issue
an order ruling on the complaint.

Sec.  8.15  Status conference.

    (a) In any proceeding subject to the part 8 rules, the Commission
may in its discretion direct the attorneys and/or the parties to appear
for a conference to consider:
    (1) Simplification or narrowing of the issues;
    (2) The necessity for or desirability of amendments to the
pleadings, additional pleadings, or other evidentiary submissions;
    (3) Obtaining admissions of fact or stipulations between the
parties as to any or all of the matters in controversy;
    (4) Settlement of the matters in controversy by agreement of the
parties;
    (5) The necessity for and extent of discovery, including objections
to interrogatories or requests for written documents;
    (6) The need and schedule for filing briefs, and the date for any
further conferences; and
    (7) Such other matters that may aid in the disposition of the
proceeding.
    (b) Any party may request that a conference be held at any time
after an initiating document has been filed.
    (c) Conferences will be scheduled by the Commission at such time
and place as it may designate, to be conducted in person or by
telephone conference call.
    (d) The failure of any attorney or party, following advance notice
with an opportunity to be present, to appear at a scheduled conference
will be deemed a waiver and will not preclude the Commission from
conferring with those parties or counsel present.
    (e) During a status conference, the Commission may issue oral
rulings pertaining to a variety of matters relevant to the conduct of
the proceeding including, inter alia, procedural matters, discovery,
and the submission of briefs or other evidentiary materials. These
rulings will be promptly memorialized in writing and served on the
parties. When such rulings require a party to take affirmative action,
such action will be required within ten (10) days from the date of the
written memorialization unless otherwise directed by the Commission.

Sec.  8.16  Confidentiality of proprietary information.

    (a) Any materials filed in the course of a proceeding under this
part may be designated as proprietary by that party if the party
believes in good faith that the materials fall within an exemption to
disclosure contained in the Freedom of Information Act (FOIA), 5 U.S.C.
552(b). Any party asserting confidentiality for such materials shall so
indicate by clearly marking each page, or portion thereof, for which a
proprietary designation is claimed. If a proprietary designation is
challenged, the party claiming confidentiality will have the burden of
demonstrating, by a preponderance of the evidence, that the material
designated as proprietary falls under the standards for nondisclosure
enunciated in FOIA.
    (b) Submissions containing information claimed to be proprietary
under this section shall be submitted to the Commission in confidence
pursuant to the requirements of Sec.  0.459 of this chapter and clearly
marked ``Not for Public Inspection.'' An edited version removing all
proprietary data shall be filed with the Commission for inclusion in
the public file within five (5) days from the date the unedited reply
is submitted, and shall be served on the opposing parties.
    (c) Except as provided in paragraph (d) of this section, materials
marked as proprietary may be disclosed solely to the following persons,
only for use in the proceeding, and only to the extent necessary to
assist in the prosecution or defense of the case:
    (1) Counsel of record representing the parties in the proceeding
and any support personnel employed by such attorneys;
    (2) Officers or employees of the parties in the proceeding who are
named by another party as being directly involved in the proceeding;
    (3) Consultants or expert witnesses retained by the parties;
    (4) The Commission and its staff; and
    (5) Court reporters and stenographers in accordance with the terms
and conditions of this section.
    (d) The Commission will entertain, subject to a proper showing, a
party's request to further restrict access to proprietary information
as specified by the party. The other parties will have an opportunity
to respond to such requests.
    (e) The persons designated in paragraphs (c) and (d) of this
section shall not disclose information designated as proprietary to any
person who is not authorized under this section to receive such
information, and shall not use the information in any activity or
function other than the prosecution or defense of the case before the
Commission. Each individual who is provided access to the information
by the opposing party shall sign a notarized statement affirmatively
stating, or shall certify under penalty of perjury, that the individual
has personally reviewed the Commission's rules and understands the
limitations they impose on the signing party.
    (f) No copies of materials marked proprietary may be made except
copies

[[Page 59235]]

to be used by persons designated in paragraphs (c) and (d) of this
section. Each party shall maintain a log recording the number of copies
made of all proprietary material and the persons to whom the copies
have been provided.
    (g) Upon termination of the complaint proceeding, including all
appeals and petitions, all originals and reproductions of any
proprietary materials, along with the log recording persons who
received copies of such materials, shall be provided to the producing
party. In addition, upon final termination of the proceeding, any notes
or other work product derived in whole or in part from the proprietary
materials of an opposing or third party shall be destroyed.

Sec.  8.17  Review.

    (a) Interlocutory review. (1) Except as provided below, no party
may seek review of interlocutory rulings until a decision on the merits
has been issued by the Commission's staff, including an administrative
law judge.
    (2) Rulings listed in this paragraph are reviewable as a matter of
right. An application for review of such ruling may not be deferred and
raised as an exception to a decision on the merits.
    (i) If the staff's ruling denies or terminates the right of any
person to participate as a party to the proceeding, such person, as a
matter of right, may file an application for review of that ruling.
    (ii) If the staff's ruling requires production of documents or
other written evidence, over objection based on a claim of privilege,
the ruling on the claim of privilege is reviewable as a matter of
right.
    (iii) If the staff's ruling denies a motion to disqualify a staff
person from participating in the proceeding, the ruling is reviewable
as a matter of right.
    (b) Petitions for reconsideration. Petitions for reconsideration of
interlocutory actions by the Commission's staff or by an administrative
law judge will not be entertained. Petitions for reconsideration of a
decision on the merits made by the Commission's staff should be filed
in accordance with Sec. Sec.  1.104 through 1.106 of this chapter.
    (c) Application for review. (1) Any party to a part 8 proceeding
aggrieved by any decision on the merits issued by the staff pursuant to
delegated authority may file an application for review by the
Commission in accordance with Sec.  1.115 of this chapter.
    (2) Any party to a part 8 proceeding aggrieved by any decision on
the merits by an administrative law judge may file an appeal of the
decision directly with the Commission, in accordance with Sec. Sec.
1.276(a) and 1.277(a) through (c) of this chapter.

[FR Doc. 2011-24259 Filed 9-22-11; 8:45 am]
BILLING CODE 6712-01-P

TOP-SECRET – Operación Clandestina de la Inteligencia Militar Argentina en México

pf

 

Una escuadra del Área de Inteligencia 121 dirigido por el General Galtieri intentó matar a la dirigencia Montonera radicada en la capital azteca

 

National Security Archive Electronic Briefing Book No. 241

 

 

 

Washington D.C., Septiembre 23, 2011 –Documentos hechos públicos hoy por el National Security Archive revelan como agentes de un escuadrón de inteligencia argentino fueron capturados por el servicio secreto mexicano  y “expulsados por espionaje a los [exilados] Montoneros radicados en México”, en enero de 1978. Aunque la prensa de la época denunció las operaciones encubiertas de los argentinos para asesinar a la dirigencia Montonera, no es hasta hoy que documentos oficiales de lo que fuera la Dirección Federal de Seguridad (DFS) de México, revelan que cuatro agentes del Área de Operaciones 121 de Rosario, Argentina, fueron “enviados por las autoridades militares de su país”.

 

Entre los documentos públicos hoy resaltan las fichas con fotografías de “Manuel Augusto Pablo Funes,  Teniente del Área de Inteligencia 121 del Ejercito Argentino” y de “Miguel Vila Adelaida, elemento civil del Área de Inteligencia 121 del Ejercito Argentino”,  al momento de ser interrogados y registrados por la DFS  el 19 de Enero de 1978.

 

La documentación hecha pública hoy confirma los pocos testimonios sobre este evento que parecían hasta hoy remotos. El 14 de enero de 1978, los oficiales del Area de Operaciones 121 en Rosario, Argentina, Rubén Fariña, Daniel Amelong y Jorge Cabrera, junto a dos Montoneros arrepentidos, Carlos Laluf y Tulio Valenzuela viajaron desde Argentina hacia México a fin de asesinar a la dirigencia de Montoneros en Ciudad de México. El grupo viajaba con los nombres ficticios Eduardo Ferrer, Pablo Funes, Carlos Carabetta, Miguel Vila y Jorge Cattone respectivamente.

 

Sin embargo, una vez en la capital azteca, Tulio Valenzuela escapa del control del escuadrón de inteligencia argentino y denuncia la maniobra en conferencia de prensa el 18 de enero de 1978. Las autoridades Mexicanas capturan a Daniel Amelong y al Montonero arrepentido Carlos Laluf cuyas fotos se reproducen aquí arriba con sus nombres falsos y el 21 de enero los expulsan junto a Fariña y Cabrera. El DFS registra que  “El día de hoy en el vuelo 621 de la compañía Aeroperu que salió del Aeropuerto Internacional ‘Benito Juárez’ de la Ciudad de México… salieron los siguientes pasajeros de nacionalidad argentina:  Manuel Augusto Pablo Funes… Miguel Vila… Eduardo Mario Ferrer Márquez… Carlos Alberto Carabetta”.

 

Lo que se que conoce hoy como Operación México fue contado por primera vez en el libro Recuerdo de La Muerte del autor Miguel Bonasso, quien se nutrió de los relatos de Tulio Valenzuela y del único sobreviviente del campo de prisioneros en el Area de Inteligencia 121, Jaime Dri.

 

Los documentos aquí publicados fueron descubiertos recientemente gracias a la colaboración de la investigadora mexicana Susana Zavala, y en cooperación entre el Proyecto de Documentación de México y el del Cono Sur del National Security Archive. Los documentos provienen del fondo del Centro de Investigación y Seguridad Nacional (CISEN) en el Archivo General de la Nación de México.

 

Para mejor ilustrar los eventos, hemos acompañado la selección de cuatro documentos del DFS, con un documento obtenido en Estados Unidos y un recorte del periódico Unomasuno.

 

 


Documentos
Los documentos están en formato PDF.
Se necesita bajar e instalar el programa gratuito Adobe Acrobat Reader para visionarlos.

 

 

Enero 18, 1978 – Testimonio del compañero Tulio Valenzuela Sobre la Campaña de Atentados en el Exterior de la Dictadura de Videla

 

La dirección de los insurgentes argentinos Montoneros exilados en México hace una conferencia de prensa para denunciar actividades clandestinas de militares argentinos en Ciudad de México que apuntaban a asesinar a su dirigencia. En la conferencia de prensa, Tulio Valenzuela (Tucho) cuenta como fue capturado en Argentina a principios de enero, y llevado a un centro clandestino de detención del Área de Inteligencia 121 llamado Quinta de Funes, en la ciudad de Rosario, Argentina. Allí, el Jefe de la zona militar, Leopoldo Fortunato Galtieri le planteó traicionar a los Montoneros, fingir que no había sido capturado y viajar a México con agentes de inteligencia del ejército para infiltrar a Montoneros. Tulio fingió asentir con la colaboración con el ejército y una vez en México contactó a sus camaradas y denunció la maniobra de inteligencia.

 

Valenzuela informa que más de una docena de otros Montoneros que se pensaban muertos, están realmente detenidos en Quinta de Funes. Entre los allí detenidos  se encuentra su esposa e hijo que han quedado como rehenes. Además informa que otro líder Montonero desaparecido, Jaime Dri, está con vida y detenido en el mismo centro clandestino en Rosario.

 

En su informe, Tucho lista a los militares que vinieron con el para la operación en Ciudad de México: el jefe de la Quinta de Funes quien lleva el documento falso de apellido Ferrer, un agente del Área 121 con el nombre falso Carabetta, un teniente que el solo conoce como Daniel, y un montonero traidor, Carlos Laluf, que viene con el nombre falso “Miguel Vila”.*

 

Enero 19, 1978 – La junta argentina envía agentes a México para asesinar dirigentes exilados

[Reproducido gracias a la gentileza de Unomásuno]

 

El diario mexicano Unomásuno publica un artículo describiendo la denuncia de Tulio Valenzuela el día anterior. Esta copia de articulo fue producida seguramente para informar al “Director General, Manuel Becerra Acosta” de la Dirección Federal de Seguridad (DFS) de México, sobre la actividad clandestina de los militares argentinos en México

 

Enero 19, 1978 – [Fichas de agentes argentinos]

 

La Dirección Federal de Seguridad logró seguir la pista y capturar a dos de los cuatro agentes de inteligencia que operaban clandestinamente junto a Tulio Valenzuela. Las fichas del DFS con fotografías de los agentes argentinos los describen con sus  nombres falsos “Manuel Augusto Pablo Funes, Teniente del Área de Inteligencia 121 del Ejército argentino” y “Miguel Vila Adelaida, Elemento Civil del Area de Inteligencia 121 del Ejército argentino”. En entrevista con el sobreviviente Jaime Dri, el National Security Archive pudo confirmar que se trata en realidad del Teniente Daniel Amelong y el Montonero colaborador del ejército Carlos Laluf. Según se sabe por testigos en los juicios contra los comandantes del Area de Inteligencia 121, en Argentina, el mismo día de la captura de Amelong y Laluf, los otros dos agentes, Rubén Fariña y Jorge Cabrera se refugiaron en la Embajada Argentina en México cuando vieron a sus colegas  ser apresados por la DFS.

 

Enero 19, 1978 – Detención de Elementos de Inteligencia del Ejército Argentino, en México

 

En estas seis  páginas producidas como resultado del interrogatorio al que fueron sometidos el Teniente Amelong y Laluf por la seguridad mexicana, estos confirman que “fueron enviados por las autoridades militares de su país” para infiltrar a Montoneros. Utilizando sus nombres ficticios, Augusto Pablo Funes Patinlynch y Miguel Vila Adelaida, el testimonio de Amelong y Laluf es un collage de verdades a medias y mentiras. Niegan por ejemplo tener intenciones de asesinar a la dirigencia Montonero en Ciudad de México. Sin embargo, confirmando las declaraciones de Tulio Valenzuela que el Ejército Argentino mantenía como rehén su esposa, reconocen que habían logrado “convencer a los militantes detenidos [en Argentina], de que colaboren con el gobierno… con ciertas medidas de presión moral y principalmente relacionados con sus familias.”

 

Enero 20, 1978No Controlo a mis agentes que están fuera del país: Galtieri

[Reproducido gracias a la gentileza de Unomásuno]

 

Alertado por las declaraciones de Valenzuela, el periodista del diario Unomásuno, German Ramos Navas, llamó por teléfono a Quinta de Funes para confirmar la historia. Frente a la sorpresiva entrevista del periodista, dice este artículo, el militar de inteligencia argentino no supo decir más que “no tengo control de mis agentes fuera del país”.  Entre otras, el periodista Mexicano disparó al militar argentino al teléfono: “Ustedes tienen detenido al hijo de Valenzuela”. En seguida, dice el periódico, el agente “nervioso y preocupado ante la inesperada llamada, titubeó notoriamente antes de negar que conocía a Manuel Vila o Carlos Laluf. Su nerviosismo y desconcierto fueron en aumento, al ser interrogado sobre su relación con ‘Ferrer’ y Carabetta’, nombres falsos de otros dos agentes de la junta integrantes del operativo.”  Testimonios en Argentina, dicen que el día de la llamada, el oficial del Área de Inteligencia 121 que contestó, ya recuperado negó todo y cortó la comunicación. El oficial a cargo, apellidado Guerrieri, fue probablemente tomado  por el diario como el Comandante y responsable del Área Militar Fortunato Galtieri.

 

 

Enero 21, 1978 – [Expulsión de agentes argentinos]

 

Luego de sostener conversaciones con la Embajada Argentina en México, donde se habían refugiado dos de los agentes, tres días después de la captura, un informe de la Dirección Federal de Seguridad de México reportaba que Amelong y  Laluf, junto a sus cómplices Fariña y Cabrera, eran “expulsados por espionaje a los Montoneros radicados en México”.  En el documento, los cuatro agentes argentinos del Área de Inteligencia 121 son llamados por sus aliases, Pablo Funes, Miguel Vila Adelaida, y los otros dos, Eduardo Mario Ferrer Márquez y Carlos Alberto Carabetta. El crudo informe mexicano prosigue: “A la sala de abordaje del aeropuerto llegaron para entrevistarse con esos elementos, Fernando Daniel Diego, hijo del Coronel Fernando Diego, Agregado Militar de la Embajada de Argentina en nuestro país; el propio militar y Aldo Mario de la Fuente, Agregado Administrativo de la Embajada Argentina en México.”

 

[Fe de errata- Hemos recibido información del historiador argentino Alvaro Villagrán que Carlos Gomez Centurión no servía como embajador argentino en México en enero de 1978. Según artículos de la época, del diario La Nación, el embajador anterior había regresado a Argentina por razones de salud en diciembre de 1977, quedando la embajada acéfala. Los artículos, que fueron proveídos por Alvaro Villagrán, dicen que Juan Giménez, el encargado de negocios de la embajada, quedo como  responsable de la delegación argentina a partir de diciembre de 1977 y que Carlos Gómez Centurión fue designado Embajador en mayo de 1978.]

 

 

*Nota: Esta es una recopilación escrita producida por Montoneros del testimonio y declaración de Tulio Valenzuela en Ciudad de México y repartido en conferencia de prensa. El National Security Archive lo encontró entre los 4677 documentos desclasificados por el Departamento de Estado de EEUU en 2002. El documento era parte de una serie de correspondencias entre Olimpia Díaz y la Embajada de EEUU en Panamá, en sus gestiones por ubicar y liberar a su esposo  Jaime Dri. El documento  se considera “desclasificado” pues aunque su origen es otro, según la ley de acceso a la información de EEUU, todo documento que “está en posesión” de una agencia del gobierno de EEUU, está sujeto a ser clasificado o desclasificado.

Gastbeitrag: WIE AUCH SIE “GoMoPa”-Rufmordopfer werden können


hacker Presse Info: Wie Auch Sie GoMoPa STASI Rufmordopfer werden können

Liebe Leserin, lieber Leser!

Stellen Sie sich bitte kurz vor, dass Sie mit einer tollen Geschäftsidee oder einer Geschäftserweiterung zu mehr Geld kommen möchten. Beispielsweise auch Ihr Unternehmen vergrössern oder gar Ihre Waren exportieren wollen.

Sie werben damit natürlich über die Medien….

Da meldet sich bei Ihnen möglicherweise ein Beauftragter des Finanz-Nachrichtendienstes GoMoPamit der Mitteilung, dass im GoMoPa-Forum sehr negative Forenbeiträge über Ihre Person oder Ihr Vorhaben stünden. Äusserst Schlimmes wir über Sie berichtet. Zum Beispiel, dass Sie bisher schonIhr Geld mit betrügerischen Machenschaften verdient hätten oder Ihr Sohn als erfolgreicher Sportler nach neuesten Ermittlungen in einem Kokain-Dealer-Ring verwickelt sei.

Ein anonymer User ( Schreiberling) habe dies geschrieben, wird vom GoMoPa-Beauftragten berichtet. Man könne jetzt noch nicht feststellen, ob dies so wahr sei. Man könne aber auch nicht den Beitrag einfach rausnehmen, denn es könne ja auch was Wahres daran sein!

Falls Sie selbst an der Wahrheitsfindung interessiert seien, könnten Sie auch beim ´seriösen Nachrichtendienst` GoMoPa als Gesellschafter oder als Premium-Mitglied einsteigen, dann könne man ja…..usf. …ganz einfach den Beitrag herausnehmen!

So ähnlich könnte es geschehen und glauben Sie mir: ´Dies ist kein böser Traum,-keine Fata Morgana`, sondern schon Zigtausendmal in der fast 10-Jährigen GoMoPa- Geschichte so abgelaufen.

Wir, von der CSA-Agency, wurden selbst aus Wettbewerbsgründen seit 2002 von GoMoPa auf primitivste Weise im Forum diffamiert oder die von uns als seriöse Dienstleister empfohlenen Unternehmungen wurden per Rufmord mit schmutzigsten, unwahren Verleumdungs-Attacken vonanonymen Bloggern ( bezahlte Helfershelfer vom GoMoPa) nahezu ruiniert. Nicht nur finanziell , sondern auch gesundheitlich nieder gemacht! Nicht umsonst heisst es RUFMORD.

Der Begriff ´Stalking` ist da noch eine vornehme Bezeichnung.

Auf gut deutsch passt Rufmord besser.

Geschäftlicher und gesundheitlicher RUFMORD gehört auch entsprechend bestraft.

Die Justiz tut sich sehr schwer damit. Vor allem, wenn die Rufmörder mit Ihren Machenschaften mit Gesellschaften wie z.B. ´GoMoPa` als Briefkastenfirma aus dem Ausland agieren. UND zum anderen, weil sich die Stalking-Terror-Experten von GoMoPa sich mit ihren Methoden auch der Justiz und der Medien bedienen.

TOP-SECRET – Confirmed Identity of the CIA Official behind 9/11, Rendition & Torture Cases is Revealed

BFP Breaking News: Confirmed Identity of the CIA Official behind 9/11, Rendition & Torture Cases is Revealed

Wednesday, 21. September 2011 by Sibel Edmonds

Alfreda Frances Bikowsky: The Current Director of the CIA Global Jihad Unit

BNBoiling Frogs Post has now confirmed the identity of the CIA analyst at the heart of a notorious failure in the run-up to the September 11th tragedy. Her name is Alfreda Frances Bikowsky and she is the current director of the CIA Jihad Unit. Through three credible sources and documents we have confirmed Ms. Bikowsky’s former titles and positions, including her start at the CIA as an analyst for the Soviet Desk, her position as one of the case officers at the CIA’s Bin Laden Unit-Alec Station, her central role and direct participation in the CIA’s rendition-torture and black sites operations, and her current position as director of the CIA’s Global Jihad Unit.

The producers Nowosielski and Duffy have now made both names available at their website. They also identify the second CIA culprit as Michael Anne Casey. We have not been able to obtain confirmation by other sources on this person yet, but we are still working on it.

Alfreda Frances Bikowsky is the person described in New Yorker journalist Jane Mayer’s book The Dark Side as having flown in to watch the waterboarding of terrorist Khalid Sheikh Mohammad without being assigned to do so. “Its not supposed to be entertainment,” superiors were said to have told her. She was also at the center of “the el-Masri incident,” in which an innocent German citizen was kidnapped by the CIA in 2003 and held under terrible conditions without charges for five months in a secret Afghan prison. The AP characterized it as “one of the biggest diplomatic embarrassments of the U.S. war on terrorism.”

Both the previous and current administrations appear to have deemed Alfreda Frances Bikowsky’s direct involvement in intentional obstruction of justice, intentional cover up, lying to Congress, and overseeing rendition-kidnapping-torture practices as qualifying factors to have kept promoting her. She now leads the CIA’s Global Jihad Unit and is a close advisor to the President.

TOP-SECRET – State Dept Background Briefing on Nuclear Safety

Background Briefing: Preview of High-Level Meeting on Nuclear Safety

Special Briefing

Via Teleconference

Washington, DC

September 21, 2011

MODERATOR: Thank you callers for joining us today for this background briefing on tomorrow’s High-Level Meeting on Nuclear Safety at the United Nations. We are delighted to have as our briefer today [Senior State Department Official], hereafter known as Senior State Department Official.

Go ahead and start, [Senior State Department Official].

SENIOR STATE DEPARTMENT OFFICIAL: Thank you very much, [Moderator]. Thanks for being on the call, everyone. The United States welcomed UN Secretary General Ban’s call for the High-Level Meeting, that will be conducted tomorrow, on Nuclear Security and Safety. This meeting is intended to build political support and momentum at the highest levels for international efforts to strengthen nuclear safety and security.

As you know, the international community has a lot of lessons to learn from the recent Fukushima accident in Japan, which resulted from the tragic earthquake and tsunami that devastated Japan. Indeed, we’re still learning lessons from the Chernobyl disaster, which took place over 25 years ago. The most fundamental lesson for our countries is that nuclear accidents can transcend national borders and have international consequences. A nuclear accident anywhere affects all of us, and it is also important that all states do everything they can to prevent nuclear proliferation and nuclear terrorism because of the global implications and consequences.

Another critical lesson is the necessity of being prepared for the unexpected, especially when it comes to nuclear matters. The double disaster of an earthquake and a tsunami was hard for many to imagine. All states with nuclear power must apply the highest standards for nuclear safety. And the United States wants to set the gold standard for nuclear safety and, frankly, that should be the goal of every state. It’s everyone’s responsibility to own– of each country’s own regulatory body to ensure that its nuclear facilities meet the highest standards of safety.

The United States remains committed to nuclear power as an important component of our energy (inaudible) as well as the world’s. We cannot take nuclear energy off the table, but it must be safe and secure, which is why the United States continues to reaffirm the importance of strengthening the IAEA.

This meeting will welcome the IAEA action on nuclear safety, which calls for states to request voluntary peer reviews on a regular basis to facilitate transparency and improve standards of nuclear safety. The meeting also highlights the importance of nuclear safety and compliments the Nuclear Security Summit that will be hosted next year by South Korea. The South Korea summit is a follow-on to the Nuclear Security Summit that President Obama hosted in April 2010.

I’m happy to answer any questions you might have about the High-Level Meeting tomorrow.

MODERATOR: Great. Before we jump into the questions, just to tell callers that [Senior State Department Official] is on a train, so we are hoping that the line holds. And if you hear funky noise in the background, that’s what it’s about.

Tanya, why don’t you go ahead.

OPERATOR: Thank you. We will now begin the question and answer session. If you would like to ask a question, please press * then 1. To withdraw your question, press * then 2. Once again, to ask a question, please press * then 1. One moment, please, for the first question.

Once again, to ask a question, please press * than 1. One moment please. We do have a question from Bill Freebairn. Your line is open.

QUESTION: Good afternoon. Thanks for holding the call. I was wondering whether the U.S. is going to push or press for additional measures that go, perhaps, beyond what the IAEA is saying about sort of voluntary peer reviews and suggest something a little more mandatory and/or support strengthening of a emergency response capacity, which IAEA has also talked about.

SENIOR STATE DEPARTMENT OFFICIAL: Right. The United States has always been a strong supporter of the IAEA’s peer review programs, both in conducting regular missions in the United States and also urging other countries to do the same. And we always send our senior experts, many of them in leadership capacities, to represent the United States on missions in other countries.

Establishing a mandatory requirement for member-states to submit to regular IAEA peer reviews would require the negotiation of a binding international agreement among member-states that most likely would take several years to come to fruition and no guarantee that all member-states would join in. And that’s why we settled on the voluntary peer review part of this. We are very much open to exploring longer term approaches that could including legally binding requirements, but in the meantime, we believe that these are important voluntary peer reviews that can happen and that will add to the data and the knowledge that we have and the kind of cooperation that we think we need to have.

Bill, your second question was?

QUESTION: It was on the emergency response capacity. IAEA is talking about regional centers, possibly for emergency response. So how does the U.S. support that, and do they see the IAEA as the right organization to coordinate this?

MODERATOR: [Senior State Department Official], are you still on the line? I wonder if we have lost her.

OPERATOR: I show her line as still connected.

SENIOR STATE DEPARTMENT OFFICIAL: Hello?

MODERATOR: Hi. Did you hear the question, [Senior State Department Official]? Do you need it again?

SENIOR STATE DEPARTMENT OFFICIAL: Yes. No. I just —

MODERATOR: Okay. Go ahead.

SENIOR STATE DEPARTMENT OFFICIAL: I dropped off, I’m now back.

MODERATOR: Okay. Good.

SENIOR STATE DEPARTMENT OFFICIAL: The – after Fukushima, President Obama ordered a comprehensive safety review of all 104 active power plants in the United States – almost a quarter of all nuclear reactors operating around the world. The U.S. Nuclear Regulatory Commission has already completed its near term inspections, and we believe that it’s important that because you cannot take nuclear energy off the table, we must be able to assert that these plants are safe and secure, which is why the United States continues to reaffirm the importance of strengthening the IAEA. And we also are looking forward to welcoming the IAEA action plan on nuclear safety in this meeting tomorrow, which calls for states to request voluntary peer reviews on a regular basis to facilitate transparency and improve standards of nuclear safety.

QUESTION: Yeah. But on the emergency response capability, there’s been talk about IAEA taking a strong role in putting together regional centers that could respond quickly–

SENIOR STATE DEPARTMENT OFFICIAL: Yes.

QUESTION: — to an emergency.

SENIOR STATE DEPARTMENT OFFICIAL: Yes. And we are looking for the opportunity to support these efforts. We think that the regional approach is a smart one because it provides for the fastest response and gives regions a sense of empowerment, and we look forward to making sure that we can support these issues and hearing more about them tomorrow.

QUESTION: Thank you.

SENIOR STATE DEPARTMENT OFFICIAL: You’re welcome.

OPERATOR: Once again, if you would like to ask a question, please press * then 1. At this time we have no further questions.

MODERATOR: Thank you very much, and thank you, [Senior State Department Official].

PRN: 2011/1557



	

TOP-SECRET – Protection of Critical Cyber Assets

[Federal Register Volume 76, Number 184 (Thursday, September 22, 2011)]
[Proposed Rules]
[Pages 58730-58741]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-24102]



[[Page 58730]]

=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF ENERGY

Federal Energy Regulatory Commission

18 CFR Part 40

[Docket No. RM11-11-000]


Version 4 Critical Infrastructure Protection Reliability 
Standards

AGENCY: Federal Energy Regulatory Commission.

ACTION: 

-----------------------------------------------------------------------N
otice of proposed rulemaking.

SUMMARY: Under section 215 of the Federal Power Act, the Federal Energy 
Regulatory Commission (Commission) proposes to approve eight modified 
Critical Infrastructure Protection (CIP) Reliability Standards, CIP-
002-4 through CIP-009-4, developed and submitted to the Commission for 
approval by the North American Electric Reliability Corporation (NERC), 
the Electric Reliability Organization certified by the Commission. In 
general, the CIP Reliability Standards provide a cybersecurity 
framework for the identification and protection of ``Critical Cyber 
Assets'' to support the reliable operation of the Bulk-Power System. 
Proposed Reliability Standard CIP-002-4 requires the identification and 
documentation of Critical Cyber Assets associated with Critical Assets 
that support the reliable operation of the Bulk-Power System. The 
``Version 4'' CIP Reliability Standards propose to modify CIP-002-4 to 
include ``bright line'' criteria for the identification of Critical 
Assets. The proposed Version 4 CIP Reliability Standards would replace 
the currently effective Version 3 CIP Reliability Standards. The 
Commission also proposes to approve the related Violation Risk Factors 
and Violation Severity Levels with modifications, the implementation 
plan, and effective date proposed by NERC.

DATES: Comments are due November 21, 2011.

ADDRESSES: You may submit comments, identified by docket number and in 
accordance with the requirements posted on the Commission's Web site 
http://www.ferc.gov. Comments may be submitted by any of the following 
methods:
     Agency Web Site: Documents created electronically using 
word processing software should be filed in native applications or 
print-to-PDF format and not in a scanned format, at 
http://www.ferc.gov/docs-filing/efiling.asp.
     Mail/Hand Delivery: Commenters unable to file comments 
electronically must mail or hand deliver an original copy of their 
comments to: Federal Energy Regulatory Commission, Secretary of the 
Commission, 888 First Street, NE., Washington, DC 20426. These 
requirements can be found on the Commission's Web site, see, e.g., the 
``Quick Reference Guide for Paper Submissions,'' available at 
http://www.ferc.gov/docs-filing/efiling.asp or via phone from FERC Online 
Support at 202-502-6652 or toll-free at 1-866-208-3676.

FOR FURTHER INFORMATION CONTACT: 

Jan Bargen (Technical Information), Office of Electric Reliability, 
Division of Logistics and Security, Federal Energy Regulatory 
Commission, 888 First Street, NE., Washington, DC 20426, (202) 502-
6333.
Edward Franks (Technical Information), Office of Electric Reliability, 
Division of Logistics and Security, Federal Energy Regulatory 
Commission, 888 First Street, NE., Washington, DC 20426, (202) 502-
6311.
Kevin Ryan (Legal Information), Office of the General Counsel, Federal 
Energy Regulatory Commission, 888 First Street, NE., Washington, DC 
20426, (202) 502-6840.
Matthew Vlissides (Legal Information), Office of the General Counsel, 
Federal Energy Regulatory Commission, 888 First Street, NE., 
Washington, DC 20426, (202) 502-8408.

SUPPLEMENTARY INFORMATION: 

September 15, 2011.
    1. Under section 215 of the Federal Power Act (FPA),\1\ the 
Commission proposes to approve eight modified Critical Infrastructure 
Protection (CIP) Reliability Standards, CIP-002-4 through CIP-009-4. 
The proposed ``Version 4'' CIP Standards were developed and submitted 
for approval to the Commission by the North American Electric 
Reliability Corporation (NERC), which the Commission certified as the 
Electric Reliability Organization (ERO) responsible for developing and 
enforcing mandatory Reliability Standards.\2\ In general, the CIP 
Reliability Standards provide a cybersecurity framework for the 
identification and protection of ``Critical Cyber Assets'' to support 
the reliable operation of the Bulk-Power System.\3\ In particular, the 
Version 4 CIP Reliability Standards propose to modify CIP-002-4 to 
include ``bright line'' criteria for the identification of Critical 
Assets, in lieu of the currently-required risk-based assessment 
methodology that is developed and applied by applicable entities. In 
addition, NERC developed proposed conforming modifications to the 
remaining cybersecurity Reliability Standards, CIP-003-4 through CIP-
009-4.
---------------------------------------------------------------------------

    \1\ 16 U.S.C. 824o (2006).
    \2\ North American Electric Reliability Corp., 116 FERC ] 
61,062, order on reh'g & compliance, 117 FERC ] 61,126 (2006), aff'd 
sub nom. Alcoa, Inc. v. FERC, 564 F.3d 1342 (D.C. Cir. 2009).
    \3\ The NERC Glossary of Terms defines Critical Assets to mean 
``Facilities, systems, and equipment which, if destroyed, degraded, 
or otherwise rendered unavailable, would affect the reliability or 
operability of the Bulk Electric System.''
---------------------------------------------------------------------------

    2. The Commission proposes to approve Version 4, the Violation Risk 
Factors (VRFs),the Violation Severity Levels (VSLs) with modifications, 
the implementation plan, and effective date proposed by NERC. The 
Commission also proposes to approve the retirement of the currently 
effective Version 3 CIP Reliability Standards, CIP-002-3 to CIP-009-3. 
The Commission seeks comments on these proposals to approve.
    3. While we propose to approve the Version 4 CIP Standards, like 
NERC, we recognize that the Version 4 CIP Standards represent an 
``interim step'' \4\ to addressing all of the outstanding directives 
set forth in Order No. 706.\5\ We believe that the electric industry, 
through the NERC standards development process, should continue to 
develop an approach to cybersecurity that is meaningful and 
comprehensive to assure that the nation's electric grid is capable of 
withstanding a Cybersecurity Incident.\6\ Below, we reiterate several 
topics set forth in Order No. 706 that pertain to a tiered approach to 
identifying Cyber Assets, protection from misuse, and a regional 
perspective. We expect NERC will continue to improve the CIP Standards 
to address these and other outstanding matters addressed in Order No. 
706.
---------------------------------------------------------------------------

    \4\ NERC Petition at 6.
    \5\ Mandatory Reliability Standards for Critical Infrastructure 
Protection, Order No. 706, 122 FERC ] 61,040, order on reh'g, Order 
No. 706-A, 123 FERC ] 61,174 (2008), order on clarification, Order 
No. 706-B, 126 FERC ] 61,229 (2009).
    \6\ Section 215(a) of the FPA defines Cybersecurity Incident as 
``a malicious act or suspicious event that disrupts, or was an 
attempt to disrupt, the operation of those programmable electronic 
devices and communication networks including hardware, software and 
data that are essential to the reliable operation of the Bulk-Power 
System.''
---------------------------------------------------------------------------

    4. Moreover, as discussed below, the Commission seeks comments from 
NERC and other interested persons on establishing a reasonable deadline 
for NERC to satisfy the outstanding directives in Order No. 706 
pertaining to the CIP Standards, using NERC's development timeline.

[[Page 58731]]

I. Background

A. Mandatory Reliability Standards

    5. Section 215 of the FPA requires a Commission-certified ERO to 
develop mandatory and enforceable Reliability Standards, which are 
subject to Commission review and approval. Once approved, the 
Reliability Standards may be enforced by the ERO, subject to Commission 
oversight, or by the Commission independently.\7\
---------------------------------------------------------------------------

    \7\ See 16 U.S.C. 824o(e).
---------------------------------------------------------------------------

    6. Pursuant to section 215 of the FPA, the Commission established a 
process to select and certify an ERO \8\ and, subsequently, certified 
NERC as the ERO.\9\ On January 18, 2008, the Commission issued Order 
No. 706 approving eight CIP Reliability Standards proposed by NERC.
---------------------------------------------------------------------------

    \8\ Rules Concerning Certification of the Electric Reliability 
Organization; and Procedures for the Establishment, Approval and 
Enforcement of Electric Reliability Standards, Order No. 672, FERC 
Stats. & Regs. ] 31,204, order on reh'g, Order No. 672-A, FERC 
Stats. & Regs. ] 31,212 (2006).
    \9\ North American Electric Reliability Corp., 116 FERC ] 
61,062, order on reh'g & compliance, 117 FERC ] 61,126 (2006), aff'd 
sub nom., Alcoa, Inc. v. FERC, 564 F.3d 1342 (DC Cir. 2009).
---------------------------------------------------------------------------

    7. In addition, pursuant to section 215(d)(5) of the FPA,\10\ the 
Commission directed NERC to develop modifications to the CIP 
Reliability Standards to address various concerns discussed in the 
Final Rule. In relevant part, the Commission directed the ERO to 
address the following issues regarding CIP-002-1: (1) Need for ERO 
guidance regarding the risk-based assessment methodology for 
identifying Critical Assets; (2) scope of Critical Assets and Critical 
Cyber Assets; (3) internal, management, approval of the risk-based 
assessment; (4) external review of Critical Assets identification; and 
(5) interdependency between Critical Assets of the Bulk-Power System 
and other critical infrastructures. Subsequently, the Commission 
approved Version 2 and Version 3 of the CIP Reliability Standards, each 
version including changes responsive to some but not all of the 
directives in Order No. 706.\11\
---------------------------------------------------------------------------

    \10\ 16 U.S.C. 824o(d)(5).
    \11\ North American Electric Reliability Corp., 128 FERC ] 
61,291 (2009), order denying reh'g and granting clarification, 129 
FERC ] 61,236 (2009) (approving Version 2 of the CIP Reliability 
Standards); North American Electric Reliability Corp., 130 FERC ] 
61,271 (2010) (approving Version 3 of the CIP Reliability 
Standards).
---------------------------------------------------------------------------

B. Current Version 3 CIP Reliability Standards

    8. Reliability Standard CIP-002-3 addresses the identification of 
Critical Assets and associated Critical Cyber Assets. Pursuant to CIP-
002-3, a responsible entity must develop a risk-based assessment 
methodology to identify its Critical Assets. Requirement R1 specifies 
certain types of assets that an assessment must consider for Critical 
Asset status and also allows the consideration of additional assets 
that the responsible entity deems appropriate. Requirement R2 requires 
the responsible entity to develop a list of Critical Assets based on an 
annual application of the risk-based assessment methodology developed 
pursuant to Requirement R1. Requirement R3 provides that the 
responsible entity must use the list of Critical Assets to develop a 
list of associated Critical Cyber Assets that are essential to the 
operation of the Critical Assets.
    9. In addition, the Commission approved the following ``Version 3'' 
CIP Standards:
     CIP-003-3 (Security Management Controls);
     CIP-004-3 (Personnel & Training);
     CIP-005-3 (Electronic Security Perimeter(s));
     CIP-006-3 (Physical Security of Critical Cyber Assets);
     CIP-007-3 (Systems Security Management);
     CIP-008-3 (Incident Reporting and Response Planning);
     CIP-009-3 (Recovery Plans for Critical Cyber Assets).

II. Proposed Version 4 CIP Reliability Standards

A. NERC Petition

    10. On February 10, 2011, NERC filed a petition seeking Commission 
approval of proposed Reliability Standards CIP-002-4 to CIP-009-4 and 
requesting the concurrent retirement of the currently effective Version 
3 CIP Reliability Standards, CIP-002-3 to CIP-009-3.\12\ The principal 
differences are found in CIP-002, where NERC replaced the risk-based 
assessment methodology for identifying Critical Assets with 17 uniform 
bright line criteria for identifying Critical Assets. NERC does not 
propose any changes to the process of identifying the associated 
Critical Cyber Assets that are then subject to the cyber security 
protections required by CIP-003 through CIP-009. NERC also submitted 
proposed VRFs and VSLs and an implementation plan governing the 
transition to Version 4. NERC proposed that the Version 4 CIP 
Reliability Standards become effective the first day of the eighth 
calendar quarter after applicable regulatory approvals have been 
received.
---------------------------------------------------------------------------

    \12\ NERC Petition at 1. The proposed Reliability Standards are 
not attached to the NOPR. They are, however, available on the 
Commission's eLibrary document retrieval system in Docket No. RM11-
11-000 and are available on the ERO's Web site, http://www.nerc.com. 
Reliability Standards approved by the Commission are 
not codified in the CFR.
---------------------------------------------------------------------------

    11. On April 12, 2011, NERC made an errata filing correcting 
certain errors in the petition and furnishing corrected exhibits and 
the standard drafting team minutes. In the errata, NERC also replaced 
the VRFs and VSLs in the February 10 petition with new proposed VRFs 
and VSLs.\13\
---------------------------------------------------------------------------

    \13\ NERC states that the Version 4 VRFs and VSLs are carried 
over in part from the VRFs and VSLs in the Version 3 CIP Reliability 
Standards. NERC Petition at 46. The Commission approved the Version 
2 and 3 VRFs and VSLs in Docket Nos. RD10-6-001 and RD09-7-003 on 
January 20, 2011 but required NERC to make modifications in a 
compliance filing due by March 21, 2011. North American Electric 
Reliability Corporation, 134 FERC ] 61,045 (2011). The February 10 
petition did not carry over the modified Version 3 VRFs and VSLs 
since it was filed before the March 21 compliance filing. NERC 
submitted new Version 4 VRFs and VSLs that carried over the modified 
Version 3 VRFs and VSLs in the April 12 errata. On June 6, 2011, 
NERC filed the March 21, 2011 compliance filing in the present 
docket, Docket No. RM11-11-000.
---------------------------------------------------------------------------

    12. In its Petition, NERC states that the Version 4 CIP Standards 
satisfy the Commission's criteria, set forth in Order No. 672, for 
determining whether a proposed Reliability Standard is just, 
reasonable, not unduly discriminatory or preferential and in the public 
interest.\14\ According to NERC, CIP-002-4 achieves a specified 
reliability goal by requiring the identification and documentation of 
Critical Cyber Assets associated with Critical Assets that support the 
reliable operation of the Bulk-Power System. NERC opines that the 
Reliability Standard ``improves reliability by establishing uniform 
criteria across all Responsible Entities for the identification of 
Critical Assets.'' \15\ Further, NERC states that CIP-002-4 contains a 
technically sound method to achieve its reliability goal by requiring 
the identification and documentation of Critical Assets through the 
application of the criteria set forth in Attachment 1 of CIP-002-4.
---------------------------------------------------------------------------

    \14\ Order No. 672, FERC Stats. & Regs. ] 31,204 at P 323-337.
    \15\ NERC Petition at 4.
---------------------------------------------------------------------------

    13. NERC states that CIP-002-4 establishes clear and uniform 
criteria for identifying Critical Assets on the Bulk-Power System.\16\ 
NERC also states that CIP-002-4 does not reflect any differentiation in 
requirements based on size of the responsible entity. NERC asserts that 
CIP-002-4 will not have negative effects on competition or restriction 
of the grid. NERC also contends that the two-year implementation period 
for CIP-002-4 is reasonable given the time it will take responsible 
entities to determine

[[Page 58732]]

whether assets meet the criteria included in Attachment 1 and to 
implement the controls required in CIP-003-4 through CIP-009-4 for the 
newly identified assets.
---------------------------------------------------------------------------

    \16\ Id. at 38.
---------------------------------------------------------------------------

    14. Finally, NERC acknowledges that CIP-002-4 addresses some, but 
not all, of the Commission's directives in Order No. 706. NERC explains 
that the standard drafting team limited the scope of requirements in 
the development of CIP Version 4 ``as an interim step'' limited to the 
concerns raised by the Commission regarding CIP-002.\17\ NERC states 
that it has taken a ``phased'' approach to meeting the Commission's 
directives from Order No. 706 and, according to NERC, the standard 
drafting team continues to address the remaining Commission directives. 
According to NERC, the team will build on the bright line approach of 
CIP Version 4.\18\
---------------------------------------------------------------------------

    \17\ NERC Petition at 6 (citing Order No. 706, 122 FERC ] 61,040 
at P 236).
    \18\ NERC Petition at 6.
---------------------------------------------------------------------------

B. Proposed Reliability Standard CIP-002-4

    15. Proposed Reliability Standard CIP-002-4 contains 3 
requirements. Requirement R1, which pertains to the identification of 
Critical Assets, provides:

    The Responsible Entity shall develop a list of its identified 
Critical Assets determined through an annual application of the 
criteria contained in CIP-002-4 Attachment 1--Critical Asset 
Criteria. The Responsible Entity shall update this list as 
necessary, and review it at least annually.

Attachment 1 provides seventeen criteria to be used by all responsible 
entities for the identification of Critical Assets pursuant to 
Requirement R1. The thresholds pertain to specific types of facilities 
such as generating units, transmission lines and control centers. For 
example, Criterion 1.1 provides ``[e]ach group of generating units 
(including nuclear generation) at a single plant location with an 
aggregate highest rated net Real Power capability of the preceding 12 
months equal to or exceeding 1500 MW in a single Interconnection.'' 
With regard to transmission, Criterion 1.6 provides ``Transmission 
Facilities operated at 500 kV or higher,'' and Criterion 1.7 provides 
``Transmission Facilities operated at 300 kV or higher at stations or 
substations interconnected at 300 kV or higher with three or more other 
transmission stations or substations.''
    16. Reliability Standard CIP-002-4, Requirement R2 requires 
responsible entities to develop a list of Critical Cyber Assets 
associated with the Critical Assets identified pursuant to Requirement 
R1. As in previous versions, the Requirement further states that to 
qualify as a Critical Cyber Asset, the Cyber Asset must: (1) Use a 
routable protocol to communicate outside the Electronic Security 
Perimeter; (2) use a routable protocol within a control center; or (3) 
be dial-up accessible. In the proposed version, in the context of 
generating units at a single plant location, the Requirement limits the 
designation of Critical Cyber Assets only to Cyber Assets shared by a 
combination of generating units whose compromise could within 15 
minutes result in the loss of generation capability equal to or higher 
than 1500 MW.
    17. Requirement R3 requires that a senior manager or delegate for 
each responsible entity approve annually the list of Critical Assets 
and the list of Critical Cyber Assets, even if the lists contain no 
elements. As mentioned above, proposed Reliability Standards CIP-003-4 
to CIP-009-4 only reflect conforming changes to accord with the CIP-
002-4 Reliability Standard.

C. Additional Information Regarding Attachment 1 Criteria

    18. In response to a Commission data request, NERC provided 
additional information regarding the bright line criteria for 
identifying Critical Assets.\19\ NERC provided some information 
regarding the development of the criteria. Further, based on an 
industry survey, NERC provided information regarding the estimated 
number of Critical Assets and the number of Critical Assets that have 
associated Critical Cyber Assets located in the United States that 
would be identified pursuant to CIP-002-4. For example, NERC indicates 
that the Version 4 CIP Standards would result in the identification of 
532 control centers as Critical Assets with Critical Cyber Assets, and 
another 21 control centers as Critical Assets without any associated 
Critical Cyber Assets.\20\ Further, 201 control centers would not be 
identified as Critical Assets. With regard to Blackstart Resources, 
NERC's survey results indicate that CIP-002-4 would result in the 
identification of approximately 234 Blackstart Resources as Critical 
Assets with associated Critical Cyber Assets, 273 identified as 
Critical Assets without Critical Cyber Assets, and 35 Blackstart 
Resources not classified as Critical Assets.\21\
---------------------------------------------------------------------------

    \19\ See April 17, 2011 Commission staff data request issued in 
Docket No. RM11-11-000. NERC responded to the data request in 
staggered filings, on May 27, 2011 and June 30, 2011.
    \20\ NERC June 30, 2011 Data Response at 2-3.
    \21\ Id. at 3-4. In the June 30, 2011 Data Response, NERC stated 
that with respect to Blackstart Resources some responsible entities 
indicated that they had not performed a complete analysis of their 
systems based on CIP-002-4 and are unsure whether some units may be 
classified as Critical Assets. Id. at 4.
---------------------------------------------------------------------------

III. Discussion

    19. Pursuant to FPA section 215(d)(2), the Commission proposes to 
approve CIP-002-4 to CIP-009-4 as just, reasonable, not unduly 
discriminatory or preferential, and in the public interest. The 
Commission proposes to approve the VRFs and VSLs, implementation plan, 
and effective date proposed by NERC. The Commission also proposes to 
approve the retirement of the currently effective Version 3 CIP 
Reliability Standards CIP-002-3 to CIP-009-3 upon the effective date of 
CIP-002-4 to CIP-009-4. The Commission seeks comments on these 
proposals.
    20. Further, as discussed below, the Commission seeks comments from 
NERC and other interested persons on the proposal to establish a 
reasonable deadline for NERC to satisfy the outstanding directives in 
Order No. 706. Specifically, as explained in detail later, the 
Commission requests comments on: (1) The proposal to establish a 
deadline using NERC's development timeline for the next version of the 
CIP Reliability Standards; (2) how much time NERC needs to develop and 
file the next version of the CIP Reliability Standards; (3) other 
potential approaches to Critical Cyber Asset identification; and (4) 
whether the next version is anticipated to satisfy all of the 
directives in Order No. 706.

A. The Commission Proposes To Approve the Version 4 CIP Reliability 
Standards

    21. The Commission, in giving due weight to NERC's Filing, proposes 
to approve the Version 4 CIP Reliability Standards. The Commission also 
proposes to approve the implementation plan and effective date proposed 
by NERC. Version 4 provides a change in three respects: (1) Version 4 
will result in the identification of certain types of Critical Assets 
that may not be identified under the current approach; (2) Version 4 
uses bright line criteria to identify Critical Assets, eliminating the 
use of existing entity-defined risk-based assessment methodologies that 
generally do not adequately identify Critical Assets; and (3) Version 4 
provides a level of consistency and clarity regarding the 
identification of Critical Assets lacking under Version 3. We

[[Page 58733]]

separately address each of these reasons for proposing to approve 
Version 4 below.
1. Critical Asset Identification
    22. In its Petition, NERC indicates that, after conducting reviews 
of CIP-002 compliance, NERC ``determined that the existing 
methodologies generally do not adequately identify all Critical 
Assets.'' \22\ While recognizing that CIP version 4 is intended as an 
``interim step,'' it appears that the proposed bright line criteria 
will result in the identification of certain types of Critical Assets 
(e.g. 500 kV substations) that may not be identified by the approach 
that is currently in effect. This is reflected in NERC's June 30, 2011 
data response, in which NERC presented industry survey data reflecting 
the application of the bright line criteria in Version 4. To facilitate 
an analysis of the data, NERC also provided observations and data from 
several of its earlier industry surveys, including the 2009 ``CIP Self-
Certification Survey'' and 2010 ``CIP-002 Critical Asset Methodology 
Data Request.''. For example, NERC states in the June 30, 2011 data 
response that in the 2009 survey only 50 percent of substations rated 
300 kV and above are classified as Critical Assets while that figure 
would increase to 70 percent under Version 4.\23\
---------------------------------------------------------------------------

    \22\ NERC Petition at 11.
    \23\ Id. at 4.
---------------------------------------------------------------------------

    23. The NERC petition indicates that 270 transmission substations 
rated 500 kV and above are classified as Critical Assets under Version 
3 while, according to the data response, the figure would rise to 437 
under Version 4.\24\ This increase is consistent with Criterion 1.6 of 
Attachment 1 to CIP-002-4, which identifies all transmission 
substations rated 500 kV as Critical Assets. According to the data 
response, the 25 percent of generation units rated 300 MVA and above 
would be identified as Critical Assets under Version 4. Moreover, the 
proportion of total Blackstart Resources classified as Critical Assets 
increases due to the required 100 percent coverage of these under 
Version 4.\25\ Further, the number of control centers identified as 
Critical Assets increases from 425 under Version 3 to 553 under Version 
4, the latter figure representing 74 percent of all control centers. 
These figures represent increases in certain categories in Critical 
Asset identification among generation, transmission, and control 
centers. We also note that NERC's industry survey data indicates 
decreases in the number of generation and blackstart resources 
identified as Critical Assets with Critical Cyber Assets. While the 
bright line thresholds result in the identification of a significant 
number of additional generation plants rated above 1500 MVA as Critical 
Assets, the thresholds also result in the identification of less 
generation below 300 MVA.
---------------------------------------------------------------------------

    \24\ Id. at 5.
    \25\ NERC Petition at 17 (explaining that each Blackstart 
Resource identified in a Transmission Operator's restoration plan is 
a Critical Asset). In the June 30, 2011 Data Response, NERC's survey 
found that responsible entities identified 93 percent of Blackstart 
Resources as Critical Assets. NERC stated that confusion over the 
term Blackstart Resource may have contributed to the lower 
percentage, and that responsible entities will be educated on the 
definition of Blackstart Resource prior to the effective date of 
CIP-002-4. NERC June 30, 2011 Data Response at 4.
---------------------------------------------------------------------------

    24. As NERC recognizes in its filing, the improvements in Critical 
Asset identification under Version 4 represent an interim step in 
complying with the directives in Order No. 706.\26\ As we discuss 
below, Version 4 should not be viewed as an endpoint but as a step 
towards eventual full compliance with Order No. 706.
2. Version 4 Removes Discretion in Identifying Critical Assets
    25. The proposed Version 4 CIP Reliability Standards discards the 
current risk-based methodology for identifying Critical Assets. Under 
the current CIP-002-3, responsible entities are tasked with identifying 
Critical Assets based on their own risk-based methodology. In the 
Petition NERC points out that in Order No. 706 the Commission directed 
NERC to ``provide reasonable technical support to assist entities in 
determining whether their assets are critical to the Bulk-Power 
System.'' \27\ NERC explains that it responded to the Commission's 
direction by developing guidance documents to assist entities in 
developing their risk-based methodologies and Critical Asset 
identification.\28\
---------------------------------------------------------------------------

    \27\ Id. at 10-11 (citing Order No. 706, 122 FERC ] 61,040 at P 
255).
    \28\ Id. at 11.
---------------------------------------------------------------------------

    26. In its Petition, NERC states that it ``conducted various 
reviews of risk-based methodologies developed by many entities of 
varying sizes * * * and determined that the existing methodologies 
generally do not adequately identify all Critical Assets.'' \29\ To 
address this, NERC proposes to replace the current risk-based 
methodology with uniform, bright line criteria, which will be used by 
all responsible entities to identify Critical Assets.
---------------------------------------------------------------------------

    \29\ Id.
---------------------------------------------------------------------------

    27. While risk-based assessment methodologies have merit, we share 
NERC's concerns about the existing application of the currently 
effective CIP-002-3, Requirement 1. Thus, in this context, we believe 
that a shift away from responsible entity-designed risk-based 
methodologies for identifying Critical Assets, which NERC has found to 
be inadequate, to the use of NERC-developed criteria is an improvement.
3. Version 4 Provides Consistency and Clarity in the Identification of 
Critical Assets
    28. In its June 30, 2011 data response, NERC states that the survey 
results from 2009 generated concern ``about the apparent inconsistency 
in the application of the standards across the system, as evidenced by 
the apparent variation from region to region.'' \30\ NERC states that 
it subsequently engaged with the Regional Entities and stakeholders to 
better understand the data, with these efforts resulting in the 
development of Version 4.
---------------------------------------------------------------------------

    \30\ NERC June 30, 2011 Data Response at 3.
---------------------------------------------------------------------------

    29. We believe that the application of uniform criteria is an 
improvement over the current approach because they add greater 
consistency and clarity in identifying Critical Assets. The risks posed 
by cyber threats suggest a different approach than the possibly 
inconsistent, inadequate methodologies for identifying Critical Assets, 
as evidenced by NERC's conclusion that insufficient numbers of Critical 
Assets were identified using the risk-based assessment methodology. As 
an integrated system, the protection afforded for Critical Assets and 
their Critical Cyber Assets is only as strong as its weakest link. In 
this respect, allowing responsible entities to devise their own 
methodologies for identifying Critical Assets, especially if these 
methodologies prove to be weak, may compromise the Critical Assets and 
Critical Cyber Assets of other responsible entities even if they have 
adopted a more stringent methodology. The uniform system of Critical 
Asset identification proposed by NERC in Version 4 helps to address 
this weakness and places all responsible entities on an equal footing 
with respect to Critical Asset identification.
    30. In addition, clear, bright line criteria should make it easier 
for Regional Entities, NERC and the Commission to monitor responsible 
entities and evaluate how they are identifying Critical Assets. A 
single set of bright line criteria, as opposed to

[[Page 58734]]

myriad entity-designed risk-based methodologies, should improve the CIP 
compliance process.
    31. However, under the currently-effective CIP-002-3, an entity 
that applies its risk-based assessment methodology considers specific 
types of assets identified in Requirement R1, as well as ``any 
additional assets that support the operation of the Bulk Electric 
System that the Responsible Entity deems appropriate to include in its 
assessment.'' Thus, currently, a responsible entity has the flexibility 
to consider any assets it deems appropriate. The Commission also notes 
that there are assets currently identified as Critical Assets which 
would no longer be identified as Critical Assets under the Proposed 
Reliability Standard CIP-002-4 bright line criteria for Critical Asset 
identification. The Commission seeks comment whether, under CIP Version 
4, a responsible entity retains the flexibility to identify assets 
that, although outside of the bright line criteria, are essential to 
Bulk-Power System reliability. Further, we seek comment whether the ERO 
and/or Regional Entities would have the ability, either in an event-
driven investigation or compliance audit, to identify specific assets 
that fall outside the bright-line criteria yet are still essential to 
Bulk-Power System reliability and should be subject prospectively to 
compliance with the CIP Reliability. If so, on what basis should that 
decision be made?
    32. In addition, the Commission is cognizant of one caution that 
remains concerning a binary bright line criteria protection philosophy, 
i.e., either an asset satisfies the threshold and is subject to 
compliance or is below the threshold and not subject to compliance (as 
opposed to a tiered approach to compliance as discussed below), in 
terms of applying cybersecurity protections to Cyber Assets. 
Specifically, bright line criteria that limit legally-mandated 
cybersecurity protections to certain classes of Bulk-Power System 
assets may indicate to an adversary the types of assets that fail to 
meet the threshold and, therefore, are not subject to mandatory CIP 
compliance. Therefore, the Commission encourages NERC to accelerate 
development of the next version of the CIP Reliability Standards and to 
address the concerns discussed herein in Section B.
4. Violation Risk Factors/Violation Severity Levels
    33. NERC states that the proposed VRFs and VSLs are consistent with 
those approved for the Version 3 CIP Reliability Standards.\31\ NERC 
explains that each requirement in Version 4 is assigned a VRF and a set 
of VSLs and that these elements support the determination of an initial 
value range for the base penalty amount regarding violations of 
requirements in Commission-approved Reliability Standards, as defined 
in the ERO Sanction Guidelines.\32\
---------------------------------------------------------------------------

    \31\ North American Electric Reliability Corp., 134 FERC ] 
61,045 (2011) (approving Version 2 and 3 CIP Reliability Standards 
VRFs and VSLs but requiring modifications in a compliance filing).
    \32\ NERC Petition at 37.
---------------------------------------------------------------------------

    34. The principal changes in the proposed Version 4 VRFs and VSLs 
relate to CIP-002-4. NERC proposes to carry forward the Version 3 VRFs 
and VSLs for all other Requirements (in CIP-003-4 through CIP-009-4), 
for which no substantive revisions are proposed. CIP-002-4 no longer 
contains sub-Requirements and, instead, each of three main Requirements 
has a single VRF and set of VSLs, consistent with the methodology 
proposed by NERC and approved by the Commission.\33\ The VRF 
designations for the three Requirements in CIP-002-4 are consistent 
with those assigned to similar Requirements in previous versions of the 
CIP Reliability Standards and satisfy our established guidelines. 
Therefore, the Commission proposes to approve the Version 4 VRFs 
proposed by NERC and incorporate appropriately the modifications 
directed to prior versions.
---------------------------------------------------------------------------

    \33\ North American Electric Reliability Corp., 135 FERC ] 
61,166, at 8 (2011).
---------------------------------------------------------------------------

    35. With regard to the proposed Version 4 VSLs for CIP-002-4, we 
are concerned that the VSLs for Requirement R1 and Requirement R2, 
while carrying forward the wording from corresponding Version 3 VSLs, 
do not adequately address the purpose of NERC's proposed bright line 
criteria: To ensure accurate and complete identification of all 
Critical Assets, so that all associated Critical Cyber Assets become 
subject to the protections required by the CIP Standards.
    36. More importantly, neither set of VSLs address the failure to 
properly identify either Critical Assets or Critical Cyber Assets in 
the first place. The failure to identify a Critical Asset, whether 
inadvertently or through misapplication of the bright line criteria, is 
paramount because if an Asset is not identified and included on the 
Critical Asset list, its associated Cyber Assets will not be considered 
under Requirement R2. Failure to identify those Cyber Assets as 
Critical Cyber Assets under Requirement R2 then creates the ``weakest 
link'' circumstance discussed in the Commission's order establishing 
two CIP VSL Guidelines for analyzing the validity of VSLs pertaining to 
cyber security.\34\
---------------------------------------------------------------------------

    \34\ CIP VSL Guideline 1 states, ``Requirements where a single 
lapse in protection can compromise computer network security, i.e., 
the ``weakest link'' characteristic, should apply binary rather than 
gradated VSLs.''
---------------------------------------------------------------------------

    37. Therefore, the Commission proposes to direct the ERO to modify 
the VSLs for CIP-002-4, Requirements R1 and R2, to address a failure to 
identify either Critical Assets or Critical Cyber Assets, as shown in 
Appendix 1.\35\ The Commission proposes to approve the Version 4 VSLs 
proposed by NERC, as modified, because they would then satisfy our 
established guidelines, fully address the purpose of NERC's bright line 
criteria, and incorporate appropriately the modifications directed to 
prior versions.
---------------------------------------------------------------------------

    \35\ NERC proposes to assign a Severe VSL for a violation of 
Requirement R1 if a responsible entity does not develop a list of 
its identified Critical Assets ``even if such list is null.'' NERC 
does not propose to assign a VSL for a violation of Requirement R1 
when a responsible entity fails to identify a Critical Asset that 
falls within any of the Critical Asset Criteria in Attachment 1, or 
fails to include an identified Critical Asset in its Critical Asset 
list. NERC further proposes to assign a Severe VSL to a responsible 
entity's violation of Requirement R2 only when it fails to include 
in its list of Critical Cyber Assets a Critical Cyber Asset it has 
identified. NERC does not propose to assign a VSL for a violation of 
Requirement R2 resulting from a responsible entity's failure to 
identify as a Critical Cyber Asset a Cyber Asset that qualifies as a 
Critical Cyber Asset.
---------------------------------------------------------------------------

5. Implementation Plan and Effective Date
    38. NERC proposes an effective date for full compliance with the 
Version 4 CIP Standards of the first day of the eighth calendar quarter 
after applicable regulatory approvals have been received. In addition, 
NERC provides a detailed implementation plan for newly identified 
Critical Assets and newly registered entities. NERC also presents a 
number of scenarios intended to explain how CIP-002-4 will be 
implemented. Depending on the situation, the implementation plan 
establishes timelines and milestones for entities to reach full 
compliance with CIP-002-4.
    39. The Commission proposes to approve the effective date and 
implementation plan for CIP-002-4. Under the scenarios presented by 
NERC, we understand that entities with existing CIP compliance 
implementation programs will effectively no longer use CIP-002-3 to 
identify Critical Assets after approval of CIP-002-4 but rather will 
apply the criteria in Attachment 1 of CIP-002-4. While some responsible 
entities have already installed the necessary equipment and software to 
address

[[Page 58735]]

cybersecurity, we recognize that other responsible entities may need to 
purchase and install new equipment and software to achieve compliance 
for assets that are brought within the scope of the protections under 
the CIP-002-4 bright line criteria. Based on these considerations, the 
Commission believes that the implementation plan proposed by NERC sets 
reasonable deadlines for industry compliance.

B. Ongoing Development Efforts To Satisfy Directives Set Forth in Order 
No. 706

    40. As acknowledged by NERC, the proposed Version 4 CIP Reliability 
Standards do not address all of the directives set forth in Order No. 
706. Although the Commission proposes to approve CIP-002-4, we 
highlight the need for NERC, working through the Reliability Standards 
development process, to address all outstanding Order No. 706 
directives as soon as possible.
    41. Below, we discuss several directives in Order No. 706 that have 
yet to be satisfied and propose to give guidance regarding the next 
version of the CIP Reliability Standards, such as the need to address 
the NIST framework, data network connectivity, and the potential misuse 
of control centers or control systems and the adoption of a regional 
perspective and oversight. Our guidance is intended to more fully 
ensure that all Cyber Assets serving reliability functions of the Bulk-
Power System are within scope of the CIP Reliability Standards. In 
addition, as discussed below, we seek comments from NERC and other 
interested persons on a proposal to establish a deadline for NERC to 
submit modified CIP Reliability Standards that address the outstanding 
directives set forth in Order No. 706, using NERC's development 
timeline.
    42. The stated purpose of Reliability Standard CIP-002 is the 
accurate identification of Critical Cyber Assets. Both the currently-
effective and proposed CIP-002 Reliability Standards, along with 
guidance NERC provided to industry,\36\ are structured in a staged 
approach. First, an entity must identify Critical Assets. NERC defines 
Critical Assets as ``facilities, systems, and equipment which, if 
destroyed, degraded, or otherwise rendered unavailable, would affect 
the reliability or operability of the Bulk Electric System.'' \37\ 
Second, based on the Critical Assets identified in the first step, an 
entity must identify Cyber Assets supporting the Critical Assets. The 
NERC Glossary defines Cyber Assets as ``programmable electronic devices 
and communication networks including hardware, software, and data.'' 
\38\ Third, an entity should identify the Critical Cyber Assets by 
determining, in accordance with the NERC Glossary, the ``Cyber Assets 
essential to the reliable operation of the Critical Assets.'' \39\ In 
Order No. 706, the Commission did not address whether or not the staged 
approach outlined above was the only method for identifying Critical 
Cyber Assets. Rather at that time, focus was placed on addressing 
specific concerns with the first step--the identification of Critical 
Assets. Recognizing CIP-002 as the cornerstone of the CIP Reliability 
Standards,\40\ a failure to accurately identify Critical Assets could 
greatly impact accurate Critical Cyber Asset identification and the 
overall applicability of the protection measures afforded in CIP-003 
through CIP-009.
---------------------------------------------------------------------------

    \36\ North American Reliability Corporation Security Guideline 
for the Electric Sector: ``Identifying Critical Cyber Assets'' 
Version 1.0, Effective June 17, 2010, at 4-5, and North American 
Reliability Corporation Security Guideline for the Electric Sector: 
``Identifying Critical Assets'' Version 1.0, Effective September 17, 
2009.
    \37\ NERC Glossary of Terms at 11.
    \38\ Id.
    \39\ Id.
    \40\ Order No. 706, 122 FERC ] 61,040 at P 234.
---------------------------------------------------------------------------

    43. In light of recent cybersecurity vulnerabilities, threats and 
attacks that have exploited the interconnectivity of cyber systems,\41\ 
the Commission seeks comments regarding the method of identification of 
Critical Cyber Assets \42\ to ensure sufficiency and accuracy. The 
Commission recognizes that control systems that support Bulk-Power 
System reliability are ``only as secure as their weakest links,'' and 
that a single vulnerability opens the computer network and all other 
networks with which it is interconnected to potential malicious 
activity.\43\ Accordingly, the Commission believes that any criteria 
adopted for the purposes of identifying a Critical Cyber Asset under 
CIP-002 should be based upon a Cyber Asset's connectivity and its 
potential to compromise the reliable operation \44\ of the Bulk-Power 
System, rather than focusing on the operation of any specific Critical 
Asset(s). The Commission seeks comments on this approach.
---------------------------------------------------------------------------

    \41\ These include the discovery of Stuxnet, Night Dragon and 
RSA breaches from advanced persistent threats in July 2010, February 
2011 and March 2011 respectively, where systems were compromised.
    \42\ In Order No. 706, the Commission declined to direct a 
method for identifying Critical Cyber Assets, but stated that it may 
revisit this circumstance in a future proceeding. See Order No. 706, 
122 FERC ] 61,040 at P 284.
    \43\ North American Electric Reliability Corp., 130 FERC ] 
61,211, at P 15 (2010).
    \44\ 16 U.S.C. 824o(a)(4). The term ``reliable operation'' means 
``operating the elements of the bulk-power system within equipment 
and electric system thermal, voltage, and stability limits so that 
instability, uncontrolled separation, or cascading failures of such 
system will not occur as a result of a sudden disturbance, including 
a cybersecurity incident, or unanticipated failure of system 
elements.''
---------------------------------------------------------------------------

    44. Further, the Commission seeks comments on how to ensure that 
the directives of Order No. 706 relative to CIP-002 with respect to the 
concerns discussed below are addressed, resulting in a method that will 
lead to sufficient and accurate Critical Cyber Asset identification.
    45. The Commission believes that NERC should consider the following 
three strategies to meet the outstanding directives and seeks comments 
on these strategies. First, NERC should consider applicable features of 
the NIST Risk Management Framework to ensure protection of all cyber 
systems connected to the Bulk-Power System, including establishing CIP 
requirements based on entity functional characteristics rather than 
focusing on Critical Asset size. Second, such as in the consideration 
of misuse, NERC should consider mechanisms for identifying Critical 
Cyber Assets by examining all possible communication paths between a 
given cyber resource and any asset supporting a reliability function. 
Third, NERC should provide a method for review and approval of Critical 
Cyber Asset lists from external sources such as the Regional Entities 
or NERC. Each of these strategies is discussed below.
1. NIST Framework
    46. In Order No. 706, the Commission directed NERC to ``monitor the 
development and implementation'' of cybersecurity standards then being 
developed by the National Institute of Standards and Technology 
(NIST).\45\ The Commission also directed NERC to consider the 
effectiveness of the NIST standards.\46\ At that time, the Commission 
directed NERC to address any NIST provisions that will better protect 
the Bulk-Power System in the Reliability Standards development 
process.\47\ While the Commission determined not to require NERC to 
adopt or incorporate elements of the NIST standards, Order No. 706 left 
open the option of revisiting the NIST standards at a later time.\48\ 
The Commission is not here proposing to direct that NERC use elements 
of the NIST standards. However, we continue

[[Page 58736]]

to believe that the NIST framework could provide beneficial input into 
the NERC CIP Reliability Standards and we urge NERC to consider any 
such provisions that will better protect the Bulk-Power System.
---------------------------------------------------------------------------

    \45\ Order No. 706, 122 FERC ] 61,040 at P 233.
    \46\ Id.
    \47\ Id.
    \48\ Id.
---------------------------------------------------------------------------

    47. The NIST Risk Management Framework was developed to manage the 
risks associated with all information systems, and offers a structured 
yet flexible approach that can now be applied to the electric industry. 
The NIST Risk Management Framework guides selection and specification 
of cybersecurity controls and measures necessary to protect individuals 
and the operations and assets of the organization, while considering 
effectiveness, efficiency, and constraints due to applicable laws, 
directives, policies, standards, or regulations. Each of the activities 
in the Risk Management Framework has an associated NIST security 
standard and/or guidance document that can be used by organizations 
implementing the framework. The management of risk is a key element.
    48. Two primary features of the NIST Framework are: (1) Customizing 
protection to the mission of the cyber systems subject to protection 
(similar to the role identified by the NERC Functional Model); and (2) 
ensuring that all connected cyber systems associated with the Bulk-
Power System, based on their function, receive some level of 
protection.\49\ The Bulk-Power System could benefit from each of these 
tested approaches.
---------------------------------------------------------------------------

    \49\ NIST SP800-53, Section 1.4, Organizational 
Responsibilities.
---------------------------------------------------------------------------

a. NIST Approach and the NERC Functional Model
    49. The purpose of the NERC CIP Reliability Standards is to specify 
mandatory Requirements for responsible entities to establish, maintain, 
and preserve the cybersecurity of key information technology systems' 
assets, the use of which is essential to reliable operation of the 
Bulk-Power System. The CIP Reliability Standards include Requirements 
which are based upon the functional roles of the responsible entities 
as specified in the NERC Functional Model.\50\ The identification of 
cyber systems and assets used to execute these functional roles should 
be the first step in identifying the systems for coverage under the CIP 
Reliability Standards for protection. The Functional Model should be 
used as a starting point when considering the applicability of the NIST 
Framework for securing the operation of cyber assets to provide for the 
Reliable Operation of the Bulk-Power System.
---------------------------------------------------------------------------

    \50\ Reliability Functional Model, Function Definitions and 
Functional Entities, Version 5, approved by NERC Board of Trustees 
May 2010; and, Reliability Functional Model Technical Document 
Version 5, approved by NERC Board of Trustees May 2010.
---------------------------------------------------------------------------

b. NIST Tiered Approach
    50. If applied to the Bulk-Power System, the NIST Framework would 
specify the level of protection appropriate for systems based upon 
their importance to the reliable operation of the Bulk-Power System. 
Cyber systems connected to the Bulk-Power System require availability, 
integrity, and confidentiality to effectively ensure the reliability of 
the Bulk-Power System.
    51. The NIST Framework provides for a tiered approach to 
cybersecurity protection where protection of some type would be applied 
to all cyber assets connected to the Bulk-Power System. Under the NIST 
Framework, cyber assets whose compromise or loss of operability could 
result in a greater risk to Bulk-Power System reliability would be 
subject to more rigorous cybersecurity protections compared to a less 
important asset. The NIST Framework recognizes that all connected 
assets require a baseline level of protection to prevent attackers from 
gaining a foothold to launch further, even more devastating attacks on 
other critical systems.
    52. Using the NIST framework, all cyber assets would also be 
reviewed to determine the appropriate level of cyber protection. The 
level of protection required for a given cyber asset is based upon its 
mission criticality and its innate technological risks.
2. Misuse of Control Systems
    53. In Order No. 706, the Commission directed NERC to consider the 
misuse of control centers and control systems in the determination of 
Critical Assets.\51\ If a perpetrator is able to misuse an asset, the 
attacker may navigate across and between control system data networks 
in order to gain access to multiple sites, which could enable a 
coordinated multi-site attack. Recent cybersecurity incidents \52\ 
illustrate the importance of restricting connectivity between control 
systems and external networks, emphasizing the inherent risk exposure 
created by networking critical cyber control systems. Future mechanisms 
for identifying when cyber assets require protection will have to 
examine all possible paths between a given cyber resource and any asset 
supporting a reliability function.
---------------------------------------------------------------------------

    \51\ Order No. 706, 122 FERC ] 61,040 at P 282.
    \52\ These include the discovery of Stuxnet, Night Dragon and 
RSA breaches from advanced persistent threats in July 2010, February 
2011 and March 2011 respectively, where systems were compromised.
---------------------------------------------------------------------------

    54. In Order No. 706, the Commission expressed concerns regarding 
the classification of control centers and the potential misuse of 
control systems.\53\ With regard to control centers, the Commission 
noted that responsible entities should be required to ``examine the 
impact on reliability if the control centers are unavailable, due for 
example to power or communications failures, or denial of service 
attacks.'' \54\ In addition, the Commission stated that ``[r]esponsible 
entities should also examine the impact that misuse of those control 
centers could have on the electric facilities they control and what the 
combined impact of those electric facilities could be on the 
reliability of the Bulk-Power System.'' \55\ The Commission stated that 
``when these matters are taken into account, it is difficult to 
envision a scenario in which a reliability coordinator, transmission 
operator or transmission owner control center or backup control center 
would not properly be identified as a critical asset.'' \56\
---------------------------------------------------------------------------

    \53\ Order No. 706, 122 FERC ] 61,040 at P 280-281.
    \54\ Id. P 280.
    \55\ Id.
    \56\ Id.
---------------------------------------------------------------------------

    55. In addition, the Commission raised concerns about the misuse of 
a control system that controls more than one asset.\57\ Specifically, 
the Commission noted that multiple assets, whether multiple generating 
units, multiple transmission breakers, or perhaps even multiple 
substations, could be taken out of service simultaneously due to a 
failure or misuse of the control system. The Commission stated that 
even if one or all of the assets would not be considered as a Critical 
Asset on a stand alone basis, a simultaneous outage resulting from the 
single point of control might affect the reliability or operability of 
the Bulk-Power System. The Commission stated ``[i]n that case, the 
common control system should be considered a Critical Cyber Asset.'' 
\58\
---------------------------------------------------------------------------

    \57\ Id. P 281.
    \58\ Id.
---------------------------------------------------------------------------

    56. The Commission is concerned that the proposed CIP-002-4 bright 
line criteria do not adequately address the Commission's prior 
directive regarding the classification of control centers or take the 
potential misuse of control systems into account in the identification 
of Critical Assets. For example, the proposed bright line criteria 
leave a number of Critical Assets

[[Page 58737]]

with potentially unprotected cyber assets, including a total of 222 
\59\ control centers with no legal obligation to apply cybersecurity 
measures. These potentially unprotected control centers involve an 
unknown number of associated control systems.
---------------------------------------------------------------------------

    \59\ NERC June 30, 2011 Data Response at 3.
---------------------------------------------------------------------------

    57. Consider the following example: Electric grid control system 
operation in part consists of the collection of raw data needed to run 
the grid, collected by a SCADA system from intelligent electronic 
devices (IEDs) (e.g., RTUs and synchrophasors). The SCADA data is 
typically aggregated by an energy management system (EMS). The EMS may, 
in some cases, calculate area control error (ACE) and transmit it to a 
balancing authority, which in turn makes computer based decisions about 
balancing load and generation. Those decisions are then used by the 
balancing authority or generation operator as part of an automated 
generation control (AGC) process. At each of these one or more sites, 
there are many data network interconnection points with other entities, 
(e.g., neighboring transmission operators, generation operators, and 
reliability coordinators) and additional connectivity to corporate data 
networks and elsewhere, employing several communications technologies. 
This results in a complex interconnection of cyber assets (including 
the data of those cyber assets) demanding vigilant protection.\60\ 
These cyber systems require comprehensive protection because the 
interconnected system is only as strong as its weakest link.
---------------------------------------------------------------------------

    \60\ See generally, Ron Ross, Managing Enterprise Risk in 
Today's World of Sophisticated Threats, National Institute of 
Standards and Technology (2007).
---------------------------------------------------------------------------

    58. Any failure to take into account the interconnectivity of 
control systems represents a significant reliability gap. Where modern 
data networking technology is used for operation of the Bulk-Power 
System (e.g., control systems, synchrophasors, smart grid), a network-
based cyber attack could result in multiple simultaneous outages of 
grid equipment and cyber systems alike through misuse of a single point 
of control (e.g., a SCADA control host system). Such an attack could 
take place by way of a cyber system associated with an asset that falls 
outside the CIP-002-4 bright line criteria yet is connected in common 
with other cyber systems on the Bulk-Power System. The risk of a cyber 
attack is greater now than when Order No. 706 was issued, as borne out 
by the recent increased frequency and sophistication of cyber attacks. 
It is critical, therefore, that the Commission's concerns regarding the 
potential misuse of control centers and associated control systems be 
addressed in the CIP Reliability Standards.
3. Regional Perspective
    59. In Order No. 706, the Commission directed NERC to ``develop a 
process of external review and approval of critical asset lists based 
on a regional perspective.'' \61\ The Commission found that ``Regional 
Entities must have a role in the external review to assure that there 
is sufficient accountability in the process [and] * * * because the 
Regional Entities and ERO are ultimately responsible for ensuring 
compliance with Reliability Standards.'' \62\
---------------------------------------------------------------------------

    \61\ Order No. 706, 122 FERC ] 61,040 at P 329.
    \62\ Id. P 327.
---------------------------------------------------------------------------

    60. The Commission is concerned that the lack of a regional review 
in the identification of cyber assets might result in a reliability 
gap. In Order No. 706, the Commission expressed concerns regarding the 
need for developing a process of external review and approval of 
Critical Asset lists based on a regional perspective, and that such 
lists are considered from a wide-area view. This process would help to 
identify trends in Critical Asset identification. Further, while we 
recognize that individual circumstances may likely vary, an external 
review will provide an appropriate level of consistency.\63\ For 
example, reliability coordinators may communicate through a common 
system and compromise of that system could propagate across multiple 
regions. A cyber compromise can easily propagate across these data and 
control networks with potential adverse consequences to the Bulk-Power 
System on multi-region basis.
---------------------------------------------------------------------------

    \63\ Id. P 322.
---------------------------------------------------------------------------

    61. This problem may become exacerbated by any future revisions to 
the CIP Reliability Standards that opt to reserve a high level of 
independent authority to the registered entity to categorize and 
prioritize its cyber assets. Looking forward, it will be essential for 
NERC and the Regional Entities to actively review the designation of 
cyber assets that are subject to the CIP Reliability Standards, 
including those which span regions, in order to determine whether 
additional cyber assets should be protected.
4. Summary
    62. In summary, the Commission proposes to approve NERC's proposed 
Version 4 CIP Standards pursuant to section 215(d)(2) of the FPA. As 
discussed above, it appears that the Version 4 CIP Standards represent 
an improvement in three respects in that they: (1) Will result in the 
identification of certain types of Critical Assets that may not be 
identified under the current approach; (2) use bright line criteria to 
identify Critical Assets, thus limiting the discretion of responsible 
entities when identifying Critical Assets; and (3) provide a level of 
consistency and clarity regarding the identification of Critical 
Assets.
    63. While we believe that the Version 4 CIP Reliability Standards 
satisfy the statutory standard for approval, we also believe that more 
improvement is needed. As NERC explains in its Petition, the Version 4 
CIP Reliability Standards are intended as ``interim'' and future 
versions will build on Version 4. We believe that the electric 
industry, through the NERC standards development process, should 
continue to develop an approach to cybersecurity that is meaningful and 
comprehensive to assure that the nation's electric grid is capable of 
withstanding a Cybersecurity Incident.\64\ As discussed above, we 
believe that some of the essential components of such a meaningful and 
comprehensive approach to cybersecurity are set forth in Order No. 706.
---------------------------------------------------------------------------

    \64\ Section 215(a) of the FPA defines Cybersecurity Incident as 
``a malicious act or suspicious event that disrupts, or was an 
attempt to disrupt, the operation of those programmable electronic 
devices and communication networks including hardware, software and 
data that are essential to the reliable operation of the Bulk-Power 
System.''

---------------------------------------------------------------------------

[[Page 58738]]

5. Reasonable Deadline for Full Compliance With Order No. 706
    64. The Commission issued Order No. 706 on January 18, 2008. In 
Order No. 706, the Commission approved Version 1 of the CIP Reliability 
Standards while also directing modifications pursuant to section 
215(d)(5) of the FPA, some of which are described above. Later approved 
versions of the CIP Reliability Standards, and now the proposed Version 
4 CIP Reliability Standards, addressed some of the directives in Order 
No. 706, but other directives remain unsatisfied.
    65. Over three years have elapsed since the Commission issued the 
Final Rule in January 2008. As discussed above, we believe that it is 
important for the successful implementation of a comprehensive approach 
to cybersecurity that NERC timely addresses the modifications directed 
by the Commission in Order No. 706. Accordingly, the Commission 
proposes to set a deadline for NERC to file the next version of the CIP 
Reliability Standards, which NERC indicates will address all 
outstanding Order No. 706 directives.\65\ This proposal is consistent 
with the views expressed in the January 2011 Audit Report of the 
Department of Energy's Inspector General, who found ``that the 
Commission could have, but did not impose specific deadlines for the 
ERO to incorporate changes to the CIP standards.'' \66\ Similarly, our 
proposal is responsive to the Audit Report finding that ``the CIP 
standards implementation approach and schedule approved by the 
Commission were not adequate to ensure that systems-related risks to 
the Nation's power grid were mitigated or addressed in a timely 
manner.'' \67\
---------------------------------------------------------------------------

    \65\ See NERC's May 27, 2011 Responses to Data Requests, 
Response 1 (``[t]he standard drafting team expects that the filing 
for the next version of the CIP Reliability Standards will address 
the remaining FERC Order No. 706 directives'').
    \66\ Department of Energy Inspector General Audit Report, 
Federal Energy Regulatory Commission's Monitoring of Power Grid 
Cybersecurity at 6 (January 2011).
    \67\ Id. at 2.
---------------------------------------------------------------------------

    66. The Commission understands that, under NERC's timeline for the 
ongoing effort to address all outstanding Order No. 706 directives, it 
anticipates submitting the next version of the CIP Reliability 
Standards to the NERC Board of Trustees by the second quarter of 2012, 
and filing that version the Commission by the end of the third quarter 
of 2012.\68\
---------------------------------------------------------------------------

    \68\ See NERC's May 27, 2011 Responses to Data Requests, 
Response 1. See also North American Electric Reliability Corporation 
Reliability Standards Development Plan 2011-2013 Informational 
Filing Pursuant to Section 310 of the NERC Rules of Procedure, 
Docket Nos. RM05-17-000, RM05-25-000, RM06-16-000 at 14 (filed April 
5, 2011).
---------------------------------------------------------------------------

    67. The Commission proposes to establish NERC's current development 
timeline above as a deadline for compliance with the outstanding Order 
No. 706 CIP Standard directives. The Commission seeks comments from 
NERC and other parties concerning this proposal. Further, NERC and 
other parties may propose and support an alternative compliance 
deadline.

IV. Information Collection Statement

    68. The Office of Management and Budget (OMB) regulations require 
that OMB approve certain reporting and recordkeeping requirements 
(collections of information) imposed by an agency.\69\ The information 
contained here is also subject to review under section 3507(d) of the 
Paperwork Reduction Act of 1995.\70\ We will submit this proposed rule 
to OMB for review.
---------------------------------------------------------------------------

    \69\ 5 CFR 1320.11.
    \70\ 44 U.S.C. 3507(d).
---------------------------------------------------------------------------

    69. As stated above, the Commission previously approved Reliability 
Standards similar to the proposed Reliability Standards that are the 
subject of the current rulemaking.\71\
---------------------------------------------------------------------------

    \71\ North American Electric Reliability Corporation, 130 FERC ] 
61,271 (2010).
---------------------------------------------------------------------------

    70. The principal differences in the information collection 
requirements and resulting burden imposed by the proposed Reliability 
Standards in this rule are triggered by the proposed changes in 
Reliability Standard CIP-002-4. The previous risk-based assessment 
methodology for identifying Critical Assets will be replaced by 17 
uniform ``bright line'' criteria for identifying Critical Assets (in 
CIP-002-4, Attachment 1, ``Critical Asset Criteria''). Proposed 
Reliability Standard CIP-002-4 would require each responsible entity to 
use the bright line criteria as a ``checklist'' to identify Critical 
Assets, initially and in an annual review, instead of performing the 
more technical and individualized risk analysis involved in complying 
with the currently-effective CIP Reliability Standards. As in past 
versions, each Responsible Entity will then identify the Critical Cyber 
Assets associated with its updated list of Critical Assets. If 
application of the bright line criteria result in the identification of 
new Critical Cyber Assets, such assets become subject to the remaining 
standards (proposed CIP-003-4, CIP-004-4, CIP-005-4a, CIP-006-4c, CIP-
007-4, CIP-008-4, and CIP-009-4), and the information collection 
requirements contained therein.
    71. We estimate that the burden associated with the annual review 
of the assets (by the estimated 1,501 entities) will be simplified by 
the ``Critical Asset Criteria'' in proposed Reliability Standard CIP-
002-4. Rather than each entity annually reviewing and updating a Risk-
Based Assessment Methodology that frequently required technical 
analysis and judgment decisions, the proposed bright line criteria will 
provide a straight forward checklist for all entities to use. Thus, we 
estimate that the proposal will reduce the burden associated with the 
annual review, as well as provide a consistent and clear set of 
criteria for all entities to follow.
    72. The estimated changes to burden as contained in the proposed 
rule in RM11-11 follow.

[[Page 58739]]



--------------------------------------------------------------------------------------------------------------------------------------------------------
                                                                                                                                         Annual burden
   FERC-725B Data  collection (per      Number of  respondents   Average number of     Average number of     Effect of NOPR in RM11-      hours upon
         proposed Version 4)                     \72\            annual responses       burden hours per       11, on total  annual    implementation of
                                                                  per respondent         response \73\                hours                 RM11-11
                                       (1)....................                 (2)  (3)....................  (1) x (2) x (3)........
--------------------------------------------------------------------------------------------------------------------------------------------------------
Entities that (previously and now)     345 [no change]........                   1  1,880 [reduction of 40   reduction of 13,800                 648,600
 will identify at least one Critical                                                 hours from 1,920 to      hours.
 Cyber Asset [category a].                                                           1,880 hours].
Entities that (previously and now)     1,144 [reduction of 12                    1  120 [no change]........  Reduction of 1,440                  137,280
 will not identify any Critical Cyber   entities from 1156 to                                                 hours [for the 12
 Assets [category b].                   1,144].                                                               entities].
Entities that will newly identify a    increase of 12                            1  3,840 \75\.............  increase of 46,080.....              46,080
 Critical Asset/Critical Cyber Asset    [formerly 0].
 due to the requirements in RM11-11
 \74\ [category c].
                                      ------------------------------------------------------------------------------------------------------------------
    Net Total........................  1,501 \72\.............  ..................  .......................  +30,840................             831,960
--------------------------------------------------------------------------------------------------------------------------------------------------------

    The revisions to the cost estimates based on requirements of this 
proposed rule are:
---------------------------------------------------------------------------

    \72\ The NERC Compliance Registry as of 9/28/2010 indicated that 
2,079 entities were registered for NERC's compliance program. Of 
these, 2,057 were identified as being U.S. entities. Staff concluded 
that of the 2,057 U.S. entities, approximately 1,501 were registered 
for at least one CIP related function. According to an April 7, 2009 
memo to industry, NERC noted that only 31% of entities responding to 
an earlier survey reported that they had at least one Critical 
Asset, and only 23% reported having a Critical Cyber Asset. Staff 
applied the 23% (an estimate unchanged for Version 4 standards) to 
the 1,501 figure to estimate the number of entities that identified 
Critical Assets under Version 3 CIP Standards.
    \73\ Calculations for figures prior to applying reductions:
    Respondent category b:
    3 employees x (working 50%) x (40 hrs/week) x (2 weeks) = 120 
hours.
    Respondent category c:
    20 employees x (working 50%) x (40 hrs/week) x (8 weeks) = 3200 
hours.
     20 employees x (working 20%) x (3200 hrs) = 640 hours.
     Total = 3840.
    Respondent category a:
    50% of 3840 hours (category d) = 1920.
    \74\ We estimate 12 (or 1%) of the existing entities that 
formerly had no identified Critical Cyber Assets will have them 
under the proposed Reliability Standards. This proposed rule does 
not affect the burden for the 6 new U.S. Entities that were 
estimated to newly register or otherwise become subject to the CIP 
Standards each year in FERC-725B, and therefore are not included in 
this chart.
    \75\ This estimated burden estimate applies only to the first 
three year audit cycle. In subsequent audit cycles these entities 
will move into category a, or be removed from the burden as an 
entity that no longer is registered for a CIP related function.
---------------------------------------------------------------------------

     Each entity that has identified Critical Cyber Assets has 
a reduction of 40 hours (345 entities x 40 hrs. x @$96/hour = 
$1,324,800 reduction).
     12 Entities that formerly had not identified Critical 
Cyber Assets, but now will have them, has
    [cir] A reduction of 120 hours and an increase of 3,840 hours (for 
a net increase of 3,720 annual hours), giving 12 entities x 3,720 
hrs.@$96/hour = $4,285,440.
    [cir] Storage costs = 12 entities@$15.25/entity = $183.
    Total Net Annual Cost for the FERC-725B requirements contained in 
the NOPR in RM11-11 = $2,960,823 ($4,285,440 + $183 -$1,324,800).
    The estimated hourly rate of $96 is the average cost of legal 
services ($230 per hour), technical employees ($40 per hour) and 
administrative support ($18 per hour), based on hourly rates from the 
Bureau of Labor Statistics (BLS) and the 2009 Billing Rates and 
Practices Survey Report.\76\ The $15.25 per entity for storage costs is 
an estimate based on the average costs to service and store 1 GB of 
data to demonstrate compliance with the CIP Standards.\77\
---------------------------------------------------------------------------

    \76\ Bureau of Labor Statistics figures were obtained from 
http://www.bls.gov/oes/current/naics2_22.htm, and 2009 Billing 
Rates figure were obtained from http://www.marylandlawyerblog.com/2009/07
/average_hourly_rate_for_lawyer.html. Legal services were 
based on the national average billing rate (contracting out) from 
the above report and BLS hourly earnings (in-house personnel). It is 
assumed that 25% of respondents have in-house legal personnel.
    \77\ Based on the aggregate cost of an advanced data protection 
server.
---------------------------------------------------------------------------

    Title: Mandatory Reliability Standards, Version 4 Critical 
Infrastructure Protection Standards.
    Action: Proposed Collection FERC-725B.
    OMB Control No.: 1902-0248.
    Respondents: Businesses or other for-profit institutions; not-for-
profit institutions.
    Frequency of Responses: On Occasion.
    Necessity of the Information: This proposed rule proposes to 
approve the requested modifications to Reliability Standards pertaining 
to critical infrastructure protection. The proposed Reliability 
Standards help ensure the reliable operation of the Bulk-Power System 
by providing a cybersecurity framework for the identification and 
protection of Critical Assets and associated Critical Cyber Assets. As 
discussed above, the Commission proposes to approve NERC's proposed 
Version 4 CIP Standards pursuant to section 215(d)(2) of the FPA 
because they represent an improvement to the currently-effective CIP 
Reliability Standards.
    Internal Review: The Commission has reviewed the proposed 
Reliability Standards and made a determination that its action is 
necessary to implement section 215 of the FPA.
    73. Interested persons may obtain information on the reporting 
requirements by contacting the following: Federal Energy Regulatory 
Commission, 888 First Street, NE., Washington, DC 20426 [Attention: 
Ellen Brown, Office of the Executive Director, e-mail: 
DataClearance@ferc.gov, phone: (202) 502-8663, fax: (202) 273-0873].
    74. For submitting comments concerning the collection(s) of 
information and the associated burden estimate(s), please send your 
comments to the Commission, and to the Office of Management and Budget, 
Office of Information and Regulatory Affairs,

[[Page 58740]]

Washington, DC 20503 [Attention: Desk Officer for the Federal Energy 
Regulatory Commission, phone: (202) 395-4638, fax: (202) 395-7285]. For 
security reasons, comments to OMB should be submitted by e-mail to: 
oira_submission@omb.eop.gov. Comments submitted to OMB should include 
Docket Number RM11-11 and OMB Control Number 1902-0248.

V. Environmental Analysis

    75. The Commission is required to prepare an Environmental 
Assessment or an Environmental Impact Statement for any action that may 
have a significant adverse effect on the human environment.\78\ The 
Commission has categorically excluded certain actions from this 
requirement as not having a significant effect on the human 
environment. Included in the exclusion are rules that are clarifying, 
corrective, or procedural or that do not substantially change the 
effect of the regulations being amended.\79\ The actions proposed here 
fall within this categorical exclusion in the Commission's regulations.
---------------------------------------------------------------------------

    \78\ Order No. 486, Regulations Implementing the National 
Environmental Policy Act of 1969, FERC Stats. & Regs., Regulations 
Preambles 1986-1990 ] 30,783 (1987).
    \79\ 18 CFR 380.4(a)(2)(ii).
---------------------------------------------------------------------------

VI. Regulatory Flexibility Act Certification

    76. The Regulatory Flexibility Act of 1980 (RFA) \80\ generally 
requires a description and analysis of final rules that will have a 
significant economic impact on a substantial number of small entities. 
The RFA mandates consideration of regulatory alternatives that 
accomplish the stated objectives of a proposed rule and that minimize 
any significant economic impact on a substantial number of small 
entities. The Small Business Administration's (SBA) Office of Size 
Standards develops the numerical definition of a small business.\81\ 
The SBA has established a size standard for electric utilities, stating 
that a firm is small if, including its affiliates, it is primarily 
engaged in the transmission, generation and/or distribution of electric 
energy for sale and its total electric output for the preceding twelve 
months did not exceed four million megawatt hours.\82\
---------------------------------------------------------------------------

    \80\ 5 U.S.C. 601-612.
    \81\ 13 CFR 121.101.
    \82\ 13 CFR 121.201, Sector 22, Utilities & n.1.
---------------------------------------------------------------------------

    77. The Commission analyzed the affect of the proposed rule on 
small entities. The Commission's analysis found that the DOE's Energy 
Information Administration (EIA) reports that there were 3,276 electric 
utility companies in the United States in 2009,\83\ and 3,015 of these 
electric utilities qualify as small entities under the Small Business 
Administration (SBA) definition. Of these 3,276 electric utility 
companies, the EIA subdivides them as follows: (1) 875 Cooperatives of 
which 843 are small entity cooperatives; (2) 1,841 municipal utilities, 
of which 1,826 are small entity municipal utilities; (3) 128 political 
subdivisions, of which 115 are small entity political subdivisions; (4) 
171 power marketers, of which 113 individually could be considered 
small entity power marketers; \84\ (5) 200 privately owned utilities, 
of which 93 could be considered small entity private utilities; (6) 24 
state organizations, of which 14 are small entity state organizations; 
and (7) 9 federal organizations of which 4 are small entity federal 
organizations.
---------------------------------------------------------------------------

    \83\ See Energy Information Administration Database, Form EIA-
861, Dept. of Energy (2009), available at 
http://www.eia.doe.gov/cneaf/electricity/page/eia861.html.
    \84\ Most of these small entity power marketers and private 
utilities are affiliated with others and, therefore, do not qualify 
as small entities under the SBA definition.
---------------------------------------------------------------------------

    78. Many of the entities that have not previously identified 
Critical Assets and Critical Cyber Assets are considered small 
entities. The new CIP version 4 bright line criteria generally result 
in the identification of relatively larger Bulk-Power System equipment 
as Critical Assets. For the most part, the small entities do not own or 
operate these larger facilities. There is a limited possibility that 
these entities would have facilities that meet the bright line criteria 
and therefore be subject to the full CIP standards (CIP-002 through 
CIP-009). The Commission expects only a marginal increase in the number 
of small entities that will identify at least one Critical Asset under 
the Version 4 CIP Reliability Standards that have not done so 
previously.
    79. The Commission estimates that only one percent (12) of the 
small and medium-sized entities that have not previously identified 
Critical Assets and Critical Cyber Assets will have an increased cost 
due to the proposed Reliability Standards and their identification of 
new Critical Cyber Assets. For each of those 12 entities, we anticipate 
a cost increase associated with creating a cyber security program along 
with the actual cyber security protections associated with the 
identified Critical Cyber Assets. The Commission requests comment on 
the potential implementation cost and subsequent cost increases that 
could be experienced by such small entities. Small and medium-sized 
entities that continue to have no Critical Assets will not see any 
change in their burden.
    80. In general, the majority of small entities are not required to 
comply with mandatory Reliability Standards because they are not 
regulated by NERC pursuant to the NERC Registry Criteria. Moreover, a 
small entity that is registered but does not identify critical cyber 
assets pursuant to CIP-002-4 will not have compliance obligations 
pursuant to CIP-003-4 through CIP-009-4.
    81. The Commission also investigated possible alternatives. These 
included the Commission's adoption in Order No. 693 of the NERC 
definition of bulk electric system, which reduces significantly the 
number of small entities responsible for compliance with mandatory 
Reliability Standards. The Commission also noted that small entities 
could join a joint action agency or similar organization, which could 
accept responsibility for compliance with mandatory Reliability 
Standards on behalf of its members and also may divide the 
responsibility for compliance with its members.
    82. Based on the foregoing, the Commission certifies that the 
proposed Reliability Standards will not have a significant impact on a 
substantial number of small entities. Accordingly, no regulatory 
flexibility analysis is required.

VII. Comment Procedures

    83. The Commission invites interested persons to submit comments on 
the matters and issues proposed in this notice to be adopted, including 
any related matters or alternative proposals that commenters may wish 
to discuss. Comments are due November 21, 2011. Comments must refer to 
Docket No. RM11-11-000, and must include the commenter's name, the 
organization they represent, if applicable, and their address in their 
comments.
    84. The Commission encourages comments to be filed electronically 
via the eFiling link on the Commission's Web site at http://www.ferc.gov. 
The Commission accepts most standard word processing 
formats. Documents created electronically using word processing 
software should be filed in native applications or print-to-PDF format 
and not in a scanned format. Commenters filing electronically do not 
need to make a paper filing.
    85. Commenters unable to file comments electronically must mail or 
hand deliver an original copy of their comments to: Federal Energy 
Regulatory Commission, Secretary of the Commission, 888 First Street, 
NE., Washington, DC 20426.

[[Page 58741]]

    86. All comments will be placed in the Commission's public files 
and may be viewed, printed, or downloaded remotely as described in the 
Document Availability section below. Commenters on this proposal are 
not required to serve copies of their comments on other commenters.

VIII. Document Availability

    87. In addition to publishing the full text of this document in the 
Federal Register, the Commission provides all interested persons an 
opportunity to view and/or print the contents of this document via the 
Internet through the Commission's Home Page (http://www.ferc.gov) and 
in the Commission's Public Reference Room during normal business hours 
(8:30 a.m. to 5 p.m. Eastern time) at 888 First Street, NE., Room 2A, 
Washington, DC 20426.
    88. From the Commission's Home Page on the Internet, this 
information is available on eLibrary. The full text of this document is 
available on eLibrary in PDF and Microsoft Word format for viewing, 
printing, and/or downloading. To access this document in eLibrary, type 
the docket number excluding the last three digits of this document in 
the docket number field.
    89. User assistance is available for eLibrary and the Commission's 
Web site during normal business hours from FERC Online Support at 202-
502-6652 (toll free at 1-866-208-3676) or e-mail at 
ferconlinesupport@ferc.gov, or the Public Reference Room at (202) 502-
8371, TTY (202) 502-8659. E-mail the Public Reference Room at  
public.referenceroom@ferc.gov.

List of Subjects in 18 CFR Part 40

    Electric power, Electric utilities, Reporting and recordkeeping 
requirements.

    By direction of the Commission.
Nathaniel J. Davis, Sr.,
Deputy Secretary.
[FR Doc. 2011-24102 Filed 9-21-11; 8:45 am]
BILLING CODE 6717-01-P



Frankfurter Allgemeine Zeitung (FAZ) über die Wirtschaftskriminellen der “GoMoPa” und Ihre “Partner”

http://www.faz.net/artikel/C30350/wirtschaftskriminalitaet-grossrazzia-wegen-verdachts-auf-insiderhandel-30309286.html

Occupy Wall Street Photos 21 September 2011, Day 5

Occupy Wall Street Photos 21 September 2011, Day 5

Wall and Broad Streets at the New York Stock Exchange Closed[Image][Image]
Liberty Square Camp, 7:20 AM, Mostly Asleep[Image]
Preliminary Schedule for 21 September 2011[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image][Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]

TOP-SECRET – Colombian Paramilitaries and the United States: “Unraveling the Pepes Tangled Web”

Wanted Poster: Pablo Escobar Gaviria, ca. 1993

Washington, D.C., September 21, 2011 – U.S. espionage operations targeting top Colombian government officials in 1993 provided key evidence linking the U.S.-Colombia task force charged with tracking down fugitive drug lord Pablo Escobar to one of Colombia’s most notorious paramilitary chiefs, according to a new collection of declassified documents published today by the National Security Archive. The affair sparked a special CIA investigation into whether U.S. intelligence was shared with Colombian terrorists and narcotraffickers every bit as dangerous as Escobar himself.

The new documents, released under the U.S. Freedom of Information Act, are the most definitive declassified evidence to date linking the U.S. to a Colombian paramilitary group and are the subject of an investigation published today in Colombia’s Semana magazine.

The documents reveal that the U.S.-Colombia Medellin Task Force, known in Spanish as the Bloque de Búsqueda or ‘Search Block,’ was sharing intelligence information with Fidel Castaño, paramilitary leader of Los Pepes (Perseguidos por Pablo Escobar or ‘People Persecuted by Pablo Escobar’), a clandestine terrorist organization that waged a bloody campaign against people and property associated with the reputed narcotics kingpin. One cable describes a key meeting from April 1993 where, according to sensitive US intelligence sources, Colombian National Police director General Miguel Antonio Gómez Padilla said “that he had directed a senior CNP intelligence officer to maintain contact with Fidel Castano, paramilitary leader of Los Pepes, for the purposes of intelligence collection.”

The no-holds-barred search for Escobar began in July 1992 after his escape from a luxury prison where he had been confined since surrendering under a special plea agreement with Colombian authorities. U.S. anti-narcotics strategy in Colombia was intensely focused on Escobar, the legendary Medellín Cartel kingpin who for years had waged a violent campaign of bombings and assassinations against Colombian law enforcement. This gloves-off strategy forged alliances between Colombian intelligence agencies, rival drug traffickers and disaffected former Escobar associates like Castaño, the godfather of a new generation of narcotics-fueled paramilitary forces that still plagues Colombia today.

The new collection also sheds light on the role of U.S. intelligence agencies in Colombia’s conflict—both the close cooperation with Colombian security forces evident in the Task Force as well as the highly-sensitive U.S. intelligence operations that targeted the Colombian government itself. Key information about links between the Task Force and the Pepes was derived from U.S. intelligence sources that closely monitored meetings between the Colombian president and his top security officials.

Several of the documents included in this collection were released as the result of a lawsuit under the Freedom of Information Act brought by the Institute for Policy Studies (IPS), a Washington-based policy group. To support its request, IPS relied on information revealed in Mark Bowden’s 2001 book, Killing Pablo, a work that drew heavily on classified sources and interviews with former U.S. and Colombian officials. Since then, the National Security Archive has been working to assemble a definitive collection of declassified documents on the Pepes episode, precisely because the documents cited by Bowden have yet to see the light of day.

“The collaboration between paramilitaries and government security forces evident in the Pepes episode is a direct precursor of today’s ‘para-political’ scandal,” said Michael Evans, director of the National Security Archive’s Colombia Documentation Project. “The Pepes affair is the archetype for the pattern of collaboration between drug cartels, paramilitary warlords and Colombian security forces that developed over the next decade into one of the most dangerous threats to Colombian security and U.S. anti-narcotics programs. Evidence still concealed within secret U.S. intelligence files forms a critical part of that hidden history.”

“Sensitive PALO Reporting”

The documents include two heavily-censored CIA memos (Documents 25 and 28) describing briefings provided by members of a “Blue Ribbon Panel” of CIA investigators to members of U.S. congressional intelligence committees and the National Security Council. The Panel—which included personnel from the CIA’s directorate for clandestine intelligence operations—had been investigating the possibility that intelligence shared with the Medellín Task Force in 1993 ended up in the hands of Colombian paramilitaries and narcotraffickers from the Pepes. That investigation concluded on December 3, 1993, the day Escobar was killed.

The CIA Panel aimed to compile a complete inventory of all U.S. intelligence information shared with the Task Force that may have been passed to the Pepes. And while the group’s conclusions were not declassified, the briefing led one congressional staffer to comment that it was “one of the most bizarre stories” that he had ever heard, and to question why the CIA had been chosen to look into the matter rather than “some outside element.” Why, in other words, would the CIA be put in charge of an investigation that so directly implicated the Agency itself?

For months, U.S. intelligence had been reporting about Task Force links with the Pepes:

  • The Embassy suspected some level of cooperation between Los Pepes and the Task Force as early as February 1993, when it reported that the Pepes attacks could be the work of “rogue policemen taking advantage of the rash of bombings to give Escobar a taste of his own medicine.” (Document 8)
  • A secret CIA report from March 1993 found that, “Unofficial paramilitary groups with a variety of backgrounds and motives are assisting Bogota’s efforts against both the Medellin druglord Pablo Escobar and radical leftist insurgents. (Document 10)
  • Around the same time, the CIA reported that the Colombian defense minister, Rafael Pardo, was “concerned that the police are providing intelligence to Los Pepes.” In a document titled, “Colombia: Extralegal Steps Against Escobar Possible,” Agency analysts predicted that President Gaviria’s “demand for an intensified effort to capture Escobar may lead some subordinates to rely more heavily on Los Pepes and on extralegal means.” [Emphasis added] (Document 15)

By far the most detailed declassified record on the Pepes affair, the August 1993 Embassy cable, “Unraveling the Pepes Tangled Web,” reveals that the Colombian government was both the recipient of U.S. intelligence information and the target of U.S. intelligence operations. Just as technical and investigative intelligence techniques tracked Escobar’s movements and communications, other agents eavesdropped on the Colombian president’s inner circle.

The most important information in the cable is attributed to “PALO” sources, an acronym that likely refers to the CIA. One indication of this is the fact that the cable—which includes the sensitive “NODIS” designation, limiting its distribution to a highly-select group of addressees—was referred to CIA before declassification.

According to the cable, Colombian prosecutor Gustavo DeGreiff had “new, ‘very good’ evidence linking key members of the police task force in Medellin charged with capturing Pablo Escobar Gaviria (the “Bloque de Busqueda”) to criminal activities and human rights abuses committed by Los Pepes.”

The cable describes a series of meetings from the previous April, including one where, according to “PALO” intelligence sources, Colombian National Police director General Miguel Antonio Gómez Padilla said “that he had directed a senior CNP intelligence officer to maintain contact with Fidel Castano, paramilitary leader of Los Pepes, for the purposes of intelligence collection.”

A few days later, “PALO” reported that Colombian President César Gaviria ordered intelligence cooperation with Los Pepes to cease and told police intelligence commander General Luis Enrique Montenegro Rinco, “to ‘pass the word’ that Los Pepes must be dissolved immediately.” Montenegro, according to the source, “was not a member of Los Pepes, but as commander of police intelligence knew some of the members, and was aware of their activities.”

The very fact that Gaviria chose to deliver his message to Los Pepes through one of his senior police commanders was also significant, according to the Embassy, as an indication that “the president believed police officials were in contact with Los Pepes.”

“Fidel Castano, Super Drug-Thug”

Besides the possible transfer of U.S. intelligence to the Pepes, a big concern among U.S. officials was the possibility that information connecting the Pepes to the Task Force—or an official investigation into the matter—would undermine the anti-Escobar effort and could provide significant leverage to the Cali Cartel in surrender negotiations with the Colombian government.

The Embassy reported in the “Tangled Web” cable that President Gaviria “must deal with the issue in such a way as to remove the offenders, but at the same time, not discredit the police efforts against Escobar.” (Document 20)

If Cali has concrete information of Bloque misdeeds that could embarrass the [Government of Colombia], it could be a powerful tool as they pursue surrender negotiations… The implication of key police officials and perhaps other high-level [Colombian government] officials in these activities, or the fact that high-level officers may be operating in the pay of the Cali cartel, could dramatically improve Cali’s position.

An Embassy post-mortem cable on the Escobar affair, written less than a month after his death, similarly reported that “any substantiation of Cali-police complicity in the activities of Los Pepes would have seriously damaged the Bloque’s credibility in their efforts against Escobar.” (Document 30)

More importantly, U.S. military intelligence doubted that the Gaviria government was sincere about cracking down on Castaño’s gang, questioning whether it made sense to target a group that shared a common enemy: leftist Colombian guerrilla groups. One briefing document prepared by the U.S. Defense Intelligence Agency in the midst of the Pepes episode concluded that the Colombian government’s willingness to pursue Pepes military chief Castaño “may depend more on how his paramilitary agenda complements Bogota’s counterinsurgent objectives rather than on his drug trafficking activities.” (Document 16)

By May 1994, only five months after the Task Force was dissolved, the State Department’s intelligence branch was calling Fidel Castaño a “super drug-thug” and “one of Colombia’s most ruthless criminals” who “could become a new Escobar.” Castaño, the report read, “is more ferocious than Escobar, has more military capability, and can count on fellow antiguerrillas in the Colombian Army and the Colombian National Police.” It was, State reported, “unlikely that police or military officials would be willing to vigorously search for him if he did, in fact, act as an intermediary to deliver Cali bribes to senior police and military officers.” (Document 32)

The warnings proved to be deadly accurate. While Fidel disappeared in the mid-1990s and is presumed dead, his brother, Carlos Castaño, took over after Fidel’s disappearance, uniting and strengthening Colombia’s paramilitary armies under the banner of the United Self-Defense Forces of Colombia (AUC), a ruthless killing machine that vied with guerrilla groups for control of the country’s lurcrative drug trade and which for many years met with little to no resistance from government security forces. A third Castaño brother, Vicente, allegedly murdered his brother Carlos and is said to be leading a new generation of Colombian narco-paramilitary groups.

Concerns that former Pepes would use their knowledge of official corruption to extract concessions from the Colombian government in surrender agreements resontate in the ongoing negotations with demobilized paramilitary leaders under the Justice and Peace law. Unlike the Cali traffickers–many of whom actually were taken down by authorities in the years that followed–Castaño and many of the other paramilitary thugs from Los Pepes largely escaped justice and have gone on to become major drug trafficking and paramilitary bosses in their own right. Former Pepe Diego Fernando “Don Berna” Murillo is currently in custody and seeking a reduced sentence under the law.

Hidden History

Unfortunately, the vast majority of U.S. diplomatic and intelligence reporting on Los Pepes remains classified. A more complete declassified account of the matter—including the conclusions of the CIA investigation—would be of tremendous value both to historians and to ongoing peace and reconciliation efforts in Colombia. Among other things, the release of this material would support the Colombian government’s National Commission on Reparation and Reconciliation (CNRR) in the production of its report on the emergence and evolution of Colombia’s illegal armed groups.

At issue is the exact nature of the relationship between the U.S.-Colombia Task Force and narco-terrorists led by Fidel Castaño, perhaps the most important single figure in the birth of Colombia’s modern paramilitary movement. While it is certain that the Task Force was exchanging information with Castaño and Los Pepes, we do not know how long the Task Force maintained these ties and whether the relationship was sanctioned—either tacitly or explicitly—by U.S. participants in the Task Force, the Embassy, or at a more senior level of the U.S. government.

And while we know about the CIA’s investigation, its conclusions are far from clear. Nor is it at all certain that the “Blue Ribbon Panel,” which issued its findings only days after Escobar was killed, was the final word on the matter. Until the CIA is forced to open its files on the Pepes, we may never fully understand one of the key periods in the history of Colombian paramilitarism.


Read the Documents
Note: The following documents are in PDF format.
You will need to download and install the free Adobe Acrobat Reader to view.

U.S. Intelligence and Colombian Narcotics Cartels

Document 1
1992 July 29
ARA Guidances, Wednesday, July 29, 1992 [Colombia: Chasing Escobar]

Department of State cable, Unclassified, 4 pp.
Source: State Department declassification release under FOIA

Department of State press guidance prepared just after Escobar’s escape from confinement indicates that Colombia has the “full support” of the U.S. in the search for Escobar.

Document 2
1992 July 31
Council of State Plans Hearings on Overflights, Gaviria Responds
U.S. Embassy Bogotá cable, Confidential, 5 pp.
Source: State Department declassification release under FOIA

Challenged over his decision permitting U.S. overflights of Colombian territory, Colombian President César Gaviria says that his order was constitutional and, according to this cable, “that the Colombian police authorities need the technical assistance of the [U.S. government] in order to find Pablo Escobar. Gaviria’s explains that the U.S. C-130 aircraft “carry technical equipment, not armament” and are not “warplanes,” and that his authorization of the overflights without informing the Council of State should thus not trigger any constitutional concerns.

Document 3
1992 August 10

GoC to Begin Hitting Narcs on All Fronts
U.S. Embassy Bogotá cable, Confidential, 17 pp.
Source: State Department declassification release under FOIA

Shortly after Escobar’s escape from confinement, Colombian Defense Minister Rafael Pardo assured Ambassador Busby that Colombia would “apply pressure on all the narco trafficking fronts” and that he had “ordered acting Armed Forces Commander General Manual Alberto Murillo Gonzalez to develop a plan that fully involved the Army, Navy and Air Force. The heavily-excised document adds that, “Pardo’s enthusiasm and determination to go after the narcos using all of the above tactics fits squarely with our counternarcotics interests in Colombia. We need to be as responsive as possible to the [Colombian government’s] requests for assistance.”

Document 4
1992 August 11

Monthly Status Report – July 1992
U.S. Embassy Bogotá cable, Confidential, 16 pp.
Source: State Department declassification release under FOIA

A brief Embassy post-mortem on Escobar’s escape during an operation to move him to a conventional prison, calls the affair “an example of the correct strategic decision (to shut Escobar down) executed with unbelievable incompetence,” concluding that corruption was “the determining factor.” The cable reports that the Colombian government “has launched a full-court press to capture Escobar” and that the Embassy was “now looking at longer-range tactics.” Well-publicized U.S. intelligence overflights of Colombia “may have spooked” Escobar, according to the report.

Document 5
1992 September 28

Results of General Joulwan Visit to Colombia
U.S. Embassy Bogotá cable, Confidential, 16 pp.
Source: State Department declassification release under FOIA

Following the visit to Colombia by General George Joulwan, commander-in-chief of U.S. Southern Command, the Embassy reports that he met with Embassy staff for a discussion focused on “the US/Colombian effort to capture Escobar.” Much of the remainder of this heavily-censored cable concerns the importance of strengthening  both U.S.-Colombia intelligence cooperation and military-police coordination in Colombia.

Document 6
1992 December 04

Colombians to Continue the Fight Through the Holidays
U.S. Embassy Bogotá cable, Secret, 4 pp.
Source: State Department Appeals Review Panel declassification release under FOIA

Colombian government contacts have assured U.S. Embassy staff “that no operational unit commanders are being granted holiday leave” and that, “Police continue planning operations involving interdiction, fumigation, hunt for Pablo Escobar, and visits by senior officers to field operating units.”

Document 7
1993 March 29

Beyond Support Justice IV (SJIV)
U.S. Embassy Bogotá cable, Secret, 12 pp.
Source: State Department declassification release under FOIA

As the hunt for Escobar continues, Embassy reporting reflects its recommendation that the U.S. widen the scope of the counternarcotics effort in Colombia “to include the full array of military support” and going “far beyond” previous levels of assistance. The Embassy contrasts “increasingly successful” intelligence and operational cooperation under the “Support Justice” program with other bilateral policy issues where there is more friction (like trade). Among many other issues, the Embassy lauds the “great strides in tactical capability (which we provided) made in the search for Pablo Escobar.”

Los Pepes

Document 8
1993 February 01

Escobar Family Target of Medellin Bombings
U.S. Embassy Bogotá cable, Secret, 3 pp.
Source: State Department declassification release under FOIA

The Embassy speculates that recent attacks directed against Escobar family members are “almost certainly related, [and] perhaps carried out by[,] members of the Galeano-Moncada organization retaliating for Escobar’s murder of the two former colleagues.” Another possibility is that the attacks were the work of “rogue policemen taking advantage of the rash of bombings to give Escobar a taste of his own medicine.”

Document 9
1993 February 24

[Operation Envigado / Pablo Escobar-Gaviria]
U.S. Drug Enforcement Administration, Limited Official Use, 6 pp.
Source: DEA declassification release under FOIA

The DEA reports on the emergence of a new anti-Escobar group called Colombia Libre (Free Colombia) whose alleged purpose is “to employ and pay informants for information in connection with the whereabouts of Escobar and his cohorts.” The group claims to be non-violent and is said to “cooperate fully with government officials.” The report adds that “the Colombia Libre group does not command a great deal of credibility at this time.”

Document 10
1993 March
“Alliances of Military Convenience,” from Latin American Military Issues, Number 3
U.S. Central Intelligence Agency, Secret, extract, 2pp.

Source: CIA declassification release under FOIA

A classified CIA periodical on Latin American military issues reports that, “Unofficial paramilitary groups with a variety of backgrounds and motives are assisting Bogota’s efforts against both the Medellin druglord Pablo Escobar and radical leftist insurgents.”

Document 11
1993 April 06

Monthly Status Report – March 1993
U.S. Embassy Bogotá cable, Confidential, 7 pp.
Source: State Department declassification release under FOIA

This Embassy “summary of significant events” for March 1993 reports that the ebb in terrorist attacks attributed to Escobar’s organization “could be attributed to a combination of the unrelenting pressure exerted by the Colombian security forces and the Pepes (People Persecuted by Pablo Escobar) against Escobar and his associates.” So far in March, “four top lieutenants of Pablo Escobar were killed—two by Colombian security forces and two by the Pepes,” according to the Embassy.

Document 12
1993 April 06

GoC Denies Negotiations in Response to Pepes
U.S. Embassy Bogotá cable, Confidential, 3 pp.
Source: State Department declassification release under FOIA

In response to allegations advanced by Los Pepes,Colombian officials deny that the government is negotiating the surrender of Pablo Escobar, adding that they “energetically reject any criminal form of fighting crime, as well as all types of private justice which attempt to assume responsibilities which correspond constitutionally to law enforcement authorities and the judiciary.”

Document 13
1993 April 15

GoC Foreign Policy Advisor on Latest Development in the Search for Escobar
U.S. Embassy Bogotá cable, Confidential, 3 pp.
Source: State Department declassification release under FOIA

In the midst of a series of high-level Colombian government meetings concerning ties between the Medellín Task Force and Los Pepes (see Document 20), the Embassy reports that President Gaviria’s foreign policy advisor, Gabriel Silva, had said in an April 13 meeting “that it was not entirely coincidental that publicity regarding the search for Pablo Escobar had cooled off somewhat in the past few weeks.” Silva told Ambassador Busby “that the GoC had become concerned about the expectations which had been built up concerning the Pablo Escobar Task Force (Bloque de Busqueda) in Medellin in the minds of the public” and that “expectations were running away from reality.”

Interestingly, a subsequent reference to this same meeting from the “Tangled Web” cable (Document 20) reports that Busby had met with Silva that day “to express his strongest reservations” about Los Pepes, indicating that he suspected links between Colombian security forces and the terrorist group. These reservations are not mentioned in the April 15 account of the meeting.

Document 14
1993 April 26

Los Pepes Declare Victory and Call it Quits
U.S. Embassy Bogotá cable, Confidential, 3 pp.
Source: State Department declassification release under FOIA

Shortly after the mid-April meetings described above (and in greater detail in the “Tangled Web” cable), Los Pepes announced that the group’s “military objective” against Escobar “has been completed in its majority” and that they would dissolve their organization in an effort to “assist the authorities, who in the end will be the ones to bring Pablo Escobar to justice.” The letter further requests that “if military actions against Pablo Escobar and his organization continue in the name of the ‘Pepes,’ that they launch an exhaustive investigation to determine the real perpetrators.”

Commenting, the Embassy says: “The entire Pepes episode has been bizarre at best,” citing “rumors … of government involvement with the Pepes at the local police and military level.” However, discussions with the Colombian government “lead us to believe it rejected the Pepes’ tactics, were [sic] fearful of the implications of the appearance of yet another criminal organization, and were [sic] sincere in their offer of rewards to try to stop the organization.”

The cable concludes with the Embassy’s promise to “offer our own speculation and such information as we have in a separate cable.”

Document 15
Undated, Ca. April 1993

Colombia: Extralegal Steps Against Escobar Possible
U.S. Central Intelligence Agency, Classification unknown, extract, 3pp.
Source: CIA declassification release under FOIA

A heavily-censored CIA intelligence report finds that Colombian President César Gaviria “is worried that his political leverage and economic program will suffer unless Pablo Escobar is captured soon.” Minster of Defense Rafael Pardo, meanwhile, “is concerned that the police are providing intelligence to Los Pepes, a violent paramilitary group of anti-Escobar traffickers.” The report concludes that while there is “no evidence Gaviria would sanction police support for Los Pepes, his demand for an intensified effort to capture Escobar my lead some subordinates to rely more heavily on Los Pepes and on extralegal means.”

Document 16
Undated, Ca. April 1993
Information Paper on “Los Pepes”
U.S. Defense Intelligence Agency, Secret, 4 pp.
Source: DIA declassification decision under FOIA

This DIA information paper prepared for the FBI provides general background information on Los Pepes, including its origins, composition and activities. The report finds that “Fidel Castano Gil,” identified as “chief of operations” for the Pepes, could pose new and different challenges in a post-Escobar era,” noting that “Castano’s drug trafficking activities provide him the financing necessary to further an anti-left agenda.” DIA concludes that the Colombian government’s willingness to take on Castaño “may depend more on how his paramilitary agenda complements Bogota’s counterinsurgent activities rather than on his drug trafficking activities.”

Document 17
1993 May 07
Text of Escobar’s Latest Letter to the Fiscal
U.S. Embassy Bogotá cable, Limited Official Use, 5 pp.

Source: State Department declassification release under FOIA

The Embassy forwards the unreleased text of a letter from Pablo Escobar to the Colombian attorney general, Gustavo De Greiff. Escobar says that the Pepes have not disbanded and that “it is simply a stratagem” to “get the government to stop running its little television reward offer” for information on the Pepes. Escobar blames Fidel Castaño, the Cali cartel, and others for his problems and suggests that he could never get justice in Colombia’s corrupt judicial system.

Document 18
1993 June 08
Los Pepes Deny Involvement in Anti-Escobar Terrorism
U.S. Embassy Bogotá cable, Classification unknown, 2 pp.

Source: State Department declassification release under FOIA

After the Pepes issued a communiqué denying responsibility for continuing attacks against Escobar associates, the Embassy comments that the Pepes likely are still involved in anti-Escobar terrorism “but publicly deny this in order to avoid [Colombian govnerment] persecution.”

Document 19
1993 July 08
Family Diaspora: Tracking Down the Escobars
U.S. Embassy Bogotá cable, Confidential, 5 pp.

Source: State Department Appeals Review Panel declassification release under FOIA

By July 1993, the Medellín Task Force and Los Pepes had Escobar on the run, and his family had spread out across the globe, as reported in this cable. The Embassy speculates that one reason for this might be that, “Pablo and his brother Roberto are trying to protect family members from reprisals similar to those the anti-Escobar group ‘Los Pepes’ conducted” earlier in 1993.

Document 20
1993 August 06

Unraveling the Pepes Tangled Web
U.S. Embassy Bogotá cable, Secret/NODIS, 10 pp.
Source: State Department Appeals Review Panel declassification release under FOIA
[NOTE: Portions of this document released on appeal appear with white letters on black background and can be difficult to read.]

By far the most detailed declassified record on the Pepes affair, this August 1993 Embassy cable reveals that the Colombian government was both the recipient of U.S. intelligence information and the target of U.S. intelligence operations. Just as technical and investigative intelligence techniques tracked Escobar’s movements and communications, other agents eavesdropped on the Colombian president’s inner circle.

The most important information in the cable is attributed to “PALO” sources, an acronym that probably refers to the CIA. One indication of this is the fact that the cable—which includes the sensitive “NODIS” designation, limiting its distribution to a highly-select group of addressees—was referred to CIA before declassification.

According to the cable, Colombian prosecutor Gustavo DeGreiff had “new, ‘very good’ evidence linking key members of the police task force in Medellin charged with capturing Pablo Escobar Gaviria (the “Bloque de Busqueda”) to criminal activities and human rights abuses committed by Los Pepes.”

The cable describes a series of meetings from the previous April, including one where, according to “PALO” intelligence sources, Colombian National Police director General Miguel Antonio Gómez Padilla said “that he had directed a senior CNP intelligence officer to maintain contact with Fidel Castano, paramilitary leader of Los Pepes, for the purposes of intelligence collection.”

A few days later, “PALO” reported that Colombian President César Gaviria ordered intelligence cooperation with Los Pepes to cease and told police intelligence commander General Luis Enrique Montenegro Rinco, “to ‘pass the word’ that Los Pepes must be dissolved immediately.” Montenegro, according to the source, “was not a member of Los Pepes, but as commander of police intelligence knew some of the members, and was aware of their activities.”

The very fact that Gaviria chose to deliver his message to Los Pepes through one of his senior police commanders was also significant, according to the Embassy, as an indication that “the president believed police officials were in contact with Los Pepes.”

The Embassy concludes that President Gaviria “must deal with the issue in such a way as to remove the offenders, but at the same time, not discredit the police efforts against Escobar.” Incriminating information about the Task Force known by the Cali Cartel “could be a powerful tool as they pursue surrender negotiations,” according to the cable, and “the implication of key police officials and perhaps other high-level [Colombian government] officials in these activities, or the fact that high-level officers may be operating in the pay of the Cali cartel, could dramatically improve Cali’s position.”

Document 21
1993 October 26
The Hunt for Escobar: Next Steps
U.S. State Department cable, Secret/NODIS, 2 pp.
Source: State Department declassification release under FOIA

In another highly-sensitve “NODIS” cable, the State Department, in a message meant exclusively for Ambassador Morris Busby or his deputy, requests a “detailed analysis” of certain U.S. support operations in Colombia connected to the “hunt for Pablo Escobar.” The analysis is to focus on the contribution of each support element and also “put into perspective the evolution of our participation and the Colombian effort.”

Noting with concern allegations of “human rights abuses” connected to the Escobar Task Force, the State Department also instructs the Embassy to press President Gaviria for the “immediate removal from duty” of a member of the Task Force “pending resolution of the investigation into the charges against him.” The cable references the August 6, 1993, “Tangled Web” cable, indicating that the issues discussed in that message–including specific information tying the U.S.-Colombia Task Force and the Colombian National Police to the Pepes–was probably the source of the State Department’s concern.

Document 22
1993 October 27
The Hunt for Escobar: Next Steps
U.S. Embassy Bogotá cable, Secret/NODIS, 2 pp.
Source: State Department declassification release under FOIA

Resonding to the State Department’s cable of October 26 (Document 21), Ambassador Busby says that the so-called “debate” about the future of U.S. “hunt for Pablo Escobar” operations “frankly mystifies” the Embassy. Busby notes that a “complete review of our intelligence and operations traffic so far reveals nothing extraordinary” and that nothing had changed over the last two-and-a-half months “which would prompt such a ‘debate.'” Busby adds that the Embassy “would very much appreciate the Department articulating to us the origin and substance of this debate.”

Document 23
1993 December 06

Colombian Law Enforcement Action Against Pablo Escobar
U.S. Department of State cable, Unclassified, 1 p.
Source: State Department declassification release under FOIA

Acting Secretary of State Peter Tarnoff sends a congratulatory cable to Ambassador Busby, commending his “success in coordinating the many U.S. government agencies which worked with the Colombian government for more than seventeen months to end Pablo Escobar’s ability to evade Colombian law.” Tarnoff wants to maintain momentum as they continue “efforts to strengthen Colombia’s ability to arrest, prosecute and imprison cartel kingpins.”

The Aftermath: Colombia After Escobar

Document 24
1993 November

The Illicit Drug Situation in Colombia
U.S. Drug Enforcement Administration, Drug Intelligence Report, Classification unknown, 67 pp.
Source: DEA declassification release under FOIA

This is an unclassified DEA overview of the illegal narcotics industry in Colombia.

Document 25
1993 December 06

Briefing of NSC and SSCI on “Los Pepes” Affair
Central Intelligence Agency memorandum for the record, Secret, 3 pp.
Source: CIA declassification release under FOIA

In two separate briefings, members of the CIA’s “Blue Ribbon Panel” on the Pepes matter—including officials from the Directorate of Operations and the chief of the CIA’s independent investigations unit—brief the National Security Council and Senate Select Committee on Intelligence staffers just days after Escobar is killed. Assembled in early November, the Panel was to look at whether U.S. intelligence information provided to the anti-Escobar Task Force was shared with members of the Pepes terror group, which was by then known to have connections to senior Colombian police officials leading the Task Force. The Panel told the NSC that the “Embassy Joint Task Force” on Escobar “maintained no record of information passed to the Colombians,” but that another source, excised from the declassified memo on the briefing, “kept a log of all information passed to the Colombians,” that the Panel was trying to obtain. The SSCI staff received a shorter briefing, asked no questions, and was not told about the existence of a separate log.

A separate memo reports the briefing given by the Panel to members of the House Permanent Select Committee on Intelligence (see Document 28)

Document 26
1993 December 17

President Gaviria Threatened by Escobar Associates
U.S. Embassy Bogotá cable, Secret, 4 pp.
Source: State Department declassification release under FOIA

A ‘Secret’ cable from the Embassy reports that President Gaviria had received a letter from Escobar’s group “The Extraditables” threatening to assassinate the president. Commenting, the Embassy says that “the threat from the Escobar organization is being interpreted as a retaliation against the government not only for the death of Escobar, but also for the favoritism the [Government of Colombia] is showing towards the Cali cartel.”

Document 27
1993 December 20

New National Police Chief Appointed
U.S. Embassy Bogotá cable, Confidential, 3 pp.
Source: State Department Appeals Review Panel declassification release under FOIA

Longtime Colombian National Police director General Miguel Antonio Gomez Padilla has resigned and will be replaced by General Octavio Vargas Silva, the man “who headed the successful anti-Escobar task force.” A portion of the cable redacted upon first review but later released by the State Department’s Appeals Review Panel says that Gomez “was especially disturbed over the influence of the Cali cartel in numerous levels of government” and that he “had simply had enough of the situation.” The career of General Vargas, the Embassy adds, has been tainted by “press reports which attributed part of his success in hunting Escobar to assistance by Cali traffickers.”

Document 28
1993 December 27

Briefing for HPSCI Staff on Results of “Los Pepes” Panel and on Death of Pablo Escobar
Central Intelligence Agency memorandum for the record, Secret, 6 pp.
Source: CIA declassification release under FOIA

In a briefing similar to those reported in Document 25, the CIA’s “Blue Ribbon Panel” on the Pepes affair met with staffers from the House Permanent Select Committee on Intelligence on December 6.

Attached to a memo about the meeting is a heavily-redacted copy of a paper on the “findings and conclusions” of the Panel. Also attached is a “background” paper on the Panel itself. The Panel “met full time from 8 November through 3 December 1993” and produced “daily ‘fact sheets’ for the [Executive Director] beginning on 15 November” as well as a “final Panel report” that “integrates these fact sheets.”

After the briefing, HPSCI staffer Dick Giza called the issue “one of the most bizarre stories” he’d ever heard of, “both in how it arose and how it was investigated,” asking why the investigation had not been assigned to an “outside element” like the President’s Foreign Intelligence Advisory Board (PFIAB).

Document 29
1994 January 04

Secret Witness Linked to Villa Alzate Missing
U.S. Embassy Bogotá cable, Confidential, 4 pp.
Source: State Department declassification release under FOIA

A news item on the disappearance of a former member of the anti-Escobar Task Force and secret paid witness of the attorney general’s office catches the Embassy’s attention. Ex-police agent Jaime Rincon Lezama (“Fernando”) disappeared in May 1993 and had been allegedly providing prosecutors with “information on the identities and activities of Los Pepes within the Bloque [Task Force].” Rincon reportedly worked for the former delegate attorney general for judicial police affairs, Guillermo Villa Alzate, who has been linked to the Cali cartel and “whose exact whereabouts remain unclear.” Despite Villa’s ties to the cartel, the Embassy comments that “it would be premature to discount altogether unofficial police participation in his disappearance considering that Fernando supposedly fingered over 10 of his former colleagues as operatives of Los Pepes.”

Document 30
1994 January 07

Villa Alzate Speaks: Denies Any Connection with Disappearance of Secret Witness
U.S. Embassy Bogotá cable, Confidential, 5 pp.
Source: State Department declassification release under FOIA

Former delegate attorney general for judicial police affairs and alleged Cali cartel conspirator Guillermo Villa Alzate reemerges to defend himself following accusations (detailed above) that he is connected to the disappearance of a former police official who had been providing him information on the Task Force’s connections to Los Pepes. The Embassy notes that the development “once again raises questions as to the extent of possible Cali cartel influence,” adding that “it is also clear that any substantiation of Cali-police complicity in the activities of Los Pepes would have seriously damaged the Bloque’s credibility in their efforts against Escobar.”

Document 31
1994 February 11

Presidential Contender Samper and Ambassador Discuss Narcotics, Political, and Economic Issues
U.S. Embassy Bogotá cable, Confidential, 9 pp.
Source: State Department declassification release under FOIA

Amidst a discussion about the death of Pablo Escobar, Colombian presidential candidate and later president Ernesto Samper tells U.S. Ambassador Myles Frechette that the Cali cartel “is worse” than Escobar “because its level of sophistication has permitted it to penetrate Colombian society at virtually all levels.” However, Samper says that “the door should be kept open for those who wish to exercise the option to use legal procedures” to dismantle the Cali cartel. Ambassador Frechette doubts that the Cali capos would hold up their end of the bargain, observing that “the cartel’s armed branch, the ‘Pepes’ was capable of assassinations and violent crime.” Samper campaign finance director and ex-justice minister Monica DeGreiff replies that “her sources within the cartel had warned her that the deal would greatly reduce the possibility of violence from ‘difficult to control cartel elements.'”

Document 32
1994 May 26
Profile of Fidel Castano, Super Drug-Thug
Department of State, Bureau of Intelligence and Research, Intelligence Assessment, Secret, 3 pp.

Source: State Department Appeals Review Panel declassification release under FOIA

This State Department intelligence profile of Fidel Castano says that the former Escobar strongman was “a principal leader of Los Pepes, which provided officials with information on the whereabouts of Escobar and attacked supporters and properties of Escobar.” Castano “reportedly acted as an intermediary between the Cali cartel and the Escobar search force.” The Pepes were “financially backed by the Cali cartel” and “reportedly had the tacit support of some senior Colombian police officials,” according to the report. The report details the Castano family’s long history of involvement in violent narcotrafficking and anti-guerrilla activities. According to the report, Castano is “more ferocious than Escobar, has more military capability, and can count on fellow antiguerrillas in the Colombian Army and the Colombian National Police.” The report says that Castano “hopes his work with Los Pepes will earn him judicial leniency,” adding that “it is unlikely that police or military officials would be willing to vigorously search for him if he did, in fact, act as an intermediary to deliver Cali bribes to senior police and military officers.”

Document 33
1994 June 30

Delivery of Demarche to President Gaviria
U.S. Department of State cable, Secret, 5 pp.
Source: State Department declassification release under FOIA

A toughly-worded diplomatic note to Colombian president-elect Ernesto Samper makes clear that the State Department expects results from the new administration, which has been tainted by a narcotics scandal. The State Department says that it is “deeply troubled by the information pointing to the influence of drug trafficking organizations” in Samper’s presidential campaign,” which create the impression “that drug traffickers have used intimidation and financial power to purchase influence in your administration.” The State Department also reminds the Embassy that “our bilateral relationship will be predicated on Samper taking a tough counternarcotics stance.”

Document 34
1994 September 07

GoC Overhauls Police Leadership
U.S. Embassy Bogotá cable, Confidential, 7 pp.
Source: State Department declassification release under FOIA

Colonel Hugo Martinez, commander of the “Search Bloc” that hunted down Pablo Escobar in 1993, is named director of the National Judicial Police (DIJIN) a special police intelligence organization. The Embassy notes that Martinez, “as head of the unit,” was “responsible for directing the actions of the Bloque,” which, according to the Colombian attorney general, had “a high incidence of human rights complaints” and about which there were “allegations that the Bloque (and Martinez) was closely tied with “Los Pepes” (a group committed to killing Pablo Escobar) because of their common goal.”

Document 35
1997 January 17

Police General Montenegro to Head DAS
U.S. Embassy Bogotá cable, Confidential, 3 pp.
Source: State Department declassification release under FOIA

In January 1997, Colombian National Police commander General Rosso Jose Serrano named Gen. Luis Enrique Montenegro Rinco, the former police intelligence commander, as the new director of the Administrative Security Department (DAS – similar to U.S. FBI). As police intelligence chief, Montenegro had been a key informational link between the Medellín Task Force and Los Pepes.

Document 36
2003 October 03

Medellin Snapshot
U.S. Embassy Bogotá cable, Confidential, 3 pp.
Source: State Department declassification release under FOIA

This 2003 ‘snapshot’ of Medellín reports that unidentified individuals had told the Embassy that, “elements of the army” were supportive of paramilitaries from the Nutibara Block, “composed of former leaders of the ultra-violent ‘Pepes’ group that played a key role in bringing down drug kingpin Pablo Escobar.”

TOP-SECRET – SOUTHERN CONE RENDITION PROGRAM: PERU’S PARTICIPATION

Former Peruvian President General Enrique Morales Bermudez (left) and and his Army chief Pedro Richter Prada (right) are among 140 South American military officers indicted in the investigation.
National Security Archive Electronic Briefing Book No. 244

Washington, D.C., September 21, 2011 – Declassified U.S. documents posted today on the Web by the National Security Archive (www.nsarchive.org) show that the U.S. government had detailed knowledge of collaboration between the Peruvian, Bolivian and Argentine secret police forces to kidnap, torture and “permanently disappear” three militants in a Cold War rendition operation in Lima in June 1980—but took insufficient action to save the victims.

The Archive’s documents are part of a sweeping Italian investigation of Condor that has issued arrest warrants for 140 former top officials from seven South American countries and, in the words of today’s New York Times, has “agitated political establishments up and down the continent.”

The documents address what has become known as “the case of the missing Montoneros,” a covert operation by a death squad unit of Argentina’s feared Battalion 601 to kidnap three members of a militant group living in Lima, Peru, on June 12, 1980, and render them through Bolivia back to Argentina. (A fourth member, previously captured, was brought to Lima to identify his colleagues and then disappeared with them.) “The present situation is that the four Argentines will be held in Peru and then expelled to Bolivia where they will be expelled to Argentina,” a U.S. official reported from Buenos Aires four days after Esther Gianetti de Molfino, María Inés Raverta and Julio César Ramírez were kidnapped in broad daylight in downtown Lima. “Once in Argentina they will be interrogated and then permanently disappeared.”

The case was first detailed at length in The Condor Years, a book by National Security Archive board member John Dinges. In his own book, The Pinochet File, Archive senior analyst Peter Kornbluh identified the Montonero operation as “one of the last recorded cases of a Condor operation.” Condor was founded in November 1975, in Santiago, Chile, by the Pinochet regime, which became known as “Condor One.” Operation Condor became infamous for terrorist activities after Chilean agents, in collaboration with Paraguay, planted a bomb under the car of former ambassador Orlando Letelier in September 1976, killing him and his colleague, Ronni Moffitt, in Washington D.C.

Peru’s former military ruler, General Enrique Morales Bermudez, has admitted authorizing the Montonero kidnappings but continues to deny that Peru was a member of Operation Condor. But a secret CIA report, dated August 22, 1978, and titled “A Brief Look at Operation Condor” described Condor as “a cooperative effort by intelligence/security services in several South American countries to combat terrorism and subversion. The original members included services from Chile, Argentina, Uruguay, Paraguay, Brazil and Bolivia. Peru and Ecuador recently became members.” (Emphasis added) A Chilean intelligence document confirms that Peru formally joined Operation Condor in March 1978.

A State Department cable dated several weeks after the kidnapping stated that “there seems to be little doubt that the Peruvian army, acting in concert with its Argentine counterpart, resorted to the kinds of illegal repressive measures more familiar in the Southern Cone” than Peru.

Italy’s indictments include General Morales Bermudez and his military deputy Pedro Richter Prada, among 138 other military officers from Chile, Brazil, Argentina, Uruguay and Paraguay who were involved in the kidnapping, torture and disappearances of 25 Latin Americans who had dual Italian citizenship. The indictments, in a 250-page court filing by Italian judge Luisianna Figliolia last December, come after a six-year investigation by investigative magistrate Giancarlo Capaldo, who drew on hundreds of declassified documents provided by the National Security Archive’s Southern Cone project. “These documents provide hard evidence of Condor crimes,” according to project director Carlos Osorio, “that almost 30 years later still demand the resolution of justice.”

The New York Times story, “Italy Follows Trail of Secret South American Abductions,” noted that the Italian effort at universal jurisdiction “deals not only with individual cases involving Italian citizens but also with the broader responsibilities of Condor’s cross-border kidnapping and torture operations.” The story also suggested that Condor’s allied effort to track down, kidnap, and secretly transport targets to third countries, according to historians, was “reminiscent of the United States’ modern terrorist rendition program.”

The Archive’s Peter Kornbluh noted “sinister similarities between Condor and the current U.S. rendition, enhanced interrogation, and black site detention operations.”


Read the Documents
Note: The following documents are in PDF format.
You will need to download and install the free Adobe Acrobat Reader to view.

Document 1: CIA, Secret report, “A Brief Look at Operation Condor,” August 22, 1978.

In August 1978, the CIA prepared a short briefing paper for Department of Justice lawyers who were investigating the September 21, 1976, assassination of Orlando Letelier and Ronni Moffitt in Washington D.C.  The report identifies the members of Condor, including Peru. The report also identifies Condor’s use of “executive action”—assassination—against specific targets outside the territory of member nations.

Document 2: State Department, memo, “Meeting with Argentine Intelligence Service, June 19, 1980.

Four days after the Montoneros were seized in a public park in Lima, the Regional Security Officer in Buenos Aires, James Blystone, met with a high-level source in Argentina’s intelligence service. Blystone reports to U.S. Ambassador Raul H. Castro in this memo that the source has told him: “The present situation is that the four Argentines will be held in Peru and then expelled to Bolivia where they will be expelled to Argentina. Once in Argentina they will be interrogated and then permanently disappeared.” The three seized Argentines are Esther Gianetti de Molfino, who was a member of “Madres del Plaza de Mayo,” María Inés Raverta and Julio César Ramírez. A fourth Argentine, Federico Frias Alberga, had been previously captured and taken to Lima by Argentine agents to identify his colleagues. He then disappeared along with them. This document was discovered by Long Island University professor J. Patrice McSherry, who provided it to Newsweek Magazine several years ago.

Document 3: State Department, cable, “Argentine Involvement in Lima Kidnappings,” June 19, 1980.

The U.S. Ambassador to Buenos Aires, Raul H. Castro, cables the State Department with some of the information Blystone had learned. The cable states that the rendition operation “hit a snag” because it became public, and that Battalion 601 agents had decided to take the Montoneros to a third country, Bolivia.

Document 4: State Department, INR Report, Argentina-Peru: Attempted Repatriation of Montoneros Apparently Foiled,” June 25, 1980.

The State Department’s Bureau of Intelligence and Research attempts to analyze the covert rendition operation run by Argentina in Peru. The report concludes that “this incident is not unique. In recent years, there have been several similar cases that attest to the high degree of cooperation among intelligence and security agencies of the southern South American countries and to their tendency to resort to illegal means of treating suspected subversives.”

Document 5: State Department, Cable, “Montoneros: Amnesty International Reportedly Claims 3 Killed in Peru; Foreign Minister Comments Further, July 3, 1980. 

In this nearly illegible cable, the U.S. Embassy analyzes the uproar in Peru over new allegations made by Amnesty International on the fate of the three Montoneros. On page 3, the cable notes that the situation is “very clearly” a serious matter but that the details are still “obscured.” But Embassy analysts conclude that “there seems to be little doubt that the Peruvian army, acting in concert with its Argentine counterpart, resorted to the kinds of illegal repressive measures more familiar in the Southern Cone than here.”

Document 6: State Department, Cable, “The Case of the Missing Montoneros,” July 11, 1980.

In a cable from Lima, U.S. Ambassador Harry Shlaudeman reports on his conversation with Prime Minister Richter Prada about the missing Montoneros. Richter claims that the three Argentines were “legally expelled and delivered to a Bolivian immigration official in accordance with long-standing practice.” Shlaudeman concludes that two other Montoneros who Richter says are fugitives are probably “permanent disappearances.”

Document 7: State Department, Cable, “Purported Discovery of Missing Montonero,” August 4, 1980.

The body of one of those seized in Peru, Esther Gianetti de Molfino, is discovered in an apartment in Madrid. The apartment is supposedly rented by another of the kidnapped Montoneros. The elaborate effort by Battalion 601 to cover up their disappearances by making her body reappear in Spain is reminiscent of Operation Colombo, when disfigured bodies appeared on the streets of Buenos Aires with identification cards of missing Chilean political figures. (Medical examinations proved that the bodies were not those individuals.) The Argentine Foreign Ministry used the discovery of de Molfino’s corpse to denounce the “falseness of the campaign against Argentina and Peru” over the missing Montoneros, according to the cable.

Document 8: State Department, Memo, “Hypothesis—The GOA as Prisoner of Army Intelligence,” August 18, 1980.

A political officer at the U.S. Embassy in Buenos Aires, Townsend Friedman, offers a strange assessment of the implications of the Montonero case on the equations of power in the Argentine military regime. “Disappearance is 601 work,” he writes. Due to the embarrassment factor, he suggests, “Anyone with an ounce of political sense in the GOA would have aborted, if he had been able, these operations.” Rather than obvious collaborators, Friedman concludes that General Videla and the Junta are “victims” of Battalion 601 and the secret police.

Document 9: State Department, Memo, “The Case of the Missing Montoneros,” August 19, 1980.

In another memo to the Embassy Charge, Townsend Friedman provides a short chronology and reevaluation of the Montonero case. He focuses on what he calls “the intimate relationship” between Argentina’s and Bolivia’s intelligence services. He cites a July communication between Prime Minister Richter and Argentine Army Commander, Galtieri, who tells Richter that there could be “an interesting development” in the case. That development turns out to be the discovery of the corpse of Esther Gianetti de Molfino in an apartment in Madrid, clearly planted there by agents of Battalion 601 to suggest that the Montoneros had not been kidnapped after all.

Document 10: State Department, Memo, “Conversation with Argentine Intelligence Source,” April 7, 1980.

The interest of Italian judge Giancarlo Capaldo in the case of the Montoneros derives from his belief that it is connected to other Condor operations that took the lives of Italian-Argentines, among them the case of the disappearance of Horacio Campiglia who was abducted in March 1980 in Rio de Janiero by Argentine agents collaborating with Brazil’s intelligence service. This report from Regional Security Officer James Blystone provides perhaps the most comprehensive detail on joint secret police collaboration to track down, abduct and render targeted victims in the Southern Cone. Blystone reports on the communications, travel, and even type of plane used in this rendition operation, and on the steps taken to provide a cover up of the plot.

Contents of this website Copyright 1995-2008 National Security Archive. All rights reser

DIE FINANCIAL TIMES und die seriöse Presse über die erfundenen “Goldman, Morgenstern und Partner” alias “GoMoPa”

http://www.victims-opfer.com/?page_id=11764

TOP-SECRET – Spy Jules Kroll Bond Gets Favor

[Federal Register Volume 76, Number 182 (Tuesday, September 20, 2011)]
[Notices]
[Pages 58319-58321]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-24028]

-----------------------------------------------------------------------

SECURITIES AND EXCHANGE COMMISSION

[Release No. 34-65339]

 Order Granting Temporary Exemption of Kroll Bond Rating Agency,
Inc. From the Conflict of Interest Prohibition in Rule 17g-5(c)(1) of
the Securities Exchange Act of 1934

September 14, 2011.

I. Introduction

    Rule 17g-5(c)(1) of the Securities Exchange Act of 1934 (``Exchange
Act'') prohibits a nationally recognized statistical rating
organization (``NRSRO'') from issuing or maintaining a credit rating
solicited by a person that, in the most recently ended fiscal year,
provided the NRSRO with net revenue equaling or exceeding 10% of the
total net revenue of the NRSRO for the fiscal year. In adopting this
rule, the Commission stated that such a person would be in a position
to exercise substantial influence on the NRSRO, which in turn would
make it difficult for the NRSRO to remain impartial.\1\
---------------------------------------------------------------------------

    \1\ Release No. 34-55857 (June 5, 2007), 72 FR 33564, 33598
(June 18, 2007).
---------------------------------------------------------------------------

II. Application and Exemption Request of Kroll Bond Rating Agency, Inc.

    Kroll Bond Rating Agency, Inc. (``Kroll''), f/k/a LACE Financial
Corp. (``LACE''), is a credit rating agency registered with the
Commission as an NRSRO under Section 15E of the Exchange Act for the
classes of credit ratings described in clauses (i) through (v) of
Section 3(a)(62)(B) of the Exchange Act. Kroll traditionally has
operated mainly under the ``subscriber-paid'' business model, in which
the NRSRO derives its revenue from restricting access to its ratings to
paid

[[Page 58320]]

subscribers. Kroll has informed the Commission that it intends to
expand its existing NRSRO business by establishing a new ``issuer-
paid'' rating service under which it will issue ratings paid for by the
issuer, underwriter, or sponsor of the security being rated. In
connection with this planned expansion, Kroll has requested a temporary
and limited exemption from Rule 17g-5(c)(1) on the grounds that the
restrictions imposed by Rule 17g-5(c)(1) would pose a substantial
constraint on the firm's ability to compete effectively with large
rating agencies offering comparable ratings services. Specifically,
Kroll argues that given that the fees typically associated with issuer-
paid engagements tend to be relatively high when compared to the fees
associated with its existing subscriber-based business, it is possible
that in the early stages of its expansion the fees associated with a
single issuer-paid engagement could exceed ten percent of its total net
revenue for the fiscal year. Accordingly, Kroll has requested that the
Commission grant it an exemption from Rule 17g-5(c)(1) for any revenues
derived from non-subscription based business during the remainder of
calendar years 2011 and 2012, which are also the end of Kroll's 2011
and 2012 fiscal years, respectively.

III. Discussion

    The Commission, when adopting Rule 17g-5(c)(1), noted that it
intended to monitor how the prohibition operates in practice,
particularly with respect to asset-backed securities, and whether
exemptions may be appropriate.\2\ The Commission has previously granted
two temporary exemptions from Rule 17g-5(c)(1), including one on
February 11, 2008 to LACE, as Kroll was formerly known, in connection
with its initial registration as an NRSRO (``LACE Exemptive
Order'').\3\ The Commission noted several factors in granting that
exemption, including the fact that the revenue in question was earned
prior to the adoption of the rule, the likelihood of smaller firms such
as LACE being more likely to be affected by the rule, LACE's
expectation that the percentage of total revenue provided by the
relevant client would decrease, and the increased competition in the
asset-backed securities class that could result from LACE's
registration. In granting the LACE Exemptive Order, the Commission also
noted that an exemption would further the primary purpose of the Credit
Rating Agency Reform Act of 2006 (``Rating Agency Act'') as set forth
in the Report of the Senate Committee on Banking, Housing, and Urban
Affairs accompanying the Rating Agency Act: To ``improve ratings
quality for the protection of investors and in the public interest by
fostering accountability, transparency, and competition in the credit
rating industry.'' \4\ On June 23, 2008, the Commission, citing the
same factors set forth in the LACE Exemptive Order, issued a similar
order granting Realpoint LLC a temporary exemption from the
requirements of Rule 17g-5(c)(1) in connection with Realpoint LLC's
registration as an NRSRO.\5\
---------------------------------------------------------------------------

    \2\ Release No. 34-55857 (June 5, 2007), 72 FR 33564, 33598
(June 18, 2007).
    \3\ Release No. 34-57301 (February 11, 2008), 73 FR 8720
(February 14, 2008).
    \4\ See Report of the Senate Committee on Banking, Housing, and
Urban Affairs to Accompany S. 3850, Credit Rating Agency Reform Act
of 2006, S. Report No. 109-326, 109th Cong., 2d Sess. (Sept. 6,
2006).
    \5\ Release No. 34-58001 (June 23, 2008), 73 FR 36362 (June 26,
2008).
---------------------------------------------------------------------------

    On September 2, 2010, the Commission issued an Order Instituting
Administrative and Cease-and-Desist Proceedings (``LACE/Putnam Order'')
against LACE and Barron Putnam, LACE's founder as well as its majority
owner during the relevant time period. The LACE/Putnam Order found,
among other things, that the firm made misrepresentations in its
application to become registered as an NRSRO and its accompanying
request for an exemption from Rule 17g-5(c)(1). Specifically, the
Commission found that the firm materially misstated the amount of
revenue it received from its largest customer during 2007.\6\ On
November 9, 2010, the Commission issued an Order Making Findings and
Imposing A Cease-and-Desist Order (the ``Mouzon Order'') against LACE's
former president, Damyon Mouzon. The Mouzon Order found, among other
things, that as LACE's president, Mouzon was responsible for ensuring
the accuracy of the information provided to the Commission in
connection with the firm's NRSRO application and its request for an
exemption, and that he knew or should have known that the financial
information that LACE provided to the Commission in connection with its
NRSRO application and its request for an exemption from Rule 17g-
5(c)(1) was inaccurate.\7\ LACE, Putnam and Mouzon each consented to
the entry of those orders on a neither admit nor deny basis.
---------------------------------------------------------------------------

    \6\ In the Matter of LACE Financial Corp. and Barron Putnam,
Respondents: Order Instituting Administrative and Cease-and-Desist
Proceedings, Pursuant to Sections 15E(d) and 21C of the Securities
Exchange Act of 1934, Making Findings, and Imposing Remedial
Sanctions and Cease-and-Desist Orders, Release No. 62834 (September
2, 2010).
    \7\ In the Matter of Damyon Mouzon, Respondent: Order Making
Findings and Imposing a Cease-and-Desist Order Pursuant to Section
21C of the Securities Exchange Act of 1934, Release No. 63280
(November 9, 2010).
---------------------------------------------------------------------------

    In the request that is subject to this Order, Kroll acknowledged
the recent orders against LACE and its former owner and president and
stated that it has taken significant steps to enhance the compliance
and other functions associated with the traditional subscriber-based
business, including replacing senior management, retaining new
compliance and financial personnel, and adding new independent
directors comprising a majority of the board. Kroll has informed
Commission staff that LACE's former ownership and management personnel
no longer have any ownership or other relationship, financial or
otherwise, with Kroll. Kroll has further informed Commission staff that
LACE ceased performing any work or analysis in connection with the
issuer-paid ratings that were the subject of the LACE Exemptive Order
in December 2008.
    The Commission believes that a temporary, limited and conditional
exemption allowing Kroll to enter the market for rating structured
finance products is consistent with the Commission's goal of improving
ratings quality for the protection of investors and in the public
interest by fostering accountability, transparency, and competition in
the credit rating industry. In order to maintain this exemption, Kroll
will be required to publicly disclose in Exhibit 6 to Form NRSRO, as
applicable, that the firm received more than 10% of its net revenue in
fiscal years 2011 and 2012 from a client or clients that paid it to
rate asset-backed securities. This disclosure is designed to alert
users of credit ratings to the existence of this specific conflict and
is consistent with exemptive relief the Commission has previously
granted to LACE and Realpoint LLC. Furthermore, in addition to Kroll's
existing obligations as an NRSRO to maintain policies, procedures, and
internal controls, by the terms of this order, Kroll will also be
required to maintain policies, procedures, and internal controls
specifically designed to address the conflict created by exceeding the
10% threshold. Finally, the Commission notes that Kroll is subject to
the September 2, 2010 Order Instituting Administrative and Cease-and-
Desist Proceedings against LACE Financial Corp.
    Section 15E(p) of the Exchange Act, as added by Section 932(a)(8)
of the Dodd-

[[Page 58321]]

Frank Wall Street Reform and Consumer Protection Act, requires
Commission staff to conduct an examination of each NRSRO at least
annually. As part of this annual examination regimen for NRSROs,
Commission staff will closely review Kroll's activities with respect to
managing this conflict and meeting the conditions set forth below and
will consider whether to recommend that the Commission take additional
action, including administrative or other action.
    The Commission therefore finds that a temporary, limited and
conditional exemption allowing Kroll to enter the market for rating
structured finance products is consistent with the Commission's goal,
as established by the Rating Agency Act, of improving ratings quality
by fostering accountability, transparency, and competition in the
credit rating industry, subject to Kroll's making public disclosure of
the conflict created by exceeding the 10% threshold and maintaining
policies, procedures and internal controls to address that conflict, is
necessary and appropriate in the public interest and is consistent with
the protection of investors.

IV. Conclusion

    Accordingly, pursuant to Section 36 of the Exchange Act,
    It is hereby ordered that Kroll Bond Rating Agency, Inc., formerly
known as LACE Financial Corp., is exempt from the conflict of interest
prohibition in Exchange Act Rule 17g-5(c)(1) until January 1, 2013,
with respect to any revenue derived from issuer-paid ratings, provided
that: (1) Kroll Bond Rating Agency, Inc. publicly discloses in Exhibit
6 to Form NRSRO, as applicable, that the firm received more than 10% of
its total net revenue in fiscal year 2011 or 2012 from a client or
clients; and (2) in addition to fulfilling its existing obligations as
an NRSRO to maintain policies, procedures, and internal controls, Kroll
Bond Rating Agency, Inc. also maintains policies, procedures, and
internal controls specifically designed to address the conflict created
by exceeding the 10% threshold.

    By the Commission.
Elizabeth M. Murphy,
Secretary.
[FR Doc. 2011-24028 Filed 9-19-11; 8:45 am]
BILLING CODE 8011-01-P

Die “GoMoPa” – Wirecard Lüge

http://www.usag24-betrug.com/index.php/gomopas-wirecard-behauptungen-zweifelhaft-schuett-hat-keinerlei-behauptungen-zu-wirecard-gemacht/

Unveiled – Occupy Wall Street Photos 19 September 2011

Occupy Wall Street Photos 19 September 2011

Wall Street at the New York Stock Exchange Closed[Image]
Wall Street Pedestrian Traffic Corraled by Barriers[Image][Image]
Wall Street Area Financial Buildings Looming over Liberty Camp (aka Zuccotti Park)[Image]
Camp Speakers Corner[Image]
[Image]
[Image]
[Image]
Bystanders Observing the Speakers[Image]
[Image]
Main Camp Pizza Supplier[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]
Federal Reserve Bank of New York Ostensible Regulator of Wall Street Banks, One Block From Liberty Camp[Image]

TOP-SECRET – NEW KISSINGER ‘TELCONS’ REVEAL CHILE PLOTTING AT HIGHEST LEVELS OF U.S. GOVERNMENT

NEW KISSINGER ‘TELCONS’ REVEAL CHILE PLOTTING
AT HIGHEST LEVELS OF U.S. GOVERNMENT

Nixon Vetoed Proposed Coexistence with an Allende Government
Kissinger to the CIA: “We will not let Chile go down the drain.”

National Security Archive Electronic Briefing Book No. 255

Washington D.C., September 19, 2011 – On the eve of the thirty-fifth anniversary of the military coup in Chile, the National Security Archive today published for the first time formerly secret transcripts of Henry Kissinger’s telephone conversations that set in motion a massive U.S. effort to overthrow the newly-elected socialist government of Salvador Allende. “We will not let Chile go down the drain,” Kissinger told CIA director Richard Helms in one phone call. “I am with you,” the September 12, 1970 transcript records Helms responding.

The telephone call transcripts—known as ‘telcons’—include previously-unreported conversations between Kissinger and President Richard Nixon and Secretary of State William Rogers.  Just eight days after Allende’s election, Kissinger informed the president that the State Department had recommended an approach to “see what we can work out [with Allende].”   Nixon responded by instructing Kissinger: “Don’t let them do it.

After Nixon spoke directly to Rogers, Kissinger recorded a conversation in which the Secretary of State agreed that “we ought, as you say, to cold-bloodedly decide what to do and then do it,” but warned it should be done “discreetly so that it doesn’t backfire.” Secretary Rogers predicted that “after all we have said about elections, if the first time a Communist wins the U.S. tries to prevent the constitutional process from coming into play we will look very bad.”

The telcons also reveal that just nine weeks before the Chilean military, led by Gen. Augusto Pinochet and supported by the CIA, overthrew the Allende government on September 11, 1973, Nixon called Kissinger on July 4 to say “I think that Chilean guy might have some problems.” “Yes, I think he’s definitely in difficulties,” Kissinger responded. Nixon then blamed CIA director Helms and former U.S. Ambassador Edward Korry for failing to block Allende’s inauguration three years earlier. “They screwed it up,” the President declared.

Although Kissinger never intended the public to know about these conversations, observed Peter Kornbluh, who directs the National Security Archive’s Chile Documentation Project, he “bestowed on history a gift that keeps on giving by secretly taping and transcribing his phone calls.”  The transcripts, Kornbluh noted, provide historians with the ability to “eavesdrop on the most candid conversations of the highest and most powerful U.S. officials as they plotted covert intervention against a democratically-elected government.”

Kissinger began secretly taping all his incoming and outgoing phone conversations when he became national security advisor in 1969; his secretaries transcribed the calls from audio tapes that were later destroyed.  When Kissinger left office in January 1977, he took more than 30,000 pages of the transcripts, claiming they were “personal papers,” and used them, selectively, to write his memoirs.  In 1999, the National Security Archive initiated legal proceedings to force Kissinger to return these records to the U.S. government so they could be subject to the freedom of information act and declassification.  At the request of Archive senior analyst William Burr, telcons on foreign policy crises from the early 1970s, including these four previously-unknown conversations on Chile, were recently declassified by the Nixon Presidential library.

On November 30, 2008 the National Security Archive will publish a comprehensive collection of Kissinger telcons in the Digital National Security Archive (DNSA). Comprising 15,502 telcons, this collection documents Kissinger’s conversations with top officials in the Nixon and Ford administrations, including President Richard Nixon; Defense Secretaries Melvin Laird, Elliot Richardson, and James Schlesinger; Secretary of State William P. Rogers; Ambassador to the U.N. George H.W. Bush; and White House Counselor Donald Rumsfeld; along with noted journalists, ambassadors, and business leaders with close White House ties.  Wide-ranging topics discussed in the telcons include détente with Moscow, military actions during the Vietnam War and the negotiations that led to its end, Middle East peace talks, the 1970 crisis in Jordan, U.S. relations with Europe, Japan, and Chile, rapprochement with China, the Cyprus crisis (1974- ), and the unfolding Watergate affair.  When combined with the Archive’s previous electronic publication of Kissinger’s memoranda of conversation — The Kissinger Transcripts: A Verbatim Record of U.S. Diplomacy, 1969-1977 — users of the DNSA will have access to comprehensive records of Kissinger’s talks with myriad U.S. officials and world leaders.  Like the Archive’s earlier publication, the Kissinger telcons will be comprehensively and expertly indexed, providing users with have easy access to the information they seek.  The collection also includes 158 White House tapes, some of which dovetail with transcripts of Kissinger’s telephone conversations with Nixon and others.  Users of the set will thus be able to read the “telcon” and listen to the tape simultaneously.

READ THE DOCUMENTS

l. Helms/Kissinger, September 12, 1970, 12:00 noon.

Eight days after Salvador Allende’s narrow election, Kissinger tells CIA director Richard Helms that he is calling a meeting of the 40 committee—the committee that determines covert operations abroad.  “We will not let Chile go down the drain,” Kissinger declares.  Helms reports he has sent a CIA emissary to Chile to obtain a first-hand assessment of the situation.

2. President/Kissinger, September 12, 1970, 12:32 p.m.

In the middle of a Kissinger report to Nixon on the status of a terrorist hostage crisis in Amman, Jordan, he tells the president that “the big problem today is Chile.”  Former CIA director and ITT board member John McCone has called to press for action against Allende; Nixon’s friend Pepsi CEO Donald Kendall has brought Chilean media mogul Augustine Edwards to Washington.  Nixon blasts a State Department proposal to “see what we can work out [with Allende], and orders Kissinger “don’t let them do that.” The president demands to see all State Department cable traffic on Chile and to get an appraisal of “what the options are.”

3. Secretary Rogers, September 14, 1970, 12:15pm (page 2)

After Nixon speaks to Secretary of State William Rogers about Chile, Kissinger speaks to him on September 14. Rogers reluctantly agrees that the CIA should “encourage a different result” in Chile, but warns it should be done discreetly lest U.S. intervention against a democratically-elected government be exposed.  Kissinger firmly tells Secretary Rogers that “the president’s view is to do the maximum possible to prevent an Allende takeover, but through Chilean sources and with a low posture.”

4) President/Kissinger, July 4, 1973, 11:00 a.m.

Vacationing in San Clemente, Nixon calls Kissinger and discusses the deteriorating situation in Chile.  Two weeks earlier, a coup attempt against Allende failed, but Nixon and Kissinger predict further turmoil.  “I think that Chilean guy may have some problems,” Nixon states.  “Oh, he has massive problems.  He has massive problems…he’s definitely in difficulties,” Kissinger responds.  The two share recollections of three years earlier when they had covertly attempted to block Allende’s inauguration.  Nixon blames CIA director Richard Helms and former U.S. ambassador Edward Korry for failing to stop Allende; “they screwed it up,” he states.  The conversation then turns to Kissinger’s evaluation of the Los Angeles premiere of the play “Gigi.”

5) President/Kissinger, September 16, 1973, 11:50 a.m. (previously posted May 26, 2004)

In their first substantive conversation following the military coup in Chile, Kissinger and Nixon discuss the U.S. role in the overthrow of Allende, and the adverse reaction in the new media. When Nixon asks if the U.S. “hand” will show in the coup, Kissinger admits “we helped them” and that “[deleted reference] created conditions as great as possible.”  The two commiserate over what Kissinger calls the “bleating” liberal press. In the Eisenhower period, he states, “we would be heroes.” Nixon assures him that the people will appreciate what they did: “let me say they aren’t going to buy this crap from the liberals on this one.”

Börse-Online berichtet über die Organisierten Kriminellen der “GoMoPa” und wie sie die Finanzbranche bedrohen

http://www.immovation-ag.de/medienpool/meldungen/BoerseOnline_Nr38_16.09.2010_Wo_gehobelt_wird.pdf

Börse Online über “GoMoPa”-Betrüger und RA Jochen Resch

http://www.graumarktinfo.de/gm/aktuell/diskussion/:Gomopa–Anwaelte-als-Finanzierungsquelle/616477.html

TOP-SECRET – Deep Packet Spying Breaches Gmail and All Security

Date: Sat, 17 Sep 2011 20:37:56 -0500
From: Marsh Ray <marsh[at]extendedsubset.com>
To: Discussion of cryptography and related <cryptography[at]randombit.net>
Subject: [cryptography] Another data point on SSL “trusted” root CA reliability (S Korea)

Been seeing Twitter from [at]ralphholz, [at]KevinSMcArthur, and [at]eddy_nigg about some goofy certs surfacing in S Korea with CA=true. via Reddit http://www.reddit.com/tb/kj25j

http://english.hani.co.kr/arti/english_edition/e_national/496473.html [below]

It’s not entirely clear that a trusted CA cert is being used in this attack, however the article comes to the conclusion that HTTPS application data is being decrypted so it’s the most plausible assumption. Quoting extensively here because I don’t have a sense of how long “The Hankyoreh” keeps their English language text around. – Marsh

_______________________________________________
cryptography mailing list cryptography[at]randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Date: Sun, 18 Sep 2011 12:11:59 +0200
From: Ralph Holz <holz[at]net.in.tum.de>
To: cryptography[at]randombit.net
Subject: Re: [cryptography] Another data point on SSL “trusted” root CA reliability (S Korea)

True, we found about 80 distinct certificates that had subject “Government of Korea” and CA:TRUE [1].

In our full dataset from April 2011, however, we found about 30k certificates with this property. None of them had valid chains to the NSS root store. The numbers do not seem to change over time: in Nov 2009, it was about 30k, and about the same in Sep 2010. In the EFF dataset of the full IPv4 space, I find 773,512 such certificates. *Distinct* ones – and the EFF dataset has 5.5m distinct certs. It is a wide-spread problem.

For the case of Korea, [at]KevinSMcArthur found that the issuing certificates have a pathlen of 0, which makes it impossible for the end-host cert to operate as a CA *as long as the client actually checks that extension*. I don’t know which ones do, but it would be a question to ask the NSS developers.

As of now, I don’t think these are really attacker certs, also because the overall numbers seem to point more at some CA software that creates certs with the CA flag on by default.

Although your article seems to indicate something bad is going on over there…

[1] If you want to check, CSVs at:

www.meleeisland.de/korean_hosts_CA_on.csv

www.meleeisland.de/korean_hosts_CA_on_fullchains.csv

www.meleeisland.de/scan_apr2011_ca_on_issuers_not_selfsigned.csv

Ralph


NIS admits to packet tapping Gmail

If proven, international fallout could occur over insecurity of the HTTP Secure system

By Noh Hyung-woong

It has come to light that the National Intelligence Service has been using a technique known as “packet tapping” to spy on emails sent and received using Gmail, Google’s email service. This is expected to have a significant impact, as it proves that not even Gmail, previously a popular “cyber safe haven” because of its reputation for high levels of security, is safe from tapping.

The NIS itself disclosed that Gmail tapping was taking place in the process of responding to a constitutional appeal filed by 52-year-old former teacher Kim Hyeong-geun, who was the object of packet tapping, in March this year.

As part of written responses submitted recently to the Constitutional Court, the NIS stated, “Mr. Kim was taking measures to avoid detection by investigation agencies, such as using a foreign mail service [Gmail] and mail accounts in his parents’ names, and deleting emails immediately after receiving or sending them. We therefore made the judgment that gathering evidence through a conventional search and seizure would be difficult, and conducted packet tapping.”

The NIS went on to explain, “[Some Korean citizens] systematically attempt so-called ‘cyber asylum,’ in ways such as using foreign mail services (Gmail, Hotmail) that lie beyond the boundaries of Korea‘s investigative authority, making packet tapping an inevitable measure for dealing with this.”

The NIS asserted the need to tap Gmail when applying to a court of law for permission to also use communication restriction measures [packet tapping]. The court, too, accepted the NIS’s request at the time and granted permission for packet tapping.

Unlike normal communication tapping methods, packet tapping is a technology that allows a real-time view of all content coming and going via the Internet. It opens all packets of a designated user that are transmitted via the Internet. This was impossible in the early days of the Internet, but monitoring and vetting of desired information only from among huge amounts of packet information became possible with the development of “deep packet inspection” technology. Deep packet inspection technology is used not only for censorship, but also in marketing such as custom advertising on Gmail and Facebook.

The fact that the NIS taps Gmail, which uses HTTP Secure, a communication protocol with reinforced security, means that it possesses the technology to decrypt data packets transmitted via Internet lines after intercepting them.

“Gmail has been using an encrypted protocol since 2009, when it was revealed that Chinese security services had been tapping it,” said one official from a software security company. “Technologically, decrypting it is known to be almost impossible. If it turns out to be true [that the NIS has been packet tapping], this could turn into an international controversy.”

“The revelation of the possibility that Gmail may have been tapped is truly shocking,” said Jang Yeo-gyeong, an activist at Jinbo.net. “It has shown once again that the secrets of people’s private lives can be totally violated.” Lawyer Lee Gwang-cheol of MINBYUN-Lawyers for a Democratic Society, who has taken on Kim’s case, said, “I think it is surprising, and perhaps even good, that the NIS itself has revealed that it uses packet tapping on Gmail. I hope the Constitutional Court will use this appeal hearing to decide upon legitimate boundaries for investigations, given that the actual circumstances of the NIS’s packet tapping have not been clearly revealed.”

Please direct questions or comments to [englishhani[at]hani.co.kr]

How 250,000 US embassy cables were leaked

Bradley Manning, left, is accused of stealing classified files released by Julian Assange, right

US soldier Bradley Manning, left, who is accused of stealing the classified files and handing the database to the WikiLeaks website of Julian Assange, right. Photograph: Associated Press/AFP/Getty Images

An innocuous-looking memory stick, no longer than a couple of fingernails, came into the hands of a Guardian reporter earlier this year. The device is so small it will hang easily on a keyring. But its contents will send shockwaves through the world’s chancelleries and deliver what one official described as “an epic blow” to US diplomacy.

The 1.6 gigabytes of text files on the memory stick ran to millions of words: the contents of more than 250,000 leaked state department cables, sent from, or to, US embassies around the world.

What will emerge in the days and weeks ahead is an unprecedented picture of secret diplomacy as conducted by the planet’s sole superpower. There are 251,287 dispatches in all, from more than 250 US embassies and consulates. They reveal how the US deals with both its allies and its enemies – negotiating, pressuring and sometimes brusquely denigrating foreign leaders, all behind the firewalls of ciphers and secrecy classifications that diplomats assume to be secure. The leaked cables range up to the “SECRET NOFORN” level, which means they are meant never to be shown to non-US citizens.

As well as conventional political analyses, some of the cables contain detailed accounts of corruption by foreign regimes, as well as intelligence on undercover arms shipments, human trafficking and sanction-busting efforts by would-be nuclear states such as Iran and Libya. Some are based on interviews with local sources while others are general impressions and briefings written for top state department visitors who may be unfamiliar with local nuances.

Intended to be read by officials in Washington up to the level of the secretary of state, the cables are generally drafted by the ambassador or subordinates. Although their contents are often startling and troubling, the cables are unlikely to gratify conspiracy theorists. They do not contain evidence of assassination plots, CIA bribery or such criminal enterprises as the Iran-Contra scandal in the Reagan years, when anti-Nicaraguan guerrillas were covertly financed.

One reason may be that America’s most sensitive “top secret” and above foreign intelligence files cannot be accessed from Siprnet, the defence department network involved.

The US military believes it knows where the leak originated. A soldier, Bradley Manning, 22, has been held in solitary confinement for the last seven months and is facing a court martial in the new year. The former intelligence analyst is charged with unauthorised downloads of classified material while serving on an army base outside Baghdad. He is suspected of taking copies not only of the state department archive, but also of video of an Apache helicopter crew gunning down civilians in Baghdad, and hundreds of thousands of daily war logs from military operations in Afghanistan and Iraq.

It was childishly easy, according to the published chatlog of a conversation Manning had with a fellow-hacker. “I would come in with music on a CD-RW labelled with something like ‘Lady Gaga’ … erase the music … then write a compressed split file. No one suspected a thing … [I] listened and lip-synched to Lady Gaga’s Telephone while exfiltrating possibly the largest data spillage in American history.” He said that he “had unprecedented access to classified networks 14 hours a day 7 days a week for 8+ months”.

Manning told his correspondent Adrian Lamo, who subsequently denounced him to the authorities: “Hillary Clinton and several thousand diplomats around the world are going to have a heart attack when they wake up one morning and find an entire repository of classified foreign policy is available, in searchable format, to the public … Everywhere there’s a US post, there’s a diplomatic scandal that will be revealed. Worldwide anarchy in CSV format … It’s beautiful, and horrifying.”

He added: “Information should be free. It belongs in the public domain.”

Manning, according to the chatlogs, says he uploaded the copies to WikiLeaks, the “freedom of information activists” as he called them, led by Australian former hacker Julian Assange.

Assange and his circle apparently decided against immediately making the cables public. Instead they embarked on staged disclosure of the other material – aimed, as they put it on their website, at “maximising political impact”.

In April at a Washington press conference the group released the Apache helicopter video, titling it Collateral Murder.

The Guardian’s Nick Davies brokered an agreement with Assange to hand over in advance two further sets of military field reports on Iraq and Afghanistan so professional journalists could analyse them. Published earlier this year simultaneously with the New York Times and Der Spiegel in Germany, the analyses revealed that coalition forces killed civilians in previously unreported shootings and handed over prisoners to be tortured.

The revelations shot Assange and WikiLeaks to global prominence but led to angry denunciations from the Pentagon and calls from extreme rightwingers in the US that Assange be arrested or even assassinated. This month Sweden issued an international warrant for Assange, for questioning about alleged sexual assaults. His lawyer says the allegations spring from unprotected but otherwise consensual sex with two women.

WikiLeaks says it is now planning to post a selection of the cables. Meanwhile, a Guardian team of expert writers has been spending months combing through the data. Freedom of information campaigner Heather Brooke obtained a copy of the database through her own contacts and joined the Guardian team. The paper is to publish independently, but simultaneously with the New York Times and Der Spiegel, along with Le Monde in Paris and El País in Madrid. As on previous occasions the Guardian is redacting information likely to cause reprisals against vulnerable individuals.

WikiLeaks-named Ethiopian reporter in unredacted cable flees country in fear

Julian Assange, founder of wikileaks

Wikileaks named Ethiopian reporter Argaw Ashine, along with many others, when founder Julian Assange (pictured in July) agreed for leaked US cables to be published unredacted. Photograph: Lefteris Pitarakis/AP

An Ethiopian reporter has fled the country after being named in a WikiLeaks cable, in what a media rights group said was the first instance of one of the leaks causing direct repercussions for a journalist.

Wikileaks recently published all its cables unredacted, naming sources that were removed by partner media organisations, including the Guardian.

The Committee to Protect Journalists (CPJ) said reporter Argaw Ashine fled at the weekend after being interrogated over the identity of a government source mentioned in a leaked 2009 US cable. Argaw was the local correspondent for Kenya’s Nation Media Group.

The cable said Argaw was told by an unnamed source that the government would target six journalists from a newspaper seen as critical of the government. That paper closed later that year after citing harassment and intimidation.

Joel Simon, the New York-based CPJ’s executive director, said: “The threat we sought to avert through redactions of initial WikiLeaks cables has now become real. A citation in one of these cables can easily provide repressive governments with the perfect opportunity to persecute or punish journalists and activists.

“WikiLeaks must take responsibility for its actions and do whatever it can to reduce the risk to journalists named in its cables. It must put in place systems to ensure that such disclosures do not reoccur.”

Ethiopian officials on Thursday denied Argaw’s account to the CPJ that he had been harassed and intimidated because of the cable.

A government spokesman said officials had separately arrested five opposition figures on Wednesday, including a journalist, on allegations of terrorism. They follow dozens of other terrorism-related arrests and detentions in recent weeks, including those of two Swedish journalists.

The main opposition coalition said recent events illustrate a pattern of oppression as citizens tire of the longtime leadership and seek change. Human rights groups have long accused Ethiopia of cracking down on political dissent.

Shimeles Kemal, the government spokesman, said Argaw was not pressured to name a source and that Ethiopian law allows journalists to protect their sources.

“This is a very absurd and ridiculous accusation, the allegation that he was threatened by security to leave the country or disclose a source,” Shimeles said.

Argaw has asked the CPJ to not reveal his location.

Eskinder Nega, a journalist and publisher whose newspaper was shut down over allegations that the paper incited violence during disputed elections in 2005, was among the five opposition figures arrested on Wednesday, Shimeles said. After the newspaper was shut down, Eskinder continued to speak critically of the government in public forums, and articles under his byline appeared on opposition-aligned websites.

“According to the police statement, these people have been involved in activities, they have plotted, planned and carefully laid out contrived plans that are likely to wreak havoc in the country through launching terrorist attacks and throwing the country into utter chaos,” Shimeles said.

Opposition party official Negasso Gidada said another person arrested, Andualem Arage, served on the editorial board of an opposition-party newspaper. He denied the charges that the five were involved in terrorist activities.

Negasso said the party newspaper had been advocating for “the right to struggle in a peaceful, democratic, constitutional and legal way.

“The people are fed up because of the social, economic and political situation and the people follow also what is happening in North Africa and Arab countries … and people are saying, ‘When is our turn? When shall we go to the streets?'” he said.

“The attitude is so strong in the country, in the people, soon it will explode, and the government is afraid of that, and by arresting political party members and leaders, the government thinks it will take precautionary measures against that.”

TOP-SECRET – COMPLETE PENTAGON PAPERS AT LAST!

June 13, 1971: The New York Times begins to publish the Pentagon Papers.

COMPLETE PENTAGON PAPERS AT LAST!
All Three Versions Posted, Allowing Side-by-Side Comparison

National Security Archive Electronic Briefing Book No. 359

Posted – September 16, 2011

Edited By John Prados

For more information contact:
John Prados – 202/994-7000

Bookmark and Share
The Complete
Pentagon PapersA Side-By-Side Comparison of the Three Major Editions

Pentagon-Papers-Index

Pentagon-Papers-Part-I

Pentagon-Papers-Part-II

Pentagon-Papers-Part-III

Pentagon-Papers-Part-IV-A-1

Pentagon-Papers-Part-IV-A-2

Pentagon-Papers-Part-IV-A-3

Pentagon-Papers-Part-IV-A-4

Pentagon-Papers-Part-IV-A-5

Pentagon-Papers-Part-IV-B-1

Pentagon-Papers-Part-IV-B-2

Pentagon-Papers-Part-IV-B-3

Pentagon-Papers-Part-IV-B-4

Pentagon-Papers-Part-IV-B-5

Pentagon-Papers-Part-IV-C-1

Pentagon-Papers-Part-IV-C-10

Pentagon-Papers-Part-IV-C-2a

Pentagon-Papers-Part-IV-C-2b

Pentagon-Papers-Part-IV-C-2c

Pentagon-Papers-Part-IV-C-3

Pentagon-Papers-Part-IV-C-4

Pentagon-Papers-Part-IV-C-5

Pentagon-Papers-Part-IV-C-6-a

Pentagon-Papers-Part-IV-C-6-b

Pentagon-Papers-Part-IV-C-6-c

Pentagon-Papers-Part-IV-C-7-a

Pentagon-Papers-Part-IV-C-7-b

Pentagon-Papers-Part-IV-C-8

Pentagon-Papers-Part-IV-C-9a

Pentagon-Papers-Part-IV-C-9b

Pentagon-Papers-Part-V-A-Vol-IA

Pentagon-Papers-Part-V-A-Vol-IB

Pentagon-Papers-Part-V-A-Vol-IC

Pentagon-Papers-Part-V-A-Vol-IID

Pentagon-Papers-Part-V-B-2a

Pentagon-Papers-Part-V-B-2b

Pentagon-Papers-Part-V-B-3a

Pentagon-Papers-Part-V-B-3b

Pentagon-Papers-Part-V-B-3c

Pentagon-Papers-Part-V-B-3d

Pentagon-Papers-Part-V-B-4-Book-I

Pentagon-Papers-Part-V-B-4-Book-II

Pentagon-Papers-Part-V-B1

Pentagon-Papers-Part-VI-A

Pentagon-Papers-Part-VI-B

Pentagon-Papers-Part-VI-C-1

Pentagon-Papers-Part-VI-C-2

Pentagon-Papers-Part-VI-C-3

Pentagon-Papers-Part-VI-C-4

In the news

“After 40 Years, the Complete Pentagon Papers”
By Michael Cooper and Sam Roberts
The New York Times
June 7, 2011

More on the Pentagon Papers

Pentagon Papers Home

The Secret Briefs and the Secret Evidence.
Expert commentary from Archive analyst John Prados

Supreme Court Briefs and Opinions.
Audio and transcripts

White House Telephone Conversations.
Audio and transcripts

Intelligence and Vietnam.
The Top Secret 1969 State Department Study

Excerpts from Nixon, Kissinger and Haldeman Memoirs

Richard Nixon, The Memoirs of Richard Nixon (New York: Grosset & Dunlap, 1978), pp. 508-515.

Henry Kissinger, Years of Upheaval (Boston: Little, Brown and Company, 1982), pp. 115-118.

H.R. Haldeman, The Haldeman Diaries (New York: Berkeley Books, 1995), pp. 363-371, 378.

Inside the Pentagon Papers
Edited by John Prados and Margaret Pratt Porter
University Press of Kansas
ISBN: 0-7006-1325-0

 

What Were the 11 Missing Words?
Enter the National Security Archive’s Reader Contest!

Washington, DC, September 16, 2011 – For the first time ever, all three major editions of the Pentagon Papers are being made available simultaneously online. The posting today by the National Security Archive at George Washington University (www.nsarchive.org), allows for a unique side-by-side comparison, showing readers exactly what the U.S. government tried to hide for 40 years by means of deletions from the original text.

To make the most of this new resource, the Archive is unveiling a special contest inviting readers to make their own nominations for the infamous “11 words” that some officials tried to keep secret even this year!

Today’s posting includes the full texts of the “Gravel” edition entered into Congressional proceedings in 1971 by Sen. Mike Gravel (D-Alaska) and later published by the Beacon Press, the authorized 1971 declassified version issued by the House Armed Services Committee with deletions insisted on by the Nixon administration, and the new 2011 “complete” edition released in June by the National Archives and Records Administration (NARA).

Accompanying the posting is the National Security Archive’s invitation for readers to identify their own favorite nominees for the “11 words” that securocrats attempted to delete during the declassification process for the Papers earlier this year, until alert NARA staffers realized those words actually had been declassified back in 1971.  Best submissions for the “11 words” — as judged by National Security Archive experts — will appear in the Archive’s blog, Unredacted, and on the Archive’s Facebook page.  National Security Archive senior fellow John Prados wrote the introduction and analysis for the posting. Archive analyst Carlos Osorio coordinated the data processing for publication. Archive staff Wendy Valdes and Charlotte Karrlsson-Willis did the input, indexing and cross-referencing, and the Archive’s webmaster Michael Evans managed the online publication of the Pentagon Papers.

*               *               *

With a simple press release on June 8, 2011 the National Archives and Records Administration (NARA) announced that five days later the United States Government would declassify and make public the full forty-seven volumes of the set of studies universally known as the “Pentagon Papers.” The studies acquired that name when they were leaked by Daniel Ellsberg, one of the analysts who had worked on them but had subsequently gone into the opposition on U.S. policy in the Vietnam war. The National Security Archive here posts, for the first time anywhere, a combined, comparative, and searchable set of all the major editions of the Pentagon Papers together with a cross-referencing index to all the sets.

As it happens NARA’s release of the Pentagon Papers coincided exactly with the 40th anniversary of the day in 1971 when the leaked documents began to appear in the press, at first the New York Times, but then also the Washington Post and many other news media. The Nixon administration attempted to suppress the leak of the Papers by seeking a prior injunction against their publication from the U.S. Court. It succeeded thereby in making the Pentagon Papers into one of the significant political documents of the 20th Century. The case went to the Supreme Court, which decided against the government in a notable First Amendment decision affirming freedom of the press.

With this background the reader can begin to understand the secrecy issues that swirled around this set of materials. The first point is that the Ellsberg leak involved the disclosure of official documents. The study’s actual title, “United States-Vietnam Relations 1945-1967,” reveals that the contents of the papers concerned the Vietnam policies of Lyndon B. Johnson and previous presidents back to Franklin D. Roosevelt. Second, these were official documents classified at a high level. Those who worked on the Pentagon Papers have affirmed that the materials were classified this way in order to prevent the Johnson White House from discovering that this review was underway, but Nixon officials argued the documents were secret only because they included information whose disclosure damaged the national security of the United States. The administration argued this both in the Pentagon Papers court case and in the subsequent criminal prosecution of Daniel Ellsberg and his confederate, Anthony J. Russo. For forty years from 1971 until 2011 the U.S. Government has continued to take the position that the Pentagon Papers remained secret even though anyone could read them. Repeated efforts to secure the declassification of the Pentagon Papers were denied or ignored.

In the meantime the clamor for access to the Pentagon Papers resulted in the appearance of several editions of the documents. The most widely available and best-known of these versions is The Pentagon Papers as Published by the New York Times, which compiled in one place the series of articles and set of documents that newspaper had published. (Note 1) This edition attracted huge public attention and went through many printings but was flawed in that it represented a very narrow selection among the plethora of materials contained in the original. The Times reporters had distilled the 43 studies of the original to which they had access into a single volume. That version was far surpassed after an Alaska Democrat, Senator Mike Gravel, read the Pentagon Papers into the Congressional Record. This material was taken by the Beacon Press of Boston and published as a four-volume (2,901 page) set that contained nearly all the material in the actual studies and also added in a series of documents that the original had lacked (this will be called the “Gravel Edition”). (Note 2) Meanwhile the Nixon administration itself had promised to release a set of the Pentagon Papers and it did so through the Armed Services Committee of the House of Representatives. This appeared in twelve volumes, or “books” (6,742 pages), and was published by the U.S. Government Printing Office. (Note 3) This edition (hereafter termed the “HASC edition”) exactly reproduced the original, minus numerous deletions that reflected the Nixon administration’s claims for national security damage framed in its court cases.

As a result of the way the Pentagon Papers surfaced there have always been difficulties in using them. The Times version, widely available, only scratched the surface. Both the Gravel and HASC editions appeared in only a few, or one printing, and were therefore not very accessible to the public. Restricted availability—in many cases limited to good college libraries—kept the full set of materials away from most of the public. The Gravel edition had the virtues of having a straightforward presentation and including Johnson administration documents. The HASC edition’s advantage lay in its much more ample documentation on the presidencies of FDR, Harry Truman, and Dwight D. Eisenhower. On the other hand this version used the pagination of the original Department of Defense compilation, which was confusing and changed almost as often as the studies themselves.

None of the 1971 editions included four volumes of diplomatic accounts of Johnson administration peace feelers to North Vietnam, which Ellsberg had withheld when leaking the rest of the Pentagon Papers. An expurgated set of those studies only became available in 1983. (Note 4) The complete Diplomatic Volumes were finally declassified in 2002. That release resulted in the stunning contradiction that the Diplomatic Volumes of the Pentagon Papers—deemed too sensitive even to leak in 1971—were fully available to the public while the major portion of the review—which has been available to the public ever since 1971—remained secret.

In any case, until now the United States Government has insisted that the Pentagon Papers are secret while those who sought to learn from them have been able to read whatever version they could access, each with its own flaws. The NARA action in releasing the full set of studies, a token of its commitment to major declassification initiatives, permits comprehensive examination of the Pentagon Papers for the first time.

However, readers remain hampered by the confusing organization and structure of the original Department of Defense review. Using the Gravel edition to find material, and then looking it up in the original actually remains a suitable way to proceed. This has been problematical not only because of the confusing pagination in the original but due to the differences in availability of the various editions. Even the new NARA release, although it is online, limits the user to one item at a time because it is organized by file corresponding to study volume.

The National Security Archive has undertaken to make the full Pentagon Papers completely accessible. We have done this by arranging a full-matrix display. This presentation shows each page of the fully declassified NARA version of the Pentagon Papers side-by-side with the corresponding page of the HASC edition and corresponding material from the Gravel set. From this display it is possible to instantly identify the passages deleted by the Nixon administration in 1971, as well as how editors changed material in the original when compiling the Gravel edition. We have excluded the Times version because that consists of the summarizations of authors and only a limited portion of text.

The Archive has also undertaken to make available an Index that permits cross-referencing among the various versions we are displaying—not only the pdf panels but also the page numbers in the printed editions of these works. An introduction to the Index makes clear how it is organized and can be used.

This posting of nearly 20,000 pages has been an enormous undertaking and required the cooperation of many Archive personnel. Information technology and Latin America specialist Carlos Osorio conceptualized and coordinated the data processing for the multi version publication. Analyst Wendy Valdes organized and verified the inputs. Analyst Charlotte Karrlsson-Willis created the Index with assistance from Valdes. Webmaster Michael Evans (also a Latin Americanist) accomplished the final work of getting the page matrix display up on our website.

*               *               *

NARA’s release of the Pentagon Papers was accompanied by a fresh demonstration of inappropriate secrecy policy. In reviewing these documents for declassification, one authority sought to suppress eleven words on one page. What was silly about this exercise was that the “11 Words” were not classified. That is, in effect an agency sought to make secret a passage of the Pentagon Papers that had already been reviewed and declassified by the United States Government in 1971. Since classification is supposed to protect information that can damage the national security of the United States, the idea that the “11 Words” pose a danger to the nation in 2011 after having been in the open for four decades was startling. Calmer heads finally prevailed and the government relented and released the documents with no deletions. But it has not revealed what the “11 Words” actually were.

Needless to say, the “11 Words” episode occasioned a playful guessing game in which people have tried to identify the offending passage. The National Security Archive posted its own set of eleven candidates. Here we would like to extend an invitation to interested readers to send us your own guesses. Accordingly we are sponsoring an “11 Words Contest.” Good candidate passages will be posted as articles in our blog Unredacted and on the Archive’s Facebook page, and the best ones will be incorporated into an Electronic Briefing Book as we proceed. There will be prizes for the best candidate passage and for runners-up.

“11  WORDS”  CONTEST  RULES 

Beginning with the date of this posting we open a contest for readers to nominate their own favorite candidates for the “11 Words” a government agency wanted to suppress in the Pentagon Papers. Readers can examine the side-by-side page display of all the Pentagon Papers content posted here to find items to nominate. All entries must be received by 12:00 Midnight of Friday, November 16, 2011. Entries will be judged by National Security Archive panelists. The Grand Prize winner and Runners-Up will be announced by posting in the blog Unredacted on the National Security Archive website during the week that starts on December 17th.

Prizes: The National Security Archive will award the best Pentagon Papers candidate for deletion a Grand Prize consisting of a set of the available Archive Readers—books on major international issues which include compilations of documents obtained by the Archive along with analysis by Archive experts. In keeping with the “11 Words” theme, in addition to the Grand Prize winner there will be ten Runners-Up. Each of these winners will receive a copy of the book Inside the Pentagon Papers edited by John Prados and Margaret Pratt Porter.

Entries: Enter early and often! There is no limit to the number of candidate passages a reader may submit to the “11 Words” competition. However, entries must follow the format prescribed below. Only one candidate passage may be nominated in any single entry. Multiple entries must be submitted separately. All entries must be in writing, in an email to the Archive (at nsarchiv@gwu.edu ) or through our Facebook page. Please do not use Twitter, as a proper entry cannot be fitted within the Twitter message format. By submitting an entry the reader agrees in advance to cede to the National Security Archive the right to publish her/his entry in our blog Unredacted, on our Facebook page,and/or in one of our Electronic Briefing Books. The National Security Archive will be solely responsible for the selection of entries that we publish and when they may appear. Entries that are published become finalists in the prize competition but there will be no monetary or other compensation. Those which do not rise to that level will not be circulated. Entries that do not follow the prescribed format will automatically be rejected. When entries do appear in Unredacted or on Facebook, readers should feel free to comment on them just as they do regarding any of our other articles.

Format: All contest submissions must contain the true name and address of the entrant for purposes of the Prize awards. Each entry must contain the following information:

  • Quotation: The entrant must pick a specific phrase of the Pentagon Papers, precisely 11 words long, and the phrase nominated must be quoted verbatim in the text, enclosed in quotation marks. The entrant is free to nominate an 11 word passage embedded in a longer sentence—but in that case the full sentence must appear as the quotation and the 11 word phrase must be highlighted in bold. Candidate phrases longer than 11 words are not acceptable.
  • Reference: The entry must provide the exact Pentagon Papers page citation for the 11 Words nominee. The page numbers will be found on our side-by-side display or they may be taken from the original published NARA/HASC edition. Page numbers taken from the Gravel or other editions of the Pentagon Papers are not acceptable.
  • Eligibility of Phrases: What made the 11 Words controversial was that this exercise was an attempt to make secret anew a text that had been declassified and lay in the public domain since 1971. At that time the declassified version of the Pentagon Papers was the HASC edition. Consequently, to be eligible for nomination a phrase must appear in the HASC edition of the Pentagon Papers. Readers will easily be able to establish whether any given text was published in the HASC edition simply by referring to the side-by-side pages we have displayed in this posting. The eleven phrases already nominated by the Archive (in EBB 350) are not eligible for selection. Any entries that do nominate them will simply be regarded as thoughtful comments on work already done.
  • Argumentation: The entry must explain precisely why the reader believes the nominated phrase could be the 11 Words the government wished to suppress. It should also comment on what agency or agencies could expect to profit from such a deletion. The reader’s argument should be clear and concise. It may rely on historical analysis or arguments regarding government secrecy policy, or both, and the reader may weigh the factors in any way she/he wishes. Remember, there is no “right” answer until the U.S. Government reveals which were the real 11 Words. There is no set word count to the length of the reader’s argument, but the Archive reserves the right to exclude entries of excessive length. (For a sample of the kind of argumentation an entry should contain see the candidate phrases nominated by the Archive in EBB 350.)

Judging: All entries will be reviewed by a panel of National Security Archive experts. Our criteria will be the plausibility of a government secrecy claim with respect to each set of 11 Words nominated, along with the substance and quality of the reader’s argument for why a particular phrase must be the real 11 Words. Since there is no “right” answer, everything will depend on the reader’s selections and the quality of her/his argumentation. The Archive has no preconceived notion as to the true identity of the 11 Words. Entries will be judged solely on the basis of the case they make. Inaccurate quotation or source referencing, frivolous argumentation, and failure to incorporate required elements of the format will be grounds for rejection. All decisions of the judges will be final.


Notes

1. Neil Sheehan, Hedrick Smith, E. W. Kenworthy, and Fox Butterfield, The Pentagon Papers as Published by the New York Times. New York: Bantam Books, 1971.

2. The Senator Gravel Edition: The Pentagon Papers: The Defense Department History of United States Decisionmaking on Vietnam. Boston: Beacon Press, 1971.

3. Leslie H. Gelb, et. al, eds., United States-Vietnam Relations 1945-1967. Washington: Government Printing Office, 1971.

4. George C. Herring, ed. The Secret Diplomacy of the Vietnam War: The Negotiating Volumes of the Pentagon Papers. Austin (TX): University of Texas Press, 1983.

OP-SECRET – CIA Domestic Spying Authorized T

cia-domestic-spy

TOP-SECRET – Fukushima Daiichi NPS 15-16 September 2011



17 September 2011

Fukushima Daiichi NPS 15-16 September 2011

Photos released by Tokyo Electric Power Co. 17 September 2011


Fukushima Daiichi NPS 15-16 September 2011

[Image]Unit 1, Reactor building cover from northern side, Sep 15, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_01.jpg
[Image]Unit 1, Reactor building cover from northern side, Sep 15, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_02.jpg
[Image]Unit 1, View from large crane around a reactor building, Sep 15, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_03.jpg
[Image]Unit 1, Southern direction (Unit 3 & 4) from Unit 1, Sep 15, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_04.jpg
[Image]Unit 2, Overview of a reactor building from western hilltop, Sep 15, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_05.jpg
[Image]Unit 3, Overview of a reactor building from western hilltop, Sep 15, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_06.jpg
[Image]Unit 3, Rubble collection around southwest of a reactor building, Sep 16, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_07.jpg
[Image]Unit 3, Rubble collection preparation of a reactor building, Sep 15, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_08.jpg
[Image]Unit 4, Overview of a reactor building from western hilltop, Sep 15, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_09.jpg
[Image]Unit 4, Rubble collection preparation of a reactor building, Sep 15, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_10.jpg
[Image]Unit 5,6, Overview of a reactor building from southwest side, Sep 15, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_11.jpg
[Image]Unit 5,6, Maintenance work at port and harbors from Unit 6 seaside yard, Sep 15, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_12.jpg
[Image]Centralized Radiation Waste Treatment Facility, overview, Sep 16, 2011.
High-resolution: http://cryptome.org/eyeball/daiichi-091711/110917_15.jpg
[Image]Centralized Radiation Waste Treatment Facility, overview, Sep 16, 2011.

TOP-SECRET – ARCHIVE EXPERT TESTIFIES IN FUJIMORI TRIAL

Senior Analyst Kate Doyle providing testimony in the trial against former-president Alberto Fujimori (center)

 

 

ARCHIVE EXPERT TESTIFIES IN FUJIMORI TRIAL

National Security Archive Electronic Briefing Book No. 256


Lima, Perú (September 16, 2011) – National Security Archive Senior Analyst Kate Doyle testified yesterday before Peru’s Special Tribunal of the Supreme Court of Justice in the case against former-president Alberto Fujimori. Doyle provided expert testimony, explaining how 21 declassified U.S. documents obtained under the Freedom of Information Act (FOIA) provide illuminating information on human rights abuses carried out under the Fujimori government (1990-2000)

The 21 documents, produced by the U.S. Embassy in Lima, describe how the Fujimori government tried to hide the involvement of government security forces in human rights crimes. Doyle emphasized that, “over time, and after years of study, the declassified documents produced by the U.S. Embassy reveal that the extra-legal operations were a part of official state policy and not a result rogue elements out of control of the military, police or intelligence services.”

During her testimony before the tribunal Kate explained how the documents reveal evidence of two-sided government strategy in the fight against terrorism, one was public and “the other was secret, a clandestine strategy of aggressively fighting subversion with the use of state-sponsored terrorism. The operations were carried out outside the state’s legal process, without respect for the rule of law or basic human rights.”

The Fujimori trial is yet another case that has benefited from access to declassified U.S. government records. The National Security Archive has provided documents for legal cases in twelve different countries; in Mexico, Guatemala, Uruguay, Chile, Peru, Argentina, Liberia, Sierra Leone, Indonesia, Rwanda, Italy, and Spain. Archive analysts have provided expert testimony in other human rights cases as well, most recently in the case of the Diario Militar, presented before the Inter-American Human Rights Commission in October 2007 (see Kate Doyle’s testimony in previous posting on the Death Squad Dossier).

To see the text in Spanish click here

Related Links

Asociación Pro Derechos Humanos (APRODEH)

Sala Penal Especial de la Corte Suprema

 

Video

Click here to watch the video

TOP-SECRET – 2 DE OCTUBRE DE 1968 – Verdad Bajo Resguardo

Mexican President Gustavo Díaz Ordaz (right) and Government Minister Luis Echeverría Alvarez

2 DE OCTUBRE DE 1968 – Verdad Bajo Resguardo

National Security Archive Electronic Briefing Book No. 258

Mexican army soldiers with detainees from the Tlatelolco massacre, October 2, 1968
Washington D.C., September 17, 2011 – We have arrived at the fortieth anniversary of the massacre at Tlatelolco with little to report. The events of that terrible day remain shrouded in the kind of secrecy that characterizes repressive dictatorships rather than the modern, developed and democratic nation that Mexico is today. This shameful state of affairs is due first and foremost to the lies, misinformation and equivocations of those originally responsable: the late President Gustavo Díaz Ordaz; his hardline deputy, Government Minister Luis Echeverría Alvarez; Marcellino García Barragán, Secretary of National Defense; Chief of the Presidential Staff Luis Gutiérrez Oropeza; Mario Ballesteros Prieto, Chief of Staff to the Secretary of National Defense; and Alfonso Corona del Rosal, Regent of the Federal District.But those men, and the era they represented, have receded into the distant past and no longer pose the greatest obstacle to understanding what happened to Tlatelolco. That honor belongs to the current government of Mexico, which has steadfastly refused to provide the records and testimony necessary to clarify October 2nd once and for all. The dishonest and incomplete efforts of ex-President Vicente Fox to compel his agencies to turn over their files related to Tlatelolco and to launch competent criminal investigations of former Mexican officials is exacerbated today by stonewalling on the part of President Calderón’s government. To investigate Tlatelolco among the files preserved at the Archivo General de la Naciónis to lose oneself in a black hole of missing documentation, enduring secrecy and an intransigent and arrogant staff.To mark the solemn occasion of the anniversary of Tlatelolco, Archivos Abiertos offers the most complete account to date of what files exist on October 2nd – and what remains hidden.  It is our hope that the survivors of Tlatelolco, families of the victims, historians, journalists and human rights investigators will use this account as a guide to insist on a full and truthful version of the events of the massacre. Así – y solo así – podamos llegar a un México verdaderamente abierto. Washington D.C., 2 de octubre 2008 – Nosotros hemos arrivado en el cuadragésimo aniversario de la masacre de Tlatelolco con poco que reportar. Los eventos de ese terrible día continuan envolviendo los secretos que caracterizaron el régimen represivo y dictatorial que se vivió en México en aquella época, a diferencia de la actualidad en donde México es una nación moderna, desarrollada y democrática. Este vergonzoso suceso se dió gracias a las mentiras, a la desinformación y a los errores de los originales responsables: el ex Presidente Gustavo Díaz Ordaz; su segundo al mando, el Secretario de Gobernación Luis Echeverría Álvarez; Marcellino García Barragán secretario de la Defensa Nacional; al Jefe del Estado Mayor Presidencial Luis Gutiérrez Oropeza; a mario Ballesteros Prieto, Jefe del Estado Mayor de la Secretaría de la Defensa Nacional; y a Alfonso Corona del Rosal, regente del Distrito Federal.Pero esos hombres, la era que representaron y los grandes obstáculo para entender lo que sucedio en Tlatelolco quedaron enterrados en el pasado. Ese honor correponde al gobierno actual de México, el cual se ha negado a dar información que pudiese aclarar todo lo que sucedio el 2 de Octubre de una vez por todas. Lo deshonesto y los esfuerzos incompletos del ex Presidente Vicente Fox para obligar a sus agencias a abrir los archivos e iniciar una investigación criminal, es agravado hoy en día por el gobierno del actual Presidente Felipe Calderón el cual obstruye la investigación entre los archivos preservados en el Archivo General de la Nación, en donde esforzarse a investigar es perderse en un hoyo negro de falta de documentación, aguantando al personal intransigente y prepotente.Para marcar la solemne ocasión del aniversario de Tlatelolco, Archivos Abiertos ofrece la más completa información hasta la fecha de los archivos que existen acerca del 2 de Octubre, y lo que permanece escondido bajo resguardo. Es nuestra esperanza que los sobrevivientes de Tlatelolco, las familias de las víctimas, los historiadores,  los periodistas y los investigadores de los derechos humanos utilizen esta información como guía para insistir en una versión completa y veraz de los acontecimientos de la masacre. Así – y sólo así – podamos llegar a un México verdaderamente abierto.

2 DE OCTUBRE DE 1968 – Verdad Bajo Resguardo
Editado por Kate Doyle y Susana Zavala

Para Mayor Información Contactar a
Kate Doyle kadoyle@gwu.edu
Susana Zavala  zavalasusana@gmail.com

Durante el sexenio de Vicente Fox Quesada, se decretó el acuerdo presidencial, 27 de noviembre de 2001, mediante el cual se disponía de diversas medidas para la procuración de justicia por delitos cometidos contra personas vinculadas con movimientos sociales y políticos del pasado.

Una de las disposiciones ordenó que la documentación en poder de las dependencias federales fuera transferida al Archivo General de la Nación (AGN) para atender la recomendación 26/2001 de la Comisión Nacional de los Derechos Humanos (CNDH), que había documentado 532 casos de desaparición forzada de personas por motivos políticos. A estas investigaciones se les daría seguimiento a través de una fiscalía especial dependiente de la Procuraduría General de la República.

En 2002 la Oficina del Fiscal Especial para Movimientos Sociales y Políticos del Pasado (OFEMOSPP), encabezada por Ignacio Carrillo Prieto, abrió sus puertas para integrar las averiguaciones previas de los casos investigados previamente por la CNDH. Tiempo después, Carrillo atrajo también las denuncias de los acontecimientos del 2 de octubre de 1968 y los hechos del 10 de junio de 1971. Su misión era comprobar la responsabilidad de funcionarios, de todos los niveles (que ejercieron funciones en las décadas de los sesenta, setenta y ochenta) en delitos en contra de personas vinculadas a grupos de oposición al gobierno mexicano de aquellos años.

Pero, ¿cuáles fueron las Secretarías de Estado que atendieron esta medida? ¿Cuáles no cumplieron y estaban obligadas? ¿Cuándo y en dónde se resguardó la documentación de aquellas que acataron el acuerdo? ¿Quiénes pueden tener acceso a estos documentos? ¿Quiénes se hicieron cargo de monitorear el total cumplimiento del mandado presidencial? Estas y muchas otras preguntas motivaron a The National Security Archive a realizar una exhaustiva investigación haciendo uso de la Ley Federal de Transparencia y Acceso a la Información Pública Gubernamental (LFTAIPG) para conocer los detalles del cumplimiento a la disposición presidencial y su vigencia actual.

Dependencias que cumplieron

SEDENA (DOCUMENTO 1)

Former Mexican President Vicente Fox

Sólo algunas de las Secretarías de Estado atendieron el acuerdo de Fox. De las primeras en hacer entrega de parte de su archivo histórico fueron las Fuerzas Armadas.  El 22 de enero de 2002, la SEDENA, mediante Acta de Transferencia, hace entrega de información generada desde 1965 hasta 1985.

 “En la Ciudad de México, DF, siendo las dieciocho horas del día veintidós del mes de enero del año dos mil dos, en las instalaciones del Archivo General de la Nación, se precede a suscribir la presente acta de cumplimiento al acuerdo presidencial. Publicado en el Diario Oficial de la Federación el 27 de noviembre del 2001. Mediante el cual dispone diversas medidas para la procuración de justicia por delitos cometidos contra personas vinculadas con movimientos sociales y políticos del pasado, con la representación por parte de la Secretaría de la Defensa Nacional el C. General de División EM Roberto Miranda Sánchez, Director General de Archivo e Historia y por parte de la Secretaría de Gobernación la C. Dra. Stella María González Cicero, Directora del Archivo General de la Nación…”

El documento termina asentando “Por lo anterior la Dirección del Archivo General de la Nación, custodiará y conservará el acervo documental que constituye la información que le es transferida en estricto acatamiento al Acuerdo Presidencial de mérito.”  El acta consta de 9 fojas de las que se resume la siguiente cifra: Cajas 486, legajos 1,653 y un total de 150,713 hojas de 36 Zonas Militares de las 45 que actualmente existen.

La consulta de este fondo documental no tiene mayores restricciones que las señaladas por el área de referencia del AGN. Sin embargo, éste no cuenta con  un índice temático completo que facilite la búsqueda de información, aunque el AGN en su Centro de Referencias tiene a disposición de los investigadores el que le entregó SEDENA.

Por otra parte, hemos identificado documentos que adjuntan anexos los cuales aportan información complementaria en las comunicaciones entre las áreas militares u otras dependencias. Realizamos una exhaustiva búsqueda tratando de ubicar estos anexos en la colección transferida al AGN sin éxito. Y haciendo uso del Sistema de Solicitudes de Información (SISI) del IFAI cuestionamos al respecto a la dependencia castrense, lamentablemente los funcionarios actuales del Archivo Histórico Militar desconocen el paradero de los anexos ya que categóricamente pronunciaron la inexistencia de esta información.

CISEN (DOCUMENTO 2)

El Centro de Investigación y Seguridad Nacional (CISEN) envió a las instalaciones del ex Palacio de Lecumberri, en febrero de 2002, el fondo documental perteneciente a la extinta Dirección Federal de Seguridad (DFS) y la información de la Dirección General de Investigaciones Políticas y Sociales (DGIPS) que se encontraban bajo su custodia desde 1947 hasta 1985.

El Acta entrega-recepción signada por el entonces director del CISEN, Eduardo Medina Mora y la directora del AGN Stella María González Cicero, contabilizaron 4223 cajas con un número aproximado de 58,302 (expedientes). Además se transfirieron de una serie de tarjetas, contabilizadas en aproximadamente 7 millones y que hacen posible la búsqueda de los documentos en sus expedientes, que no fueron especificadas en el  acta de entrega.

También el acta de recepción omite detalles sobre la descripción y el formato de la información resguardada en la Galería No. 1. Sólo señala la procedencia de ésta. Cabe mencionar que las autoridades actuales del AGN aseguran que existen miles de imágenes en diversos tamaños, no obstante descartan por completo que la colección incluyera audiocintas o vídeos.

Para corroborar lo dicho por las autoridades hemos solicitado al CISEN y al AGN un cotejo entre la información resguardada y lo que realmente se trasladó mediante el acta de entrega. Esto debido a las contradicciones en que ambas dependencias han incurrido pues el CISEN manifiesta haber remitido al AGN todo los documentos y el AGN ha respondido que no llegó información en formatos de audio y video.

Sobre su acceso, cuando se trate de un personaje, la vía corta es una solicitud electrónica a través del SISI, en su modalidad de Versión Pública (VP). En los documentos que el AGN entrega en esta modalidad se testan (se suprime con cintos negros) los datos personales del individuo en cuestión. Cuando se desee consultar sobre un tema en particular es decir algún grupo armado, institución, dependencia, etc., lo recomendable es visitar la Galería No. 1 del AGN.

El AGN, desde 1998, ya tenía en resguardo un fondo documental perteneciente a la DGIPS, órgano que dependía de la Secretaría de Gobernación (SEGOB) también extinta DFS reportaba a esta dependencia. Este fondo actualmente se  ubican en la Galería No. 2 del archivo y cuenta con 3052 cajas de información. En este fondo está totalmente abierto al público y fue trasladado al AGN en otro momento y circunstancias. En parte de esta colección es posible consultar cerca de 500 cajas con copia de informes de la DFS de 1969 a 1976.

Secretaría de Relaciones Exteriores (DOCUMENTO 3)

Esta dependencia da respuesta al acuerdo presidencial el 14 de enero de 2002.  Por parte de la Dirección General de Derechos Humanos de la SER, la Subsecretaría para Derechos Humanos y Democracia, Mariclaire Acosta, manifiesta:

“En cumplimiento del citado Acuerdo y después de haberlo conversado con el titular de la Unidad de Estudios Legislativos de la Secretaría de Gobernación, le transmito los citados expedientes en paquetes de 4 y 10 sobres cerrados, respectivamente, con el fin de que los mismos se integren al Archivo General de la Nación.”

Los citados paquetes no han sido posibles de localizar ni en la SER ni en el AGN, ignorándose pues el total de fojas, tipo de material y descripción de su contenido.

La Secretaría de Gobernación (DOCUMENTO 4)

El entonces Secretario de Gobernación, Santiago Creel Miranda, dio instrucciones a las Direcciones Generales a su cargo de enviar, a más tardar al 31 de enero de 2002, la documentación relativa al acuerdo presidencial.

Por su parte, el 16 de enero de 2002, Felipe de Jesús Preciado Coronado, Comisionado del Instituto Nacional de Migración informa: “…me permito transferir al Archivo General de la Nación un total de 15 expedientes originales pertenecientes al archivo de la Coordinación de Control y Verificación Migratoria y que contiene información presumiblemente relacionada con los hechos materia del citado Acuerdo Presidencial…”

Su lista no cuantifica el número de fojas o formato de la información, sólo precisa una breve descripción y algunas fechas. Por ello sabemos que la celda número 7 menciona un informe confidencial del año 1968 y la 13 refiere uno a los disturbios estudiantiles en el mes de julio en la Ciudad de México.

El comisionado finaliza comentando “… se carece de elementos para determinar cuales (expedientes) estarían vinculados con hechos del pasado relacionados con violaciones a los derechos humanos o probablemente constitutivos de delitos cometidos en contra de personas vinculadas con movimientos sociales y políticos, por lo que desde luego, dicho acervo está a disposición de las instancias competentes que requieran consultarlo.”

A pesar de que este memorándum está dirigido a la entonces Directora Stella María González haciendo entrega del mismo, esta información no se encuentra disponible al público pues se desconoce su ubicación dentro del AGN.

Los que no acataron la disposición

Hubo direcciones generales dependientes de la SEGOB que no cumplieron el acuerdo argumentando no contar con expedientes que aportaran datos a las investigaciones. Por ejemplo, la Dirección General del Registro Nacional de Población e Identificación Personal, informó lo siguiente el 22 de enero: “…esta Unidad Administrativa no cuenta con archivo documental de acuerdo a lo solicitado.”  El memorándum lo firma el Director General, Fernando Tovar y de Teresa. (DOCUMENTO 5)

La Dirección General de Asociaciones Religiosas, Dirección de Registro y Certificaciones refiere el titular, Guillermo Fuentes Maldonado, el 10 de enero de 2002: “Sobre el particular me permito informarle que en los archivos dependientes de la Dirección General de Asociaciones Religiosas de la Subsecretaría de Población, Migración y Asuntos Religiosos, no existen expedientes, documentos e información general que pudiera ser considerado como relevante para la investigación de los hechos del pasado.”  (DOCUMENTO 6)

Entre las negativas que más afectaron el proceso de acopio sin duda fueron la hechas por el Estado Mayor Presidencial y la Procuraduría General de la República, pues estas dependencias fueron protagonistas de los hechos sus archivos en 1968 seguramente generaron pilas de información. Sus registros podrían resolver dudas que por años han dejado incompleta la verdad sobre su injerencia en el conflicto.

Además muchas otras como el Tribunal Superior de Justicia, la Secretaría de Educación Pública, la Secretaría de Salud, la Secretaría de Telecomunicaciones y Transporte no realizaron búsquedas en sus archivos para contribuir con la recopilación de expedientes relacionados a las investigaciones del pasado ni tuvieron siquiera la intención de transferir documentación solicitada. No son creíbles los argumentos de estas secretarías que dicen carecer de documentos que pudieran ayudar a descifrar algunas de las incógnitas que por años sólo se han quedado en especulaciones y otras ni siquiera se tomaron la molestia de responder al acuerdo.

Es importante señalar que el decreto presidencial incluía sólo dependencias federales. Sin embargo, para garantizar el buen cumplimiento de esta medida se debió  incluir también dependencias del Gobierno del Distrito Federal, ya que en los registros del servicio forense, delegaciones, hospitales, corporaciones policíacas, departamento de limpia, panteones, etc. es posible obtener datos imprescindibles para la reconstrucción de los hechos.

Intentos fallidos de justicia y esclarecimiento

El año pasado la Suprema Corte de Justicia de la Nación (SCJN) consideró que las causas penales para resolver el caso del 2 de octubre de 1968 ya habían prescrito. Esta resolución prácticamente da por concluido el proceso judicial que se había iniciado en contra del ex presidente Luis Echeverría Álvarez por el delito de genocidio. Esto originó que se descalificara la actuación del ex fiscal Carrillo Prieto, ya que repetidamente se le señalaron las escasas probabilidades de enjuiciar al ex mandatario bajo el delito de genocidio, dejando en duda su capacidad de integrar correctamente la averiguación previa.

A 40 años de aquella noche en la Plaza de las Tres Culturas, el caso aparentemente cerrado continúa siendo objeto de controversia. La demanda de justicia para quienes el 2 de octubre de 1968 perdieron a un ser querido o que purgaron un condena por delitos que no habían cometido sigue vigente más que nunca a pesar del dictamen de la Corte.

Muchos pensaron que de no concluir el caso en una sentencia jurídica promovida por la OFEMOSPP, por lo menos sería posible que su titular determinara, a través de un “Libro Blanco”, una sanción histórica a los funcionarios que reprendieron ferozmente la manifestación estudiantil pacífica. La tarea de esclarecer los hechos del 2 de octubre de 1968 sigue pendiente, pues ni el “Informe a la Sociedad Mexicana 2006” que elaboró el Fiscal Carrillo, al término de sus funciones, ni el informe elaborado por sus colaboradores del área histórica, “Que jamás vuelva a suceder” dio cabal respuesta a la sociedad mexicana.

La verdad bajo resguardo.

Uno de los problemas que denunciaron los integrantes del Comité 68, conformado en 1998 por el Congreso de la Unión (LVII Legislatura), fue la magra voluntad de las autoridades federales de esclarecer los hechos del 2 de octubre. Su desinterés y nulo apoyo se reflejó en los resultados obtenidos. La intención del Comité fue frustrada cuando solicitaron acceso a los archivos de las dependencias federales, pues éste fue restringido en la mayoría de los casos. Sin la documentación generada por las administraciones de Gustavo Díaz Ordaz y Luis Echeverría Álvarez este trabajo no pasó de ser un mero anecdotario.

La OFEMOSPP tenía la ventaja del contar, previo a su creación, con un acuerdo que disponía otorgarle todas las facilidades para su indagación y aún así los resultados fueron cuestionados. ¿Qué sigue? ¿Una comisión de la verdad? No lo sabemos. Lo que sí sabemos es que la información trasladada al AGN está incompleta y que la propia fiscalía dejó al final de sus funciones miles de documentos en la bóveda se seguridad del AGN, lugar a donde van a parar los documentos que por alguna razón de suma delicadeza tienen que ser sacados de sus colecciones de origen. Dichos documentos no pueden ser consultados por los ciudadanos. Peor aún, la Unidad de Coordinación de Investigaciones Especiales de la Procuraduría General de la República, la cual atrajo los casos sin resolver, continúa con esta practica de secretismo.

Existe un catálogo de 350 expedientes en reserva, todos ellos pertenecientes a información que Agentes de Ministerio Público de la Federación (AMPF), colaboradores de la OFEMOSPP y ahora de la Unidad de Investigaciones Especiales sacaron de sus fondos documentales impidiendo que investigadores de DDHH, abogados, periodistas, académicos o estudiantes puedan consultarlos.

De acuerdo con el índice proveído por el AGN, la práctica de ocultamiento se inicio en 2003. En una primera etapa los resguardos fueron decisión de Ministerios Públicos adscritos a la OFEMOSPP, los fechados después de noviembre de 2006 fueron designados a la unidad especial. Cada página en resguardo fue seleccionada según el criterio de los agentes con el argumento de servir como evidencia fundamental de una determinada averiguación previa.

La lista completa puede ser consultada en la página electrónica del AGN, ya que es obligación de toda dependencia contar con un Portal de Obligaciones de Transparencia (POT) el cual debe ser actualizado periódicamente. En el rubro XII del POT del AGN, refiere la Información Relevante del archivo y en esta pestaña está incorporado el Índice de Expedientes Reservados, es decir toda aquella información que haya sido etiquetada como reservada. (DOCUMENTO 7)

Un total de 9,294 fojas y 27 fotografías fueron separadas de sus expedientes, volúmenes y legajos originales; además de tres cajas íntegras. Si bien el índice de expedientes señala la fecha de resguardo, fundamento legal, periodo, número de fojas, dependencia donde se encuentra en reserva y el responsable de ésta.

La autoridad (PGR) que llevó a cabo el resguardo es una distinta del depositario (AGN). Debido a esto los datos no son suficientes para saber si dicha información en reserva fue destinada a una averiguación previa del caso 68 o a algún caso de desaparición forzada. Sólo sabemos que la documentación en resguardo se encuentra físicamente en el AGN.

Las 350 celdas, que describen los resguardos ejecutados por el Ministerio Público,  no especifican datos sobre el fondo documental al que pertenecen, el número de averiguación previa que motiva su resguardo, la clasificación del documento dentro de su acervo o la descripción del documento.

Se entiende que algunos de los resguardos deben continuar bajo este esquema, pues las AP siguen su proceso de integración, sobre todo las que denuncian casos de desaparición forzada. Pero es indispensable que la PGR garantice a las víctimas y familiares que la documentación integrada a las AP es protegida, además debe ser integrada a los Índices de Expedientes Reservados de su POT con una descripción de cada página señalando a que averiguación pertenece de esa manera los denunciantes y representantes legales podrán llevar registro de los avances en sus casos pero mientras se buscan mecanismos para optimizar esto, la documentación sobre los disturbios de 1968 debe ser depositada inmediatamente en sus acervos originales y ponerla a disposición de público de nueva cuenta.

Con estas acciones nos queda claro que los pasos que se dieron en la administración de Vicente Fox, para esclarecer uno de los pasajes más obscuros de la historia reciente de México, fueron discretamente en retroceso. No obstante la reconstrucción de los acontecimientos en Tlatelolco que el decreto presidencial en 2001 preveía debe ser un reclamo que trascienda en cualquier administración federal.

El Estado Mexicano está obligado a garantizar el derecho a conocer la verdad sin importar el partido político en turno. Debe ordenar a las Secretarías de Estado, sobre todo aquellas que hicieron caso omiso en 2002, que continúen trasfiriendo al AGN la documentación que vayan identificando en sus archivos; que localicé la que se perdió o se traspapeló en el AGN, que decrete máxima publicidad a los documentos bajo resguardo y que ordene inmediatamente a la PGR integrar a sus expedientes originales la información relativa a los acontecimientos del 2 de octubre para su libre consulta.

Esta investigación concluye que la verdad sobre el conflicto estudiantil en 1968 estará lejos todavía si el gobierno en turno no tiene interés o voluntad en que se conozca. No hay explicaciones congruentes de por qué siguen en reserva cerca de 10.000 documentos, si el proceso en las instancias procuradoras de justicia ya finalizó; no las hay para el extravío de documentos y menos para el desacato en que incurrieron muchas dependencias.


DOCUMENTOS

DOCUMENTO 1
Enero 22, 2002
Acta de Transferencia de Documentación
9 páginas

El acta da cumplimiento al acuerdo presidencial, publicado en el Diario Oficial de la Federación el 27 de noviembre de 2001, mediante el cual se disponen diversas medidas para la procuración de justicia por delitos cometidos contra personas vinculadas con movimientos sociales y políticos del pasado.  Se resume la siguiente cifra: cajas 486, legajos 1,653 y un total de 150,713 hojas generadas en 36 Zonas Militares. El documento se encuentra firmado por la Dra. Stella María González Cicero, Directora General del Archivo General de la Nación y el Gral. De Div. DEM Roberto Miranda Sánchez, Director de la Dirección General del Archivo e Historia.

Fuente:
Secretaría de la Defensa Nacional

DOCUMENTO 2
Febrero 19, 2002
Acta Administrativa de Entrega-Recepción del Acervo Documental Transferido al Archivo General de la Nación
6 páginas

En cumplimiento al acuerdo presidencial del 27 de noviembre de 2002, la Secretaría de Gobernación transferiría al Archivo General de la Nación la totalidad de los archivos, expedientes, documentos e información en general que fueron generados por las extintas Dirección General de Seguridad y Dirección General de Investigaciones Políticas y Sociales. Dicha información actualmente se encuentran bajo custodia y conservación del Centro de Investigación y Seguridad Nacional a efecto de que pueda ser consultada en los términos de dicho acuerdo. El Acta entrega-recepción fue signada por el entonces director del CISEN Eduardo Medina Mora Icaza y la directora del Archivo General de la Nación Dra. Stella María González Cicero contabilizaron 4223 cajas con un número aproximado de 58,302 (expedientes).

Fuente:
Archivo General de la Nación

DOCUMENTO 3
Enero 14, 2002
Memorándum Secretaría de Relaciones Exteriores
1 página

Para cumplimiento del Acuerdo, del 27 de noviembre de 2001, la Subsecretaria para Derechos Humanos y Democracia, Mariclaire Acosta, transfiere dos expedientes relacionados con violaciones, generados hasta 1985, mismos que pudieran ser relevantes para la investigación. Los citados expedientes son remitidos en paquetes de 4 y 10 sobres cerrados, respectivamente, con el fin de que los mismos se integren al Archivo General de la Nación.

Fuente:
Secretaría de Relaciones Exteriores

DOCUMENTO 4
Enero 16, 2002
Memorándum

Felipe de Jesús Preciado Coronado, Comisionado del Instituto Nacional de Migración informa: “…me permito transferir al Archivo General de la Nación un total de 15 expedientes originales pertenecientes al archivo de la Coordinación de Control y Verificación Migratoria y que contiene información presumiblemente relacionada con los hechos materia del citado Acuerdo Presidencial…”

El Comisionado concluye: “… se carece de elementos para determinar cuales (expedientes) estarían vinculados con hechos del pasado relacionados con violaciones a los derechos humanos o probablemente constitutivos de delitos cometidos en contra de personas vinculadas con movimientos sociales y políticos, por lo que desde luego, dicho acervo está a disposición de las instancias competentes que requieran consultarlo.”

Fuente:
Archivo General de la Nación

DOCUMENTO 5
Enero 22, 2002
Memorándum

La Dirección General del Registro Nacional de Población e Identificación Personal, informó lo siguiente el 22 de enero: “…esta Unidad Administrativa no cuenta con archivo documental de acuerdo a lo solicitado.”  El memorándum lo firma el Director General, Fernando Tovar y de Teresa.

Fuente:
Archivo General de la Nación

DOCUMENTO 6
Enero 10, 2002
Memorándum

La Dirección General de Asociaciones Religiosas, Dirección de Registro y Certificaciones refiere el titular, Guillermo Fuentes Maldonado, el 10 de enero de 2002: “Sobre el particular me permito informarle que en los archivos dependientes de la Dirección General de Asociaciones Religiosas de la Subsecretaría de Población, Migración y Asuntos Religiosos, no existen expedientes, documentos e información general que pudiera ser considerado como relevante para la investigación de los hechos del pasado.”

Fuente:
Archivo General de la Nación

DOCUMENTO 7
De junio 26, 2003 a enero 29, 2007
Lista de resguardos POT-AGN

Esta lista describe la información que Agentes de Ministerio Público de la Federación (AMPF), colaboradores de la OFEMOSPP y ahora de la Unidad de Investigaciones Especiales sacaron de sus fondos documentales Un total de 9294 fojas y 27 fotografías fueron separadas de sus expedientes, volúmenes y legajos originales; además de tres cajas íntegras. El índice de expedientes señala la fecha de resguardo, fundamento legal, periodo, número de fojas, dependencia donde se encuentra en reserva y el responsable de ésta.

TOP-SECRET – Bureau of Public Debt Records Eyeball

Bureau of Public Debt Records Eyeball

Federal Register, August 17, 2011

Systems Covered by this Notice

    This notice covers all systems of records adopted by the Bureau of
the Public Debt up to April 1, 2011. The systems notices are reprinted
in their entirety following the Table of Contents.

    Dated: August 11, 2011.
Veronica Marco,
Acting Deputy Assistant Secretary for Privacy, Transparency, and
Records.

Table of Contents

Bureau of the Public Debt
BPD.001--Human Resources and Administrative Records
BPD.002--United States Savings-Type Securities
BPD.003--United States Securities (Other than Savings-Type
Securities)
BPD.004--Controlled Access Security System
BPD.005--Employee Assistance Records
BPD.006--Health Service Program Records
BPD.007--Gifts to Reduce the Public Debt
BPD.008--Retail Treasury Securities Access Application
BPD.009--U.S. Treasury Securities Fraud Information System

TREASURY/BPD.001

System Name:
    Human Resources and Administrative Records--Treasury/BPD.

System Location(s):
    Records are maintained at the following Bureau of the Public Debt
locations: 200 Third Street, Parkersburg, WV; 320 Avery Street,
Parkersburg, WV; Second and Avery Streets, Parkersburg, WV; and 799 9th
Street, NW., Washington, DC.

Bureau of Public Debt Records

Eyeball

200 Third Street, Parkersburg, WV[Image]
[Image]
[Image]
[Image]

TOP-SECRET – TEMPEST and Countermeasures Cables

A sends:

The following 5 cables contain both the word “TEMPEST” and “countermeasures”, all are SECRET//NOFORN:

08BISHKEK293

09STATE869

09STATE23578

09STATE29526

09STATE29527 (Appears to be duplicate of 09STATE29526)

Also:

– 09STATE23578 (Appears to be duplicate of 09STATE29526)

Source: http://laurelai.info/mirrors/cablegate/

The State Department section 12 FAH (Foreign Affairs Handbook) is classified.


VZCZCXYZ0001
RR RUEHWEB

DE RUEHEK #0293/01 0870902
ZNY SSSSS ZZH
R 270902Z MAR 08
FM AMEMBASSY BISHKEK
TO SECSTATE WASHDC 0846

S E C R E T BISHKEK 000293 

SIPDIS 

NOFORN
SIPDIS 

DEPT FOR ACTION OF OIG
DEPT FOR NEA/SCA/EX BILL HAUGH
DEPT FOR SCA/CEN DAVID GEHRENBECK 

E.O. 12958: DECL: 03/26/2033
TAGS: AMGT ASEC ASIG AISG
SUBJECT: EMBASSY BISHKEK RESPONSES TO RECOMMENDATIONS
LISTED IN OIG REPORT NUMBER ISP-S-08-14A, FEBRUARY 2008 

REF: A. MCCORMICK/AMBASSADOR YOVANOVITCH E-MAIL DATED
        FEBRUARY 29 2008
     B. OIG REPORT NUMBER ISP-S-08-14A FEBRUARY 2008 

Classified By: DCM Lee Litzenberger for Reasons 1.4(g) 

Here follows Embassy Bishkek responses to the formal and
informal recommendations listed in OIG report number
ISP-S-08-14A. 

1.  (C/NF)  Recommendation 1: Embassy Bishkek should continue
to coordinate with the Bureau of Overseas Buildings
Operations to ensure near term installation of locally
fabricated mantraps for the vehicle entrances to the embassy
compound.
(Action: Embassy Bishkek, in coordination with OBO) 

Management decision: Post concurs. 

Response: Post has contracted via RPSO Frankfurt with a
German Architectural and Engineering firm to provide 100%
design and construction documents for the Mantrap project. To
date, Post and OBO have received the 35% design submittal for
review and have returned comments. Although most recently
some contractual problems have slowed the design effort, Post
is confident these issues will be resolved quickly and 100%
design documents can be delivered by 30 April. After
receiving the final construction documents and OBO Building
Permit, Post will proceed to the contracting and construction
phase. 

2.  (C/NF)  Recommendation 2: The Bureau of Overseas
Buildings Operations, in coordination with Embassy Bishkek,
should replace the damaged forced-entry/ballistic-resistant
window on the compound access control guard booth servicing
the employee parking lot. (Action: OBO, in coordination with
Embassy Bishkek) 

Management decision: Post concurs. 

Response: Post identified the proper replacement glass and
ordered the glass directly from Norshield in coordination
with OBO/PE/CC/SPE via purchases order SKG-100-08-M-0057. The
order for the replacement glass was placed on 01/17/08. On
03/05/08, Post learned that the window reached our dispatch
agent in New Jersey. Post anticipates the window will arrive
06/08. Once the replacement glass is received, Post will
coordinate with Larry Best and Koburn Stoll from
OBO/PE/CC/SPE to request an FE/BR door and window team for
installation. 

3.  (SBU)  Recommendation 3: Embassy Bishkek should implement
flexible work hours for embassy personnel and encourage
employees to vary their arrival and departure times. (Action:
Embassy Bishkek) 

Management decision: Post concurs in part. 

Response: Post is not prepared to implement flexible working
hours Embassy wide, but prefers a stepped approach to arrival
times by section to help alleviate vehicles waiting outside
of the compound to be screened, which is a the security
concern that prompted this recommendation. Post has analyzed
the congestion problems and contends that the congestion is
primarily focused at Post 26 (vehicle CAC) from between 0800
to 0830 while vehicles are waiting for security screening.
Post Management has instructed the Facilities Maintenance
Section to alter their working hours so that this section
would start work at 0800 vice 0830. The Facilities
Maintenance Section is by far the largest section that
reports directly to the Embassy every morning and modifying
their arrival time by 30 minutes should eliminate waiting
lines for security screening while still maintaining positive
management controls over staff. In addition, the RSO
regularly advises all American Staff to vary their routes and
times to and from work. 

4.  (C/NF)  Recommendation 4: The Bureau of Overseas
Buildings Operations should assess the integrity of all
affected chancery windows and advise the embassy of any
needed work to bring the windows into compliance with
security standards. (Action: OBO) 

Management decision: Post concurs. 

Response: Yvonne Manderville from OBO/PE/DE/SEB visited Post
in March 2008. Manderville stated that adhesive properties of
the gasket material have failed and caused the gasket to 

separate from the window pane which has resulted in the
degradation of the ballistic properties of the window
assemblies. Manderville recommended that Post petition for
inclusion in the FEBR window and door   replacement program.
Post is drafting a cable to OBO and DS requesting a formal
condition survey of all FE/BR windows and doors. In this
cable Post will also petition for inclusion in the Life Cycle
Replacement program. Request will be submitted by May 1, 2008. 

5.  (S/NF)  Recommendation 5: The Bureau of Diplomatic
Security, in coordination with Embassy Bishkek, should
conduct a complete TEMPEST review of all permanent and
temporary classified processing areas at post and provide
detailed instructions regarding countermeasures that should
be employed to mitigate any proven TEMPEST noncompliance or
threat. (Action: DS in coordination with Embassy Bishkek) 

Management decision: Post concurs. 

Response: Post will review and implement the recommendations
from the May 2007 Technical Security Assessment. Post has
contacted Lee Mason and Mark Steakley from DS/ST/CMP/ECB to
request and schedule a TEMPEST review. Mason and Steakley
were contacted in mid March and Post is waiting follow-up and
confirmation. 

6.  (SBU)  Recommendation 6: Embassy Bishkek should establish
a viable alternate command center. (Action: Embassy Bishkek) 

Management decision: Post does not concur. 

Response: The current alternate command center represents the
best option presently available to Embassy Bishkek. The
alternate command center is located south of Bishkek not far
from the Kyrgyz Presidential mansion and the Diplomatic
village. While the road infrastructure could be improved, the
location is not remote. In addition, the location is well
suited for a helicopter landing zone.  There is a large field
approximately 600 meters wide and 2 kilometers in length that
could accommodate several transport helicopters in the event
of an evacuation. The alternate command center has a HF radio
base station that when last tested in December 2007 had
excellent link quality between Embassy Dushanbe (82%) and
Embassy Tashkent (91%). The alternate command center has two
computer workstations with dial-up internet access, a
photocopier, and a fax. There are two landlines, one IVG line
and two satellite phones. The alternate command center can be
placed into operation within 30 minutes as demonstrated in a
test in December 2007. Furthermore, the location has been
fully stocked with medical supplies, emergency rations and
water. Embassy Bishkek could not find any blast protection
requirements in the applicable Alternate Command Center
references in 12 FAH-1 H-261c and 12 FAH 1, Appendix 3. As
the Post housing pool evolves, Post will continue to seek a
better Alternate Command Center, but the current location is
the best option at the present time. 

7.  (SBU)  Recommendation 7: The Bureau of Overseas Buildings
Operations, in coordination with Embassy Bishkek, should
evaluate post's current safe haven and initiate a physical
security upgrade project to bring the safe haven into
conformance with current requirements. (Action: OBO, in
coordination with Embassy Bishkek) 

Management decision: Post concurs. 

Response: Post's safe haven area is too small to protect all
employees assigned to Embassy Bishkek.  Until the annex is
built, Post initiated coordination with Yvonne Manderville
OBO/PE/DE/SEB and Dale Amdahl DS/PCB/PSD to identify and
implement viable alternatives such as constructing safe areas
in the warehouse, facilities maintenance building and health
unit/caf. Post's floor warden training addresses refuge
locations within the Chancery. 

8.  (SBU)  Recommendation 8: Embassy Bishkek should develop
and implement a formal agreement with Manas Air Base for the
evacuation of Americans and qualifying locally employed staff
members. (Action: Embassy Bishkek) 

Management decision: Post concurs. 

Response: The Embassy has explored the recommendation. In
doing so we have learned that a formal agreement between
Embassy Bishkek and Manas Coalition Airbase for the
evacuation of Americans and qualifying locally employed staff
members and selected foreign nationals, is not necessary to
ensure Noncombatant Evacuation Operations are accomplished, 

and the base is not authorized by USCENTCOM to conclude such
an agreement. There are mechanisms in place for the efficient
and proper coordination and planning for this contingency
which should be followed to ensure forces and assets are
available during emergency situations. Embassy Bishkek has
therefore  coordinated with USCENTCOM to ensure contingency
planning options are in-place, to include evacuation of
Embassy personnel, and fully coordinated with other affected
agencies (USTRANSCOM, DOS, and JCS) IAW applicable
directives. 

9.  (SBU)  Recommendation 9: Embassy Bishkek, in coordination
with the Bureau of Diplomatic Security, should conduct a
security assessment to determine whether static residential
guards are required in addition to the centralized alarm
monitoring system and mobile patrol. (Action: Embassy
Bishkek, in coordination with DS) 

Management decision: Post concurs, with comment. 

Response: Post will conduct, in coordination with the Bureau
of Diplomatic security an assessment outlined in 12 FAH-6
H-521.1. Post is confident the assessment will reaffirm that
the residential security program is necessary for the safety
and security of personnel assigned to Embassy Bishkek.
Targeted date for completion is 30 June 2008. 

The greatest threat against Americans in Bishkek is crime. In
February 1994 Embassy Bishkek instructed the Local Guard
Commander to implement a night residential security program.
In October 2002, the RSO identified a local alarm company
that had the technical capability to install and monitor
alarms and panic buttons at Embassy residences. However, in
January 2008 the new Minister of Internal Affairs announced
that MVD would no longer provide a quick reaction force to
respond to alarms. In addition, RSO Bishkek is only
authorized one, 24 hour mobile patrol. This means that
response time to residences in the event of an emergency is
too slow. Although the distance between the southernmost and
northernmost residence is only 8 miles, the infrastructure
and traffic can delay response time by more than 30 minutes.
In addition, Mobile Patrol can only check each residence two
or three times in a 12 hour shift.  This situation is
untenable. 

Since 2006, residential LGF have detected and deterred 4
instances of attempted vandalism to Embassy employee vehicles
at their residences. LGF residential guards have deterred
assault and when tasked provided temporary 24 hour
residential security for American Officers who the RSO had
reason to believe were being threatened by host nation
intelligence and or organized crime. Finally, residential
security guards were able to monitor and report regarding an
incident in which a vehicle belonging to the son-in-law of
the former deputy chief of the Kyrgyz Intelligence service
was deliberately torched within 30 feet of an apartment
building which, at the time, housed four Embassy employees
and their families. Since the Embassy began using the alarm
company, the Police have not had to respond to incidents at
residences during the night when the guards were present. The
alarms have only been needed during the day when the guards
are not present. The statistic speaks for itself. The
residential guards are a definite deterrent against acts of
violence and vandalism against American Officers. Embassy
Bishkek, if required to choose between residential alarms and
residential guards, would choose to maintain the residential
guards, as a more viable means of protecting the lives of the
American officers and their dependents. 

10.  (C/NF)  Recommendation 10: Embassy Bishkek should
install shatter-resistant window film on all windows that the
regional security officer considers vulnerable at the chief
of mission residence. (Action: Embassy Bishkek) 

Management decision: Post concurs. 

Response: Post's Facilities Maintenance Section has scheduled
a survey of the CMR to identify all windows that are not
currently protected by shatter-resistant window film. Post
currently has film on hand and will contract with a local
contractor for installation. Targeted date of completion is
May 31, 2008. 

11.  (SBU)  Recommendation 11: Embassy Bishkek should install
grilles on all accessible windows in the chief of mission
residence safe area and fit one window grille with an
interior emergency release device for emergency egress.
(Action: Embassy Bishkek) 

Management decision: Post concurs. 

Response: RSO in conjunction with the FM at Post has
scheduled a review and update of the existing physical
security assessment of the CMR in accordance with residential
security standards 12 FAH-6 H-400, 12 FAH-6 H-113.10 and 12
FAH-8 H-520. Any deficiencies discovered during this review
will be corrected to conform to the standards. Targeted date
of completion is July 31, 2008. 

12.  (U)  Recommendation 12: Embassy Bishkek should pursue
and secure a formal agreement with Manas Air force Base,
including reimbursement, for investigative support provided
by the regional security office. (Action: Embassy Bishkek) 

Management decision: Post concurs. 

Response: Post FMO has contacted Manas Air Base Chief
Financial Officer regarding this recomendation and has
requested a meeting to explore the concept of reimbursement
for investigative services provided by the Embassy on behalf
of Manas Air Base. Post RSO and FMO are working closley to
accurately identify and quantify associated cost related to
investigations. Once Post's analysis is complete the FMO will
coordinate with Manas Air Base Chief Finance Officer to
establish a formal agreement that outlines workload counts
and a reimbursement plan for investigations completed by RSO
Foreign Service National Investigators on behalf of Manas Air
Base. 

13.  (C/NF)  Recommendation 13: Embassy Bishkek, in
coordination with the Bureaus of Overseas Buildings
Operations and Diplomatic Security, should modify the
facility manager's existing office space to bring it into
compliance with current physical security protection
standards. (Action: Embassy Bishkek, in coordination with OBO
and DS) 

Management decision: Post concurs. 

Response: Although Post concurs with this recommendation, a
short term solution is unlikely. The existing Facilities
Managers Office is a loft in the Maintenance Shop Building.
This building is a pre-engineered building (Butler Building)
and is physically unable to handle the load that would be
applied to the structure by the addition of making this area
compliant with current physical security protection
standards. Post has been actively pursuing with OBO a new
office annex (NOX), which is a long term solution to
holistically address all of our space and space related
security concerns. Post is currently on the "Top 80 List" for
2011 and a back-up for 2010. However, Embassy Bishkek
Facilities Maintenance Officer and the Regional Security
Officer will prepare a waiver and exception package for
DS/PSD/PCB review and approval. Targeted date for submission
of the waiver and exception request to DS/PSD/PCB is June
2008. 

14.  (C/NF)  Informal Recommendation 1: The inner CAC
building (post two) lacks any form of protective window
treatment on its windows. Occupants are susceptible to flying
glass if a bomb attack occurred on the east side of the
compound. Embassy Bishkek should install shatter-resistant
window film on all post two windows that the regional
security officer deems vulnerable to blast. 

Management decision: Post concurs. 

Response: Post's Facilities Maintenance Section will conduct
a survey of Post 2 and identify all windows that are not
currently protected by shatter-resistant window film. Post
currently has film on hand and will contract with a local
contractor for installation. Targeted date of completion is
May 31, 2008. 

15.  (C/NF)  Informal Recommendation 2: The presence of a
concrete barrier adjacent to the east side vehicular CAC, a
large boulder adjacent to the northwest corner of the
compound wall, and a stoplight fixture adjacent to the
service CAC provide footholds that an intruder could use to
scale the compound wall. Embassy Bishkek should remove or
relocate the concrete barrier, boulder, and stoplight that
are adjacent to the embassy compound fence. 

Management decision: Post concurs. 

Response: In March Post relocated the concrete barriers and 

large boulders so that they are at least 2.75 meters from the
compound wall and can no longer be used as a foothold. The
location of the stoplight fixture will be relocated during
the construction of the mantrap for that CAC later this year. 

16.  (C/NF)  Informal Recommendation 3: The rear hardline
door leading to the temporary trailers is not covered by an
exterior camera. The Marine at Post One cannot positively
determine who he is letting into the chancery. Without
a camera, he could either allow an intruder to enter or deny
entry to a trusted employee in an emergency. Embassy Bishkek
should install a camera to cover this area. 

Management decision: Post concurs. 

Response: The regional ESO from Astana concurs with this
recommendation; ESO will relocate camera #28 so that it
provides video coverage of this entrance to the Chancery.
Additional materials required for this project are on-hand
and this project has been added to the active work list as a
priority. Targeted completion date is June 30th 

17.  (SBU)  Informal Recommendation 4: The emergency plan for
Embassy Bishkek has not been entered into the crisis and
emergency planning application. Embassy Bishkek should direct
section heads to input the missing data before February 2008. 

Management decision: Post concurs. 

Response: In February Post completed the unclassified portion
of the EAP and entered it into the crisis and emergency
planning application. Post is waiting for DS/IP/SPC/EP to
advise that the software glitch has been fixed to allow Post
to publish the classified sections as well. 

18.  (SBU)  Informal Recommendation 5: The emergency
notification system does not cover the embassy's built-in
conference room or the workspace just outside the two CAA
temporary office trailers. Embassy Bishkek should install
speaker systems at these two locations. 

Management decision: Post concurs. 

Response: The regional ESO from Astana concurs with this
recommendation; additional speakers and other materials
required for this project are on-hand and this project has
been added to the active work list as a priority. Targeted
completion date is June 30th. 

19. (SBU)  Informal Recommendation 6: The physical security
exceptions for three locations within the compound are not
valid. Embassy Bishkek should update the existing physical
security exceptions for the medical unit, cafeteria, and CAA
office trailers. 

Management decision: Post concurs. 

Response: The waiver for exceptions to physical security
standards for the CAA office trailer is valid.  However, the
Health Unit/Caf waiver is no longer valid. As a result of
post growth, the Health Unit and Cafeteria are now staffed by
employees more than 4 hours per day.  Embassy Bishkek will
resubmit a waiver and exception packet for the health
unit/cafeteria. Targeted submission date is 30 June. 

20.  (U)  Informal Recommendation 7: Several apartment
stairwells do not have lighting at night. Embassy Bishkek
should explore gaining landlord agreement to install motion
activated lights in stairwells and issue flashlights to
employees in the interim. 

Management decision: Post does not concur. 

Response: Post has conducted an informal survey of all direct
hire American staff who receive Embassy provide housing and
other than individual incidents of actual light bulbs being
burned out, all stairwells have adequate lighting installed.
In addition to this, every Friday, the Facilities Maintenance
Section Electricians in conjunction with the Local Guard
Force make inspections of existing security lighting. Lights
are tested in guard booths and stairwells and any maintenance
work orders that have been submitted citing security lighting
issues are repaired at this time. 

21.  (C/NF)  Informal Recommendation 8: The grilles on the
CMR rear doors do not have latches and cannot be secured from
inside the residence. Embassy Bishkek should secure these
grilles. 

Management decision: Post concurs. 

Response: RSO in conjunction with the FM at Post will review
and update the existing physical security assessment of the
CMR in accordance with residential security standards 12
FAH-6 H-400, 12 FAH-6 H-113.10 and 12 FAH-8 H-520. Any
deficiencies discovered during this review will be corrected
to conform to the standards. Expected completion date is 1
May 2008. 

22.  (C/NF)  Informal Recommendation 9: The passive infrared
sensor in the living room of the CMR on the rear of the
building is inoperative. Embassy Bishkek should repair this
infrared sensor. 

Management decision: Post concurs. 

Response: The local security company that installs and
maintains all of our residential alarm systems visited the
CMR on March 19, 2008. The entire alarm system was inspected
and tested. It was found that some faulty wiring was causing
the infrared sensor from operating properly, wiring was
repaired and a complete operational test was  conducted with
satisfactory results. 

YOVANOVITCH

R 061518Z JAN 09
FM SECSTATE WASHDC
TO AMEMBASSY ANKARA
AMCONSUL ISTANBUL
INFO AMEMBASSY PRETORIA
CIA WASHINGTON DC/DO/MSP-MCGSOC/ 2364
DIA WASHINGTON DC/
JOINT STAFF WASHINGTON DC//J3SOD//
HQ USSOCOM MACDILL AFB FL/
HQ EUCOM VAIHINGEN GE/
COMSOCEUR/
USASOC FT BRAGG NC/
AFSOC HURLBURT FLD FL

S E C R E T STATE 000869 

DDSO FOR CAPT. SONG
USSOCOM FOR MR. BRIAN MILLER
POST FOR RSO
POST FOR IMO
POST FOR ADANA
PRETORIA FOR RIMC 

E.O. 12958: DECL: 12/29/2018
TAGS: ACOA AEMR AMGT ASEC
SUBJECT: EUCOM(AF) REGIONAL SURVEY TEAM PCC ACCESS -
AMEMBASSY ANKARA 

REF: A. USSOCOM SCSO J2 MACDILL AFB
     B. FL 111131Z DEC 08
     C. 08 ANKARA 2153 

Classified By: JAMES MCDERMOTT, DIRECTOR, DS/IP/SPC,
REASON 1.4(G) 

1. (U) ACTION POSTS ARE REQUESTED TO ACKNOWLEDGE RECEIPT OF
THIS TELEGRAM  VIA CABLE TO INFO DS/IP/SPC AND
IRM/OPS/ITI/SI/CSB STATING CONCURRENCE AND/OR  NONCONCURRENCE. 

2. (U) FOR ATO AF: PLEASE FORWARD YOUR ACCESS AUTHORIZATION
REQUEST TO  IRM/OPS/ITI/SI/CSB AND INFO DS/IP/SPC.  ANY
FURTHER INQUIRIES CAN BE DIRECTED  TO YOUR OC/COMSEC. 

3. (U) IRM/BPC/CST/LD/OB AND IRM/OPS/ITI/SI/CSB HAVE CLEARED
THIS TELEGRAM. 

4. (S) THE FOLLOWING RST MEMBERS WILL VISIT AMEMBASSY ANKARA
AS WELL AS CONSULATE GENERAL ISTANBUL AND US CONSULATE ADANA
ON JANUARY 14, 2009 TO FEBRUARY 14, 2009 TO  CONDUCT A
SECURITY PROGRAM SURVEY OF THE  FACILITY.  THE FOLLOWING TEAM
MEMBERS WHO POSSESS TOP SECRET (TS)  CLEARANCES ARE
AUTHORIZED ESCORTED ACCESS TO THE PCC IN ACCORDANCE WITH
5FAH-6 H124.4 E, G, H: 

NAME                    SSN         CLEARANCE 

MANN, JAMES R.          XXX-XX-XXXX TS/SCI
MCKINNON, ISAIAH        XXX-XX-XXXX TS/SCI
DRAPER, DONALD W.       XXX-XX-XXXX TS/SCI 

5. (S) PHOTOGRAPHY IN THE PCC IS AUTHORIZED UNDER THE
FOLLOWING CONDITIONS: 

     (A) THE SHIELDED ENCLOSURE, MG SET, AC POWER FILTERS,
AND ISOLATION  TRANSFORMER ARE NOT TO BE FILMED OR
PHOTOGRAPHED; THEREFORE, ARRANGE TO  HAVE THIS EQUIPMENT
COVERED DURING FILMING/PHOTOGRAPHY OF AREA. 

     (B) ALL ELECTRONIC PROCESSING OF CLASSIFIED DATA MUST
HALT DURING THE  USE OF ANY ELECTRONIC EQUIPMENT UTILIZED BY
THE TEAM. 

     (C) ANY VIDEO TAPE OR PHOTOS TAKEN WITHIN THE PCC SHALL
BE CLASSIFIED  CONFIDENTIAL AND MARKED AND HANDLED AS SUCH. 

     (D) PLAY BACK OF CLASSIFIED VIDEO/AUDIO TAPE MUST BE
ACCOMPLISHED IN  A TEMPEST APPROVED MANNER. 

     (E) CLASSIFIED PLAIN TEXT MUST BE SECURED AND THE SURVEY
TEAM MUST  REMAIN UNDER ESCORT BY PCC PERSONNEL. 

6. (U) POC: DS/IP/SPC/SO: JAMES SPOO, BRANCH CHIEF, STE (571)
345-2532. 

RICE

VZCZCXYZ0000
RR RUEHWEB

DE RUEHC #3578 0711843
ZNY SSSSS ZZH
R 121826Z MAR 09
FM SECSTATE WASHDC
TO RUEHUL/AMEMBASSY SEOUL 0000
INFO RUEHBK/AMEMBASSY BANGKOK 0000
RUEHBJ/AMEMBASSY BEIJING 0000
RUEHML/AMEMBASSY MANILA 0000

S E C R E T STATE 023578 

NOFORN
SEOUL FOR RSO IMO AND ESO
BEIJING FOR ESC
MANILA FOR RDSE (ACTING)
BANGKOK FOR RIMC
SIPDIS 

E.O. 12958: DECL: UPON CLOSURE OF U.S. EMBASSY SEOUL
TAGS: AADP ABLD ACOA AMGT ASEC KSEO KRIM KGIT KNET KCIP
SUBJECT: TEMPEST COUNTERMEASURES REQUIREMENTS - SEOUL 

REF: 00 STATE 126075 

Classified By: M.J. STEAKLEY, DS/ST/CMP, REASON: 1.4 (C) AND (G) 

1. (S/NF) These revised TEMPEST countermeasures requirements
are effective immediately. Requirements apply to the Chancery
at Seoul, located at 82 Sejong-ro.  Post's relevant threat
levels at the time of this  telegram are High for Technical
and High for Human Intelligence. 

2. (S) TEMPEST requirements are determined by the Certified
TEMPEST Technical Authority (CTTA) and approved by the
Countermeasures Division Director.  These requirements apply
to all information processing systems for this facility. 

A. (S) TOP SECRET and SCI CLASSIFIED Automated Information
System (AIS): Post is authorized to use TEMPEST Level 1 AIS
equipment for processing classified national security
information (NSI) at the TOP SECRET or SCI level within the
Embassy core area of the CAA.  Post is authorized to use
Commercial-off- the-Shelf (COTS) AIS equipment within a CSE
or equivalent that meets NSA 94-106 specifications. Use of
higher level equipment is approved. 

B. (S) SECRET (COLLATERAL) CLASSIFIED (AIS): Seoul is
authorized to use  TEMPEST Level 1 AIS equipment for
processing classified NSI at the SECRET level within
restricted and core areas of the CAA.  Post was previously
authorized Zone A equipment, but that equipment category is
being phased out and is no longer being procured.  By October
1, 2013, Seoul must have replaced all Zone A classified
processing equipment with TEMPEST Level 1 equipment.  Post is
authorized to use COTS AIS equipment within a certified
shielded enclosure (CSE) or equivalent that meets NSA 94-106
specifications. 

C. (S) SENSITIVE BUT UNCLASSIFIED AIS: Use of COTS AIS for
processing unclassified and sensitive but unclassified (SBU)
within the Embassy restricted area and core area of the CAA
is approved.  Unclassified and multimedia equipped
unclassified processing equipment to be used within a CAA
must be purchased, shipped, stored, installed, maintained and
repaired in accordance with 12 FAH-6 H-542, and may not be
located inside a CSE. 

3. (S) Secure video teleconferencing (SVDC), if requested,
will be addressed in a SEPTEL following completion of
coordination with VCI/VO. 

4. (S) All Classified Automated Information System (CAIS)
equipment, components and peripherals must be secured in
accordance with Overseas Security Policy Board (OSPB)
requirements for classified discussion, processing and/or
storage overseas.  Thin Clients with embedded flash memory,
at facilities with 24-hour cleared American presence, are
permitted to remain unsecured within the Controlled Access
Areas (CAA) as long as the equipment is rebooted prior to
vacating the premises. 

5. (S) Fiber optic cabling is required for classified
connectivity.  Fiber optic cabling is also required for
unclassified (SBU) connectivity for any IT equipment located
within a CSE.  Equipment used to process classified
information outside a CSE must be installed, to the maximum
extent possible, in accordance with Recommendation A of
NSTISSAM TEMPEST 2-95 with the following additional
requirements: 

- Be located a minimum of one meter (three feet spherical)
from other computer and electronic equipment used for
unclassified information processing. 

- Be located a minimum of one meter (three feet spherical)
from telephones, modems, facsimile machines, and unshielded
telephone or signal lines that do not leave USG-controlled
property (for example, phone lines that go to the post phone
switch). 

- Be located a minimum of two meters (six feet spherical)
from telephones, modems, facsimile machines, and unshielded
telephone or signal lines that transit USG-controlled
property (for example, direct phone lines that do not go
through the post telephone switch, telephone switch lines
going out, any wire going to antennas on the roof, etc). 

- Be located a minimum of 3 meters (ten feet spherical) from
active radio transmitters (two-way radios, high frequency
transceivers, satellite transceivers, cellular devices,
Wi-Fi devices, Bluetooth, etc.) and must not use the same AC
power circuit as active radio transmitters (to include cell
phone chargers). 

- Be located a minimum of three meters (ten feet spherical)
from cable television antenna feeds and any Warren switch
with the switch on.  This distance can be reduced to one
meter if the Warren switch is off when processing classified. 

- Be located to have no physical contact with any other
office equipment or cabling. 

6. (S) Classified conversations up to SECRET may be conducted
in the CAA offices or vaults in accordance with 12 FAH-6
H-313.10-4. Classified discussions shall be conducted in CAA
spaces with DS-approved acoustic countermeasures or in secure
conference rooms (SCRs) or equivalent according to the OSPB
Conduct of Classified Conversations standard.  Classified
conversations above the SECRET level are restricted to
relevant core areas. 

7. (U) All requirements apply to all agencies under Chief of
Mission authority and pertain to the Chancery building only.
Tenant agencies may employ additional TEMPEST countermeasures
within their respective offices. 

8. (U) For further information or clarification regarding 12
FAH-6 H-540 Automated Information Systems Standards, please
contact DS/CS/ETPA.  For other, TEMPEST related issues,
please contact the Department CTTA at DSCTTA@state.sgov.gov. 

9. (U) Post must verify that these TEMPEST countermeasures
have been implemented and report so in an updated Technical
Security Assessment (TSA).  All proposed change requests to a
CAA countermeasures environment must be sent to the
Department, identified for DS/ST/CMP action. 

10. (U) This telegram should be retained by Post until
superseding requirements are received.
CLINTON

VZCZCXYZ0000
RR RUEHWEB

DE RUEHC #9526 0861053
ZNY SSSSS ZZH
R 271035Z MAR 09
FM SECSTATE WASHDC
TO RUEHAM/AMEMBASSY AMMAN 0000
INFO RUEHAD/AMEMBASSY ABU DHABI 0000
RUEHEG/AMEMBASSY CAIRO 0000
RUEHFT/AMCONSUL FRANKFURT 0000
RUEHNW/DIR DTSPO WASHINGTON DC

S E C R E T STATE 029526 

NOFORN
AMMAN FOR RSO IMO AND ESO
ABU DHABI FOR ESC
CAIRO FOR RDSE
FRANKFURT FOR RIMC
DTSPO FOR BRS/CMD/TCSC
SIPDIS 

E.O. 12958: DECL: UPON CLOSURE OF U.S. EMBASSY AMMAN
TAGS: AADP ABLD ACOA AMGT ASEC KSEO KRIM KGIT KNET KCIP
SUBJECT: TEMPEST COUNTERMEASURES REQUIREMENTS - AMMAN 

REF: A. 95 STATE 230596
     B. 06 STATE 13022 

Classified By: M.J. STEAKLEY, DS/ST/CMP, REASON: 1.4 (C) AND (G) 

1. (S/NF) These revised TEMPEST countermeasures requirements
are effective immediately.  Requirements apply to the
Chancery at Amman, Jordan, located at Abdoun, Al-Umawyeen
Street, Amman, Jordan.  Amman,s threat levels at the time of
this telegram are MEDIUM for Technical and MEDIUM for Human
Intelligence. 

2. (S) TEMPEST requirements are determined by the Certified
TEMPEST Technical Authority (CTTA) and approved by the
Countermeasures Division Director.  These requirements apply
to all information processing systems for this facility. 

A. (S) TOP SECRET and Sensitive Compartmented Information
(SCI) CLASSIFIED Automated Information System (AIS): Post is
authorized to use TEMPEST Level 2 AIS equipment for
processing classified national security information (NSI) at
the TOP SECRET or SCI level within the Embassy core area of
the controlled access area (CAA).  Within a certified
shielded enclosure (CSE) or equivalent that meets NSA 94-106
specifications, post is authorized to use
commercial-off-the-shelf (COTS) AIS equipment. 

B. (S) SECRET (COLLATERAL) CLASSIFIED (AIS): Post is
authorized to use TEMPEST Level 2 AIS equipment for
processing classified NSI at the SECRET level  within
restricted and core areas of the CAA.  Post is authorized to
use COTS AIS equipment within a certified shielded enclosure
(CSE) or equivalent that meets NSA 94-106 specifications. 

NOTE: Post currently has COTS equipment installed for
classified processing at the SECRET level outside of a CSE.
This equipment must be replaced with TEMPEST Level 2 or
TEMPEST Level 1 compliant AIS within 24 months of the date of
this telegram.  Effective immediately, all new procurements
must be for TEMPEST Level 2 or TEMPEST Level 1 compliant
equipment. 

C. (S) SENSITIVE BUT UNCLASSIFIED AIS: Use of COTS AIS for
processing unclassified and sensitive but unclassified (SBU)
within the Embassy restricted and core area of the CAA is
approved.  Unclassified and multimedia-equipped unclassified
processing equipment to be used within a CAA must be
purchased, shipped, stored, installed, maintained and
repaired in accordance with 12 FAH-6 H-542, and may not be
located inside a CSE. 

3. (S) Secure video-teleconferencing and data collaboration
(SVDC) system installation and operation was previously
authorized in REFTEL (B).  As a result of the TEMPEST
requirements change announced in this telegram, the current
SVDC equipment must either be replaced with TEMPEST Level 1
compliant equipment or the existing SVDC COTS equipment must
be relocated and installed inside a CSE. Request that Post,s
RSO notify DS/CMP/ECB within 60 days of this telegram whether
SVDC equipment will remain in its current location and be
upgraded to TEMPEST Level 1 or if the existing SVDC COTS
equipment will be moved inside a CSE.  Should Post decide to
move the existing SVDC COTS equipment to a different location
inside a CSE, a new SVDC check list must be prepared and
submitted, and a new authorization telegram will be issued by
DS/ST/CMP to formalize the decision. 

4. (S) All Classified Automated Information System (CAIS)
equipment, components and peripherals must be secured in
accordance with Overseas Security Policy Board (OSPB)
requirements for classified discussion, processing and/or
storage overseas.  Thin clients with embedded flash memory,
at facilities with 24-hour cleared American presence, are
permitted to remain unsecured within the CAA as long as the
equipment is rebooted prior to vacating the premises. 

5. (S) Fiber optic cabling is required for classified
connectivity.  Fiber optic cabling is also required for
unclassified (SBU) connectivity for any information
technology equipment located within a CSE.  Equipment used to
process classified information outside a CSE must be
installed, to the maximum extent possible, in accordance with
Recommendation E of NSTISSAM TEMPEST/2-95A with the following
additional requirements: 

- Be located a minimum of one meter (three feet spherical)
from other computer and electronic equipment used for
unclassified information processing. 

- Be located a minimum of one meter (three feet spherical)
from telephones, modems, facsimile machines, and unshielded
telephone or signal lines that do not leave USG-controlled
property (for example, phone lines that go to the post phone
switch). 

- Be located a minimum of two meters (six feet spherical)
from telephones, modems, facsimile machines, and unshielded
telephone or signal lines that transit USG-controlled
property (for example, direct phone lines that do not go
through the post telephone switch, telephone switch lines
going out, any wire going to antennas on the roof, etc). 

- Be located a minimum of 3 meters (ten feet spherical) from
active radio transmitters (two-way radios, high frequency
transceivers, satellite transceivers, cellular devices,
Wi-Fi devices, Bluetooth, etc.) and must not use the same AC
power circuit as active radio transmitters (to include cell
phone chargers). 

- Be located a minimum of three meters (ten feet spherical)
from cable television antenna feeds and any Warren switch
with the switch on.  This distance can be reduced to one
meter if the Warren switch is off when processing classified. 

- Be located to have no physical contact with any other
office equipment or cabling. 

6. (S) Classified conversations up to SECRET may be conducted
in the CAA offices or vaults in accordance with 12 FAH-6
H-311.10-4.  Classified conversations above the SECRET level
are restricted to relevant core areas. 

7. (U) All requirements apply to all agencies under Chief of
Mission authority, and pertain to the Chancery building only.
 Tenant agencies may employ additional TEMPEST
countermeasures within their respective offices. 

8. (U) For further information or clarification regarding 12
FAH-6 H-540 Automated Information Systems Standards, please
contact DS/CS/ETPA.  For other TEMPEST-related issues, please
contact Department CTTA at DSCTTA@state.sgov.gov. 

9. (U) In accordance with 12 FAH-6 H-533.2, Post must verify
that these TEMPEST countermeasures have been implemented;
DS/ST/CMP requests Post report so in an updated Technical
Security Assessment (TSA).  All proposed change requests to a
CAA countermeasures environment must be sent to the
Department, identified for DS/ST/CMP action. 

10. (U) This telegram should be retained by Post until
superseding requirements are received.
CLINTON

VZCZCXRO1998
RR RUEHCI
DE RUEHC #9527/01 0861055
ZNY SSSSS ZZH
R 271037Z MAR 09
FM SECSTATE WASHDC
TO RUEHCI/AMCONSUL KOLKATA 3202
INFO RUEHBK/AMEMBASSY BANGKOK 9276
RUEHML/AMEMBASSY MANILA 0314
RUEHNE/AMEMBASSY NEW DELHI 3759
RUEHNW/DIR DTSPO WASHINGTON DC

S E C R E T SECTION 01 OF 02 STATE 029527 

NOFORN
KOLKATA FOR RSO AND IMO
NEW DELHI FOR ESC AND RIMC
MANILA FOR RDSE (ACTING)
BANGKOK FOR RIMC
DTSPO FOR BRS/CMD/TCSC
SIPDIS 

E.O. 12958: DECL: UPON CLOSURE OF U.S. CONSULATE KOLKATA
TAGS: AADP ABLD AMGT ACOA ASEC KSEO KRIM KGIT KNET KCIP
SUBJECT: TEMPEST COUNTERMEASURES REQUIREMENTS - KOLKATA 

REF: 94 STATE 261557 

Classified By: M.J. STEAKLEY, DS/ST/CMP, REASON: 1.4 (C) AND (G) 

1. (S/NF) These revised TEMPEST countermeasures requirements
are effective immediately.  Requirements apply to the
Chancery at Kolkata, located at 5/1 Ho Chi Minh Sarani,
Kolkata West Bengal, India.  Kolkata,s relevant threat
levels at the time of this telegram are Medium for Technical
and Medium for Human Intelligence. 

2. (S) TEMPEST requirements are determined by the Certified
TEMPEST Technical Authority (CTTA) and approved by the
Countermeasures Division Director.  These requirements apply
to all information processing systems for this facility. 

A. (S) TOP SECRET and Sensitive Compartmented Information
(SCI) CLASSIFIED Automated Information System (AIS): Post is
not currently authorized for processing classified national
security information (NSI) at the TOP SECRET or SCI level.
TEMPEST requirements will be provided for processing at this
level once authorized. 

B. (S) SECRET (COLLATERAL) CLASSIFIED AIS: Post is authorized
to use TEMPEST Zone B or TEMPEST Level 2 AIS equipment for
processing classified NSI at the SECRET level within
restricted and core areas of the controlled access area
(CAA).  Use of higher level equipment is approved.  Post is
authorized to use commercial-off-the-shelf (COTS) AIS
equipment within a certified shielded enclosure (CSE) or
equivalent that meets NSA 94-106 specifications. 

NOTE: Post currently has Zone B compliant equipment installed
for classified processing, and this equipment may continue to
be used for processing at the SECRET level until September,
2011.  All new procurements must be for TEMPEST Level 2
compliant equipment.  By October 2011, all classified
processing at Post must be on TEMPEST Level 2 equipment.  Use
of higher level equipment is approved. 

C. (S) SENSITIVE BUT UNCLASSIFIED (SBU) AIS: Use of COTS AIS
for processing SBU information within the restricted and core
area of the Embassy CAA is approved. 

3. (S) Secret-High Video-teleconferencing and Data
Collaboration (SVDC), if requested, will be addressed in a
SEPTEL following completion of coordination with VCI/VO. 

4. (S) All Classified Automated Information System (CAIS)
equipment, components and peripherals must be secured in
accordance with Overseas Security Policy Board (OSPB)
requirements for classified discussion, processing and/or
storage overseas.  Thin clients with embedded flash memory,
at facilities with a 24-hour cleared American presence, are
permitted to remain unsecured within the CAA as long as the
equipment is rebooted prior to vacating the premises. 

5. (S) Fiber optic cabling is required for classified
connectivity.  Fiber optic cabling is also required for SBU
connectivity for any information technology equipment located
within a CSE.  Equipment used to process classified
information outside a CSE must be installed, to the maximum
extent possible, in accordance with Recommendation E of
NSTISSAM TEMPEST 2-95 with the following additional
requirements: 

- Be located a minimum of one meter (three feet spherical)
from other computer and electronic equipment used for
unclassified information processing. 

- Be located a minimum of one meter (three feet spherical)
from telephones, modems, facsimile machines, and unshielded
telephone or signal lines that do not leave USG-controlled
property (for example, phone lines that go to the post phone
switch). 

- Be located a minimum of two meters (six feet spherical) 

STATE 00029527  002 OF 002 

from telephones, modems, facsimile machines, and unshielded
telephone or signal lines that transit USG-controlled
property (for example, direct phone lines that do not go
through the post telephone switch, telephone switch lines
going out, any wire going to antennas on the roof, etc). 

- Be located a minimum of 3 meters (ten feet spherical) from
active radio transmitters (two-way radios, high frequency
transceivers, satellite transceivers, cellular devices,
Wi-Fi devices, Bluetooth, etc.) and must not use the same AC
power circuit as active radio transmitters (to include cell
phone chargers). 

- Be located a minimum of three meters (ten feet spherical)
from cable television antenna feeds and any Warren switch
with the switch on.  This distance can be reduced to one
meter if the Warren switch is off when processing classified. 

- Be located to have no physical contact with any other
office equipment or cabling. 

6. (S) Classified conversations up to SECRET may be conducted
in the CAA offices or vaults in accordance with 12 FAH-6
H-312.10-4.  Classified conversations above the SECRET level
are restricted to relevant core areas. 

7. (U) All requirements apply to all agencies under Chief of
Mission authority and pertain to the Chancery building only.
Tenant agencies may employ additional TEMPEST countermeasures
within their respective offices. 

8. (U) For further information or clarification regarding 12
FAH-6 H-540 Automated Information Systems Standards, please
contact DS/CS/ETPA.  For other TEMPEST-related issues, please
contact the Department CTTA at DSCTTA@state.sgov.gov. 

9. (U) In accordance with 12 FAH-6 H-533.2, Post must verify
that these TEMPEST countermeasures have been implemented;
DS/ST/CMP requests Post report so in an updated Technical
Security Assessment (TSA).  All proposed change requests to a
CAA countermeasures environment must be sent to the
Department, identified for DS/ST/CMP action. 

10. (U) This telegram should be retained by Post until
superseding requirements are received.
CLINTON

TOP-SECRET – Electronic Filing of Bank Secrecy Act Reports

[Federal Register Volume 76, Number 180 (Friday, September 16, 2011)]
[Notices]
[Pages 57799-57801]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-23841]

=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF THE TREASURY

Financial Crimes Enforcement Network

Agency Information Collection Activities; Proposal That
Electronic Filing of Bank Secrecy Act (BSA) Reports Be Required;
Comment Request

AGENCY: Financial Crimes Enforcement Network (FinCEN), Treasury.

ACTION: Notice and request for comments.

-----------------------------------------------------------------------

SUMMARY: FinCEN is proposing to require electronic filing of certain
Bank Secrecy Act (BSA) reports not later than June 30, 2012. This
requirement will significantly enhance the quality of our electronic
data, improve our analytic capabilities in supporting law enforcement
requirements and result in significant reduction in real costs to the
United States Government and ultimately to U.S. taxpayers.
Specifically, we propose mandatory electronic submission of all BSA
reports excluding the Report of International Transportation of
Currency or Monetary Instruments (CMIR).\1\
---------------------------------------------------------------------------

    \1\ All CMIRs are filed with the Department of Homeland
Security's Customs and Border Protection (CBP) at the port of entry/
exit or mailed to the Commissioner of Customs in Washington, DC.
There are no electronic filing capabilities at the ports. A CBP
contractor keys the data on the completed form into a data tape that
is electronically uploaded to the BSA database. FinCEN receives no
paper filed CMIRs.

---------------------------------------------------------------------------
DATES: Comments should be submitted on or before November 15, 2011.

ADDRESSES: Written comments should be submitted to: Regulatory Policy
and Programs Division, Financial Crimes Enforcement Network, Department
of the Treasury, P.O. Box 39, Vienna, Virginia 22183, Attention: PRA
Comments--BSA Required Electronic Filing. BSA Required Electronic
Filing comments also may be submitted by electronic mail to the
following Internet address: regcomments@fincen.gov, with the caption,
``Attention: BSA Required Electronic Filing,'' in the body of the text.
    Inspection of comments. Comments may be inspected, between 10 a.m.
and 4 p.m., in the FinCEN reading room in Vienna, VA. Persons wishing
to inspect the comments submitted must request an appointment with the
Disclosure Officer by telephoning (703) 905-5034 (not a toll free
call).

FOR FURTHER INFORMATION CONTACT: The FinCEN Regulatory Helpline at 800-
949-2732, select option 7.

SUPPLEMENTARY INFORMATION:
    Title: Bank Secrecy Act, Reporting Forms, (31 CFR chapter X).
    Abstract: The statute generally referred to as the ``Bank Secrecy
Act,'' Titles I and II of Public Law 91-508, as amended, codified at 12
U.S.C. 1829b, 12 U.S.C. 1951-1959, and 31 U.S.C. 5311-5332, authorizes
the Secretary of the Treasury (Secretary), inter alia, to require
financial institutions to file reports that are determined to have a
high degree of usefulness in criminal, tax, and regulatory matters, or
in the conduct of intelligence or counter-intelligence activities to
protect against international terrorism, and to implement counter-money
laundering programs and compliance procedures.\2\ Regulations
implementing Title II of the BSA appear at 31 CFR Chapter X. The
authority of the Secretary to administer the BSA has been delegated to
the Director of FinCEN.
---------------------------------------------------------------------------

    \2\ Language expanding the scope of the BSA to intelligence or
counter-intelligence activities to protect against international
terrorism was added by Section 358 of the Uniting and Strengthening
America by Providing Appropriate Tools Required to Intercept and
Obstruct Terrorism Act of 2001 (the USA PATRIOT Act), Public Law
107-56.
---------------------------------------------------------------------------

    The Secretary was granted authority with the enactment of Title 31
U.S.C., to require financial institutions and other persons to file
various BSA reports. The information collected on the reports is
required to be provided pursuant to Title 31 U.S.C., as implemented by
FinCEN regulations found throughout 31 CFR chapter X. The information
collected pursuant to this authority is made available to appropriate
agencies and organizations as disclosed in FinCEN's Privacy Act System
of Records Notice.\3\
---------------------------------------------------------------------------

    \3\ Treasury Department bureaus such as FinCEN renew their
System of Records Notices every three years unless there is cause to
amend them more frequently. FinCEN's System of Records Notice was
most recently published at 73 FR 42405, 42407-9 (July 21, 2008).
---------------------------------------------------------------------------

    Current Action: In support of Treasury's paperless initiative and
efforts to make the government operations more efficient, FinCEN has
chosen to mandate electronic filing of certain BSA reports effective
June 30, 2012.
    This requirement will significantly enhance the quality of our
electronic data, improve our analytic capabilities in supporting law
enforcement requirements, and result in a significant reduction in real
costs to the U.S. government and ultimately to U.S. taxpayers.
Specifically, we propose to make mandatory the electronic submission of
all BSA reports excluding the CMIR.\4\
---------------------------------------------------------------------------

    \4\ See supra note 1.
---------------------------------------------------------------------------

    Background: Since October 2002, FinCEN has provided financial
institutions with the capability of electronically filing BSA reports
through its system called BSA E-Filing. Effective August 2011, the
system was expanded to support individuals filing the Report of Foreign
Bank and Financial Accounts (FBAR) report. BSA E-Filing is a secure,
Web-based electronic filing system. It is a flexible solution for
financial institutions or individuals, whether they file one BSA report
or thousands. BSA E-Filing is an accessible service that filers can
access by using their existing internet connections regardless of
connection speed. In addition, it is designed to minimize filing errors
and provide enhanced feedback to filing institutions or individuals,
thereby providing a significant improvement in data quality.
    BSA E-Filing, which is provided free of charge, features
streamlined BSA information submission; faster routing of information
to law enforcement; greater data security and privacy compared with
paper forms; long-term

[[Page 57800]]

cost savings to institutions, individuals, and the government; and
insures compatibility with future versions of BSA reports.
    In addition, BSA E-Filing offers the following features not
available on paper:
     Electronic notification of submissions, receipt of
submission, and errors, warnings, and alerts;
     Batch validation;
     Acknowledgement that a currency transaction report (CTR)
and or suspicious activity report (SAR) was filed;
     Feedback reports to filers;
     Faster receipt for money services businesses of
registration acknowledgement letter;
     Ability to send and receive secure messages;
     Use of Adobe forms that allows users to create templates,
reducing data entry but still providing for printing paper copies if
the filer wants to use a paper copy for its internal review and
approval processes;
     Ability for supervisory users to assign system roles to
their staff; and
     Availability of helpful training materials.
    In 2010, we initiated a complete redesign and rebuilding of a new
system-of-record that significantly enhances FinCEN's current technical
capabilities to receive, process, share, and store BSA data. A
significant part of this upgrade was the implementation of state-of-
the-art electronic reporting or information collection tools. As of
July 1, 2011, over 84% of BSA reports are filed electronically with
FinCEN.\5\ FinCEN annually measures customer satisfaction with BSA E-
Filing and has a performance goal of at least 90% satisfaction; in
Fiscal Year 2010, 96% of customers were satisfied with BSA E-Filing.\6\
To enroll with BSA E-Filing financial institutions or individuals go to
http://bsaefiling.fincen.treas.gov/main.html and follow four easy
steps.
---------------------------------------------------------------------------

    \5\ As of July 2011, there are over 12,000 registered e-filers.
Of the 1250 major filers, 659 are currently e-filing. FinCEN
anticipates that many current paper filers will convert to e-file
when the new BSA E-Filing system becomes available.
    \6\ See FinCEN's 2010 Annual Report, available at
http://www.fincen.gov/news_room/rp/files/annual_report_fy2010.pdf.
---------------------------------------------------------------------------

    As a result of the 2010 initiative, FinCEN is in the process of
fielding a new BSA Collection, Processing, and Analytic system. The new
system, which includes significant e-filing improvements, is designed
to support the most efficient state-of-the-art electronic filing. The
database will accept XML-based dynamic reports as well as certain other
file formats. The various file formats \7\ will be provided to permit
integration into in-house systems or for use by service providers.
---------------------------------------------------------------------------

    \7\ The XML Schema, ACSII, and the electronic file
specifications will be provided at no cost to filers.
---------------------------------------------------------------------------

    All filings (batch, computer-to-computer, and discrete) will be
initiated through the BSA E-Filing system \8\ using current
registration and log-in procedures. Although batch and computer-to-
computer filing processes will remain unchanged, the file format will
change to match the database. Batch and computer-to-computer filers
will file reports, which are based on an electronic file specification
that will be provided free of charge. Discrete filings (the replacement
for submitting a single paper report) will be based on Adobe LiveCycle
Designer ES dynamic forms. The discrete function is available for all
small business report filers (as well as individuals). The discrete
filing function will be accessed by logging into the BSA E-Filing
System and entering a pre-approved user ID and password. During log-in
to the discrete filing option, filers will be prompted through a series
of questions.\9\
---------------------------------------------------------------------------

    \8\ BSA E-Filing is a free Web-based service provided by FinCEN.
More information on the filing methods may be accessed at
http://bsaefiling.fincen.treas.gov/main.html.
    \9\ A series of predetermined questions designed to establish
the type of institution and filing in much the same manner as used
in widely accepted income tax filing software.
---------------------------------------------------------------------------

    After log-in, a financial institution filing a report through the
discrete function will answer another set of questions that will
establish a subset of the data fields appropriate to the filer's
specific type of filing institution.
    Today's proposal requiring filers to submit certain BSA reports
electronically using the free FinCEN BSA E-Filing system will provide a
range of benefits. Electronic filing will also facilitate the rapid
dissemination of financial and suspicious activity information in
connection with BSA filings, making information contained in these
filings more readily available to--and more easily searchable by--law
enforcement, the financial regulatory community, and other users of BSA
data. Additionally, the proposal to require certain BSA reports to be
filed electronically will result in a significant reduction in the use
of paper, producing a positive environmental impact. Further, the
implementation of the proposal has the potential to save the government
a few million dollars per year through the reduction of expenditures
associated with current paper processing, in particular the physical
intake and sorting of incoming reports, and the electronic keying of
reported information into the database.
    Security: Mandatory electronic filing will provide increased
security not available with paper filings. At the present time, all
paper reports are mailed to the IRS Enterprise Computing Center--
Detroit (ECC-D) as unclassified mail with no special handling via the
U.S. Postal Service system. On occasion, mailed paper reports have been
delayed, and in some cases damaged beyond readability. A financial
institution may not discover that a report was not received by ECC-D
until many months after the report was due.\10\ For example, problems
with delivery of reports may not be discovered until the financial
institution is examined by its regulator, and the regulator compares a
list of the reports that are posted to the database against the
institution's official files. The BSA E-Filing System is a secure 128-
bit single socket layer protected Web-based filing system. Reports
received are acknowledged and any noted errors are reported back to the
filer. This process provides the filer with a record that the required
filing was received, as well as suggestions on how to improve the
accuracy of their future reports. Reports originated by the filer are
posted securely directly to the database, thereby significantly
reducing or eliminating possibility of data compromise.
---------------------------------------------------------------------------

    \10\ The missing report becomes more critical if it was
reporting suspicious activity--especially when relating to terrorist
financing.
---------------------------------------------------------------------------

Filer Impact Assessment

    a. Depository institutions: Based on information available we
believe this change in filing procedures will have minimal impact on
depository institutions. All depository institutions are currently
required to file quarterly call or thrift financial reports with their
regulator electronically through a Web-based portal provided by the
appropriate federal regulator. This same electronic connectivity may be
used to file BSA reports with FinCEN by logging in to the BSA E-Filing
System Web-based portal.
    b. Broker-Dealers, Future-Commission Merchants (FCMs), Introducing
Brokers in Commodities (IB-Cs), and Mutual Funds: \11\ Based on
information available we believe this change in filing procedures will
have minimal impact on these filing institutions. This group is highly
automated and enjoys robust electronic buying and selling systems with
sophisticated processing

[[Page 57801]]

and reporting systems.\12\ Currently the Securities and Exchange
Commission (SEC) mandates electronic filing,\13\ as does the Commodity
Futures Trading Commission (CFTC).\14\
---------------------------------------------------------------------------

    \11\ FinCEN is considering adding a SAR reporting requirement to
Investment Adviser's (IA's) registered with the SEC. Mandatory e-
filing will have minimum impact on this group.
    \12\ Currently both the SEC and the CFTC require electronic
reporting, The SEC through the EDGAR system and the CFTC through the
NFC Windjammer and Easy File systems.
    \13\ See http://www.sec.gov/info/edgar/regoverview.htm.
    \14\ For financial institutions subject to CFTC oversight See
NFA Electronic Filings at
http://www.nfa.futures.org/NFA-electronic-filings/index.HTML.
---------------------------------------------------------------------------

    c. Insurance companies: Based on information available we believe
this change in filing procedures will have minimal impact on these
institutions. This group is highly automated.\15\
---------------------------------------------------------------------------

    \15\ See the National Insurance Producer Registry (NIPR) at
http://www.nipr.com/. NIPR is a unique public-private partnership
that supports the work of the states and the National Association of
Insurance Commissioners (NAIC) in making the producer-licensing
process more cost-effective, streamlined and uniform for the benefit
of regulators, the insurance industry and the consumers they protect
and serve.
---------------------------------------------------------------------------

    d. Casinos and Card Clubs: \16\ Based on information available we
believe this change in filing procedures will have minimal impact on
these institutions.
---------------------------------------------------------------------------

    \16\ Casinos and Card Clubs with gross annual gaming revenues in
excess of $1 million (see 31 CFR1010.100 (t)(5)(ii) and (6)(ii)).
---------------------------------------------------------------------------

    e. Money Services Businesses (MSBs): Information gained from a
review of the MSB filings of the currency transaction report (CTR),
SAR, and Registration of Money Services Business (RMSB) forms indicates
that some impact to this group can be expected. Information in trade
journals and other publications, along with informal comments from the
Internal Revenue Service Small Business/Self Employed, indicate that
most filers have Internet connectivity. MSBs routinely accept and
process credit card transactions requiring automated communications
with the approving card center. They also routinely place orders for
goods and services through the Internet and electronically access bill
paying services. Additionally, basic Internet access can be obtained
through a simple inexpensive dial-up connection or at professional
external Internet facilities such as service providers for those MSBs
without Internet connectivity. Lastly, FinCEN has included provisions
for requesting a hardship exception in this notice in case unforeseen
situations arise.\17\
---------------------------------------------------------------------------

    \17\ See Filer impact paragraph ``g.''
---------------------------------------------------------------------------

    f. Service Providers: There is a network of third-party service
providers with which financial institutions may contract to provide
electronic filing services to the BSA E-Filing System. FinCEN believes
this group to be highly automated and many are already using the BSA E-
Filing System. We do not anticipate that this proposal will have an
impact on this group.
    g. Small businesses: \18\ In support of small businesses, FinCEN's
Office of Compliance will provide a temporary hardship exemption
capability. A small business may request, and may be granted, an
emergency extension of up to one year if it can document a sufficiently
serious problem that prevents compliance with the new filing
requirements. The approved extension will be effective for one year
from the effective date of this notice.\19\ A hardship request based
solely on a lack of Internet connectivity or a business decision to
restrict Internet connectivity will not be considered adequate
justification for an extension.
---------------------------------------------------------------------------

    \18\ See the Small Business Administration's (SBA) Web site
http://www.sba.gov/content/what-sbas-definition-small-business-concern
for SBA's definition of a small business concern.
    \19\ Request for emergency extension will be mailed to:
Department of the Treasury, Financial Crimes Enforcement Network,
Attention RPP-CP, PO Box 39, Vienna, VA 22183 or may be e-mailed to:
regcomments@fincen.gov.
---------------------------------------------------------------------------

    h. Individual filers: Effective August 2011, FinCEN expanded its
support of electronic filing to individuals.\20\ The capability to file
the Report of Foreign Bank and Financial Accounts (FBAR Form TD F 90-
22.1) became available and individuals worldwide can sign up to file
their individual FBAR's by accessing the FinCEN E-Filing Web site.
Based on new applications to date, there is no indication of any issues
with individuals using this new capability.
---------------------------------------------------------------------------

    \20\ See page 3 Background.
---------------------------------------------------------------------------

Paperwork Reduction Act (PRA)

    Type of Review: Review of a new proposal to mandate the electronic
filing of BSA reports.
    Affected Public: Businesses or other for-profit and non-profit
institutions.
    Frequency: As required.
    Estimated Burden: Effective with the FinCEN IT Modernization, BSA
reporting will be supported by seven BSA reports.\21\ The burden for
electronic filing and recordkeeping of each BSA report is reflected in
the OMB approved burden \22\ for each of these reports. The non-
reporting recordkeeping burden is reflected separately.\23\
---------------------------------------------------------------------------

    \21\ BSA-SAR, BSA-CTR, Designation Of Exempt Person, CMIR, RMSB,
Foreign Bank Account Report, and the Report of Cash Over $10,000
Received in a Trade or Business (Form 8300).
    \22\ See OMB Control Numbers 1506-0065, 1506-0064, 1506-0009,
1506-0013, 1506-0014, 1506-0018.
    \23\ See OMB Control Numbers 1506-0051 through 1506-0059.
---------------------------------------------------------------------------

    Estimated number of respondents for all reports = 74,900.\24\
---------------------------------------------------------------------------

    \24\ All filers subject to BSA reporting requirements excluding
CMIR. See supra note 1.
---------------------------------------------------------------------------

    Estimated Total Annual Responses for all reports = 16,172,770.
    Estimated Total Annual Burden Hours = 20,874,761.\25\
---------------------------------------------------------------------------

    \25\ Includes all reporting and recordkeeping burden associated
with filing BSA reports.
---------------------------------------------------------------------------

    An agency may not conduct or sponsor, and a person is not required
to respond to, a collection of information unless the collection of
information displays a valid OMB control number. Records required to be
retained pursuant to the BSA must be retained for five years.

Request for Comments

    Comments submitted in response to this notice will be summarized
and/or included in the request for OMB approval. All comments will
become a matter of public record. Comments are invited on: (a) Whether
the collection of information only by electronic means is necessary for
the proper performance of the functions of the agency, including
whether the information shall have practical utility; (b) the accuracy
of the agency's estimate of the burden of the collection of
information; (c) ways to enhance the quality, utility, and clarity of
the information to be collected; (d) ways to minimize the burden of the
collection of information on respondents (filers), including through
the use of automated collection techniques or other forms of
information technology; (e) the practicality of utilizing external
Internet facilities or service providers to occasionally file BSA
reports, (f) estimates of capital or start-up costs and costs of
operation, maintenance, or purchase of services to provide information
by filers that currently do not have Internet access, and (g) the
enhanced security of sensitive information and significant cost savings
of electronic filing.

    Dated: September 13, 2011.
James H. Freis, Jr.,
Director, Financial Crimes Enforcement Network.
[FR Doc. 2011-23841 Filed 9-15-11; 8:45 am]
BILLING CODE 4810-02-P

TOP-SECRET – EIS of Huge Security Complex Along US-Canadian Border

[Federal Register Volume 76, Number 180 (Friday, September 16, 2011)] [Notices] [Pages 57751-57754] From the Federal Register Online via the Government Printing Office [www.gpo.gov] [FR Doc No: 2011-23993] ———————————————————————– DEPARTMENT OF HOMELAND SECURITY Customs and Border Protection Notice of Availability of a Draft Programmatic Environmental Impact Statement for Northern Border Activities AGENCY: U.S. Customs and Border Protection, DHS. ACTION: Notice of availability; Request for comments; Notice of public meetings. ———————————————————————– SUMMARY: U.S. Customs and Border Protection (CBP) announces that a Draft Programmatic Environmental Impact Statement (PEIS) is now available and open for public comment. The Draft PEIS analyzes the potential environmental and socioeconomic effects associated with its ongoing and potential future activities along the Northern Border between the United States and Canada. The overall area of study analyzed in the document extends approximately 4,000 miles from Maine to Washington and 100 miles south of the U.S.-Canada Border. CBP also announces that it will be holding a series of public meetings in October to obtain comments regarding the Draft PEIS. DATES: CBP invites comments on the Draft PEIS during the 45 day comment period, which begins on September 16, 2011. To ensure consideration, comments must be received by October 31, 2011. Comments may be submitted as set forth in the ADDRESSES section of this document. CBP will hold public meetings on the Draft PEIS. The locations, dates, and times are listed in the SUPPLEMENTARY INFORMATION section of this document. ADDRESSES: You may submit comments related to the Draft PEIS by any of the following methods. Please include your name and address and the state or region to which the comment applies, as appropriate. To avoid duplication, please use only one of the following methods for providing comments: Project Web site: http://www.NorthernBorderPEIS.com/public-
involvement/comments.html
; E-mail: Comments@NorthernBorderPEIS.com; Mail: CBP Northern Border PEIS, P.O. Box 3625, McLean, Virginia 22102; Phone voicemail box: (866) 760-1421 (comments recorded in the voicemail box will be transcribed). You may download the Draft PEIS from the project Web site: http://www.NorthernBorderPEIS.com. It will also be made available on the Department of Homeland Security Web site (http://www.dhs.gov). Copies of the Draft PEIS may also be obtained by submitting a request through one of the methods listed below. Please include your name and mailing address in your request. E-mail: Comments@NorthernBorderPEIS.com and write “Draft PEIS” in the subject line; Mail: CBP Northern Border PEIS, (Draft PEIS Request), P.O. Box 3625, McLean, VA 22102; Phone: (866) 760-1421. FOR FURTHER INFORMATION CONTACT: Jennifer Hass, CBP, Office of Administration, telephone (202) 344-1929. You may also visit the project’s Web site at: http://www.NorthernBorderPEIS.com. SUPPLEMENTARY INFORMATION: Public Meetings and Invitation To Comment CBP invites comments on all aspects of the Draft PEIS. Comments that will provide the most assistance to CBP will reference a specific section of the Draft PEIS, explain the reason for any recommended change, and include data, information, or authority that support such recommended change. Substantive comments received during the comment period will be addressed in, and included as an appendix to, the Final PEIS. The Final PEIS will be made available to the public through a Notice of Availability in the Federal Register. Comments may be submitted as described in the ADDRESSES section of this document. Respondents may request to withhold names or street addresses, except for city or town, from public view or from disclosure under the Freedom of Information Act. Such a request must be stated prominently at the beginning of the comment. Such requests will be honored to the extent allowed by law. This request to withhold personal information does not apply to submissions from organizations or businesses, or from individuals identifying themselves as representatives or officials of organizations or businesses. CBP will hold public meetings to inform the public and solicit comments about the Draft PEIS. Meetings will be held from 7 p.m. to 9 p.m. at each of the locations and dates provided below. The meeting in the Washington, DC area is for interested parties located outside of the project’s areas of interest. Meetings will include displays, handouts, and a presentation by CBP, and will provide an opportunity for the public to record their comments on the Draft PEIS. Changes in meeting plans, due to inclement weather or other causes, will be announced on the project’s Web site at: http://www.NorthernBorderPEIS.com, and on a telephone message at: (866) 760-1421. —————————————————————————————— Date City, state Location —————————————————————————————— October 3…. Duluth, MN…………. Holiday Inn, 200 West First Street, Duluth, MN 55802. October 4…. Massena, NY………… VFW, 101 W Hatfield St., Massena, NY 13662. October 4…. Caribou, ME………… Caribou Inn and Convention Center, 19 Main Street, Caribou, ME 04736. October 5…. Augusta, ME………… The Senator Inn & Spa, 284 Western Ave., Augusta, ME 04330. October 5…. Bottineau, ND………. Twin Oaks Resort & Convention Center, 10723 Lake Loop Road, Bottineau, ND 58318. October 6…. St. Albans, VT……… The Senator Historical Museum, 9 Church Street, St. Albans, VT 05478. October 6…. Detroit, MI………… Holiday Inn Express, 1020 Washington Boulevard, Detroit, MI 48226. October 6…. Havre, MT………….. The Town House Inn, 627 1st Street West, Havre, MT 59501. October 11… Bellingham, WA……… Hampton Inn, 3958 Bennett Drive, Bellingham, WA 98225. October 11… Rochester, NY………. Holiday Inn–Rochester Airport, 911 Brooks Avenue, Rochester, NY 14624. October 12… Erie, PA…………… Ambassador Banquet Center, 7794 Peach Street, Erie, PA 16509. October 13… Naples, ID…………. The Great Northwest Territories Event Center, 336 County Road 8, Naples, ID 83847. October 17… Washington, DC……… Crystal City Marriott at Regan National Airport, 1999 Jefferson Davis Highway, Arlington, VA 22201. —————————————————————————————— [[Page 57752]] The public may obtain information concerning the status and progress of the PEIS, as well as view and download the document, via the project’s Web site at: http://www.NorthernBorderPEIS.com. Background U.S. Customs and Border Protection (CBP) is charged with the mission of enforcing customs, immigration, agriculture, and numerous other laws and regulations at the Nation’s borders and facilitating legitimate trade and travel through legal ports of entry. As the guardian of the United States’ borders, CBP protects the roughly 4,000 miles of Northern Border between United States and Canada, from Maine to Washington. The terrain ranges from densely forested lands on the west and east coasts to open plains in the middle of the country. CBP has completed a Draft Programmatic Environmental Impact Statement (PEIS) for its ongoing and potential future activities along the Northern Border. The Draft PEIS is now available for public review and comment. (For instructions on obtaining a copy of the PEIS or on submitting comments, please see the ADDRESSES section of this document.) An Environmental Impact Statement (EIS) is a study of the potential effects on the environment from a specific Federal action. A Programmatic EIS (PEIS) is an EIS that looks at the general types of effects of a whole broad program of actions. It often forms the foundation for a “regular” or site-specific EIS, which looks in general detail at the effects of a specific project slated for a particular place. Because this effort is programmatic in nature, the Draft PEIS does not define effects for a specific or planned action. Instead, it analyzes the overall environmental and socioeconomic effects of activities supporting the homeland security mission of CBP focused on applying alternative approaches to better secure the border. On July 6, 2010, CBP published in the Federal Register (75 FR 38822) a notice announcing that CBP intended to prepare four PEISs to analyze the environmental effects of current and potential future CBP border security activities along the Northern Border. Each PEIS was to cover one region of the Northern Border: the New England region, the Great Lakes region, the region east of the Rocky Mountains, and the region west of the Rocky Mountains. The notice also announced and initiated the public scoping process to gather information from the public in preparation for drafting the PEISs. As indicated in the notice, the scoping period concluded on August 5, 2010. However, CBP continued to take comments past the initial scoping period. For more information on this process, please see the section of this document entitled Public Scoping Process. Subsequently, and in part due to comments received during public scoping, CBP decided to refocus its approach and develop one PEIS covering the entire Northern Border, rather than four separate, regional PEISs. This new approach was designed to ensure that CBP could effectively analyze and convey impacts that occur across regions of the Northern Border. CBP published a notice in the Federal Register announcing this intention on November 9, 2010 (75 FR 68810). While this makes for a somewhat larger single document, it offers the advantage of less duplication and greater usefulness as a CBP planning tool. Aided by the information gained during the public scoping process, CBP has prepared the Draft PEIS to analyze the environmental and socioeconomic effects of current and potential future CBP border security activities along the Northern Border between the United States and Canada, including an area extending approximately 100 miles south of the Northern Border. For the purposes of the PEIS, the Northern Border is defined as the area between the United States and Canada extending from the Atlantic Ocean to the Pacific Ocean encompassing all the States between Maine and Washington, inclusively. (The Alaska- Canada border is not included in this effort.) CBP is evaluating the environmental and socioeconomic impacts of routine aspects of its operations along the Northern Border and considering enhancements to its infrastructure, technologies, and application of manpower to continue to deter existing and evolving threats to the Nation’s physical and economic security. Due to the diverse and natural environments along the Northern Border, the Draft PEIS analyzes four Northern Border regions, referred to above: the New England region, the Great Lakes region, the region east of the Rocky Mountains, and the region west of the Rocky Mountains. CBP plans to use the information derived from the analysis in the PEIS in management, planning, and decision-making for its mission and its environmental stewardship responsibilities. It will also be used to establish a foundation for future impact analyses. More specifically, CBP plans to use the PEIS analysis over the next five to seven years as CBP works to improve security along the Northern Border. To protect the Northern Border against evolving terrorist and criminal threats, CBP plans to implement a diversified approach to border security over the next five to seven years that responds most effectively to those threats. This will involve some combination of facilities, security infrastructure, technologies, and operational activities, although the specific combination of elements that will be used over this period cannot be determined at this time. CBP will use this PEIS as a foundation for future environmental analyses of specific programs or locations as CBP’s plans for particular Northern Border security activities develop. Alternatives Considered The Draft PEIS considers the environmental impacts of several alternative approaches CBP may use to protect the Northern Border against evolving threats. These alternatives would all support continued deployment of existing CBP personnel in the most effective manner while maintaining officer safety and continued use of partnerships with other Federal, state, and local law enforcement agencies in the United States and Canada. CBP needs to maintain effective control of the Northern Border via all air, land, and maritime pathways for cross-border movement. The No Action Alternative (or “status quo”) would be to continue with the same facilities, technology, infrastructure, and approximate level of personnel currently in use, deployed, or currently planned by CBP. Normal maintenance of existing facilities is included in this alternative. This alternative would not meet CBP’s goals as it would not allow CBP to improve its capability to interdict cross-border violators or to identify and resolve threats at the ports of entry in a manner that avoids adverse effects on legal trade and travel. However, it is evaluated in this Draft PEIS because it provides a baseline against which the impacts of the other reasonable alternatives can be compared. The Facilities Development and Improvement Alternative would focus on providing new permanent facilities or improvements to existing facilities such as Border Patrol stations, ports of entry, and other facilities to allow CBP agents to operate more efficiently and respond to situations more quickly. This alternative would help meet CBP’s goals because the new and improved facilities would make it more difficult for cross-border violators to cross the border. It [[Page 57753]] would also divert traffic from or increase the capacity of the more heavily used ports of entry, decreasing waiting times. The applicability of this alternative would be limited, as most roads crossing the Northern Border already have a crossing facility. The Detection, Inspection, Surveillance and Communications Technology Expansion Alternative would focus on deploying more effective detection, inspection surveillance and communication technologies in support of CBP activities. This alternative would involve utilizing upgraded systems that would enable CBP to focus efforts on identifying threat areas, improving agent and officer communication systems, and deploying personnel to resolve incidents with maximum efficiency. This alternative would help meet CBP’s goals by improving CBP’s situational awareness and allowing CBP to more efficiently and effectively direct its resources for interdicting cross-border violators. The Tactical Security Infrastructure Deployment Alternative would focus on constructing additional barriers, access roads, and related facilities. The barriers would include selective fencing and vehicle barriers at selected points along the border and would deter and delay cross-border violators. The access roads and related facilities would increase the mobility of agents, and enhance their capabilities for surveillance and for responding to various international border violations. This alternative would help meet CBP’s goals by discouraging cross-border violators and improving CBP’s capacity to respond. The Flexible Direction Alternative (the Preferred Alternative) would allow CBP to follow any of the above directions in order to employ the most effective response to the changing threat environment along the Northern Border. This approach would allow CBP to respond more appropriately to a constantly changing threat environment. Public Scoping Process CBP developed and executed a public scoping program for the PEIS to identify public concerns to be examined in the PEIS. “Scoping” of an EIS is a process of informing diverse stakeholders about an action that an agency is planning and seeking those stakeholders’ feedback on the environmental concerns that the action could generate. The intent of the scoping effort is to adopt the scope of the planned environmental document to ensure that it addresses relevant concerns identified by interested members of the public as well as organizations, Native American Tribes, and other government agencies and officials. CBP’s public scoping period for the Northern Border PEIS commenced on July 6, 2010 and concluded on August 5, 2010. See 75 FR 38822. The public scoping process was initiated with the publishing of a notice of intent (NOI) notifying the public of CBP’s decision to prepare the PEISs. In coordination with the publication of the NOI, display advertisements were published in various newspapers serving local communities, public service announcements were broadcasted on local radio stations, scoping letters were mailed to potentially interested stakeholders consisting of agencies, organizations, and individuals, and a project Web site was developed. Following the publication of the NOI, a series of public scoping meetings were held in July 2010. CBP encouraged the public to submit comments concerning the scope of the PEIS during the public meetings, or via Web site, e-mail, or letter. The comments CBP received during the public scoping process were used to adapt the scope of the Draft PEIS and to ensure that it addressed relevant concerns identified by interested members of the public as well as organizations, Native American Tribes, and other government agencies and officials. CBP has compiled a list of comments received in a scoping report. This report is available on the project’s Web site at: http://www.NorthernBorderPEIS.com. NEPA This environmental analysis is being conducted pursuant to the National Environmental Policy Act of 1969 (NEPA), 42 U.S.C. 4321 et seq., the Council on Environmental Quality Regulations for Implementing the NEPA (40 CFR parts 1500-1508), and Department of Homeland Security Directive 023-01 (renumbered from 5100.1), Environmental Planning Program of April 19, 2006. NEPA addresses concerns about environmental quality and the government’s role in protecting it. The essence of NEPA is the requirement that every Federal agency examine the environmental effects of any proposed action before deciding to proceed with it or with some alternative. NEPA and the implementing regulations issued by the President’s Council on Environmental Quality call for agencies to document the potential environmental effects of actions they are proposing. Generally, agencies must make those documents public, and seek public feedback on them. In accordance with NEPA, the PEIS analyzes the effects on the environment of the Northern Border Security Program. CBP will seek public input on these studies and will use them in agency planning and decision making. Because NEPA is a uniquely broad environmental law and covers the full spectrum of the natural and human environment, the PEIS will also address environmental considerations governed by other environmental statutes such as the Clean Air Act, Clean Water Act, Endangered Species Act, and National Historic Preservation Act (NHPA). NHPA Programmatic Agreement CBP is developing a Programmatic Agreement (PA) for operations along the Northern Border in accordance with Section 106 of NHPA, 16 U.S.C. 470f, and its implementing regulations (36 CFR part 800). While the PA is being pursued as an independent action from the PEIS, it will be applied to future activities occurring within the Northern Border study area and therefore is relevant to the Northern Border PEIS project. The Northern Border is defined for purposes of the PA as extending from the Atlantic Ocean to the Pacific Ocean encompassing all the States between Maine to Washington, including an area extending approximately 100 miles south of the U.S.-Canada border. This area is identical to the area of study of the PEIS. CBP is currently consulting and coordinating with the Historic Preservation Officers of the states of Idaho, Maine, Michigan, Minnesota, Montana, New Hampshire, New York, North Dakota, Pennsylvania, Wisconsin, Vermont, and Washington, and the Advisory Council on Historic Preservation (ACHP) to finalize an agreed upon framework for future Section 106 reviews for CBP actions. The PA will be signed by CBP, the ACHP, State Historic Preservation Officers, and other consulting parties. The signed PA will identify (1) activities and projects carried out by CBP that are agreed do not have the potential to affect properties either listed or eligible for listing in the National Register of Historic Places, and (2) activities that are considered undertakings that do not require consultation under Section 106. Additionally, the PA identifies actions that may have an effect but that will not require Section 106 review by CBP, State or Tribal Historic Preservation Officers, Tribes and other consulting parties, so long as all terms and conditions as described in the PA are satisfactorily met. The signed PA will be valid for five years from the date of [[Page 57754]] execution, as verified with CBP filing the PA with the ACHP. Next Steps After the public comment period on the draft PEIS, CBP will complete a Final PEIS. The Final PEIS will be made available to the public through a Notice of Availability in the Federal Register. CBP will then select a programmatic course of action to guide CBP’s activities along the Northern Border for the next five to seven years. That decision will be published in the Federal Register in a Record of Decision. Dated: September 14, 2011. Trent Frazier, Acting Executive Director, Facilities Management and Engineering, Office of Administration. [FR Doc. 2011-23993 Filed 9-15-11; 8:45 am] BILLING CODE 9111-14-P

TOP-SECRET – Trujillo Declassified

Citizens of Trujillo gather at a memorial for the victims (Semana.com)

Trujillo Declassified
Documenting Colombia’s ‘tragedy without end’

Documents Detail U.S. Concerns about Impunity in Major Human Rights Case

National Security Archive Electronic Briefing Book No. 259

“Justice, Reparation, Memory, Truth”: Stones at the entrance to the memorial for the victims of the Trujillo massacre. (Michael Evans)

Washington D.C., Septemnber 16, 2011 – As Colombian prosecutors begin to reopen investigations against individuals connected to one of the worst massacres in the country’s modern history, the National Security Archive today publishes on the Web a collection of declassified documents detailing U.S. concerns about the wall of impunity that has long surrounded the case. These documents are central to an article published this weekend in Spanish on the Web site of Semana magazine, Colombia’s largest newsweekly. An English version of the article is available below and on the Web site of the new Semana International.

The new movement on the Trujillo massacre follows closely the release of a major new report on the case, the first issued by the Historical Memory Group (GMH) of the National Commission on Reparations and Reconciliation (CNRR). Led by a distinguished group of researchers, the GMH is charged with writing a comprehensive history of the Colombian conflict focusing on the country’s illegal armed groups.

The Archive’s Colombia Documentation Project is proud to be assisting the GMH and other researchers with investigations of the major human rights cases over the last four decades of violence in Colombia.


Trujillo Declassified: Documenting a ‘tragedy without end’
By Michael Evans

[NOTE: Click on the highlighted links to read the source documents in PDF.]

With a number of recent arrests connected to the infamous Trujillo massacres of 1988-1994, Colombia reopens one of the most enduring cases of impunity in its modern history. The investigation of these drug traffickers, assassins and paramilitaries, along with at least 12 retired members of the Colombian security forces, is another hopeful sign that Colombia will finally come to grips with a case that has long foundered on the rocky shoals of Colombian justice. But it also raises an uncomfortable question: Will the investigations pursue senior military officials responsible for the pattern of impunity that has perpetuated the suffering over these many years? And what, if any, responsibility does the United States bear for having supported the institutions behind this wall of silence?

To truly understand the Trujillo case, it is important to recognize the pervasive climate of impunity that lies at the core of the tragedy. Thirteen years after President Ernesto Samper accepted responsibility for the state’s role in the Trujillo killings, and 18 years after the murders themselves, not a single perpetrator has been sentenced in connection to the case.

Earlier this month, a special report on the Trujillo killings assembled by the Historical Memory Group (GMH) established under the “Justice and Peace” law found that impunity in the Trujillo case was not simply a symptom of state impotence or a lack of resources.“To the contrary,” writes Gonzalo Sánchez, the group’s director,

“it is part of the logic that surrounds and/or causes these crimes. It is precisely this impunity that guarantees that the crimes can continue being committed, that the perpetrators can continue committing them, and that those responsible are not punished.”

As Colombia revisits this “tragedy without end,” the country is faced with the possibility that yet another investigation will end without convictions.

Inscription at a special memorial for Father Tiberio Fernandez, one of some 342 victims of violence in Trujillo. (Michael Evans)

The ongoing political violence and the history of impunity that surrounds this case make it all the more important that groups investigating human rights crimes have access to a broad array of data from international organizations, courts and advocacy groups. One particularly rich source on Colombia’s impunity problem turns out to be one of its closest friends: the United States government. Colombia’s human rights record has been on the radar of American diplomats and intelligence officials for over 30 years, particularly those cases tied to the U.S. through training or other support. Thanks to hundreds of Freedom of Information Act requests by the National Security Archive in Washington, D.C., many of these formerly secret documents have now been declassified. These records tell us what U.S. officials said behind the scenes about their top Andean ally, and whether they believed that Colombia’s senior military and civilian leaders were serious about pursuing justice in Trujillo and other cases.

By the mid-1990s, increasing international outcry over the human rights situation in Colombia meant that the U.S. had to be much more careful about which units and officers of the Colombian armed forces it could support. Credible reports focused specifically on the abuses of U.S.-supported military units and officers complicated the U.S.-Colombia security relationship, particularly when meaningful prosecutions were practically non-existent.

For the U.S., Trujillo would be an important test of President Samper’s stated commitment to improve Colombia’s human rights record and his pledge to break the military’s ties to paramilitaries. The mere admission of state responsibility would not be enough. Clinton administration officials wanted to see real progress on the case, including the prosecution of military officials connected to the killings.

Chief among these was Maj. Alirio Uruena, a Third Brigade officer who, in addition to his association with the paramilitaries and drug traffickers behind Trujillo, had an uncomfortably close connection to the U.S. One Embassy cable noted that Uruena had “received USG [U.S. Government]-sponsored training on two occasions”: in 1976, at a “cadet orientation at the School of the Americas,” and at a “DIA-sponsored intelligence officer course” in December 1988 and January 1989, just a year or so before the killings in which he was specifically implicated. [19950207.pdf]

The sheer brutality of the killings made Uruena’s connection to the U.S. especially worrisome. Uruena had “personally directed the torture of 11 detainees and their subsequent execution,” according to one cable. The key witness in the case, a civilian army informant who participated in the murders, said that the killings “were carried out by cutting off the limbs and heads of the still living victims with a chain saw.” His testimony, according to the Embassy, was corroborated by “more than a dozen witnesses.” [19900727.pdf] Perhaps even more troubling, the case also tied Maj. Uruena to a narco-paramilitary group led by infamous paramilitary chiefs Diego Montoya and Henry Loaiza (both of whom are now under investigation for the Trujillo killings).

The U.S. connection to Trujillo, and the U.S. desire to continue supporting the strategically-located Third Brigade, made it all the more important that Samper back up his historic acceptance of state responsibility with punitive action against the perpetrators. The State Department’s top human rights official, John Shattuck, told Samper in one 1995 meeting that “rhetorical advances” needed to be followed by “evidence that the Colombian state can and will attack the underlying cause of its high levels of human rights violations and general violence: impunity.”Referring to Trujillo and two other cases, Shattuck said that “until the Colombian military and/or civilian justice systems are capable of investigating, trying, convicting, and sentencing those responsible for the massacres, the institutional reforms would be empty gestures.” What mattered, Shattuck said, was that Colombia begin to “show results … in instances of human rights violations attributed to the state security forces.” [19950327.pdf]

U.S. intelligence was also skeptical that Colombia was serious about its promise to break ties with paramilitary groups. The CIA reported in March 1995 that Samper had “yet to demonstrate resolve in addressing abuses by paramilitary groups that operate with the tacit approval of the military.” Samper had also “failed to arrest and prosecute [notorious paramilitary chief] Fidel Castano” and had “endorsed [Minister of Defense] Botero’s proposal to create rural security cooperatives,” many of which operated alongside illegal paramilitary groups, according to the CIA.[19950322.pdf]

Neither did Samper’s admission of state responsibility in the Trujillo case atone for the Colombian Army’s failure to bring charges against personnel involved in other serious abuses. Army commander Gen. Harold Bedoya’s response, in December 1996, to an Embassy request for information on 18 human rights cases tied to the military by Amnesty International was a “de facto admission of institutional culpability,” according to one cable. But rather than embarrass Bedoya by publicly challenging his shameful” response, the cable suggested that it be used “to pressure him into beginning to genuinely clean up the [Colombian Army’s] sordid performance on human rights, particularly the pattern of quasi-impunity posing as military justice.” “We should not shirk at some gentlemanly blackmail,” the Embassy added, “if that is what it takes to get our human rights agenda moving forward.” [19961227.pdf]

One year later, things had only gotten worse.  The CIA’s December 1997 “Update on Links Between Military, Paramilitary Forces” grimly predicted that “prospects for a concerted effort by the military high command to crack down on paramilitaries—and the officers that cooperate with them—appear dim.” The new Armed Forces commander, Gen. Manuel Bonett, “like his predecessor Harold Bedoya,” showed “little inclination to combat paramilitary groups.” [19971202.pdf]

Despite overwhelming evidence, Uruena was never convicted for his role in Trujillo, and his eventual dismissal from the Army was openly opposed by senior military officers. Even firing Uruena came at great political cost for Samper, who was subsequently unwilling to push for the actual prosecution of the perpetrators—most especially Uruena, but also those that the Embassy said had “whitewashed” and “perverted” the initial investigations, including Gen. Bonett, who had served as the first instance military judge in the case. [19980306.pdf]

Nevertheless, the reopening of the Trujillo case in the immediate wake of the GMH report is a hopeful sign that the recovery of historical memory in Colombia may finally be helping to lift the veil of impunity. It is perhaps too early to know whether these latest developments are signs of real progress or merely “empty gestures” without tangible legal consequences, but they are clearly part of a trend that has seen a number of high-profile military officers put under investigation in recent months.

Given Colombia’s recent history, it is perhaps not surprising that the U.S. may now hold the evidence that could make or break these cases. Fourteen top Colombian paramilitary commanders await prosecution in the U.S. on drug trafficking charges. It is not yet clear whether Colombian investigators will have the opportunity to question these men, who are responsible for some of the worst atrocities of the conflict, or if the memories of their crimes, their victims, and their collaborators in the Colombian security forces, will remain locked inside the U.S. prison system.

Either way, as Colombians boldly press forward with these investigations, declassified U.S. documents could prove to be a valuable source of evidence otherwise unavailable to prosecutors on Colombia’s conflict and, above all, the system of unchecked impunity that lies at its core.

TOP-SECRET – “Body count mentalities” Colombia’s “False Positives” Scandal, Declassified

Gen. Mario Montoya Uribe announces his resigation as Colombian Army Commander in November 2008. (Photo credit: Semana.com)

Body count mentalities”
Colombia’s “False Positives” Scandal, Declassified

Documents Describe History of Abuses by Colombian Army

National Security Archive Electronic Briefing Book No. 266

Washington, D.C., September 16, 2011 – The CIA and senior U.S. diplomats were aware as early as 1994 that U.S.-backed Colombian security forces engaged in “death squad tactics,” cooperated with drug-running paramilitary groups, and encouraged a “body count syndrome,” according to declassified documents published on the Web today by the National Security Archive. These records shed light on a policy—recently examined in a still-undisclosed Colombian Army report—that influenced the behavior of Colombian military officers for years, leading to extrajudicial executions and collaboration with paramilitary drug traffickers. The secret report has led to the dismissal of 30 Army officers and the resignation of Gen. Mario Montoya Uribe, the Colombian Army Commander who had long promoted the idea of using body counts to measure progress against guerrillas.

Archive Colombia analyst, Michael Evans, whose article on the matter was published today in Spanish on the Web site of Colombia’s Semana magazine, said that, “These documents and the recent scandal over the still-secret Colombian Army report raise important questions about the historical and legal responsibilities the Army has to come clean about what appears to be a longstanding, institutional incentive to commit murder.”

Highlights from today’s posting include:

  • A 1994 report from U.S. Ambassador Myles Frechette decrying “body count mentalities” among Colombian Army officers seeking to advance through the ranks. “Field officers who cannot show track records of aggressive anti-guerrilla activity (wherein the majority of the military’s human rights abuses occur) disadvantage themselves at promotion time.”
  • A CIA intelligence report from 1994 finding that the Colombian security forces “employ death squad tactics in their counterinsurgency campaign” and had “a history of assassinating leftwing civilians in guerrilla areas, cooperating with narcotics-related paramilitary groups in attacks against suspected guerrilla sympathizers, and killing captured combatants.”
  • A Colombian Army colonel’s comments in 1997 that there was a “body count syndrome” in the Colombian Army that “tends to fuel human rights abuses by well-meaning soldiers trying to get their quota to impress superiors” and a “cavalier, or at least passive, approach when it comes to allowing the paramilitaries to serve as proxies … for the COLAR in contributing to the guerrilla body count.”
  • The same colonel’s assertion that military collaboration with illegal paramilitary groups “had gotten much worse” under Gen. Rito Alejo Del Río Rojas, who is now under investigation for a murder that occurred during that same era.
  • A declassified U.S. Embassy cable describing a February 2000 false positives operation in which both the ACCU paramilitaries and the Colombian Army almost simultaneously claimed credit for having killed two long-demobilized guerrillas near Medellín. Ambassador Curtis Kamman called it “a clear case of Army-paramilitary complicity,” adding that it was “difficult to conclude anything other than that the paramilitary and Army members simply failed to get their stories straight in advance.”

“Body count mentalities”
Colombia’s “False Positives” Scandal, Declassified

By Michael Evans

Recently, the Colombian and U.S. media have been fixated on the scandal over “false positives”—the extrajudicial killing by the Colombian Army of civilians who are subsequently presented as guerrilla casualties to inflate the combat “body count.” A still-undisclosed military report on the matter has led to the dismissal of 30 Army officers in relation to the scandal and the resignation of Gen. Mario Montoya Uribe, the Army commander who had long promoted the idea of using body counts to measure progress against guerrillas. But the manner in which the investigation was conducted—in absolute secrecy and with little or no legal consequences for those implicated—raises a number of important questions. Is yet another personnel purge absent an impartial, civilian-led, criminal investigation really enough to change the culture in the Colombian Army? And when, if ever, will the Colombian Army divulge the contents of its internal report?

Amidst these lingering questions, a new collection of declassified U.S. diplomatic, military and intelligence documents published today by the National Security Archive in Washington, D.C., describe the “body count syndrome” that has been one of the guiding principles of Colombian military behavior in Colombia for years, leading to human rights abuses—such as false positives—and encouraging collaboration with illegal paramilitary groups. As such, the documents raise important questions about the historical and legal responsibilities the Army has to come clean about what appears to be a longstanding, institutional incentive to commit murder.

The earliest record in the Archive’s collection referring specifically to the phenomenon dates back to 1990. That document, a cable approved by U.S. Ambassador Thomas McNamara, reported a disturbing increase in abuses attributed to the Colombian Army. In one case, McNamara disputed the military’s claim that it had killed nine guerrillas in El Ramal, Santander, on June 7 of that year.

The investigation by Instruccion Criminal and the Procuraduria strongly suggests … that the nine were executed by the Army and then dressed in military fatigues. A military judge who arrived on the scene apparently realized that there were no bullet holes in the military uniforms to match the wounds in the victims’ bodies…”

At the same time, the Embassy was also beginning to see a connection between the Colombian security forces and the country’s burgeoning paramilitary groups. Many of the Army’s recent abuses had “come in the course of operations by armed para-military groups in which Army officers and enlisted men have participated,” according to the declassified cable. [19900727.pdf]

Similar tendencies were highlighted four years later in a cable cleared by U.S. Ambassador Myles Frechette. He found that “body count mentalities” persisted among Colombian Army officers seeking promotions. The Embassy’s Defense Attaché Office (DAO) had reported that, “Field officers who cannot show track records of aggressive anti-guerrilla activity (wherein the majority of the military’s human rights abuses occur) disadvantage themselves at promotion time.” Moreover, the claim by Minister of Defense Fernando Botero that there was “a growing awareness that committing human rights abuses will block an officer’s path to promotion” reflected “wishful thinking,” according to the DAO. [19941021.pdf]

A CIA intelligence report, also from 1994, went even further, finding that the Colombian security forces continued to “employ death squad tactics in their counterinsurgency campaign.” The document, a review of President César Gaviria’s anti-guerrilla policy, noted that the Colombian military had “a history of assassinating leftwing civilians in guerrilla areas, cooperating with narcotics-related paramilitary groups in attacks against suspected guerrilla sympathizers, and killing captured combatants.” Traditionally, the Army had “not taken guerrilla prisoners,” according to report, and the military had “treated Gaviria’s new human rights guidelines as pro forma.” [19940126.pdf]

Just over ten years ago, another U.S. intelligence report, previously published by the National Security Archive, and based on a conversation with a Colombian Army colonel, suggested that the steep rise in paramilitarism during that era was related to a “body count syndrome” in the Colombian Army.

This mindset tends to fuel human rights abuses by well-meaning soldiers trying to get their quota to impress superiors. It could also lead to a cavalier, or at least passive, approach when it comes to allowing the paramilitaries to serve as proxies for the COLAR  [Colombian Army] in contributing to the guerrilla body count.

The unidentified officer was also “intimately familiar” with General Rito Alejo Del Río Rojas, “about whom he had [few] nice things to say.” Military cooperation with paramilitaries “had been occurring for a number of years,” he said, but “had gotten much worse under Del Río.” Two other commanders, Gen. Jorge Enrique Mora and Gen. Harold Bedoya Pizarro were among those “who looked the other way” with respect to military-paramilitary collusion, the colonel said, referring to “the time frame when Mora was a BG [brigadier general] commanding the large and critical 4th Brigade in Medellín … back in 1994-95.” [19971224.pdf]

The 4th Brigade, a traditional launching point for officers seeking to move up the military chain-of-command, has long been accused of collusion with local paramilitary groups. The Los Angeles Times reported in 2007 on a classified CIA report linking Gen. Montoya to joint military-paramilitary operations in Medellín while he served as brigade commander in 2002. His replacement as Army commander, General Oscar Gonzalez, also commanded the 4th Brigade, as well as other units in the conflictive area around Medellín.

In no case were the 4th Brigade’s paramilitary ties more evident than in a February 2000 false positives operation in which both the ACCU paramilitaries and the Colombian Army almost simultaneously claimed credit for having killed two long-demobilized guerrillas near Medellín. A declassified U.S. Embassy cable on the matter, signed by Ambassador Curtis Kamman, reported the case with shocked disbelief.

The ACCU (which witnesses say kidnapped the two) claims its forces executed them, while the Army’s Fourth Brigade (which released the bodies the next day) presented the dead as ELN guerrillas killed in combat with the Army. After these competing claims sparked localized fear and confusion, armed men stole the cadavers from the morgue…

Kamman called the killings “a clear case of Army-paramilitary complicity” that would “further increase the already high-level of international NGO interest in the issue of 4th Brigade ties to paramilitaries.” The ambassador added that it was “difficult to conclude anything other than that the paramilitary and Army members simply failed to get their stories straight in advance.” [20000208.pdf]

So while Colombian Army officials scramble to get their “stories straight” in response to the recent scandal, it seems worth noting that “body counts” and “false positives” have an institutional history in the Colombian armed forces going back many years. And while recent steps to cleanse the Army’s ranks of officials associated with the policy are welcome, they are clearly not enough. What are the facts? Who is responsible? How long has this been happening? Who are the victims? And where are the bodies buried?

Declassified U.S. documents can provide some clues, but it seems unlikely that we will learn the answers to these questions unless the Colombian Army declassifies and releases its full report on the “false positives” scandal. Until then, it seems, secrecy and impunity will continue to prevail over transparency and justice in Colombia.


Michael Evans is director of the Colombia Documentation Project at the National Security Archive in Washington, D.C. The Colombia Documentation Project would like to thank the John Merck Fund for their generous support of this project.

TOP-SECRET – The August 1991 Coup in Moscow, 20 Years Later

Documents Show Hardliners Tried to Topple Gorbachev but Brought Down the Soviet Union

National Security Archive Electronic Briefing Book No. 357

Washington D.C., September 16, 2011 -The hardline coup d’etat 20 years ago today in Moscow surprised its plotters with unexpected resistance from Soviet president Mikhail Gorbachev, from Russian democratic opposition forces, and from the international community including the Bush administration, according to documents posted today by the National Security Archive at George Washington University (www.nsarchive.org).

The documents include the most complete account of the coup by a Gorbachev insider, the British ambassador’s immediate skeptical analysis of the plot, the Russian Supreme Soviet’s debate as the coup dissipated on August 21, and telcons of President Bush’s talks during the coup with foreign leaders including Gorbachev and Russian president Boris Yeltsin.

The posting marks the 20th anniversary of the August 19, 1991 announcement by the so-called Committee on the State of Emergency (GKChP), as USSR state television replaced regular programming with the ominous chords of “Swan Lake,” that Gorbachev was allegedly sick and the Committee was taking power in the country.  The coup pre-empted the scheduled August 20 signing of the new Union Treaty, intended to create a new decentralized and democratic Union.  The plotters, led by KGB Chairman Vladimir Kryuchkov and Minister of Defense Dmitry Yazov, held Gorbachev under house arrest at his dacha in Foros, Crimea; but as the diary of Gorbachev aide Anatoly Chernyaev shows, Gorbachev refused to cooperate with the coup plotters and demanded that he return to Moscow and face the Supreme Soviet.

However, already on August 19, demonstrators surrounded the tanks sent by the coup plotters to guard the White House – the building of the democratically elected Russian Parliament.  The freshly elected Russian President Boris Yeltsin assumed leadership of the opposition and demanded that Gorbachev be reinstalled as the lawful President of the Soviet Union.  Yeltsin standing on a tank (actually an armored personnel carrier) outside the White House became the symbol of the Russian democratic revolution, which prevented the right-wing takeover, but also led directly to the collapse of the Union.  In effect, the coup plotters speeded up the outcome they were trying to prevent.

The Chernyaev diary provides the most complete account of the Foros experience of the Gorbachev circle; excerpts have appeared in Foreign Policy (http://www.foreignpolicy.com/articles/2011/06/21/three_days_in_foros) while the Archive has published the full text.  The August 20 telegram from British Ambassador Rodric Braithwaite describes the indecisiveness of the coup plotters and prescribes a policy of the strongest possible support for Gorbachev.  The memoranda of telephone conversations with foreign leaders from the Bush Library show that the Bush administration was carefully following the developments in Moscow and projecting clear support for Gorbachev.

The final document published in today’s posting – for the first time anywhere – brings the reader into the halls of the legendary Russian White House, to the extraordinary session of the Supreme Soviet of the Russian Federation at the exact moment of the triumph of the democratic resistance to the coup.  The discussions show the resoluteness of the democratic opposition and the decisive role of the Soviet army, in which key units ultimately disobeyed orders and sided with the democratic forces.


Document 1.  “Three Days in Foros,” excerpt from Anatoly Chernyaev Diary.
[Source:  Diary of Anatoly Chernyaev, Donated Manuscript, on file at the National Security Archive, translated by Anna Melyakova]

Document 2.  Rodric Braithwaite, “Moscow, August 19:  The First Day of the Coup,” Telegram of 20 August 1991.
[Source:  Rodric Braithwaite, Correspondence, 1988 to 1993, Donated Manuscript, on file at the National Security Archive]

Document 3.  George Bush-Felipe Gonzalez Memorandum of Telephone Conversation, August 19, 1991.
[Source;  Bush Presidential Library, NSArchive foia 1999-0303-F]

Document 4.  George Bush-Vaclav Havel Memorandum of Telephone Conversation, August 19, 1991.
[Source;  Bush Presidential Library, NSArchive foia 1999-0303-F]

Document 5.  George Bush-Jozsef Antall Memorandum of Telephone Conversation, August 19, 1991.
[Source;  Bush Presidential Library, NSArchive foia 1999-0303-F]

Document 6.  George Bush-Boris Yeltsin Memorandum of Telephone Conversation, August 20, 1991.
[Source;  Bush Presidential Library, NSArchive foia 1999-0303-F]

Document 7.  George Bush-Boris Yeltsin Memorandum of Telephone Conversation, August 21, 1991.
[Source;  Bush Presidential Library, NSArchive foia 1999-0303-F]

Document 8.  George Bush-Mikhail Gorbachev Memorandum of Telephone Conversation, August 21, 1991.
[Source;  Bush Presidential Library, NSArchive foia 1999-0303-F]

Document 9.  Transcript of the First Extraordinary Session of the Supreme Soviet of the Russian Federation, August 21, 1991.
[Source:  State Archive of the Russian Federation (GARF), Fond 10026, Translated by Matthew McGorrin]

Boris Yeltsin in front of the Parliament 08.19.1991

911 x 10 Photos

911 x 10

[Image]In this Monday, July 25, 2011 photo, Vladimir Gavriushin sits at the grave he built for his daughter Yelena in a cemetery outside Vilnius, Lithuania. Yelena was one of the nearly 3,000 people killed on Sept. 11, 2001. Gavriushin has buried rocks from ground zero under these tombstone towers, far from the place Yelena died _ a place he can no longer afford to visit. And so, as the 10-year anniversary of the terrorist attacks approaches, he mourns for her here, at his own ground zero.
[Image]Andrew Kinard, a Marine lieutenant, lost both legs in an I.E.D. attack two months into his first tour in Iraq, in 2006. Now he’s at Harvard, pursuing a joint law and business degree. He was photographed at his summer internship, at the Fortress Investment Group. (Christopher Anderson)
[Image]In a May 23, 2011 photo, Sukhwinder Singh sits next to the memorial for his father, Balbir Singh Sodhi, in Mesa, Arizona. Singh’s father was shot and killed in front of the family owned gas station as he was placing flowers at a makeshift memorial the family set up shortly after the 9/11 attacks in 2001. The Sikh was killed during the anti-muslim backlash after the 9/11 attacks. Some have objected to including Balbair Singh Sodhi’s name on a Phoenix Sept. 11 memorial, saying he was not a victim of the attack.
[Image]A police officer stands guard in New York’s Times Square as the ABC news ticker displays news of an al-Qaida terror threat, Friday, Sept. 9, 2011. Just days before the 10th anniversary of the Sept. 11 attacks, U.S. counterterrorism officials are chasing a credible but unconfirmed al-Qaida threat to use a car bomb on bridges or tunnels in New York City or Washington. It is the first “active plot” timed to coincide with the somber commemoration.
[Image](L-R) New York Mayor Michael Bloomberg, Janice Fedarcyk, assistant director in charge New York Field Office for the FBI, and New York Police Commissioner Ray Kelly speak to media about a threat in New York September 8, 2011. President Barack Obama on Thursday ordered a redoubling of U.S. counter-terrorism efforts in the face of a “credible but unconfirmed” threat ahead of the 10th anniversary of the Sept. 11, 2001 attacks. Reuters
[Image]New York City police officers stop a commercial truck at a checkpoint in New York’s financial district, Friday, Sept. 9, 2011. U.S. officials said Thursday that they were chasing a credible but unconfirmed al-Qaida threat to use a car bomb on bridges or tunnels in New York or Washington. Police Commissioner Raymond Kelly said that police are beefing up security at bridges and tunnels, setting up vehicle checkpoints and doing bomb sweeps of parking garages. (Mark Lennihan)
[Image]The U.S. embassy in Paris during a ceremony to pay tribute to the victims of the 9/11 attacks, Friday, Sept. 9, 2011, ahead of the 10-year anniversary of the Sept. 11, 2001 terror attacks on Sunday. (Charles Platiau)
[Image]Construction workers install model twin towers representing the towers of the World Trade Center in preparation to commemorate the 10 anniversary of the Sept. 11 this Sunday, at Trocadero plazamin Paris Friday Sept. 9, 2011. The Eiffel tower is seen in the background. The towers will be finished on Saturday in advance of the commemoration on upcoming Sunday. (Michel Euler)
[Image]Workers at the new Flight 93 National Memorial work on final preparations for Saturday’s dedication ceremony Sept. 8. 2011 in Shanksville, Pa.. The boulder in the background marks the location of the crash crater. Sunday will mark the tenth anniversary of the attacks of Sept. 11, 2001. (Gene J. Puskar)
[Image]Family members of police officers killed during or as a result of the 9/11 terrorist attacks stand to be recognized during a ceremony in New York, Thursday, Sept. 8, 2011. (Seth Wenig)
[Image]Developer Larry Silverstein, left, and Joe Daniels, President of the September 11 Memorial, attend a news conference Wednesday, Aug. 24, 2011 in New York where they discussed Silverstein’s buildings at the World Trade Center and the plans for the opening of the memorial. (Mark Lennihan)
[Image]This Tuesday, Aug 16, 2011 photo shows Michael Lewin in his office in the town of Lod, central Israel. His brother, Daniel Lewin, was killed during the Sept. 11, 2001 attacks on the United States. Daniel’s family honors his memory with a traditional Jewish yahrzeit, an annual memorial observance of a loved one’s death. They talk about his life and study the Torah, the Hebrew Bible, in his name. Over the years, Michael has visited ground zero several times on business trips to New York.
[Image]ADVANCE FOR USE LABOR DAY WEEKEND, SEPT. 3-5, 2011 AND THEREAFTER – This Wednesday, Aug. 10 2011 photo shows a tent which houses a chapel and a storage of the remains of victims of the attacks on the World Trade Center near Chief Medical Examiner Office Forensic Biology Lab in New York. (Mary Altaffer)
[Image]ADVANCE FOR USE LABOR DAY WEEKEND, SEPT. 3-5, 2011 AND THEREAFTER – This Wednesday, Aug. 10 2011 photo shows posters on a wall of the garden behind a tent which houses a chapel and a storage of the remains of victims of the attacks on the World Trade Center near Chief Medical Examiner Office Forensic Biology Lab in New York. (Mary Altaffer)
[Image]FILE – In this Sept. 2001 file photo, dust still covers the streets near ground zero as Associated Press photographer Amy Sancetta pushes her bike on the streets a few days after the terrorist attacks in New York. On Sept. 11, 2001, the Ohio-based national photographer was in New York City to cover her tenth the U.S. Open Tennis tournament. The desk had a report that a plane might have hit one of the World Trade Center towers, so she caught a cab downtown.
[Image]FILE – In this Tuesday, Sept. 11, 2001 file photo, pedestrians in lower Manhattan watch smoke rise from the World Trade Tower after an early morning terrorist attack on the New York landmark. Television brought the 2001 attacks to the world in real time, and forever linked the thousands who lived through it and the millions who watched. It became a collective experience, and, from every angle, one of the most digitally documented events ever. And so it remains. (Amy Sancetta, file)

Börse Online über “GoMoPa”-Betrüger und RA Jochen Resch

http://www.graumarktinfo.de/gm/aktuell/diskussion/:Gomopa–Anwaelte-als-Finanzierungsquelle/616477.html

“SPIEGEL” über die STASI-Connection des mutmasslichen “GoMoPa”-Chefs Jochen Resch

http://www.spiegel.de/spiegel/print/d-65717414.html

TOP-SECRET-Getting Access to the Secrets of the Osama Bin Laden Kill

Getting Access to the Secrets of the Osama Bin Laden Kill

[Image]

Nicholas Schmidle has written Getting Bin Laden, a dramatic and detailed account of the raid to kill Osama bin Laden, in The New Yorker, August 1, 2011. The story shows that Schmidle had extraordinary access to participants in the operation, in the White House, the DoD, the CIA, and Special Operations — members of the latter two providing details of personnel, training, location, scheduling and travel well beyond what is usually revealed about covert actions. The persuasive spin of the account parallels that of Associated Press covering the bin Laden hunter “CIA John” which was also based on privileged access to official informants.

Highly secret meeting details and quotes by President Obama, Vice President Biden, Robert Gates, Leon Panetta, Admiral Mullen, Admiral McRaven, John Brennan, Deputy National Security Advisor Ben Rhodes and a number of special operations members are used to produce a dramatic narrative in which there are no failures, no journalistic counterbalance to a complex and risky operation. Even the unexpected helicopter crash is transformed into a success:

“I’m glad no one was hurt in the crash, but, on the other hand, I’m sort of glad we left the helicopter there,” the special-operations officer said. “It quiets the conspiracy mongers out there and instantly lends credibility. You believe everything else instantly, because there’s a helicopter sitting there.”

While Schmidle is an experienced journalist with service in Pakistan and elsewhere, his access to those involved in the kill’s top secret planning and operation, and his unrelenting positive spin of the story (in accord with Obama’s campaign to valorize the singular accomplishment), could be explained by his access to  his father, Richard Schmidle, a general in Special Operations and now deputy commander for U.S. Cyber Command.

[Image]
USMC BGEN Rorbert E. Schmidle Jr., The Special Operations Command (SOCOM) War Fighter Conference held at the Officer’s Club aboard Marine Corps Base (MCB) Camp Lejeune, North Carolina (NC). Photographer’s Name: LCPL NATHAN L. BARNES, USMC. Location: MARINE CORPS BASE CAMP LEJEUNE. Date Shot: 3/4/2004. Date Posted: unknown. VIRIN: 040304-M-RT524-001 [Clipped and enlarged from original photo (2.4MB).]


https://slsp.manpower.usmc.mil/gosa/biographies/rptBiography.asp?PERSON_ID=5&PERSON_TYPE=General

Lieutenant General Robert E. Schmidle, Jr.

Deputy Commander, U. S. Cyber Command

Lieutenant General Robert E. Schmidle, Jr., USMC, serves as the Deputy Commander for U.S. Cyber Command, Ft. George G. Meade, MD. As the Deputy Commander, he directs the forces and daily activities of U.S. Cyber Command. In this capacity, he also coordinates the Department of Defense computer network attack and computer network defense missions.

Lieutenant General Schmidle is a native of Newtown, Connecticut.

His command assignments include: Commanding General of First Marine Aircraft Wing, Commanding Officer of Special Purpose Marine Air-Ground Task Force (Experimental), and Commanding Officer of Marine Fighter/Attack Squadrons 251 and 115.

Previous operational assignments include multiple tours flying the F-4 and F/A-18 aircraft as well as serving as the operations officer and air officer of an Infantry Battalion, First Battalion 9th Marines.

Additionally, Lieutenant General Schmidle has served in the following key staff assignments: Assistant Deputy Commandant of the Marine Corps for Programs and Resources (Programs), Deputy Chief of Staff for Integrated Product Team 1 for the 2006 Quadrennial Defense Review and USMC lead for the 2010 Quadrennial Defense Review, Deputy Director for Resources and Acquisition in the Joint Staff J-8, Director of the USMC Expeditionary Force Development Center and the Military Secretary for the 32nd and 33rd Commandants of the Marine Corps.

Lieutenant General Schmidle graduated from Drew University with a Bachelor of Arts degree in History. He also holds a Master of Arts in Philosophy from American University and is currently working on his doctorate at Georgetown University He is a distinguished graduate and prior faculty member of the Marine Corps Command and Staff College as well as a distinguished graduate of the Marine Corps War College. Additionally, he has been published on a range of topics from military history to social psychology and philosophy.


[Image]

Source

[Image]

Source

[Image]

Lt. Gen. Robert Schmidle, the deputy commander for U.S. Cyber Command during the Evening Parade reception at Marine Barracks Washington in Washington, D.C., May 27, 2011. (U.S. Marine Corps photo by Lance Cpl. Tia Dufour/Released) Date Posted: 6/3/2011. VIRIN: 110527-M-KS211-009

[Image]

http://newamerica.net/user/122
Nicholas Schmidle, Bernard L. Schwartz Fellow, schmidle[at]newamerica.net

[Image]
Nicholas Schmidle, May 12, 2009. Source

[Image]

Major General Robert E. “Rooster” Schmidle Jr., P. W. Singer, New America Foundation, Uploaded to Flickr on May 26, 2010 Source

TOP-SECRET-Smithwick tribunal told spymasters could have averted double murder

A written statement that claims up to a quarter of the IRA gang involved in the killing of two top Ulster policemen were British agents has been handed to a tribunal investigating collusion between terrorists and the security forces during the Northern Ireland Troubles.

The document handed to the Smithwick tribunal by a former British military intelligence officer, shines new light on Ulster’s covert war — and raises concerns that the murder of Superintendent Bob Buchanan and Chief Superintendent Harry Breen in March 1989 could have been prevented.

The material, given to the tribunal by Ian Hurst, a former member of the force research unit (FRU), claims that one of Britain’s most important agents in the IRA, codenamed Stakeknife, was aware of the murder plot, prompting accusations that in turn his spy bosses failed to inform either the Royal Ulster Constabulary or the Garda Síochána about it.

In his 24-page statement, passed to the tribunal headed by Judge Peter Smithwick in June, Hurst claims that Stakeknife — FRU informer Freddie Scappaticci — played a key role in intelligence-gathering that led to the double murder. Yet Scappaticci, the then head of the IRA’s spy-catching unit, was in fact a top British agent in the Provisionals. …

Another FRU agent and one-time IRA member known as Kevin Fulton has claimed state agents involved in the ambush killed the two police officers to prevent them being handed over to a Provisional interrogation unit, with the danger of them leaking the names of informants under torture.

The Guardian has learned that the Smithwick tribunal has asked Hurst to give his evidence in private. But Hurst is understood to insist that he will only speak in public about the Breen-Buchanan double murder and the role of state agents in the IRA.

It is understood Hurst may be considering legal action to challenge the tribunal’s decision. He has an Irish passport, holds Irish citizenship due to marriage and could argue that the ruling to force him to give evidence in camera is a breach of the Republic’s constitution and his right to give evidence openly to a legally constituted inquiry.

TOP-SECRET – Meyer Lansky – THE FBI FILES PART 2

Meyer Lansky (1902-1983) was involved in a wide-range of organized criminal activity and was associated with many other well known criminal figures from the 1920s to the 1970s. Lansky was especially active in gambling ventures, including the rise of Las Vegas and efforts to build casinos in Cuba before the communist revolution there. In 1972, he was indicted on charges that he and others had skimmed millions of dollars from a Vegas casino that they owned; the indictment on Lansky was later dismissed since he was considered too ill to face trial. The files in this release range from 1950 to 1978.

By clicking on the links below you can download the files a pdf documents

92-2831 section 8 -136

92-2831 section 9 -99

92-2831 section 10 -181

92-2831 section 11 -133

92-2831 section 12 -155

92-2831 section 13 -66

92-2831 section 15 -33

92-2831 section 16 -117

92-2831 section 17 -39

92-2831 section 18 -37

92-2831 section 19 -85

92-2831 section 21 -13

92-2831 Sub A -42

166-3701 -10

Miscellaneous -3

Meyer Lansky

Meyer Lansky in 1958
Born Meyer Suchowljansky
July 4, 1902(1902-07-04)
Grodno, Russian Empire
Died January 15, 1983(1983-01-15) (aged 80)
Miami Beach, Florida
Cause of death lung cancer
Nationality United States
Known for Mob activity

Meyer Lansky (born Meyer Suchowljansky[1]; July 4, 1902 – January 15, 1983), known as the “Mob’s Accountant”, was a Russian Empire-born American organized crime figure who, along with his associate Charles “Lucky” Luciano, was instrumental in the development of the “National Crime Syndicate” in the United States. For decades he was thought to be one of the most powerful people in the country.

Lansky developed a gambling empire which stretched from Saratoga, New York to Miami to Council Bluffs and Las Vegas; it is also said that he oversaw gambling concessions in Cuba. Although a member of the Jewish Mafia, Lansky undoubtedly had strong influence with the Italian Mafia and played a large role in the consolidation of the criminal underworld (although the full extent of this role has been the subject of some debate).

Lansky was born Meyer Suchowljansky in Grodno (then in the Russian Empire, now in Belarus), to a Jewish family who experienced pogroms at the hands of the local Christian Polish and Russian population.[2] In 1911, he emigrated to the United States through the port of Odessa[3] with his mother and brother and joined his father, who had previously emigrated to the United States in 1909, and settled on the Lower East Side of Manhattan, New York.[4]

Lansky met Bugsy Siegel when he was a teenager. They became lifelong friends, as well as partners in the bootlegging trade, and together with Lucky Luciano, formed a lasting partnership. Lansky was instrumental in Luciano’s rise to power by organizing the 1931 murder of Mafia powerhouse Salvatore Maranzano. As a youngster, Siegel saved Lansky’s life several times, a fact which Lansky always appreciated. The two adroitly managed the Bug and Meyer Mob despite its reputation as one of the most violent Prohibition gangs.

Lansky was the brother of Jacob “Jake” Lansky, who in 1959 was the manager of the Nacional Hotel in Havana, Cuba.

 Gambling operations

By 1936, Lansky had established gambling operations in Florida, New Orleans, and Cuba. These gambling operations were very successful as they were founded upon two innovations. First, in Lansky and his connections there existed the technical expertise to effectively manage them based upon Lansky’s knowledge of the true mathematical odds of most popular wagering games. Second, mob connections were used to ensure legal and physical security of their establishments from other crime figures, and law enforcement (through payoffs).

But there was also an absolute rule of integrity concerning the games and wagers made within their establishments. Lansky’s “carpet joints” in Florida and elsewhere were never “clip-joints”; where gamblers were unsure of whether or not the games were rigged against them. Lansky ensured that the staff (the croupiers and their management) actually consisted of men of high integrity. And it was widely known what would happen to a croupier or a table manager who attempted to cheat or steal from a customer or the house.[clarification needed]

In 1936, Lansky’s partner Luciano was sent to prison. As Alfred McCoy records:

“During the 1930s, Meyer Lansky ‘discovered’ the Caribbean for Northeastern United States syndicate bosses and invested their illegal profits in an assortment of lucrative gambling ventures…. He was also reportedly responsible for organized crime’s decision to declare Miami a ‘free city’ (i.e., not subject to the usual rules of territorial monopoly).”

[citation needed]

Lansky later convinced the Mafia to place Bugsy Siegel in charge of Las Vegas, and became a major investor in Siegel’s Flamingo Hotel.

After Al Capone‘s 1931 conviction for tax evasion and prostitution, Lansky saw that he too was vulnerable to a similar prosecution. To protect himself, he transferred the illegal earnings from his growing casino empire to a Swiss numbered bank account, whose anonymity was assured by the 1934 Swiss Banking Act. Lansky eventually even bought an offshore bank in Switzerland, which he used to launder money through a network of shell and holding companies.[5]

War work

In the 1930s, Meyer Lansky and his gang claimed to have stepped outside their usual criminal activities to break up rallies held by Nazi sympathizers. Lansky recalled a particular rally in Yorkville, a German neighborhood in Manhattan, that he claimed he and 14 other associates disrupted:

The stage was decorated with a swastika and a picture of Adolf Hitler. The speakers started ranting. There were only fifteen of us, but we went into action. We threw some of them out the windows. Most of the Nazis panicked and ran out. We chased them and beat them up. We wanted to show them that Jews would not always sit back and accept insults.[6]

During World War II, Lansky was also instrumental in helping the Office of Naval Intelligence‘s Operation Underworld, in which the US government recruited criminals to watch out for German infiltrators and submarine-borne saboteurs.

According to Lucky Luciano’s authorized biography, during this time, Lansky helped arrange a deal with the US Government via a high-ranking U.S. Navy official. This deal would secure the release of Lucky Luciano from prison; in exchange the Italian Mafia would provide security for the war ships that were being built along the docks in New York Harbor. German submarines were sinking allied shipping outside the coast on a daily basis and there was great fear of attack or sabotage by Nazi sympathizers.

The Flamingo

During the 1940s, Lansky’s associate Benjamin “Bugsy” Siegel persuaded the crime bosses to invest in a lavish new casino hotel project in Las Vegas, the Flamingo. After long delays and large cost overruns, the Flamingo Hotel was still not open for business. To discuss the Flamingo problem, the Mafia investors attended a secret meeting in Havana, Cuba in 1946. While the other bosses wanted to kill Siegel, Lansky begged them to give his friend a second chance. Despite this reprieve, Siegel continued to lose Mafia money on the Flamingo Hotel. A second family meeting was then called. However, by the time this meeting took place, the casino turned a small profit. Lansky again, with Luciano’s support, convinced the family to give Siegel some more time.

The Flamingo was soon losing money again. At a third meeting, the family decided that Siegel was finished. He had humiliated the organized crime bosses and never had a chance. It is widely believed that Lansky himself was compelled to give the final okay on eliminating Siegel due to his long relationship with Siegel and his stature in the family.

On June 20, 1947, Siegel was shot and killed in Beverly Hills, California. Twenty minutes after the Siegel hit, Lansky’s associates, including Gus Greenbaum and Moe Sedway, walked into the Flamingo Hotel and took control of the property. According to the Federal Bureau of Investigation, Lansky retained a substantial financial interest in the Flamingo for the next twenty years. Lansky said in several interviews later in his life that if it had been up to him, Ben Siegel would be alive today.

This also marked a power transfer in Vegas from the New York crime families to the Chicago Outfit. Although his role was considerably more restrained than in previous years, Lansky is believed to have both advised and aided Chicago boss Tony Accardo in initially establishing his hold.

Lansky in Cuba

After World War II, Lansky associate Lucky Luciano was paroled from prison on the condition that he permanently return to Sicily. However, Luciano secretly moved to Cuba, where he worked to resume control over American Mafia operations. Luciano also ran a number of casinos in Cuba with the sanction of Cuban president General Fulgencio Batista, though the American government succeeded in pressuring the Batista regime to deport Luciano.

Batista’s closest friend in the Mafia was Lansky. They formed a renowned friendship and business relationship that lasted for three decades. During a stay at the Waldorf-Astoria in New York in the late 1940s, it was mutually agreed upon that, in exchange for kickbacks, Batista would offer Lansky and the Mafia control of Havana’s racetracks and casinos. Batista would open Havana to large scale gambling, and his government would match, dollar for dollar, any hotel investment over $1 million, which would include a casino license. Lansky, of course, would place himself at the center of Cuba’s gambling operations. He immediately called on his “associates” to hold a summit in Havana.

The Havana Conference was held on December 22, 1946 at the Hotel Nacional. This was the first full-scale meeting of American underworld leaders since the Chicago meeting in 1932. Present were such notable figures as Joe Adonis and Albert “The Mad Hatter” Anastasia, Frank Costello, Joseph “Joe Bananas” Bonanno, Vito Genovese, Moe Dalitz, Thomas Luchese, from New York, Santo Trafficante Jr. from Tampa, Carlos “The Little Man” Marcello from New Orleans, and Stefano Magaddino, Joe Bonanno’s cousin from Buffalo. From Chicago there was Anthony Accardo and the Fischetti brothers, “Trigger-Happy” Charlie and his brother Rocco, and, representing the Jewish interest, Lansky and “Dandy” Phil Kastel from Florida. The first to arrive was Salvatore Charles Lucky Luciano, who had been deported to Italy, and had to travel to Havana with a false passport. Lansky shared with them his vision of a new Havana, profitable for those willing to invest the right sum of money. A city that could be their “Latin Las Vegas,” where they would feel right at home since it was a place where drugs, prostitution, labor racketeering, and extortion were already commonplace. According to Luciano’s evidence, and he is the only one who ever recounted details of the events in any detail, he confirmed that he was appointed as kingpin for the mob, to rule from Cuba until such time as he could find a legitimate way back into the U.S. Entertainment at the conference was provided by, among others, Frank Sinatra who flew down to Cuba with their friends, the Fischetti brothers.

In 1952, Lansky even offered then President Carlos Prío Socarrás a bribe of U.S. $250,000 to step down so Batista could return to power. Once Batista retook control of the government he quickly put gambling back on track. The dictator contacted Lansky and offered him an annual salary of U.S. $25,000 to serve as an unofficial gambling minister. By 1955, Batista had changed the gambling laws once again, granting a gaming license to anyone who invested $1 million in a hotel or U.S. $200,000 in a new nightclub. Unlike the procedure for acquiring gaming licenses in Vegas, this provision exempted venture capitalists from background checks. As long as they made the required investment, they were provided with public matching funds for construction, a 10-year tax exemption and duty-free importation of equipment and furnishings. The government would get U.S. $250,000 for the license plus a percentage of the profits from each casino. Cuba’s 10,000 slot machines, even the ones which dispensed small prizes for children at country fairs, were to be the province of Batista’s brother-in-law, Roberto Fernandez y Miranda. An Army general and government sports director, Fernandez was also given the parking meters in Havana as a little something extra. Import duties were waived on materials for hotel construction and Cuban contractors with the right “in” made windfalls by importing much more than was needed and selling the surplus to others for hefty profits. It was rumored that besides the U.S. $250,000 to get a license, sometimes more was required under the table. Periodic payoffs were requested and received by corrupt politicians.

Lansky set about reforming the Montmartre Club, which soon became the in place in Havana. He also long expressed an interest in putting a casino in the elegant Hotel Nacional, which overlooked El Morro, the ancient fortress guarding Havana harbor. Lansky planned to take a wing of the 10-storey hotel and create luxury suites for high stakes players. Batista endorsed Lansky’s idea over the objections of American expatriates such as Ernest Hemingway and the elegant hotel opened for business in 1955 with a show by Eartha Kitt. The casino was an immediate success.[7]

Once all the new hotels, nightclubs and casinos had been built Batista wasted no time collecting his share of the profits. Nightly, the “bagman” for his wife collected 10 percent of the profits at Trafficante’s interests; the Sans Souci cabaret, and the casinos in the hotels Sevilla-Biltmore, Commodoro, Deauville and Capri (part-owned by the actor George Raft). His take from the Lansky casinos, his prized Habana Riviera, the Nacional, the Montmartre Club and others, was said to be 30 percent. What exactly Batista and his cronies actually received in total in the way of bribes, payoffs and profiteering has never been certified. The slot machines alone contributed approximately U.S. $1 million to the regime’s bank account.

Revolution

The fast times soon rolled to a stop. The 1959 Cuban revolution and the rise of Fidel Castro changed the climate for mob investment in Cuba. On that New Year’s Eve of 1958, while Batista was preparing to flee to the Dominican Republic and then on to Spain (where he died in exile in 1973), Lansky was celebrating the $3 million he made in the first year of operations at his 440-room, $18 million palace, the Habana Riviera. Many of the casinos, including several of Lansky’s, were looted and destroyed that night.

On January 8, 1959, Castro marched into Havana and took over, setting up shop in the Hilton. Lansky had fled the day before for the Bahamas and other Caribbean destinations. The new Cuban president, Manuel Urrutia Lleó, took steps to close the casinos.

In October 1960, Castro nationalized the island’s hotel-casinos and outlawed gambling. This action essentially wiped out Lansky’s asset base and revenue streams. He lost an estimated $7 million. With the additional crackdown on casinos in Miami, Lansky was forced to depend on his Las Vegas revenues.

Later years

In his later years, Lansky lived a low-profile, routine existence in Miami Beach, making life difficult for the Federal Bureau of Investigation (FBI). He dressed like the average grandfather, walked his dog every morning, and portrayed himself as a harmless retiree. Lansky’s associates usually met him in malls and other crowded locations. Lansky would change drivers, who chauffeured him around town to look for new pay phones almost every day. Lansky was so elusive that the FBI essentially gave up monitoring him by the mid-1970s.

Attempted escape to Israel and trial

In 1970, Lansky fled to Herzliya Pituah, Israel, to escape federal tax evasion charges. Although the Israeli Law of Return allows any Jew to settle in the State of Israel, it excludes those with criminal pasts. Two years after Lansky fled to Israel, Israeli authorities deported him back to the U.S. However, the government’s best shot at convicting Lansky was with the testimony of loan shark Vincent “Fat Vinnie” Teresa, an informant with little or no credibility. The jury was unreceptive and Lansky was acquitted in 1974.

Death

Lansky’s last years were spent quietly at his home in Miami Beach. He died of lung cancer on January 15, 1983, age 80, leaving behind a widow and three children.[8] On paper, Lansky was worth almost nothing. At the time, the FBI believed he left behind over $300 million in hidden bank accounts, but they never found any money.

However, his biographer Robert Lacey describes Lansky’s financially strained circumstances in the last two decades of his life and his inability to pay for health care for his relatives. For Lacey, there was no evidence “to sustain the notion of Lansky as king of all evil, the brains, the secret mover, the inspirer and controller of American organized crime.”[9] He concludes from evidence including interviews with the surviving members of the family that Lansky’s wealth and influence had been grossly exaggerated, and that it would be more accurate to think of him as an accountant for gangsters rather than a gangster himself. His granddaughter told author T.J. English that at his death in 1983, Lansky left only $37,000 in cash.[10] When asked in his later years what went wrong in Cuba, the gangster offered no excuses. “I crapped out,” he said. He would also tell people he had lost every single penny in Cuba. In all likelihood, it was only an excuse to keep the IRS off his back. According to Lansky’s daughter Sandra, he had transferred at least $15 million to his brother Jake due to his problems with the IRS. Lansky was known to keep money in other people’s names, but how much will likely never be known. Meyer Lansky was and continues to be a mystery.

In September 1982, Forbes listed him as one of the 400 wealthiest people in America. His net worth was estimated at $100 million.

 In popular culture

 In film

  • The character Hyman Roth, portrayed by Lee Strasberg, and certain aspects of the main character Michael Corleone from the film The Godfather Part II (1974), are based on Lansky. In fact, shortly after the premiere in 1974, Lansky phoned Strasberg and congratulated him on a good performance (Strasberg was nominated for an Oscar for his role), but added “You could’ve made me more sympathetic.” Roth’s statement to Michael Corleone that “We’re bigger than U.S. Steel” was actually a direct quote from Lansky, who said the same thing to his wife while watching a news story on the Cosa Nostra. The character Johnny Ola is similar to Lansky’s associate Vincent Alo. Additionally, the character Moe Greene, who was a friend of Roth’s, is modeled upon Bugsy Siegel.[11][12] The film reflects real life in that Lansky was denied the Right of Return to Israel and returned to the U.S. to face criminal charges, but fabricated details regarding Roth’s attempts to bribe Latin American dictators for entry to their countries, as well as Roth’s ultimate fate.
  • Maximilian “Max” Bercovicz, the gangster played by James Woods in Sergio Leone‘s opus Once Upon A Time In America was inspired by Meyer Lansky.[13]
  • Mark Rydell plays Lansky in the 1990 Sydney Pollack film Havana, starring Robert Redford.
  • The film Bugsy (1991), a biography of Bugsy Siegel, included Lansky as a major character, played by Ben Kingsley.
  • In the 1991 film Mobsters, he is played by the actor Patrick Dempsey.
  • In a 1999 movie biopic entitled Lansky, the dramatized role of Lansky is portrayed by Richard Dreyfuss.
  • Meyer Lansky is portrayed by Dustin Hoffman in the 2005 film The Lost City.

 In television

  • In the current (2010) series on HBO, Boardwalk Empire, Meyer Lansky is played by Anatol Yusef.
  • The 1981 NBC mini series, The Gangster Chronicles, the character of Michael Lasker, played by Brian Benben, was based on Lansky. Because Lansky was still living at the time, the producers derived the “Michael Lasker” name for the character to avoid legal complications.
  • A 1999 made-for-TV movie called Lansky was released starring Richard Dreyfuss as Lansky, Eric Roberts as Bugsy Siegel, and Anthony LaPaglia as Lucky Luciano.
  • Manny Wiesbord, the mob chieftain played by Joseph Wiseman on Crime Story, was based on Lansky.
  • Lansky’s grandson, Meyer Lansky II, appeared in the “Jesse James vs. Al Capone” episode of Spike‘s Deadliest Warrior as a Capone expert, credited as “Mafioso Descendant.” The senior Lansky was briefly referenced during the episode.

 In literature

  • In the 2010 book of photographs “New York City Gangland”,[14] Meyer Lansky is seen “loitering” on Little Italy’s famed “Whiskey Curb” with partners Benjamin “Bugsy” Siegel, Vincent “Jimmy Blue Eyes” Alo, and waterfront racketeer Eddie McGrath.
  • In the 1996 novel The Plan, by Stephen J. Cannell, Lansky and fellow mobster Joseph Alo are involved in putting an anti-Racketeer Influenced and Corrupt Organizations Act presidential candidate into office.
  • In the 2009 theatrical adaption by Joseph Bologna “Lansky” is portrayed by Mike Burstyn in a one act play.
  • In the book Havana by Stephen Hunter, Lansky and Fidel Castro are both included as main characters.
  • In the 2009 novel If The Dead Rise Not by Philip Kerr the hero, Bernie Gunther, meets Lansky in Havana.
  • In the 2009 novel Ride of the Valkyries by Stuart Slade, Meyer Lansky is the President of Mafia run Cuba.
  • In the 2011 historical novel, “The Devil Himself” by Eric Dezenhall, Meyer Lansky coordinates counterespionage operations with the U.S. Navy to prevent Nazi sabotage in New York and help plan the invasion of Sicily.
  • He portrays himself in Harold Robbins 1995 follow-up to The Carpetbaggers, The Raiders.

In music

  • In his 2007 song “Party Life,” Jay-Z raps, “So tall and Lanky / My suit, it should thank me / I make it look good to be this hood Meyer Lansky.”
  • Raekwon, a member of the Wu-tang Clan referred to himself as “rap’s Meyer Lansky” in his song “Glaciers of Ice,” a single on his classic 1995 release “Only Built 4 Cuban Linx…
  • A member of the rap group Wu-Syndicate uses Myalansky as his stage name, referring to Meyer Lansky.
  • In the 2010 mixtape “Albert Anastasia” by Rick Ross refers to Meyer Lansky in his song White Sand Pt.II: “I put the team together like I’m Meyer Lansky.”
  • On Obie Trice’s “Outro” off the Cheers album Proof raps, ” Know much about Meyer Lansky? / Don’t tustle with my hand speed / Clutch your burner, bust it and watch your man bleed.”
  • In 2011 50 Cent’s Run Up On Me Freestyle raps, “Got a fetish for the guns Calico drums / Rap Meyer Lansky steady counting my ones”

TOP-SECRET – LIST OF MEMBERS OF THE INTELLIGENCE AND NATIONAL SECURITY ALLIANCE

Cryptome
13 September 2011
Members of the Intelligence and National Security Alliance
INSA Home
“INSA is the premier not-for-profit, nonpartisan, private sector professional organization providing a structure and interactive forum for thought leadership, the sharing of ideas, and networking within the intelligence and national security communities. INSA has over 150 corporate members, as well as several hundred individual members, who are industry leaders within the government, private sector, and academia.” Includes ex-directors of spy agencies and current spies, ex-White House national security staff, members and ex-members of Congress and their staff, senior military officers, senior corporate personnel and other notables. The list is not in full alphabetic order. 95 members use an nsa.gov e-mail address. RFTYGAR@NSA.GOV (Major General David B. Lacquement, Cybercom) dfmuzzy@nsa.gov or dbmuzzy@nsa.gov algorin@nsa.gov bkind@nsa.gov bmcrumm@nsa.gov bmkaspa@nsa.gov bmstite@nsa.gov ceander@nsa.gov dabonan@nsa.gov dahatch@nsa.gov daplunk@nsa.gov dbbuie@nsa.gov dcover@nsa.gov dpcargo@nsa.gov dpmatth@nsa.gov drennis@nsa.gov dvheinb@nsa.gov eejorda@nsa.gov elbauma@nsa.gov fdbedar@nsa.gov fjfleis@nsa.gov fjorlos@nsa.gov gafrisv@nsa.gov gcnolte@nsa.gov gdbartk@nsa.gov ghevens@nsa.gov grcotte@nsa.gov hadavis@nsa.gov hlriley@nsa.gov jaemmel@nsa.gov jcingli@nsa.gov jcmorti@nsa.gov jcsmart@nsa.gov jdcohen@nsa.gov jdheath@nsa.gov jewhite@nsa.gov jgrusse@nsa.gov jhdoody@nsa.gov jhohara@nsa.gov jimathe@nsa.gov jjbrand@nsa.gov jksilk@nsa.gov jllusby@nsa.gov jmcusic@nsa.gov jmjohns@nsa.gov jrsmith@nsa.gov jswalsm@nsa.gov jtnader@nsa.gov kamille@nsa.gov kbalex2@nsa.gov labaer@nsa.gov landers@nsa.gov lfgiles@nsa.gov lkensor@nsa.gov lphall@nsa.gov lrstanl@nsa.gov ltdunno@nsa.gov mabeatt@nsa.gov mawirt@nsa.gov mgflemi@nsa.gov mjgood@nsa.gov mkmcnam@nsa.gov mrevans@nsa.gov mrredgr@nsa.gov mthorto@nsa.gov nasmith@nsa.gov pacabra@nsa.gov papitte@nsa.gov plihnat@nsa.gov plporte@nsa.gov rdjones@nsa.gov rdsiers@nsa.gov relewis@nsa.gov resunda@nsa.gov rhkrysi@nsa.gov rlcarte@nsa.gov rlmeyer@nsa.gov rmmeyer@nsa.gov rpkelly@nsa.gov sfdishe@nsa.gov sfdonne@nsa.gov sgmille@nsa.gov sjmille@nsa.gov sstanar@nsa.gov swramsa@nsa.gov taedwar@nsa.gov tdsoule@nsa.gov tjpeter@nsa.gov twsager@nsa.gov vacurti@nsa.gov vnhalli@nsa.gov wjmarsh@nsa.gov wmmurph@nsa.gov wmthomp@nsa.gov wjseman@nsa.gov Mr. John Allison Chief Human Capital Officer DIA Building 6000 Washington , DC 20340-5100 Phone: (none) Fax: (none) Email: John.Allison@dia.mil _____________________________________________________ Mr. Brady Alsaker 10357 Windstream Dr. Columbia , MD 21044 Phone: (none) Fax: (none) Email: bradyalsaker@gmail.com _____________________________________________________ Mr. Charles Alsup B.S., M.S. VP of Policy INSA 901 North Stuart Steet Suite 205 Arlington , VA 22203 Phone: (703) 509-6405 Fax: (703) 224-4681 Email: calsup@insaonline.org _____________________________________________________ Mr. Laurence M Altenburg II 4501 N Fairfax Dr, 8th Floor Arlington , VA 22301 Phone: (none) Fax: (none) Email: larry.altenburg@gartner.com _____________________________________________________ Matthew Altomare 521 Abbotts Landing Circle #K Fayetteville , NC 28314 Phone: (none) Fax: (none) Email: mma32@cornell.edu _____________________________________________________ Mr. Joseph Amato 100 Severn Avenue #508 Annapolis , MD 21403 Phone: (none) Fax: (none) _____________________________________________________ Mr. Eric J Amberge Managing Director APG Technologies, LLC 116 Chimney Ridge Pl Sterling , VA 20165 Phone: (none) Fax: (none) Email: eric.amberge@apgtech.com _____________________________________________________ Richard F Ambrose Vice President IS&GS Security Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: richard.f.ambrose@lmco.com _____________________________________________________ Stephanie Ambrose VP Global Services Unit Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Mr. Rob Amos Account Manager Cisco Systems, Inc. 13635 Dulles Technology Drive Herndon , VA 20171 Phone: (none) Fax: (none) Email: roamos@cisco.com _____________________________________________________ Mr. William Amshey COO The Podmilsak Group One Fountain Square, 11911 Freed Suite 710 Reston , VA 20190 Phone: (none) Fax: (none) Email: wamsheyjr@cox.net _____________________________________________________ Ms. Cecilia Anastos 5 River Ridge Lane Fredericksburg , VA 22406 Phone: (none) Fax: (none) _____________________________________________________ Mr. Chris E Anderson Deputy SID NSA 9800 Savage Road Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: ceander@nsa.gov _____________________________________________________ Mr. Derrick Anderson 29 North Concord Gilbert , AZ 85234 Phone: (none) Fax: (none) Email: derrick.anderson@asu.edu _____________________________________________________ Jeffrey Anderson TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) _____________________________________________________ Lari Anderson VP, Strategic Development BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. Lonny Anderson Technology Directorate, CTO, CIO NSA 9800 Savage Road Suite 6473 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: landers@nsa.gov _____________________________________________________ dr rhonda l anderson phd senior advisor, s&t odni 1033 30th st nw washington , DC 20007 Phone: (850) 303-1912 Fax: (none) Email: rhonda.anderson@dni.gov _____________________________________________________ Roger Anderson VP Network Intelligence Division Applied Signal Technology 460 West California Avenue Sunnyvale , CA 94086 Phone: (none) Fax: (none) Email: roger_anderson@appsig.com _____________________________________________________ Mr. Wes Anderson General Manager Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: wesand@microsoft.com _____________________________________________________ Mark Andersson COO Applied Signal Technology 460 West California Avenue Sunnyvale , CA 94086 Phone: (none) Fax: (none) Email: MARK_ANDERSSON@appsig.com _____________________________________________________ Mr. Louis Andre Sr. Vice President, Intelligence CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: landre@caci.com _____________________________________________________ Erica Andren 41 Caerleon Ct Pikesville , MD 21208 Phone: (none) Fax: (none) Email: erica_andren@yahoo.com _____________________________________________________ Erica Andren Senior Manager BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: erica_andren@yahoo.com _____________________________________________________ Erica Andren Senior Manager BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: erica_andren@yahoo.com _____________________________________________________ Hugh K Bolton President & CEO The Advanced Technical Intelligence Center 2685 Hibiscus Way Suite 110 Beavercreek , OH 45431 Phone: (none) Fax: (937) 429-7602 Email: hbolton@atichcd.org _____________________________________________________ Ms. Deborah Bonanni Chief of Staff NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: dabonan@nsa.gov _____________________________________________________ Kit Bond Sen. Vice Chairman Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: courtney_ellis@bond.senate.gov _____________________________________________________ Steve Bond Strategic Planner Lockheed Martin Corporation-Washington Ops 230 Mall blvd King of Prussia , PA 19406 Phone: (none) Fax: (none) Email: steve.p.bond@lmco.com _____________________________________________________ Gus Bontzos Vice President ITT Corporation Lisa McGee 141 National Business parkway Suite 200 annapolis junction , MD 20701 Phone: (none) Fax: (none) Email: gus.bontzos@itt.com _____________________________________________________ Randy Bookout TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: r_bookout@ssci.senate.gov _____________________________________________________ Mr. James Boone 4905 Oakcrest Drive Fairfax , VA 22030 Phone: (none) Fax: (none) Email: jvboone@cox.net _____________________________________________________ Mr. Joseph Booth 43427 Circle Oaks Street Gonzales , LA 70737 Phone: (none) Fax: (none) Email: jbooth@dps.state.la.us _____________________________________________________ David Boren President, University of Oklahom EOP No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: davidlboren@ou.edu _____________________________________________________ Stanley Borgia Associate Director of Counterint Energy Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Ms. Rafael Borras Under Secretary for Management DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: lupe.morales@dhs.gov _____________________________________________________ Rafael Borras Undersecretary for Management DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rafael.borras@dhs.gov _____________________________________________________ Elizabeth Bosnak 2300 Clarendon Blvd, Suite 800 Arlington , VA 22201 Phone: (none) Fax: (none) _____________________________________________________ Eric J Boswell Diplomatic Security State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: boswellej@state.gov _____________________________________________________ Mr. David Bottom TITLE TBD NGA 1206 Weatherstone Court Reston , VA 20194 Phone: (none) Fax: (none) Email: bottomd@nga.mil _____________________________________________________ Mr. Michael Bouchard 2345 Crystal Drive suite 525 Crystal City , VA 22202 Phone: (none) Fax: (none) Email: Michael.Bouchard@eodt.com _____________________________________________________ Ms. Linda Bouland TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jllusby@nsa.gov _____________________________________________________ Joe Bowab Minority Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: joe_bowab@armed-services.senate.gov _____________________________________________________ Ms. Sheryl Bowanko 13401 Trey Lane Clifton , VA 20124 Phone: (none) Fax: (none) _____________________________________________________ SHERYL BOWANKO VP SAIC 11251 ROGER BACON DRIVE RESTON , VA 20190 Phone: (unlisted) Fax: (703) 318-4612 Email: sheryl.bowanko@saic.com _____________________________________________________ Raymond C Bowen III Chairman/Co-Founder Exceptional Software Strategies Inc 849 International Drive Suite 310 Linthicum , MD 21090 Phone: (none) Fax: (none) Email: raymond.bowen@exceptionalsoftware.com _____________________________________________________ William Bowman 7930 Jones Branch Road 5th Floor McLean , VA 22102 Phone: (none) Fax: (none) Email: wbowman@adobe.com _____________________________________________________ John Boyarski 208 Wakefield Drive Locust Grove , VA 22508 Phone: (none) Fax: (none) Email: john.boyarski@us.army.mil _____________________________________________________ John Boyarski Major DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.boyarski@us.army.mil _____________________________________________________ Mr. James T Boyd BS, MS Senior Program Manager KMS Solutions, LLC 205 S. Whiting Street Suite 400 Alexandria , VA 22304 Phone: (none) Fax: (703) 370-6946 Email: jtboyd@kmssol.com _____________________________________________________ Mrs. Jane A Boyd Lockheed Martin SSC Mailstop: 1102 P O Box 179 Denver , CO 80201 Phone: (540) 710-5837 Fax: (303) 971-3666 Email: jane.boyd@lmco.com _____________________________________________________ Judith Boyd Dep. AGC for Intelligence DHS Office of the General Counsel 66 15th St. NE Washington , DC 20002 Phone: (none) Fax: (none) Email: jkboyd08@gmail.com _____________________________________________________ Phillip L Boyd Fellow, Special Programs Cubic Defense Applications, Inc. 9333 Balboa Ave San Diego , CA 92123 Phone: (none) Fax: (none) Email: phil.boyd@cubic.com _____________________________________________________ Brooke Boyer TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: brooke.boyer@mail.house.gov _____________________________________________________ Daniel Boyle Business Development Representat SAS Institute 1530 Wilson Blvd Suite 800 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Col. Ed Boyle USAF (Ret. TITLE TBD Kforce Government Solutions 2750 Prosperity Ave. Suite 300 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: eboyle@dnovus.com _____________________________________________________ Mr. Joseph Bozzay 18876 Loudoun Orchard Road Leesburg , VA 20175 Phone: (none) Fax: (none) _____________________________________________________ Ms. Dyann R Bradbury Associate Director of Compliance Digital River 5300 Leighton Avenue Lincoln , NE 68504 Phone: (none) Fax: (none) Email: dbradbury@digitalriver.com _____________________________________________________ Ms. Gail Bradley Account Executive Dell Inc. One Dell Way One Dell Way Round Rock , TX 78682 Phone: (none) Fax: (none) Email: gail_bradley@dell.com _____________________________________________________ Patricia Bradshaw 11925 Parkland Court Fairfax , VA 22033 Phone: (none) Fax: (none) Email: pbradshaw1@cox.net _____________________________________________________ Mr. Tom Brady TITLE TBD Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: tom.brady@hp.com _____________________________________________________ Tom Brady Business Development Executive Hewlett Packard Company 616 Silverstone Court Silver Spring , MD 20905 Phone: (none) Fax: (none) Email: lizette.a.grady@hp.com _____________________________________________________ John Bramer Director of Program Development Software Engineering Institute, CMU NRECA Building Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Adrienne Brand Senior Consultant Booz Allen Hamilton 13200 Woodland Park Road Herndon , VA 20171 Phone: (none) Fax: (none) Email: brand_adrienne@bah.com _____________________________________________________ Mr. Joseph J Brand TITLE TBD NSA 9800 Savage Road S02, Suite 6425 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: jjbrand@nsa.gov _____________________________________________________ Robert Brandon Program Area Manager Boeing 7700 Boston Blvd Springfield , VA 22153 Phone: (none) Fax: (none) Email: Robert.w.Brandon@Boeing.com _____________________________________________________ Scott Brasfield Business Development Parsons 100 M Street SE Washington , DC 20003 Phone: (none) Fax: (none) Email: scott.brasfield@parsons.com _____________________________________________________ Dr. Sherri N Braxton-Lieber Director, NCR Programs Cubic Applications, Inc. Sherri Braxton-Lieber 12224 Summer Sky Path Clarksville , MD 21029 Phone: (none) Fax: (none) Email: sherri.braxton-lieber@cubic.com _____________________________________________________ Michael Bredimus Engineering Fellow, Special Prog Cubic Defense Applications, Inc. 9333 Balboa Ave San Diego , CA 92123 Phone: (none) Fax: (none) Email: mike.bredimus@cubic.com _____________________________________________________ Mr. Richard Breeden Executive Director ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) Email: richard.breeden@mantech.com _____________________________________________________ Chad Breese 21412 Alum Creek Ct Ashburn , VA 20147 Phone: (none) Fax: (none) Email: chad.breese@gmail.com _____________________________________________________ Mr. Chris J Brehany 13020 Feldspar Court Clifton , VA 20124-0951 Phone: (703) 818-7272 Fax: (none) Email: brehany@geointsolutions.com _____________________________________________________ Mr. Peter Breier Vice President CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: pbreier@caci.com _____________________________________________________ Mr. Robert B Bremmer Practice Manager EMC Corporation Bob Bremmer 653 MacBeth Drive Pittsburgh , PA 15235 Phone: (none) Fax: (412) 798-3774 Email: robert.bremmer@emc.com _____________________________________________________ Mr. Mark Brender 21700 Atlantic Boulevard Dulles , VA 20166 Phone: (none) Fax: (none) Email: brender.mark@geoeye.com _____________________________________________________ Donald Thomas Executive Director Ernst & Young 8484 Westpark Drive McLean , VA 22102 Phone: (none) Fax: (none) Email: donald.thomas@ey.com _____________________________________________________ Donna Thomas Principal Astrachan, Gunst & Thomas, P.C. 217 East Redwood Street 21st Floor Baltimore , MD 21202 Phone: (none) Fax: (none) Email: dthomas@agtlawyers.com _____________________________________________________ Donna Thomas TITLE TBD Astrachan, Gunst & Thomas, P.C. 217 East Redwood Street 21st Floor Baltimore , MD 21202 Phone: (none) Fax: (none) Email: dthomas@agtlawyers.com _____________________________________________________ Mr. Jason Thomas Senior Analyst TRSS, LLC 1410 Spring Hill Rd Suite 140 McLean , VA 22102 Phone: (none) Fax: (none) Email: jason.thomas@trssllc.com _____________________________________________________ Mr. John Thomas Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Thomas_John@bah.com _____________________________________________________ John Thomas SVP, General Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: john.d.thomas@saic.com _____________________________________________________ Marcus C Thomas Operational Technology Division FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: marcus.thomas@ic.fbi.gov _____________________________________________________ Mike Thomas TITLE TBD Booz Allen Hamilton 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: Thomas_Mike@bah.com _____________________________________________________ Mr. Paul Thomas VP - Defense Operations Wyle Information Systems 1600 Intenational Dr Suite 800 McLean , VA 22102 Phone: (none) Fax: (none) Email: paul.thomas@wyle.com _____________________________________________________ Ms. Ria Thomas 6903 K Victoria Dr. Alexandria , VA 22310 Phone: (none) Fax: (none) Email: rthomas@fabiani-co.com _____________________________________________________ Ria Thomas Defense/Security Fabiani & Company 1101 Pennsylvania Ave., NW Washington , DC 20004 Phone: (none) Fax: (none) Email: rthomas@fabiani-co.com _____________________________________________________ Kevin Thompkins Vice President of Bus. Ops. Engineering Systems Consultants, Inc. 8201 Corporate Drive Suite 1105 Landover , MD 20785-2230 Phone: (none) Fax: (none) _____________________________________________________ Bennie G Thompson Chair, Committee on Homeland Sec Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: andrea.lee@mail.house.gov _____________________________________________________ Gregory Thompson 950 25th St. NW Washington , DC 20037 Phone: (none) Fax: (none) Email: thompson.g@gmail.com _____________________________________________________ Jennifer Thompson Sr. Marketing Communications Spe L-3 Communications, Inc. 11955 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Kimberly A Thompson Director, Office of Corporate Co NGA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kimberly.thompson@nga.mil _____________________________________________________ Ms. Leigh Thompson TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Leigh.Thompson@gd-ais.com _____________________________________________________ Ms. Monica Thompson 3011 Colonial Springs Court Alexandria , VA 22306 Phone: (none) Fax: (none) Email: monica@prointelservices.net _____________________________________________________ Robert D Thompson Jr. State / Division of Levee Distri 505 District Dr. Monroe , LA 71202 Phone: (none) Fax: (none) Email: ldpolice1@bellsouth.net _____________________________________________________ Mr. William Thompson 8329 North Mopac Expressway Austin , TX 78759 Phone: (none) Fax: (none) Email: wmthompson@signaturescience.com _____________________________________________________ Mr. William M Thompson TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: wmthomp@nsa.gov _____________________________________________________ Mr. Robert Thomson 460 Spring Park Place Suite 1000 Herndon , VA 20170 Phone: (none) Fax: (none) Email: rthomson@terremark.com _____________________________________________________ Mr. John Tierney Vice President, Business Develop L-3 Communications/Com.Sys.East 1 Federal Street A&E-2C Camden , NJ 8103 Phone: (none) Fax: (none) Email: John.Tierney@L-3Com.com _____________________________________________________ Mr. Chris Tillery TITLE TBD USIS 7799 Leesburg Pike Suite 400 S Falls Church , VA 22043 Phone: (none) Fax: (none) Email: chris.tillery@usis.com _____________________________________________________ Mr. Michael Tillison Security Director Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: michael.tillison@hp.com _____________________________________________________ Edward A Timmes SVP, Deputy General Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: edward.a.timmes.jr@saic.com _____________________________________________________ Nils G Tolling TITLE TBD CTSS - Corporate and Transport Security Solutions 9007 West Shorewood Suite 529 Mercer Island , WA 98040 Phone: (none) Fax: (none) Email: nils@ctssgroup.com _____________________________________________________ Dr. David Tolliver 4648 Star Flower Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: DETolliver@verizon.net _____________________________________________________ Judy Tolliver 4648 Star Flower Dr Chantilly , VA 20151 Phone: (none) Fax: (none) Email: jetolliver@verizon.net _____________________________________________________ Mr. Jack Tomarchio RETIRED DHS 4103 Meadow Lane Newtown Square , PA 19073 Phone: (none) Fax: (none) Email: john.Tomarchio@dhs.gov _____________________________________________________ Jack T Tomarchio Agoge Group, LLC 200 Eagle Road, Suite 308 Wayne , PA 19087 Phone: (none) Fax: (none) Email: jtt@agogegroup.com _____________________________________________________ Adm. Chris Tomney USCG Intelligence Coordinating Center DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: chris.tomney@dhs.gov _____________________________________________________ Kurt Tong Asst Sec Asia-Pacific State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: tongk@state.gov _____________________________________________________ Deputy Asst. Se John Torres Deputy Assistant Secretary, US I DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.torres@dhs.gov _____________________________________________________ Fran Townsend INSA Chairwoman of the Board MacAndrews & Forbes Holdings, Inc. 35 E. 62nd St. New York , NY 10065 Phone: (none) Fax: (none) _____________________________________________________ Ms. Stacy Trammell 11400 Glen Dale Ridge Road Glenn Dale , MD 20769 Phone: (none) Fax: (none) Email: stacy.trammell@zavda.com _____________________________________________________ Stacy Trammell President Zavda Technologies, LLC 9250 Bendix Road Suite 540 Columbia , MD 21045 Phone: (none) Fax: (240) 266-0597 Email: stacy.trammell@zavda.com _____________________________________________________ Stacy D Trammell Stacy D. Trammell 11400 Glen Dale Ridge Road Glenn Dale , MD 20769 Phone: (unlisted) Fax: (240) 266-0597 Email: stacy.trammell@zavda.com _____________________________________________________ Christopher T Trapp TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Jeffrey Trauberman Vice President The Boeing Company-Network & Space Systems 1200 Wilson Blvd. Arlington , VA 22209 Phone: (none) Fax: (none) Email: jeff.trauberman@boeing.com _____________________________________________________ Mr. Jeffrey Trauberman VP, Space, Intel & MDS The Boeing Company Jeffrey Trauberman The Boeing Company 1200 Wilson Blvd. Arlington , VA 22209 Phone: (none) Fax: (none) Email: jeff.trauberman@boeing.com _____________________________________________________ Mr. Jeffrey Trauberman Vice President The Boeing Company 1200 Wilson Blvd. Arlington , VA 22209 Phone: (none) Fax: (none) Email: jeff.traubeman@boeing.com _____________________________________________________ Jeffrey Trauberman Vice President The Boeing Company 1200 Wilson Blvd. Arlington , VA 22209 Phone: (none) Fax: (none) Email: jeff.trauberman@boeing.com _____________________________________________________ Stephen Traver 1007 Longworth House Office Buil Washington , DC 20515 Phone: (none) Fax: (none) _____________________________________________________ Mr. Paul Tremont Executive Vice President, Operat SRC, Inc 7502 Round Pond Road North Syracuse , NY 13212 Phone: (none) Fax: (none) Email: tremont@srcinc.com _____________________________________________________ Mr. Ronald J Trerotola Director RF Systems Engineering Cubic Defense Applications, Inc. 9333 Balboa Ave San Diego , CA 92123 Phone: (unlisted) Fax: (none) Email: ron.trerotola@cubic.com _____________________________________________________ Mr. Steven A Trevino 19192 Greystone Square Leesburg , VA 20176 Phone: (none) Fax: (none) Email: Steven.Trevino@Keane.com _____________________________________________________ Joseph Trindal Managing Director KeyPoint Government Solutions, Inc. 1750 Foxtrail Drive Loveland , CO 80538 Phone: (none) Fax: (none) Email: joseph.trindal@keypoint.us.com _____________________________________________________ Mr. Bruce Triner 6112 Nightshade Court Rockville , MD 20852 Phone: (none) Fax: (none) _____________________________________________________ Kate Troendle Vice President BlueStone Capital Partners 1600 Tysons Boulevard 8th Floor McLean , VA 22102 Phone: (none) Fax: (703) 852-4496 _____________________________________________________ John Brennan Assistant to the President for H NSC No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john_o._brennan@who.eop.gov _____________________________________________________ Mr. Michael Brennan Director, Policy and Analysis NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: michael.brennan@nro.mil _____________________________________________________ Nicholas Brethauer 655 Emerson St. NE Washington , DC 20017 Phone: (none) Fax: (none) Email: npbrethauer@uwalumni.com _____________________________________________________ Larry Brewer SVP, Government Relations DRS Technologies, Inc. 5 Sylvan Way Parsippany , NJ 7054 Phone: (none) Fax: (none) Email: lbrewer@drs-ds.com _____________________________________________________ Mr. Vincent Bridgeman 3834 Windom Pl NW Washington , DC 20016 Phone: (none) Fax: (none) _____________________________________________________ Diane Briggs TITLE TBD Harris Corporation P.O. Box 37 MS: 2-21D Melbourne , FL 32902 Phone: (none) Fax: (none) Email: dbriggs@harris.com _____________________________________________________ Ambassador Kenneth Brill TITLE TBD State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: BrillKC@state.gov _____________________________________________________ Esther Brimmer International Organization Affai State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: brimmere@state.gov _____________________________________________________ Rex Brinker TITLE TBD Software Engineering Institute, CMU No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rbrinker@sei.cmu.edu _____________________________________________________ Mr. Denny Brisley 1421 Jefferson Davis Highway Suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) Email: denny.brisley@gd-ais.com _____________________________________________________ Ms. Denny Brisley President and CEO The Brisley Group, LLC 3406 Gilden Drive Alexandria , VA 22305 Phone: (none) Fax: (none) Email: debrisley@comcast.net _____________________________________________________ Ms. Denny E Brisley Market Development Executive SAIC 11251 Roger Bacon Drive Reston , VA 20190 Phone: (none) Fax: (none) Email: brisleyd@saic.com _____________________________________________________ Bill Britton Vice President General Manager Cobham Analytic Solutions 5875 Trinity Parkway Suite 300 Centreville , VA 20120 Phone: (none) Fax: (none) _____________________________________________________ Sandra Broadnax Director, Small Business Program NGA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Sandra.L.Broadnax@nga.mil _____________________________________________________ Sandra Broadnax 12310 Sunrise Valley Drive Reston , VA 20191 Phone: (none) Fax: (none) Email: sandra.braodnax@waldenu.edu _____________________________________________________ Mr. Joseph Broadwater Senior Vice President, NSG QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: joe.broadwater@analex.com _____________________________________________________ Jon Brody VP of Marketing Tenable Network Security 7063 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) _____________________________________________________ Ms. Elizabeth Brooks TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Daniel Brophy 1421 Jefferson Davis Highway Suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) Email: Daniel.Brophy@gd-ais.com _____________________________________________________ Joseph Brosky 106 Shenkelview Drive Johnstown , PA 15905 Phone: (none) Fax: (none) Email: Joe.Brosky@usdoj.gov _____________________________________________________ Mr. Joseph F Brosky National Drug Intelligence Cente 319 Washington Street Johnstown , PA 15905 Phone: (none) Fax: (none) Email: Joe.Brosky@usdoj.gov _____________________________________________________ Fred Brott TITLE TBD Intec Billing, Inc. 301 North Perimeter Center Suite 200 Atlanta , GA 30346 Phone: (none) Fax: (none) Email: fred.brott@intecbilling.com _____________________________________________________ Mr. Frederick Brott President, CEO & Chairman Intec Billing, Inc. 301 North Perimeter Center Suite 200 Atlanta , GA 30346 Phone: (none) Fax: (none) Email: fred.brott@intecbilling.com _____________________________________________________ Brenda Brown Marketing Communications Operati TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) _____________________________________________________ Mr. Charles G Brown Chair, Antennas and Propogation NSA 9800 Savage Road D, Suite 6242 Fort George G. Meade , MD 20755 Phone: (none) Fax: (301) 688-7741 Email: cgbrown@ieee.org _____________________________________________________ Mr. Clay Brown TITLE TBD Northrop Grumman Geospatial Services 6910 Scenic Pointe Place Manassas , VA 20112 Phone: (none) Fax: (none) Email: cbrown@3001inc.com _____________________________________________________ Mr. Darrell Brown 45677 Paddington Station Terrace Sterling , VA 20166 Phone: (none) Fax: (none) Email: darrellpbrown@yahoo.com _____________________________________________________ David Brown 5155 Parkstone Drive Chantilly , VA 22102 Phone: (none) Fax: (none) Email: dave.brown@agilex.com _____________________________________________________ Frank H Brown TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Jason B Brown White House Cyber Security NSC No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jason_b._brown@who.eop.gov _____________________________________________________ Mr. Jerome A Brown Jr. MPA Defense Analyst U.S. Government Accountability Office 5602 Hogenhill Terrace Rockville , MD 20853 Phone: (none) Fax: (none) Email: jerome.a.brown@gmail.com _____________________________________________________ Dr. Kevin Brown Dr. Kevin L. Brown, CEO 7901 Jones Branch Drive Suite 610 Mclean , VA 22102 Phone: (none) Fax: (none) Email: kbrown@lorenzresearch.com _____________________________________________________ Dr. Kevin Brown TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: kevin.brown@nro.mil _____________________________________________________ Ms. La Tosca Brown BA Client Executive IBM 41342 Raspberry Drive Leesburg , VA 20176 Phone: (none) Fax: (none) Email: lbbrown@us.ibm.com _____________________________________________________ Lisa S Brown TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Admiral Michael Brown USN TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Michael A Brown Transport. Security Specialist Transportation Security Administration 601 S 12th Street TSA-13 Arlington , VA 205986013 Phone: (none) Fax: (none) Email: dadabrown@gmail.com _____________________________________________________ RADM Mike Brown Deputy Assistant Secretary for C DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Michael.Brown1@dhs.gov _____________________________________________________ Paul Brown Intelligence Analyst GTEC 20907 Sandstone Square Sterling , VA 20165 Phone: (none) Fax: (none) Email: paulbrowntx@gmail.com _____________________________________________________ Mr. Roger Brown 1517 N. Colonial Court Arlington , VA 22209 Phone: (none) Fax: (none) Email: brownrogera@mac.com _____________________________________________________ Mr. William C Brown CI Staff Office CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (703) 739-5504 Email: bbrown@caci.com _____________________________________________________ William E Brown Business Development Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: william.e.brown@saic.com _____________________________________________________ Ric E Browne Manager, Business Development General Dynamics General Dynamics 2721 Technology Drive Annapolis Junction , MD 20701 Phone: (none) Fax: (none) Email: ric.browne@gd-ais.com _____________________________________________________ Mr. Robert Browning Director, Intelligence Systems General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Robert.Browning@gd-ais.com _____________________________________________________ William Brucato 11 Cresent Court Sterling , VA 20164 Phone: (none) Fax: (none) Email: missionsupport1@aol.com _____________________________________________________ Mr. James Bruce 9513 Woody Lane Great Falls , VA 22066 Phone: (none) Fax: (none) Email: james_bruce@rand.org _____________________________________________________ Ms. Kellene Bruce Research Fellow LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) Email: kbruce@lmi.org _____________________________________________________ Mr. Ronald Bruce 10 South Beaumont Avenue Catonsville , MD 21228 Phone: (none) Fax: (none) Email: crbruce@verizon.net _____________________________________________________ Mr. Charles Brummund Vice President,General Manager, BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: charles.brummund@baesystems.com _____________________________________________________ Mr. Michael J Bruni Staffing Manager SAIC Michael Bruni 11251 Roger Bacon Drive Reston , VA 20190 Phone: (none) Fax: (703) 318-4595 Email: brunim@saic.com _____________________________________________________ Mrs. Jill Bruning Chief Operating Officer NJVC, LLC 8614 Westwood Center Drive Suite 300 Vienna , VA 22182 Phone: (none) Fax: (none) Email: jill.bruning@njvc.com _____________________________________________________ Bear Bryant Deputy Director of National Inte ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: robermb3@dni.gov _____________________________________________________ Mr. Steve Bryen President Finmeccanica Angelica Falchi 1625 I Street, NW 12th Floor Washington , DC 20006 Phone: (none) Fax: (none) Email: stephen.bryen@finmeccanica.com _____________________________________________________ Robert M Brzenchek Masters Emergency Planning Specialist Luzerne County EMA Robert Brzenchek Luzerne County EMA 185 Water Street Wilkes-Barre , PA 18702 Phone: (none) Fax: (none) Email: robert.brzenchek@luzernecounty.org _____________________________________________________ Zbigniew Brzezinski Center for CSIS Counselor and Trustee CSIS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: aschwartz@csis.org _____________________________________________________ Donna Bucella Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Michael Buchwald TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: m_buchwald@ssci.senate.gov _____________________________________________________ Mr. Brian Buck Chief Technology Officer River Glass Inc 6626 Stowe Ct Lisle , IL 60532 Phone: (none) Fax: (none) Email: bbuck@riverglassinc.com _____________________________________________________ Nick Buck President & CEO Buck Consulting Group, LLC 13111 Tingewood Ct Oak Hill , VA 20171 Phone: (none) Fax: (703) 391-7821 Email: nick@buckgroup.net _____________________________________________________ Mr. David Buckley Senior Manager Deloitte 1001 G St. N.W. Ste 900 Washington , DC 20001 Phone: (none) Fax: (none) Email: davidbuckley@deloitte.com _____________________________________________________ Mr. David Buckley Inspector General CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: buckdavid@verizon.net _____________________________________________________ Mr. David Buie TITLE TBD NSA 106 Flanagan Drive Taneytown , MD 21787 Phone: (none) Fax: (none) Email: dbbuie@nsa.gov _____________________________________________________ Steve Bull Director Analytic Services (ANSER) 2900 South Quincy S Suite 800 Arlington , VA 22206 Phone: (none) Fax: (none) Email: steve.bull@anser.org _____________________________________________________ Mr. Robert Bullett 11107 Sunset Hills Road Reston , VA 20190 Phone: (none) Fax: (none) Email: rbullett@us.ibm.com _____________________________________________________ Brian B Bullock Capture Manager General Dynamics IT, NDIS 13857 McLearen Drive Herndon , VA 20171 Phone: (none) Fax: (none) Email: brian.bullock@gdit.com _____________________________________________________ Brian B Bullock Capture Manager General Dynamics IT, NDIS 13857 McLearen Drive Herndon , VA 20171 Phone: (none) Fax: (703) 268-7886 Email: brian.bullock@gdit.com _____________________________________________________ Mr. Stephen Buonato PO Box 10882 Marina del Rey , CA 90295 Phone: (none) Fax: (none) Email: sbuonato@yahoo.com _____________________________________________________ Mr. Laurence Burgess Deputy Undersecretary for Collec DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: laurence.burgess@osd.mil _____________________________________________________ LTG Ron Burgess USA Director of the DIA DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Ronald.Burgess@dia.mil _____________________________________________________ Mr. John Burgoyne Vice President, ISR Sierra Nevada Corporation 444 Salomon Circle Sparks , NV 89434 Phone: (none) Fax: (none) Email: john.burgoyne@sncorp.com _____________________________________________________ Mr. A. Burks 950 Willow Valley Lakes Dr. #H311 Willow Street , PA 17584 Phone: (none) Fax: (none) Email: joanandroyburks@worldnet.att.net _____________________________________________________ Dr. James Burnett 7136 Avenida Altisima Rancho Palos Verdes , CA 90275 Phone: (none) Fax: (none) Email: rburnett@aol.com _____________________________________________________ Destiny Burns TITLE TBD General Dynamics AIS 10560 Arrowhead Drive Fairfax , VA 22030 Phone: (none) Fax: (none) _____________________________________________________ Kerri Burns TITLE TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ William J Burns Under Secretary Political Affair State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: burnswj@state.gov _____________________________________________________ Kyle C Burr B.A. Senior Consultant Booz Allen Hamilton 8283 Greensboro Dr. McLean , VA 22102 Phone: (none) Fax: (none) Email: kyle.burr@gmail.com _____________________________________________________ Tom Burrell 1400 Fountaingrove PKY MS: 3USW Santa Rosa , CA 95403 Phone: (none) Fax: (none) Email: tom_burrell@agilent.com _____________________________________________________ Lynda Burroughs TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) _____________________________________________________ Lynda Burroughs Business Development Manager ManTech International Corporation 2250 Corporate Park Drive Suite 500 Herndon , VA 22304 Phone: (none) Fax: (none) Email: lynda.burroughs _____________________________________________________ Lynda Burroughs 12015 Lee Jackson Highway Fairfax , VA 22033 Phone: (none) Fax: (none) Email: lynda.burroughs@mantech.com _____________________________________________________ Lynda Burroughs 2250 Corporate Park Drive Suite 500 Herndon , VA 20171 Phone: (none) Fax: (none) Email: Lynda.Burroughs@mantech.com _____________________________________________________ Mr. Peter Burrow 1616 Anderson Road Suite 109 McLean , VA 22102 Phone: (none) Fax: (none) Email: peter.burrow@xebecglobal.com _____________________________________________________ Captain Richard Burton USN TITLE TBD DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: j.burton@dhs.gov _____________________________________________________ Thomas J Burton Office of Inspector General NGA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: thomas.burton@nga.mil _____________________________________________________ Wes Bush Chief Executive Officer Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Dan Butler Assistant Deputy Director of Nat ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: daniel.s.butler@ugov.gov _____________________________________________________ Mr. Daniel Butler 12020 Quorn Lane Reston , VA 20191 Phone: (none) Fax: (none) Email: d.butler@dni.osis.gov _____________________________________________________ Mr. Gerry Butler General Manager Sierra Nevada Corporation 444 Salomon Circle Sparks , NV 89434 Phone: (none) Fax: (none) Email: gerry.butler@sncorp.com _____________________________________________________ Ms. Karen Butler 12020 Quorn Lane Reston , VA 20191 Phone: (none) Fax: (none) Email: butlerkc@comcast.net _____________________________________________________ Mr. Robert Butler 2355 Dulles Corner Blvd. Suite 525 Herndon , VA 20171 Phone: (none) Fax: (none) Email: robert.butler@sap.com _____________________________________________________ Robert Butler Deputy Assistant Secretary for C DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Robert.butler@osd.mil _____________________________________________________ Mr. Garrett Butulis 2845 Calliness Way Wake Forest , NC 27587 Phone: (none) Fax: (none) Email: garrett@butulis.com _____________________________________________________ Mr. Jim Byers Director, Security Services Ensco, Inc. 5400 Port Royal Road Springfield , VA 22151 Phone: (none) Fax: (none) Email: byers.james@ensco.com _____________________________________________________ Ms. Mary Kay Byers Chief Human Capital Officer NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: marykay.byers@nro.mil _____________________________________________________ Shala A Byers Analyst Department of Homeland Security 2715 Cortland Place Apt 32 Washington , DC 20008 Phone: (none) Fax: (none) Email: shala.byers@gmail.com _____________________________________________________ Nicole Byler BA 1201 Colombo Ave Apt 10206 Sierra Vista , AZ 85635 Phone: (none) Fax: (none) Email: nicole.byler@us.army.mil _____________________________________________________ Robert Campbell 10160 Technology Blvd East Dallas , TX 75220 Phone: (none) Fax: (none) Email: robert.p.campbell@usdoj.gov _____________________________________________________ Mr. Tim Campen 8260 Willow Oaks Drive Rm 3024 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: campta3435@gmail.com _____________________________________________________ Elizabeth Camphouse 2342 Ballard Way Ellicott City , MD 21042 Phone: (none) Fax: (none) Email: elizabeth.camphouse@entegrasystems.com _____________________________________________________ Roel Campos PIAB Member PIAB No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Wendy_A._Loehrs@pfiab.eop.gov _____________________________________________________ Peggy Canale Government Segment Manager Avocent 2805 Ridge Road Drive Alexandria , VA 22302 Phone: (none) Fax: (none) Email: peggy.canale@emerson.com _____________________________________________________ Mr. Frank Cantarelli TITLE TBD Ciena Corporation 1185 Sanctuary Parkway Suite 300 Alpharetta , GA 30004 Phone: (none) Fax: (none) Email: fcantare@ciena.com _____________________________________________________ Eric Cantor Rep. House Minority Whip Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: cantorschedule@mail.house.gov _____________________________________________________ Mr. Richard Capitan Vice President - Business Dev Parsons 100 M St, SE Washington , DC 20003 Phone: (none) Fax: (none) Email: richard.capitan@parsons.com _____________________________________________________ Philip Caplan Consultant URS Federal Services, Inc. URS Federal Services, Inc. 9755 Patuxent Woods Dr. Suite 300 Columbia , MD 21046 Phone: (none) Fax: (410) 423-2570 Email: philip.caplan@urs.com _____________________________________________________ Paul Capozzola 2300 Corporate Park Drive Suite 110 Herndon , VA 20171 Phone: (703) 391-1944 Fax: (703) 674-0256 Email: pcapozzola@signaturegs.com _____________________________________________________ Paul Capozzola Director Cyber Security Signature Government Solutions Paul Capozzola 2300 Corporate Park Drive Suite 110 Herndon , VA 20171 Phone: (none) Fax: (none) Email: pcapozzola@signaturegs.com _____________________________________________________ Connie Cappadona Strategic Program Manager Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) _____________________________________________________ Connie Cappadona Strategic Program Manager Hewlett Packard Federal Strategic Programs Group 6600 Rockledge drive Bethesda , MD 20817 Phone: (none) Fax: (none) Email: connie.cappadona@hp.com _____________________________________________________ Connie Cappadona Strategic Programs Manager Hewlett-Packard 11391 Fox Vale Glen CT Oakton , VA 22124 Phone: (none) Fax: (none) Email: connie.cappadona@hp.com _____________________________________________________ Mike L Capps TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Valerie Caproni OGC FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: valerie.caproni@ic.fbi.gov _____________________________________________________ Ann Caracristi Required unless Parent Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Ms. Ann Carbonell 5819 Appleford Drive Alexandria , VA 22315-5625 Phone: (none) Fax: (none) Email: adoublen@aol.com _____________________________________________________ Dr. Ann M Carbonell PhD. NGA Source Technical Executive NGA 5819 Appleford Dr. Alexandria , VA 22315 Phone: (none) Fax: (none) Email: Ann.M.Carbonell@nga.mil _____________________________________________________ Dr. Ann M Carbonella LIDAR Program Manager NGA 5819 Appleford Drive Alexandria , VA 22315-5625 Phone: (none) Fax: (none) Email: carbonellaa@nima.mil _____________________________________________________ Mr. Robert Cardillo Deputy Director of Analysis DIA 7711 Cashland Court Alexandria , VA 22315 Phone: (none) Fax: (none) Email: Robert.Cardillo@dia.mil _____________________________________________________ Dr. David P Cargo TITLE TBD NSA 9800 Savage Road R1, Suite 6515 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: dpcargo@nsa.gov _____________________________________________________ John Carlin Chief of Staff and Senior Counse FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.carlin@ic.fbi.gov _____________________________________________________ Mr. Bruce Carlson Director NRO No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: bruce.carlson@nro.mil _____________________________________________________ Mr. Johan Carlson 7483 Argyll Court Warrenton , VA 20187 Phone: (none) Fax: (none) Email: hans@stratspace.net _____________________________________________________ Don Carmichael Director, BD Wyle Information Systems 1600 Intenational Dr Suite 800 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. Donald Carney TITLE TBD Perkins Coie 11703 Charen Lane Potomac , MD 20854 Phone: (none) Fax: (none) Email: dcarney@perkinscoie.com _____________________________________________________ Adelbert W Carpenter VP Business Development L-3 Communications 1215 S. Clark St Suite 1205 Arlington , VA 22202 Phone: (none) Fax: (703) 412-7198 Email: Buz.carpenter@L-3com.com _____________________________________________________ Mike Carpenter Senior Vice President McAfee, Inc. 12010 Sunset Hills Road 5th Floor Reston , VA 20190 Phone: (none) Fax: (none) Email: michael_carpenter@mcafee.com _____________________________________________________ Mr. David Carr TITLE TBD CISCO 12516 Nathaniel Oaks Drive Oak Hill , VA 20171 Phone: (none) Fax: (none) Email: dkcarr50@cisco.com _____________________________________________________ Mr. Michael D Carr NCE Director, Mission Systems Tr NGA 4600 Sangamore Road, MS D-085 Bethesda , MD 20816-5003 Phone: (none) Fax: (301) 227-6040 Email: carrmd@nga.mil _____________________________________________________ Robert Carr TITLE TBD DIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: robert.carr@dia.mil _____________________________________________________ Shawn Carrolo TITLE TBD Qwest Communications 4250 N. Fairfax Dr. 5th Floor Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Eric Carson 1431 Harvey Avenue Severn , MD 21144 Phone: (none) Fax: (none) Email: eric.carson@hotmail.com _____________________________________________________ Johnnie Carson Asst Secretary African Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: carsonj@state.gov _____________________________________________________ Mr. Michael Carta IC Account Manager., APG Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: michael.carta@hp.com _____________________________________________________ Mr. Mike Carta Account Executive Dell Inc. One Dell Way One Dell Way Round Rock , TX 78682 Phone: (none) Fax: (none) Email: michael_carta@dell.com _____________________________________________________ Dr. Ashton Carter Under Secretary Defense AT&L DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ashton.carter@osd.mil _____________________________________________________ Ms. Denise Carter Competition Advocate DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Denise.Carter@dia.mil _____________________________________________________ Gail Carter INSA OCI Task Force Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) _____________________________________________________ Mr. Roger Carter 7526 Cherry Tree Drive Fulton , MD 20759 Phone: (none) Fax: (none) Email: rlcarter@quantum-intl.com _____________________________________________________ Mr. Roger L Carter TITLE TBD NSA 9800 Savage Road DC5, Suite 6217 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: rlcarte@nsa.gov _____________________________________________________ Gen James Cartwright Vice Chairman DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: molly.denham@js.pentagon.mil _____________________________________________________ Alana Casanova Masters Public Affairs DISA Alana Casanova/SPI 6910 Cooper Ave Fort Meade , MD 20755 Phone: (none) Fax: (none) Email: alana.casanova@disa.mil _____________________________________________________ Mr. John P Casciano P. O. Box 231552 Centreville, VA , VA 20120 Phone: (none) Fax: (none) Email: garystar@aol.com _____________________________________________________ Ms. Susan Case Vice Presi Vice President National Security American Systems 13990 Parkeast Circle Chantilly , VA 20151 Phone: (none) Fax: (none) Email: Susan.Case@AmericanSystems.com _____________________________________________________ Mr. Ed Casey Chief Executive Officer Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 Email: Ed.Casey@serco-na.com _____________________________________________________ Ms. Angie Cash TITLE TBD Dell Inc. One Dell Way One Dell Way Round Rock , TX 78682 Phone: (none) Fax: (none) _____________________________________________________ Mike Castelli Counsel ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: boz.cas@verizon.net _____________________________________________________ Mr. David Castro Public Sector Sales Representati Quest Software - Public Sector Group 700 King Farm Boulevard Suite 250 Rockville , MD 20850 Phone: (none) Fax: (none) Email: davidacastro@gmail.com _____________________________________________________ Ms. Lorraine Castro 11487 Sunset Hills Road Reston , VA 20190 Phone: (none) Fax: (none) Email: lorraineCNJ@aol.com _____________________________________________________ Tonia Cates TITLE TBD DIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: tonia.cates@dia.mil _____________________________________________________ Mr. Greg Catherine TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Greg.Catherine@gd-ais.com _____________________________________________________ Ms. Nelson Cathie 6923 Kettle Mar Dr. Houston , TX 77084 Phone: (none) Fax: (none) Email: nelson@fbnt-inc.com _____________________________________________________ Mr. Daniel Catlaw TITLE TBD Booz Allen Hamilton 1201 South Barton Street #159 Arlington , VA 22204 Phone: (none) Fax: (none) Email: catlaw_daniel@bah.com _____________________________________________________ Mr. David Cattler 5970 Lyceum Lane Manassas , VA 20112 Phone: (none) Fax: (none) Email: cattler@earthlink.net _____________________________________________________ David Cattler Deputy National Intelligence Off ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: davidmc2@dni.gov _____________________________________________________ Mr. Richard Cauchon 85 Collamer Crossings E. Syracuse , NY 13057 Phone: (none) Fax: (none) Email: dickc@sensis.com _____________________________________________________ Marcella Cavallaro Federal Intelligence Sales Esri 380 New York St Redlands , CA 92373 Phone: (none) Fax: (none) Email: mcavallaro@esri.com _____________________________________________________ Marcella Cavallaro 8615 Westwood Center Dr Vienna , VA 22182 Phone: (none) Fax: (none) Email: mcavallaro@esri.com _____________________________________________________ Mr. James Cavanaugh 5643 Lightspun Lane Columbia , MD 21045 Phone: (410) 997-4709 Fax: (410) 740-1942 Email: jpcgolf1@verizon.net _____________________________________________________ Mr. William Cave 4001 Fairfax Drive Ste 300 Arlington , VA 22203 Phone: (none) Fax: (none) Email: william.l.cave@saic.com _____________________________________________________ Luis CdeBaca Ofc to Monitor & Combat Traffick State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: cdebacal@state.gov _____________________________________________________ Matt Cegelske Cyber Federal Executive Fellow U.S. Navy 4720 Forbes Avenue, CIC Rm 2310 Pittsburgh , PA 15213 Phone: (none) Fax: (none) Email: mcegelsk@yahoo.com _____________________________________________________ Michael Celentano 6564 Loisdale Court Springfield , VA 22150 Phone: (none) Fax: (none) _____________________________________________________ Michael Cerruti President & CEO Everest Technology Solutions Inc. 9990 Lee Highway Suite 501 Fairfax , VA 22030 Phone: (none) Fax: (none) Email: mcerruti@everest.nu _____________________________________________________ Michael J Cerruti TITLE TBD Everest Technology Solutions Inc. 9990 Lee Highway Suite 501 Fairfax , VA 22030 Phone: (none) Fax: (none) Email: mcerruti@everest.nu _____________________________________________________ Hector Cevallos Director CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) _____________________________________________________ Steve Chabinsky Dep Asst Director, FBI Cyber Div FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: stevenrc@dni.gov _____________________________________________________ Mr. Mark Chadason TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) _____________________________________________________ Mr. Patrick J Chagnon P.O. Box 152 Windsor , CT 6095 Phone: (none) Fax: (none) Email: pchagnon@bluelineinfo.com _____________________________________________________ Ms. Mary Chahalis 503 Garden View Way Rockville , MD 20850 Phone: (none) Fax: (none) Email: mchahali@us.ibm.com _____________________________________________________ Mary Chahalis Account Manager, Intel Terrago Technologies 1380 Park Garden Lane Reston , VA 20194 Phone: (none) Fax: (none) Email: marychahalis@gmail.com _____________________________________________________ stephanie chak FA Morgan Stanley 1850 k st nw suite 900 washington , DC 20006 Phone: (none) Fax: (none) Email: stephanie.chak@gmail.com _____________________________________________________ Mr. Dave Chamberlain Vice President, Integrated Custo Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: dchamberlai2@csc.com _____________________________________________________ Mr. Michael Chamberlin Director NJVC, LLC 8614 Westwood Center Drive Suite 300 Vienna , VA 22182 Phone: (none) Fax: (none) Email: michael.chamberlin@njvc.com _____________________________________________________ Regan Chambers 67 South Scribewood Circle The Woodlands , TX 77382 Phone: (none) Fax: (none) _____________________________________________________ Diane Chandler Director CACI International Inc. 4831 Walden Lane Lanham , MD 20706 Phone: (none) Fax: (none) Email: dchandler@caci.com _____________________________________________________ Kelly Chandler Recruiting Manager Cobham Analytic Solutions 1911 N Fort Myer Drive Suite 1100 Arlington , VA 22209 Phone: (none) Fax: (none) Email: kelly.chandler@cobham.com _____________________________________________________ Ms. Yvonne L Chaplin 3110 Fairview Park Drive falls church , VA 22042 Phone: (none) Fax: (none) Email: ychaplin@csc.com _____________________________________________________ Mr. David C Chapman VP, New Business Development Scientific Research Corporation 2300 Windy Ridge Parkway Suite 400 South Atlanta , GA 30339 Phone: (none) Fax: (none) Email: dchapman@scires.com _____________________________________________________ Eric Chapman TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: e_chapman@ssci.senate.gov _____________________________________________________ Ms. Tara Chapman 1700 Pennsylvania Avenue, NW Washington , DC 20006 Phone: (none) Fax: (none) Email: tdc@alumni.duke.edu _____________________________________________________ Jane P Chappell TITLE TBD Raytheon Company Jane P. Chappell 1200 S. Jupiter Road Garland , TX 75042 Phone: (972) 423-6129 Fax: (972) 205-6388 Email: jane_p_chappell@raytheon.com _____________________________________________________ Mr. Thomas Charles 8618 Westwood Center Drive #315 Vienna , VA 22182 Phone: (none) Fax: (none) Email: tcharles@sgis.com _____________________________________________________ Joe Charron TITLE TBD Kforce Government Solutions 2750 Prosperity Ave. Suite 300 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: jcharron@kforcegov.com _____________________________________________________ Timothy Chase 1919 N. Lynn Street Rosslyn , VA 22209 Phone: (none) Fax: (none) Email: tchase@deloitte.com _____________________________________________________ Mr. Harris J Chasen BS CTO F4W Harris Chasen 39 Skyline Dr. Ste. A1001 Lake Mary , FL 32746 Phone: (none) Fax: (407) 804-1030 Email: hchasen@f4winc.com _____________________________________________________ Charles Chassot 5678 Roundtree Drive Woodbridge , VA 22193 Phone: (none) Fax: (none) Email: chuck.chassot@gmail.com _____________________________________________________ Ms. Melissa Chaump 181 E. Reed Ave., #409 Alexandria , VA 22305 Phone: (none) Fax: (none) Email: melrae0607@gmail.com _____________________________________________________ Jim Chavez TITLE TBD Sandia National Laboratories P.O. Box 5800 Albuquerque , NM 87185 Phone: (505) 844-4485 Fax: (none) _____________________________________________________ Ms. L. Monica Chavez Vice President, Communications & General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Monica.Chavez@gd-ais.com _____________________________________________________ Ms Lucia M Chavez Director, Washington Operations General Dynamics 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: monica.chavez@gd-ais.com _____________________________________________________ Carson T Checketts 1709 19th St. NW #23 Washington , DC 20009 Phone: (none) Fax: (none) Email: c.checketts@mac.com _____________________________________________________ Gen. Peter W Chiarelli Vice Chief of Staff (4-star) DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Craig M Childress President Eagle Talon Solutions, Inc. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: cmchildress@eagletsi.com _____________________________________________________ Mr. Robert Chiralo Manager, Program Development SRI International 1100 Wilson Boulevard Suite 2800 Arlington , VA 22209 Phone: (none) Fax: (none) Email: chiralo@wdc.sri.com _____________________________________________________ Amy Choi 555 Massachusetts Ave NW Unit 808 Washington , DC 20001 Phone: (none) Fax: (none) Email: amy.choi@us.pwc.com _____________________________________________________ Min Chong 8381 Old Courthouse Rd Suite 330 Vienna , VA 22182 Phone: (none) Fax: (none) Email: min.chong@stopso.com _____________________________________________________ Aneesh Chopra Federal Chief Technology Officer EOP No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: aneesh_chopra@ostp.eop.gov _____________________________________________________ Mr. Duane Andrews CEO QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: dandrews@qinetiq-na.com _____________________________________________________ Mr. Edward Andron ACom ARM Property Manager BLDG Management Corp. 24 Perkiomen Avenue Staten Island , NY 10312 Phone: (718) 967-3617 Fax: (212) 557-6709 Email: eandron@bldg.com _____________________________________________________ Brad Antle CEO Salient Federal Solutions 4000 Legato Road Ste 510 Fairfax , VA 22033 Phone: (none) Fax: (none) Email: brad.antle@salientfed.com _____________________________________________________ Mr. Bradford Antle 12012 Sunset Hills Road Suite 800 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 Email: brad.antle@salientfed.com _____________________________________________________ Kathleen Appenrodt 2331 Cathedral Avenue NW Apt. 50 Washington DC , DC 20008 Phone: (none) Fax: (none) Email: Kathleen.Appenrodt@dhs.gov _____________________________________________________ Kathleen Appenrodt Federal Planner DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Kathleen.Appenrodt@dhs.gov _____________________________________________________ Mr. Roy Apseloff 117 S. Buchanan Street Arlington , VA 22204 Phone: (none) Fax: (none) Email: rapseloff@comcast.net _____________________________________________________ Mr. Roy Apseloff Director, National Media and Exp ODNI 117 S. Buchanan Street Arlington , VA 22204 Phone: (none) Fax: (none) Email: Roy.Apseloff@dia.mil _____________________________________________________ Ms. Ellen Ardrey Deputy Director, Human Capital O DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Ellen.Ardrey@dia.mil _____________________________________________________ Mr. James B Armor Jr. 7004 Veering Lane Burke , VA 22015 Phone: (none) Fax: (none) Email: james.armor@atk.com _____________________________________________________ Mr. Patrick Arnold CTO Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: patar@microsoft.com _____________________________________________________ Mr. Richard Arnold Director, Strategy & Business De General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Richard.Arnold@gd-ais.com _____________________________________________________ Steve Arnold 11717 Exploration Lane Germantown , MD 20876 Phone: (none) Fax: (none) Email: steven.arnold@hughes.com _____________________________________________________ Ms. Myra Aronson 1000 Technology Drive Pittsburgh , PA 15219 Phone: (none) Fax: (none) Email: myra.aronson@ansaldo-sts.us _____________________________________________________ Mr. Tony Arsene MBA, BAS, CEO Angelic Care Inc P.O. Box 253 Montclair , CA 91763 Phone: (909) 982-3866 Fax: (909) 982-3866 Email: guitaricon@gmail.com _____________________________________________________ Dean D Artigue TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Kenneth Asbury 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: ken.asbury@lmco.com _____________________________________________________ Robert Ashe Strategic Planner SYSTEMS TECHNOLOGIES 185 STATE HIGHWAY 36 WEST LONG BRANCH , NJ 7764 Phone: (none) Fax: (none) Email: rashe@systek.com _____________________________________________________ Sapana Asher Title TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Jeff Ashford Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jeff.ashford@mail.house.gov _____________________________________________________ Lindley Ashline GovWin.com Web Editor Deltek 13880 Dulles Corner Ln # 400 Herndon , VA 20171 Phone: (none) Fax: (none) Email: lindleyashline@deltek.com _____________________________________________________ Elizabeth Ashwell TITLE TBD Treasury Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: julie.herr@do.treas.gov _____________________________________________________ Sid Ashworth Minority Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: sid_ashworth@appro.senate.gov _____________________________________________________ Sid Ashworth VP, NGC Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Shay Assad Director of Defense Procurement DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: erin.porter@osd.mil _____________________________________________________ Bill Chow VP, Engineering and Operations Core180, Inc. 2751 Prosperity Drive Suite 200 Vienna , VA 22031 Phone: (none) Fax: (none) _____________________________________________________ Mahiyan Chowdhury Ex-MBA Substation Engineer Siemens Energy, Inc 900 E. Six Forks Rd 152 Raleigh , NC 27604 Phone: (none) Fax: (none) Email: mxc1700@hotmail.com _____________________________________________________ Dana Christiansen Federal Account Executive Gartner 4501 N. Fairfax Drive 8th Floor Arlington , VA 22203 Phone: (none) Fax: (none) Email: dana.christiansen@gartner.com _____________________________________________________ Ben Chu Strategic Planner Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: ben.1.chu@lmco.com _____________________________________________________ Ben Chu 1111 Lockheed Martin Way Sunnyvale , CA 94089 Phone: (none) Fax: (none) Email: ben.1.chu@lmco.com _____________________________________________________ Steven Chu Secretary Energy Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: the.secretary@hq.doe.gov _____________________________________________________ Mr. Leonardo Ciano 15 Sampson Rd Rochester , NH 3867 Phone: (none) Fax: (none) Email: leociano@yahoo.com _____________________________________________________ Mr. Kevin P Cichetti Associate Deput Director, Congre NGA 16424 Montecrest Lane Gaithersburg , MD 20878 Phone: (none) Fax: (none) Email: Kevin.P.Cichetti@nga.mil _____________________________________________________ Rick Cinquegrana Senior Manager Grant Thornton LLP 333 John Carlyle Street Suite 500 Alexandria , VA 22314 Phone: (none) Fax: (none) _____________________________________________________ James R Clapper Jr. Under Secretary of Defense for I DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: James.Clapper@dni.gov _____________________________________________________ Ms. Sharon Claridge 5353 Ashleigh Road Fairfax , VA 22030 Phone: (none) Fax: (none) Email: sclaridge@aol.com _____________________________________________________ Mr. Bill Clark TITLE TBD Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: william.clark@ca.com _____________________________________________________ Mr. David Clark Director of Collections DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: david.clark@osd.mil _____________________________________________________ Mr. Mark Clark TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Mark.Clark@gd-ais.com _____________________________________________________ Mrs. Mary Clark TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Ryan Clark Project Manager Computer Sciences Corporation 7231 Parkway Drive Hanover , MD 21076 Phone: (none) Fax: (none) Email: rclark52@csc.com _____________________________________________________ Mr. Timothy Clayton Director, Human Capital Manageme DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: timothy.clayton@osd.mil _____________________________________________________ Peter Clement Deputy Director of Intelligence CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1739 Email: peterc@cia.ic.gov _____________________________________________________ Denis Clements INSA Innovative Tech Council QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ John Clements 7808 boyce street ft meade , MD 20755 Phone: (none) Fax: (none) Email: john.e.clements@gmail.com _____________________________________________________ Melcena (Gary) Clemmons VP for Business Development SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: melcena.g.clemmons@saic.com _____________________________________________________ Ms. Gail Clifford TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: gclifford@potomacinstitute.org _____________________________________________________ Howard Clifford Chief Technologist - US Intel Hewlett-Packard Co 107 Sandgate Ct. Millersville , MD 21108 Phone: (none) Fax: (none) Email: howard.clifford@hp.com _____________________________________________________ Mr. Sean A Clifton 263 Clover Court Dublin , OH 43017 Phone: (none) Fax: (none) Email: sean.clifton@us.army.mil _____________________________________________________ Mr. T E Clifton III 1700 N. Moore St. Suite 2100 Arlington , VA 22209 Phone: (none) Fax: (none) Email: tip@eastportanalytics.com _____________________________________________________ Hillary Clinton Secretary State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ClintonHR@state.gov _____________________________________________________ Daniel L Cloyd National Secretary Brance, Direc FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: daniel.cloyd@ic.fbi.gov _____________________________________________________ Aaron Coats 2808 McKinney Ave. #501 Dallas , TX 75204 Phone: (none) Fax: (none) Email: acoats@smu.edu _____________________________________________________ Kyle Coble MSIT Cybersecurity Standards SPC DHS DHS - NCSD 245 Murray Lane Arlington , VA 20598 Phone: (none) Fax: (none) Email: kyle.coble@dhs.gov _____________________________________________________ Kevin Coby Vice President, Special Projects KeyW Corporation 1334 Ashton Road Hanover , MD 21076 Phone: (none) Fax: (none) Email: kcoby@keywcorp.com _____________________________________________________ Mr. Peter Coddington BA, MAS PO Box 128 Highland , MD 20777 Phone: (none) Fax: (none) Email: pcoddington@parabal.com _____________________________________________________ Michael Coe MA, BA Consultant Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: coe_michael_d@bah.com _____________________________________________________ Mr. Paul Cofoni Chief Executive Officer CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: pcofoni@caci.com _____________________________________________________ Shaw Cohe TITLE TBD ASI Government 1655 North Fort Meyer Drive Suite 1000 Arlington , VA 22209 Phone: (none) Fax: (none) Email: scohe@acqsolinc.com _____________________________________________________ Ms. Anita Cohen 6806 Wemberly Way McLean , VA 22101 Phone: (none) Fax: (none) Email: anitairene@aol.com _____________________________________________________ David S Cohen Assistant Secretary (Terrorist F Treasury Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: david.cohen@do.treas.gov _____________________________________________________ Dr. Jonathan Cohen TITLE TBD NSA 9800 Savage Road Suite 6513 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: jdcohen@nsa.gov _____________________________________________________ Linda Cohen TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: linda.cohen@mail.house.gov _____________________________________________________ Patricia A Cohen Research Staff Member Institute for Defense Analyses Intelligence Analyses Division 4850 Mark Center Drive Alexandria , VA 22312 Phone: (703) 642-2146 Fax: (none) Email: pcohen@ida.org _____________________________________________________ Harry Coker 9504 Silver Fox Turn Clinton , MD 20735-3045 Phone: (none) Fax: (none) Email: HarryCokerJr@msn.com _____________________________________________________ Harry Coker TITLE TBD CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1739 Email: harrycokerjr@msn.com _____________________________________________________ Gene Colabatistto TITLE TBD SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: gennaro.a.colabatistto@saic.com _____________________________________________________ Mr. Gus P Coldebella 3809 Alton Pl NW Washington , DC 20016 Phone: (none) Fax: (none) Email: coldebella@gmail.com _____________________________________________________ Dr. F. B Cole TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ltdunno@nsa.gov _____________________________________________________ Mr. Jerry Cole 8105 Middle Ct Austin , TX 78759 Phone: (none) Fax: (none) Email: jgcassoc@aol.com _____________________________________________________ John C Cole Director Blackstone Technology Group 4601 N. fairfax Dr Suite 1010 Arlington , VA 20169 Phone: (none) Fax: (none) Email: ccole@bstonetech.com _____________________________________________________ Richard Coleman 6066 Shingle Creek Parkway #18 Brooklyn Center , MN 55430 Phone: (none) Fax: (none) _____________________________________________________ Richard Coleman MA Chairman Cyber, Space & Intelligence Association 4305 Underwood Street University Park , MD 20782 Phone: (none) Fax: (none) Email: richcoleman1@gmail.com _____________________________________________________ Mr. Robert Coleman CEO Six3 Systems 1430 Spring Hill Road Suite 525 McLean , VA 22102 Phone: (none) Fax: (none) Email: rcoleman@six3systems.com _____________________________________________________ Marcus Collier Division Senior VP, Civilian and General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: marcus.collier@gd-ais.com _____________________________________________________ Mr. Matthew R Collier 5984-201 Jake Sears Circle Virginia Beach , VA 23464 Phone: (none) Fax: (none) Email: mattmit@regent.edu _____________________________________________________ Kelly Collins 12210 Glen Mill Rd. Potomac , MD 20854 Phone: (none) Fax: (none) Email: kelly.collins@hp.com _____________________________________________________ Dr. Nancy Walbridge Collins Columbia University International Affairs, 420 West New York , NY 10027 Phone: (none) Fax: (none) Email: nwcollins@columbia.edu _____________________________________________________ Felipe Colon Jr. Chief, IC CIO Policy ODNI - IC CIO 7708 Tiverton Drive Springfield , VA 22152 Phone: (none) Fax: (none) Email: felipe.colon@dni.gov _____________________________________________________ Rebecca Colon Senior Assistant 2 General Dynamics AIS 2721 Technology Drive Annapolis Junction , MD 20701 Phone: (none) Fax: (240) 294-2170 Email: rebecca.colon@gd-ais.com _____________________________________________________ Roy Combs TITLE TBD BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: roy.combs@baesystems.com _____________________________________________________ Ms. Kathleen S Comiskey MBA Senior Consultant Invertix Corporation 8201 Greensboro Drive Suite 800 McLean , VA 22102 Phone: (none) Fax: (none) Email: kcomiskey@invertix.com _____________________________________________________ BGen Joseph Composto USMC (Ret. Director, Security & Installatio NGA 4600 Sangamore Road, D-102 Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: joseph.composto@nga.mil _____________________________________________________ Melissa Cona 1651 Mount Eagle Pl Alexandria , VA 22302 Phone: (none) Fax: (none) Email: m.cona18@gmail.com _____________________________________________________ Erin Conaton Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: erin.conaton@mail.house.gov _____________________________________________________ Maggie Conde-Jimenez Executive Assistant ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) _____________________________________________________ Mr. Patrick Condo 1921 Gallows Road Ste 200 Vienna , VA 22182 Phone: (none) Fax: (none) Email: pcondo@convera.com _____________________________________________________ Ronald Conn Acquisition Mgmt Supervisor Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ David Connor Director Federal Sales Sourcefire 12709 Oxon Rd Oak Hill , VA 20171 Phone: (none) Fax: (none) Email: dconnor@sourcefire.com _____________________________________________________ Dee Connors TITLE TBD TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) Email: deeann.connors@tasc.com _____________________________________________________ Ms. DeeAnn Connors Director of Marketing Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: deeann.connors@ngc.com _____________________________________________________ Mr. David Conrad Architect-DHS & Intel Comm Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: dconrad@microsoft.com _____________________________________________________ Greg Conran Network Designs, Inc. 501 Church St. Suite 210 Vienna , VA 22180-4711 Phone: (none) Fax: (none) _____________________________________________________ Mr. Thomas Conroy Vice President, NSP Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: thomas.conroy@ngc.com _____________________________________________________ Kevin Considine Partner, Federal Consulting, CSC CSC (formerly Computer Sciences Corporation) 3110 Fairview Park Drive Fall Church , VA 22201 Phone: (none) Fax: (none) Email: kconsidine2@gmail.com _____________________________________________________ Tom Conway Director of Federal Business Dev McAfee, Inc. 12010 Sunset Hills Road 5th Floor Reston , VA 20190 Phone: (none) Fax: (none) Email: tom_conway@mcafee.com _____________________________________________________ RADM Cynthia Coogan Director, USCG Intelligence DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Cynthia.A.Coogan@uscg.mil _____________________________________________________ David Cook TITLE TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Lt Col Jeffrey Cook USAF 1189 Waverton Lane Lincoln , CA 95648 Phone: (none) Fax: (none) Email: angrypilot@yahoo.com _____________________________________________________ Ms. Michele Cook Vice President, Business Devlopm Six3 Systems 1430 Spring Hill Road Suite 525 McLean , VA 22102 Phone: (none) Fax: (none) Email: michele.cook@six3systems.com _____________________________________________________ Michele Cook Vice President Six3 Systems 1430 spring hill road Suite 525 Mclean , VA 22012 Phone: (none) Fax: (none) Email: Michele.cook@six3systems.com _____________________________________________________ Mr. Owen Cook High Performance Technology Mana Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: owen.cook@hp.com _____________________________________________________ Owen Cook Jr Senior Account Executive Intelligent Decisions Inc 21445 Beaumeade Cir Ashburn , VA 20147 Phone: (none) Fax: (none) Email: ocook@intelligent.net _____________________________________________________ Mrs. Julie G Coonce Business Development SMSi 11720 Sunrise Valley Dr., St 320 Reston , VA 20191 Phone: (none) Fax: (none) Email: jcoonce@sms-fed.com _____________________________________________________ Mr. Frank Cooper TITLE TBD Concurrent Technologies Corporation 325 Graystone Lane Johnstown , PA 15905 Phone: (none) Fax: (none) Email: cooper@ctc.com _____________________________________________________ Mr. Joe Cooper President & CEO Special Aerospace Security Services Inc 14325 Willard Road Suite 202 Chantilly , VA 20151 Phone: (none) Fax: (none) Email: joe.cooper@sassi-va.com _____________________________________________________ Joe D Cooper TITLE TBD Special Aerospace Security Services Inc 14325 Willard Road Suite 202 Chantilly , VA 20151 Phone: (none) Fax: (none) Email: joe.cooper@sassi-va.com _____________________________________________________ Mr. Lawrence Cooper 2806 Erics Ct. Crofton , MD 21114 Phone: (none) Fax: (none) Email: Cooper@AstroGuy.net _____________________________________________________ Steven Cooper 3818 White Post Ct Suite A Alexandria , VA 22304 Phone: (none) Fax: (none) Email: scooper@strativest.com _____________________________________________________ Mr. Steve Coppinger Vice President CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: scoppinger@caci.com _____________________________________________________ John Copple 1029 Deer Spings Lane Golden , CO 80403 Phone: (none) Fax: (none) Email: jcopple@sanborn.com _____________________________________________________ Tom Corcoran TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: t_corcoran@ssci.senate.gov _____________________________________________________ Lynne Corddry VP Business Development PS Red Hat, Inc 8260 Greensboro Dr Suite 300 McLean , VA 22102 Phone: (none) Fax: (none) Email: lcorddry@redhat.com _____________________________________________________ Jeffrey Cornelius 36227 80th St East Littlerock , CA 93543 Phone: (none) Fax: (none) Email: Oldsaltydog.cornelius@gmail.com _____________________________________________________ Shannon Cornwell No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Christopher Corpora 5 Trellis Drive Stafford , VA 22554 Phone: (none) Fax: (none) Email: cacorpora@comcast.net _____________________________________________________ Ms. Kristin Corra Intelligence Officer OUSD(I) Kristin Corra 2450 VA Ave. Washington , DC 20037 Phone: (none) Fax: (none) Email: kmcorra@yahoo.com _____________________________________________________ Mary Corrado TITLE TBD Deloitte Consulting, LLP No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mcorrado@deloitte.com _____________________________________________________ Mr. Hank Corscadden Dir - Government Contract Compli Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: Hank.Corscadden@microsoft.com _____________________________________________________ Vincent Corsi 8755 Diamond Hill Dr. Bristow , VA 20136 Phone: (none) Fax: (none) Email: vcorsi@us.ibm.com _____________________________________________________ Gene Costa VP Finance Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Jim Costabile TITLE TBD SRA 4350 Fair Lakes Court Fairfax , VA 22033 Phone: (none) Fax: (none) Email: jcostabile@raba.com _____________________________________________________ Vincent Costagliola TITLE TBD SR Technologies, Inc. 4101 SW 47 Ave Suite 102 Fort Lauderdale , FL 33314 Phone: (none) Fax: (none) _____________________________________________________ Mr. Jon-Josef Costandi 110 North French Street Alexandria , VA 22304 Phone: (none) Fax: (none) Email: jjcostandi@gmail.com _____________________________________________________ Tony Cothron 1615 Dartmoor Dr. Huntingtown , MD 20639 Phone: (none) Fax: (none) Email: tony.cothron@gdit.com _____________________________________________________ Tony Cothron USN Chief of Staff NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (301) 688-4597 _____________________________________________________ Mr. George R Cotter TITLE TBD NSA 9800 Savage Road D5, Suite 6217 Fort George G. Meade , MD 20755 Phone: (none) Fax: (301) 688-4980 Email: grcotte@nsa.gov _____________________________________________________ Maria Cotto Specialist Department Of Homeland Security / NPPD / GCSM Maria Cotto 8181 Carnegie Hall Court, #304 Vienna , VA 22180 Phone: (none) Fax: (none) Email: maria.cotto@hq.dhs.gov _____________________________________________________ John Cotton SVP, Maritime Strategic Plans DRS Technologies, Inc. 5 Sylvan Way Parsippany , NJ 7054 Phone: (none) Fax: (none) Email: jgcotton@drs.com _____________________________________________________ Mr. William Courtney Director, Business Development Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: wcourtney@csc.com _____________________________________________________ Brian Covale OUSDI DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: brian.covale@osd.mil _____________________________________________________ Pamela Cowan TITLE TBD DIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: pamela.cowan@dia.mil _____________________________________________________ Ms. Kathleen Cowles Senior Marketing Manager LGS Innovations Accounts Payable 5440 Millstream Road Suite E210 McLeansville , NC 27301 Phone: (none) Fax: (none) Email: ktcowles@lgsinnovations.com _____________________________________________________ Mr. J. M Cox 4513 Orangewood Lane Bowie , MD 20715-1134 Phone: (none) Fax: (none) _____________________________________________________ James Cox 6048 Meadowglen Drive Ottawa , AC K1C5S3 Phone: (none) Fax: (none) Email: james.cox2001@rogers.com _____________________________________________________ James Cox 6048 Meadowglen Drive Ottawa , ON K1C 5S3 Phone: (none) Fax: (none) Email: james.cox2001@rogers.com _____________________________________________________ Larry Cox SVP, General Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: larry.d.cox@saic.com _____________________________________________________ Joseph Coyne 13600 EDS Drive Herndon , VA 22101 Phone: (none) Fax: (none) Email: joe.coyne@hp.com _____________________________________________________ Mr. Lloyd Craighill 11720 Sunrise Valley Dr Ste 320 Reston , VA 20191 Phone: (none) Fax: (none) Email: lcraighill@sms-fed.com _____________________________________________________ Frank D Crandall BSCJ Special Agent in Charge Law Enforcement and Public Safety Authority 3544 Bridgeway Lakes Drive West Sacramento , CA 95691 Phone: (none) Fax: (none) Email: frankcrandall@sbcglobal.net _____________________________________________________ Ms. Nicole Crane 12329 Exbury Herndon , VA 20170 Phone: (none) Fax: (none) Email: nicole.c.crane@accenture.com _____________________________________________________ Mr. Thomas Crawford 13454 Sunrise Valley Drive Ste 240 Herndon , VA 20171-3278 Phone: (none) Fax: (none) Email: crawford@interf.com _____________________________________________________ Tom Crawford MBA Director, Operations Programs BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: tom.crawford2@BAESystems.com _____________________________________________________ VADM Vivien Cray Retired DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: vivien.cray@dhs.gov _____________________________________________________ Madelyn Creedon Counsel/Strat Forces Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: madelyn_creedon@armed-services.senate.gov _____________________________________________________ Ms. Beth Ann B Creekman Liaison Officer Office of the Director of National Intelligence 1500 Tysons McLean Blvd McLean , VA 22102 Phone: (none) Fax: (none) Email: bacreekman@gmail.com _____________________________________________________ Rita Creel Principal Engineer, Applied Assu Software Engineering Institute, CMU NRECA Building Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Patrick Cremins 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: patrick.j.cremins@lmco.com _____________________________________________________ Lou Crenshaw Vice Admiral USN (Retired)/ Prin Grant Thornton LLP 333 John Carlyle Street Suite 500 Alexandria , VA 22314 Phone: (none) Fax: (none) _____________________________________________________ Carol Cribbs Cyber Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: carol_cribbs@appro.senate.gov _____________________________________________________ Rebecca Crocker Battelle Arlington Operations 1550 Crystal Drive Arlington , VA 22202-4138 Phone: (none) Fax: (none) _____________________________________________________ Rebecca Crocker Executive Assistant Battelle Rebecca Crocker 2111 Wilson Blvd Suite 1000 Arlington , VA 22201 Phone: (none) Fax: (614) 458-0603 Email: crockerr@battelle.org _____________________________________________________ Mr. Edward Croissant TITLE TBD USCG 740 W. Deer Lake Drive Lutz , FL 33548 Phone: (none) Fax: (none) Email: edward.t.croissant@uscg.mil _____________________________________________________ Mr. George Cronin Director Advanced Programs Harris Corporation P.O. Box 37 MS: 2-21D Melbourne , FL 32902 Phone: (none) Fax: (none) Email: gcroni01@harris.com _____________________________________________________ Mr. Jason Cronin Director LGS, Bell Lab Technologies 9305 Gerwig Lane Suite 200 Columbia , MD 21046 Phone: (none) Fax: (none) Email: jcronin@lgsinnovations.com _____________________________________________________ Robert Crossgriff TITLE TBD Parsons 198 Van Buren Street Suite 250 Herndon , VA 20170 Phone: (none) Fax: (none) _____________________________________________________ Mr. James E Crowley Jr MA, BA Program Manager-National Securit IBM Corporation 12533 Ridgemoor Lake Ct St Louis , MO 63131 Phone: (314) 965-7373 Fax: (314) 252-4444 Email: crowleyj@us.ibm.com _____________________________________________________ Miss Jeannie A Crowley Sr. Associate PwC PwC 1800 Tysons Boulevard McLean , VA 22102 Phone: (none) Fax: (none) Email: jeannie.crowley@us.pwc.com _____________________________________________________ Philip J Crowley Public Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: crowleypj@state.gov _____________________________________________________ Bill Crumm SID Director NSA 9800 Savage Road Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: bmcrumm@nsa.gov _____________________________________________________ Mr. Andy Culhane TITLE TBD NSA 9800 Savage Road S32, Suite 6532 Fort George G. Meade , MD 20755 Phone: (none) Fax: (301) 688-0683 _____________________________________________________ Arthur Cummings Director, National Security Bran FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: arthur.cummingsii@ic.fbi.gov _____________________________________________________ Stephen Cundari 732 Timberbranch Drive Alexandria , VA 22302 Phone: (none) Fax: (none) Email: scundari@harding-security.com _____________________________________________________ Stephen Cundari President & COO Six3 Systems 1430 Spring Hill Road Suite 525 McLean , VA 22102 Phone: (none) Fax: (703) 997-5909 Email: steve@kinnearcundari.com _____________________________________________________ Lt Gen Charles Cunningham USAF ( TITLE TBD Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: cunninghamc@jfsc.ndu.edu _____________________________________________________ ken cunningham Engineer ITT 141 National Business parkway annapolis junction , MD 20701 Phone: (none) Fax: (none) Email: ken.cunningham@itt.com _____________________________________________________ Ms. Lisa Cunningham P.O. Box 197 Clifton , VA 20124 Phone: (none) Fax: (none) Email: kldckldc@netscape.net _____________________________________________________ Sally Cunningham SEI Counsel and Deputy Director Software Engineering Institute, CMU NRECA Building Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Francis Curley TITLE TBD Orbital Sciences Corporation 6 Locustwood Court Silver Spring , MD 20905 Phone: (none) Fax: (none) Email: schilling.terry@orbital.com _____________________________________________________ Lawrence Curran 2100 2nd St SW Washington , DC 20530 Phone: (none) Fax: (none) Email: Lawrence.M.Curran@uscg.mil _____________________________________________________ John Currier Esquire 15391 Montresor Road Leesburg , VA 20176-5813 Phone: (none) Fax: (none) Email: john.currier@baesystems.com _____________________________________________________ Vanessa Curtis 941 Ivy Trail Crownsville , MD 21032 Phone: (none) Fax: (none) Email: vacurti@nsa.gov _____________________________________________________ Mr. James Cusick Director, Office of Foreign Affa NSA 9800 Savage Road SI - Suite 6485 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: jmcusic@nsa.gov _____________________________________________________ Melissa Cutter 11339 Wildmeadows St Waldorf , MD 20601 Phone: (none) Fax: (none) Email: mcutter@caci.com _____________________________________________________ Daniel Cuviello 5290 Shawnee Road Alexandria , VA 22312 Phone: (none) Fax: (none) Email: daniel.j.cuviello@lmco.com _____________________________________________________ David Pekoske (aka Coster, John) Group President, Global Security A-T Solutions, Inc. 1934 Old Gallows Road Suite 360 Vienna , VA 22182 Phone: (none) Fax: (703) 288-3401 _____________________________________________________ Berico Technologies (aka Craig, Anne Meree) Directors at Berico Technologies Berico Technologies 1501 Lee Highway, Suite 303 Arlington , VA 22209 Phone: (none) Fax: (none) Email: directors@bericotechnologies.com _____________________________________________________ Christina Vanecek (aka Champ, Christina) Marketing PRTM Management Consultants, LLC 1750 Pennsylvania Avenue NW Suite 1000 Washington , DC 20006 Phone: (none) Fax: (none) Email: cvanecek@prtm.com _____________________________________________________ Gregg Davis TITLE TBD Verizon Business, Federal 22001 Loudoun County Parkway Ashburn , VA 20147 Phone: (none) Fax: (none) Email: gregg.davis@verizonbusiness.com _____________________________________________________ Gregg Davis TITLE TBD Verizon Business, Federal 22001 Loudoun County Parkway Ashburn , VA 20147 Phone: (none) Fax: (none) Email: gregg.davis@verizonbusiness.com _____________________________________________________ gregg davis Director Verizon 22001 Loudoun County Parkway Ashburn , VA 20147 Phone: (none) Fax: (none) Email: gregg.davis@verizonbusiness.com _____________________________________________________ Dr. Harvey Davis Director, Installation and Logis NSA 9800 Savage Road L, Suite 6600 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: hadavis@nsa.gov _____________________________________________________ Lori Davis Dir, National Security Programs Marklogic 7950 Jones Branch Road Suite 200 McLean , VA 22107 Phone: (none) Fax: (none) Email: Lori.Davis@MarkLogic.com _____________________________________________________ Paul Davis Sr VP, Chief Technology Officer NJVC NJVC 8614 Westwood Center Drive Suite #300 Vienna , VA 22182 Phone: (none) Fax: (none) Email: paul.davis@njvc.com _____________________________________________________ Stevie Davis PM DHS 4428 Simpson Mill Way Woodbridge , VA 22192 Phone: (none) Fax: (none) Email: stevie.davis@dhs.gov _____________________________________________________ Stone Davis VP, ISS KGS 2750 Prosperity Ave Ste 300 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: sdavis@kforcegov.com _____________________________________________________ Mr. Stuart Davis CORP-Executive VP of Strategy ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) Email: stuart.davis@mantech.com _____________________________________________________ Mr. Timur A Davis Sr MA, MS CEO TEAD Timur A. Davis 115 Schley Street Newark , NJ 07112 Phone: (none) Fax: (none) Email: timur.davis@gmail.com _____________________________________________________ Dr. Valerie E Davis PhD Adjunct Professor AMU 4202 Alovette San Antonio , TX 78251 Phone: (210) 725-5622 Fax: (none) Email: vedavis1@sbcglobal.net _____________________________________________________ Robert Day CIO, Director Cyber Command U.S. Coast Guard 3458 Mecartney Road Alameda , CA 94502 Phone: (202) 247-6854 Fax: (none) Email: robert.e.day@uscg.mil _____________________________________________________ Dr. Allen Dayton 10221 Raider Lane Fairfax , VA 22030-1908 Phone: (none) Fax: (none) _____________________________________________________ Manuel De Ponte Sr. VP, National Systems Group The Aerospace Corporation Attn: Linda Nicoll, M1-447 2310 E. El Segundo Blvd. El Segundo , CA 90245 Phone: (none) Fax: (none) Email: manuel.deponte@aero.org _____________________________________________________ Mr. Dean A Deal Sr. Analyst DHS/USCIS Dean Deal 3211E Arrowhead Cir Fairfax , VA 22030 Phone: (571) 296-4976 Fax: (none) Email: dean.blkbry@gmail.com _____________________________________________________ Mr. Richard Dean 6760 Alexander Bell Drive Ste 120 Columbia , MD 21046 Phone: (none) Fax: (none) Email: richard.dean@hengcon.com _____________________________________________________ Mr. James Deater 6131 Mountaindale Road Thurmont , MD 21788 Phone: (none) Fax: (none) Email: jdeater@mdsp.org _____________________________________________________ Dr. James DeBardelaben 2001 Jefferson Davis Hwy Suite 1109 Arlington , VA 20910 Phone: (none) Fax: (none) Email: jd@ivysys.com _____________________________________________________ Ms. Maria deBerliner 500 Montgomery Street #400 Alexandria , VA 22314 Phone: (none) Fax: (none) Email: mvelez@lat-intel.com _____________________________________________________ Rick DeBobes Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rick_debobes@armed-services.senate.gov _____________________________________________________ Terri DeBottis Executive Assistant SRC, Inc 7502 Round Pond Road North Syracuse , NY 13212 Phone: (none) Fax: (none) Email: debottis@srcinc.com _____________________________________________________ Gerry Decker 6564 Loisdale Court Springfield , VA 22150 Phone: (none) Fax: (none) _____________________________________________________ Mr. Michael H Decker Assistant Secretary of Defense, DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: michael.decker@osd.mil _____________________________________________________ Mr. Raymond Decker 35 Fendall Avenue Alexandria , VA 22304 Phone: (none) Fax: (none) Email: Ray.Decker@opm.gov _____________________________________________________ Dr. William A Decker SVP for Engineering SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: william.a.decker@saic.com _____________________________________________________ William A Decker Chief Engineer SAIC 1710 SAIC Drive T1-12-5 McLean , VA 22102 Phone: (none) Fax: (none) Email: deckerart@saic.com _____________________________________________________ Lynn DeCourcey Director, Cyber Security NJVC 8614 Westwood Center Drive Vienna , VA 22182 Phone: (none) Fax: (none) Email: lynn.decourcey@njvc.com _____________________________________________________ Mr. Martin Decre 11636 Dark Fire Way Columbia , MD 21044 Phone: (none) Fax: (none) Email: martin.decre@sun.com _____________________________________________________ John DeFreitas VP/GM, Intelligence Solutions L-3 Communications, Inc. 11955 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Mr. John Defreitas III 1274 Cobble Pond Way Vienna , VA 22812 Phone: (none) Fax: (none) Email: movsalot@aol.com _____________________________________________________ MG John I DeFreitas USA Deputy S3 NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. William DeGenaro 1133 4th Street Ste 200 Sarasota , FL 34236 Phone: (none) Fax: (none) _____________________________________________________ Bob Degrasse Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Bob.Degrasse@mail.house.gov _____________________________________________________ Linda Dei Managing Director KeyPoint Government Solutions, Inc. 1750 Foxtrail Drive Loveland , CO 80538 Phone: (none) Fax: (none) Email: linda.dei@keypoint.us.com _____________________________________________________ MS Debra S Del Vecchio Asst. for Program Development Penn State University/Applied Research Lab P. O. Box 30 North Atherton Street State College , PA 16804 Phone: (none) Fax: (814) 863-6239 Email: dsd13@psu.edu _____________________________________________________ Mr. Michael Del Vecchio Deputy Director, Signals Intelli NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jenette.miller@nro.mil _____________________________________________________ Mr. Leo Delaney TITLE TBD DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Leo.Delaney@dia.mil _____________________________________________________ Mr. Michael Delaney 9113 Octavia Court Springfield , VA 22153 Phone: (none) Fax: (none) _____________________________________________________ Ms. Kendrea Delauter TITLE TBD DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Kendrea.Delauter@dia.mil _____________________________________________________ Mr. Anthony Deley VP, Advanced Capability Northrop Grumman One Space Park R2/2094 Redondo Beach , CA 90278 Phone: (none) Fax: (none) Email: anthony.deley@ngc.com _____________________________________________________ Mr. Antonio Delgado 10521 Mereworth Lane Oakton , VA 22124 Phone: (none) Fax: (none) Email: adelgadojr@cox.net _____________________________________________________ Mr. Bill J DelGrego Vice President, Accenture & Col Accenture 15433 Woodgrove Road Purcellville , VA 20132 Phone: (none) Fax: (none) Email: william.j.delgrego@accenture.com _____________________________________________________ Mr. Thomas Dell 5916 Burnside Landing Drive Burke , VA 22015 Phone: (none) Fax: (none) Email: tom.dell@spadac.com _____________________________________________________ Mr. Matthew Dellon Cyber Intelligence Liaison US Department of Homeland Security 4650 N Washington Blvd Apt. 110 Arlington , VA 22201 Phone: (none) Fax: (none) Email: matthew.dellon@dhs.gov _____________________________________________________ Dr. R. P DeLong 1196 Third Avenue Anoka , MN 55303-2775 Phone: (none) Fax: (none) Email: r_peter_delong@mathc2.com _____________________________________________________ Ben Delp delpbt@jmu.edu James Madison University 701 Carrier Drive, ISAT/CS 360 MSC 4111 Harrisonburg , VA 22807 Phone: (none) Fax: (none) Email: delpbt@jmu.edu _____________________________________________________ Captain Fred Demech USN (Ret) TITLE TBD Northrop Grumman Corporation 36 Kipling Drive Moosic , PA 18507 Phone: (none) Fax: (none) Email: fred.demech@ngc.com _____________________________________________________ Helen D Demes Event Coordinator The SI Helen Demes 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: helen.d.demes@lmco.com _____________________________________________________ Jerry DeMoney Program Director SRI International 1100 Wilson Boulevard Suite 2800 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Jack Dempsey Director, Congressional Activiti DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jack.dempsey@osd.mil _____________________________________________________ Joan Dempsey TITLE TBD Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. Jerry DeMuro TITLE TBD General Dynamics Corporation 2941 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: jdemuro@gd.com _____________________________________________________ Mr. William Denk 12930 Worldgate Drive Suite 700 Herndon , VA 20170 Phone: (none) Fax: (none) Email: wdenk@drs-ds.com _____________________________________________________ William Denk Vice President DRS Technical Services, Inc DRS TSI 12930 Worldgate Drive Suite 700 Herndon , VA 20170 Phone: (none) Fax: (none) Email: wdenk@drs-ds.com _____________________________________________________ Mr. Vincent Dennis TITLE TBD NRO 14675 Lee Road Room 15A00B Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: vincent.dennis@nro.mil _____________________________________________________ Vincent Dennis TITLE TBD Deloitte Consulting, LLP No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ David A Deptula 25 Westover Ave SW Washington , DC 20032 Phone: (202) 562-5456 Fax: (none) Email: deptula.david@gmail.com _____________________________________________________ Lt. General David A Deptula USAF Deputy Chief of Staff, Office of DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: David.Deptula@pentagon.af.mil _____________________________________________________ Mitch Derman TITLE TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Ms. Eleanor Desai Vice President National Security Dell Inc. One Dell Way One Dell Way Round Rock , TX 78682 Phone: (none) Fax: (none) Email: eleanor_desai@federal.dell.com _____________________________________________________ Ms Eleanor Desai IC Sector Lead Dell Inc. One Dell Way One Dell Way Round Rock , TX 78682 Phone: (none) Fax: (none) Email: eleanor_desai@federal.dell.com _____________________________________________________ Art Deslauriers CTO Lockheed Martin Advanced Programs 13539 Dulles Technology Drive Herndon , VA 20171 Phone: (none) Fax: (none) Email: adeslauri@gmail.com _____________________________________________________ Alison Deters TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: alison.deters@mail.house.gov _____________________________________________________ Ambassador Joseph DeTrani Director National Counter Prolif ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: adam.jones@ugov.gov _____________________________________________________ Maj. Gen. Paul Dettmer Deputy AF Chief of Staff Intelli DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: paul.dettmer@pentagon.af.mil _____________________________________________________ Mark Devine Director, BD & Strategy Cobham Analytic Solutions 5875 Trinity Parkway Suite 300 Centreville , VA 20120 Phone: (none) Fax: (none) _____________________________________________________ Matthew Devost 22777 Zulla Chase Place Asburn , VA 20148 Phone: (none) Fax: (none) Email: matt@devost.net _____________________________________________________ Mr. Robert Deweese Director, Aerospace System Div. Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: robert.deweese@ngc.com _____________________________________________________ CDR Pat DiBari MS, BS Deputy, Officer of C4ISR U.S. Coast Guard 2100 2nd Street SW Washington , DC 20593 Phone: (none) Fax: (none) Email: pat.dibari@uscg.mil _____________________________________________________ Mr. Mike DiCaprio 231 Enterprise Road Johnstown , NY 12095 Phone: (none) Fax: (none) Email: mdicaprio@emihq.com _____________________________________________________ Mr. Ronald Dick Director, ES&I Division Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: rdick3@csc.com _____________________________________________________ John Dickas ODNI Monitor Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: J_Dickas@ssci.senate.gov _____________________________________________________ Alan Dietrich President, C3 & Aviation DRS Technologies, Inc. 5 Sylvan Way Parsippany , NJ 7054 Phone: (none) Fax: (none) Email: adietrich@drs.com _____________________________________________________ Joyce Dietrich CG Liaison to FBI USCG 2109 N. Scott St. #49 Arlington , VA 22209 Phone: (860) 961-6301 Fax: (none) Email: jmdietrich@comcast.net _____________________________________________________ Mr. Anthony Dignazio TITLE TBD ITT 4617 Morning Ride Court Ellicott City , MD 21043 Phone: (none) Fax: (none) Email: tony.dignazio@itt.com _____________________________________________________ Allan Assel Intel BD Juniper Networks Allan Assel Juniper Networks 2251 Corporate Park Drive Herndon , VA 20171 Phone: (none) Fax: (none) Email: aassel@juniper.net _____________________________________________________ Stephen P Aubin TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Dave Aucsmith Senior Director, Adv Tech in Gov Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: awk@microsoft.com _____________________________________________________ Mr. Mitchell Audritsh 4075 Wilson Boulevard Suite 900 Arlington , VA 22203 Phone: (unlisted) Fax: (none) Email: buckeye59@yahoo.com _____________________________________________________ Mr. David Auer Major Account Manager Cisco Systems, Inc. 13635 Dulles Technology Drive Herndon , VA 20171 Phone: (none) Fax: (none) Email: dauer@cisco.com _____________________________________________________ Dr. Wanda M Austin President & CEO The Aerospace Corporation Attn: Linda Nicoll, M1-447 2310 E. El Segundo Blvd. El Segundo , CA 90245 Phone: (none) Fax: (none) Email: wanda.m.austin@aero.org _____________________________________________________ Mr. Harry Avig TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: havig@potomacinstitute.org _____________________________________________________ Mr. Rodney Azama 203 Whitestone Road Ste 110 Silver Spring , MD 20901 Phone: (none) Fax: (none) Email: razama@verizon.net _____________________________________________________ Mr. Zalmai Azmi Senior Vice President CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: zazmi@caci.com _____________________________________________________ Mr. Colin Dillon TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: cdillon@potomacinstitute.org _____________________________________________________ Lawrence DiNapoli President/CEO Systems Technologies 185 Route 36 West Long Branch , NJ 07764 Phone: (none) Fax: (none) Email: sskodacek@systek.com _____________________________________________________ John R Dinger Deputy INR State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: shifletrv2@state.gov _____________________________________________________ Mr. Uyen Dinh Senior Director GeoEye 21700 Atlantic Boulevard Dulles , VA 20166 Phone: (none) Fax: (none) Email: dinh.uyen@geoeye.com _____________________________________________________ Nicole DiResta TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Nicole_Diresta@appro.senate.gov _____________________________________________________ Mrs. Susan F Disher NSA Representative to the Depart NSA 9800 Savage Road Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: sfdishe@nsa.gov _____________________________________________________ Mr. Jerry W Dixon Jr. 2328 Southfield Ct. Finksburg , MD 21048 Phone: (none) Fax: (none) Email: jerry@jdixon.com _____________________________________________________ Mary Dixon Director, Defense Manpower Data DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mary.dixon@osd.mil _____________________________________________________ Stacey Dixon Budget Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Stacey.Dixon@mail.house.gov _____________________________________________________ Julia Dizhevskaya Intern Delta Risk 2804 N. Seminary Chicago , IL 60657 Phone: (none) Fax: (none) Email: rschmidt911@gmail.com _____________________________________________________ Julia Dizhevskaya Consultant Delta Risk LLC 2804 N. Seminary Chicago , IL 60657 Phone: (none) Fax: (none) Email: jdizhevskaya@delta-risk.net _____________________________________________________ Dr. Michaline Dobrezinski Deputy Director, Human Resources DIA 7400 Defense Pentagon Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Michaline.Dobrezinski@dia.mil _____________________________________________________ Charles Dodd 414 2nd Street Alexandria , VA 22314 Phone: (none) Fax: (none) _____________________________________________________ Joe Dodd VP, Business Development TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) Email: joe.dodd@tasc.com _____________________________________________________ Mr. Joseph Dodd SVP Business Development TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) Email: joe.dodd@tasc.com _____________________________________________________ Mr. Glen Dodson VP and GM, National Security Gro Oracle Corporation 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: glen.dodson@oracle.com _____________________________________________________ Brett Dody 15052 Conference Center Dr Chantilly , VA 20151 Phone: (none) Fax: (none) Email: ann.sullivan@lmco.com _____________________________________________________ Brett Dody Director, Intelligence Systems G the SI 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: brett.dody@lmco.com _____________________________________________________ Brett Dody MA Deputy Vice President The SI Organization, Inc. Chris Nolan 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: brett.dody@thesiorg.com _____________________________________________________ Ms. Babs Doherty President and CEO Eagle Ray Inc. 4501 Singer Court Suite 260 Chantilly , VA 20151 Phone: (none) Fax: (none) Email: bdoherty@eaglerayinc.com _____________________________________________________ Jeffrey Dolan 15 Mohegan Ave (ds) New London , CT 6320 Phone: (none) Fax: (none) Email: jeffrey.t.dolan@uscg.mil _____________________________________________________ Karin M Dolan Assistant Director of Intelligen DoD HQMC Code I (IS) 2 Navy Annex Washington , DC 203801775 Phone: (none) Fax: (none) Email: karin.dolan@usmc.mil _____________________________________________________ Mr. Tom Dolan Director, Law Enforcement Ops Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: tdolan@csc.com _____________________________________________________ Lynn Domino 2111 Jefferson Davis Hwy #1018N Arlington , VA 22202 Phone: (none) Fax: (none) Email: pradaroxx@yahoo.com _____________________________________________________ Dr. Teresa Domzal Provost of the National Intellig ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: teresa.domzal@dia.mil _____________________________________________________ Ms. Sheri Donahue 4010 Hillsboro Road Louisville , KY 40207 Phone: (none) Fax: (none) Email: sdonahue@infragardmembers.org _____________________________________________________ Ms. Sheri Donahue 4010 Hillsboro Road Louisville , KY 40207 Phone: (none) Fax: (none) Email: sheri.donahue@insightbb.com _____________________________________________________ Bill Donellan TITLE TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Chris Donesa Deputy Staff Director/Counsel Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: chris.donesa@mail.house.gov _____________________________________________________ Ms. Sandra S Donnelly TITLE TBD NSA 9800 Savage Road E1, Suite 6809 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: sfdonne@nsa.gov _____________________________________________________ Shaun Donovan Secretary Housing and Urban Development Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ioanna.t.kefalas@hud.gov _____________________________________________________ Mr. John H Doody TITLE TBD NSA 9800 Savage Road A, Suite 6222 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: jhdoody@nsa.gov _____________________________________________________ Mr. Matt Doring TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: matt.doring@nro.mil _____________________________________________________ Mr. Henry A Dorochovich S.B. Chief Mission Officer The SI Organization, Inc. 15052 Conference Center Drive Chantilly , VA 20151 Phone: (703) 709-8783 Fax: (none) Email: henry.a.dorochovich@thesiorg.com _____________________________________________________ Andrey Dorokov 4545 Connecticut Avenue Apt 722 Washington , DC 20007 Phone: (none) Fax: (none) Email: andorohov@yandex.ru _____________________________________________________ Mr. Jon Dorrick 6917 Trillium Lane Springfield , VA 22152 Phone: (none) Fax: (none) Email: jon.dorrick@itsfed.com _____________________________________________________ Jon Dorrick 6917 Trillium Lane Springfield , VA 22152 Phone: (none) Fax: (none) Email: jon.dorrick@verizon.net _____________________________________________________ VADM David J Dorsett Director of Naval Intelligence; DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: david.dorsett@navy.mil _____________________________________________________ Jack Dorsett VP for Cyber and C4 Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: dorsett.jack@gmail.com _____________________________________________________ Jack Dorsett VP, Cyber & C4 Programs Northrop Grumman Corporation 2980 Fairview Park Falls Church , VA 22042 Phone: (none) Fax: (none) Email: jack.dorsett@ngc.com _____________________________________________________ Neal Dorsey PO Box B Lincoln , VA 20160 Phone: (none) Fax: (none) Email: dorseynet@hotmail.com _____________________________________________________ Christopher T Doss Special Training and Application FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: christopher.doss@ic.fbi.gov _____________________________________________________ Dr. Rene Doublier P.O. Box 1851 Pittsboro , NC 27312 Phone: (none) Fax: (none) Email: esres@aol.com _____________________________________________________ Ms Angel P Douglas M.H.R. Staff Officer National Geospatial-Intelligence Agency OGMC-S72361 7500 Geoint Drive Springfield , VA 22150 Phone: (703) 942-6321 Fax: (none) Email: angel.p.douglas@nga.mil _____________________________________________________ Dr. Patrick Dowd TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Jerry Dowless 13873 Park Center Road Herndon , VA 20171 Phone: (none) Fax: (none) Email: jdowless@dowless.com _____________________________________________________ Mr. David Downer TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: david.downer@gd-ais.com _____________________________________________________ Elizabeth T Doyle TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Frederick J Doyle VP, Defense & Intelligence Commu Ball Aerospace & Technologies Corp. 10 Longs Peak Drive Broomfield , CO 80020 Phone: (none) Fax: (none) Email: fdoyle@ball.com _____________________________________________________ Mr. Kevin Doyle Director, Cyber Programs SRC, Inc 7502 Round Pond Road North Syracuse , NY 13212 Phone: (none) Fax: (none) Email: doyle@srcinc.com _____________________________________________________ Michael Doyle MBA, MA Graduate student Selwyn College, University of Cambridge 8623 Connemara Drive Fair Oak Ranch , TX 78015 Phone: (none) Fax: (none) Email: mike@themekonggroup.com _____________________________________________________ Steve Doyle Senior Director of Intelligence Datameer P.O. Box 3576 Mooresville , NC 28117 Phone: (none) Fax: (none) Email: odamachines@bellsouth.net _____________________________________________________ Tim Doyle Program Director Hughes 11717 Exploration Lane Germantown , MD 20876 Phone: (none) Fax: (none) _____________________________________________________ Mr. William Doyle 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: william.a.doyle@lmco.com _____________________________________________________ Mr. John M Doyon 3536 36th Road N. Arlington , VA 22207 Phone: (none) Fax: (none) Email: doyon@erols.com _____________________________________________________ John M Doyon Director for Intelligence Progra NSC No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jdoyon@nsc.eop.gov _____________________________________________________ Michael Dozier MS Intel Analyst The IIAgroup Michael Dozier 483 4th Bethel , AK 99559 Phone: (none) Fax: (none) Email: michael.dozier@infragard.org _____________________________________________________ Mrs. Carrie Drake Event & Community Relations Mgr United States Geospatial Intelligence Foundation Carrie Drake 2325 Dulles Corner Blvd STE 450 Herndon , VA 20171 Phone: (none) Fax: (703) 793-9069 Email: carrie.drake@usgif.org _____________________________________________________ Linda Drake 470 Spring Park Place Suite 700 Herndon , VA 20170 Phone: (none) Fax: (none) Email: linda_drake@appsig.com _____________________________________________________ Linda Drake Director of Business Development Raytheon Applied Signal Technology Linda Drake 470 Spring Park Place Suite 700 Herndon , VA 20170 Phone: (none) Fax: (none) Email: linda_drake@appsig.com _____________________________________________________ Linda Drake Director of Business Development Applied Signal Technology 460 West California Avenue Sunnyvale , CA 94086 Phone: (none) Fax: (none) Email: linda_drake@appsig.com _____________________________________________________ Ms. Gina Drawdy 15029 Rumson Place Manassas , VA 20111 Phone: (none) Fax: (none) Email: ginadrawdy@aim.com _____________________________________________________ Sidney D Drell Required unless Parent Arlington , VA 22203 Phone: (650) 926-2664 Fax: (none) _____________________________________________________ Mr. Alex Drew Vice President, Intel Ops & Anal Sotera Defense Solutions, Inc 1501 Farm Credit Drive Suite 2300 McLean , VA 22102 Phone: (none) Fax: (none) Email: adrew@theanalysiscorp.com _____________________________________________________ Ava Dreyer Administrative Staff Asst Draper Laboratory 1555 Wilson Blvd. Suite 501 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Doug Dreyer 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) _____________________________________________________ Ms. Melissa Drisko Deputy Director Naval Intelligen DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: melissa.drisko@navy.mil _____________________________________________________ Paul Druckman Vice President, DHS Business Dev Accenture 11951 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) Email: paul.j.druckman@accenture.com _____________________________________________________ Mr. John Drury PE BSME President The Edge Group 4714 Louetta Rd. #703 Spring , TX 77388 Phone: (none) Fax: (none) Email: jdrury@theedgegroup.cc _____________________________________________________ Mr. Serge Duarte 185 West F. Street Rm 600 San Diego , CA 92101 Phone: (none) Fax: (none) Email: serge.duarte@dhs.gov _____________________________________________________ Mr. Serge Duarte US Immigration and Customs DHS 185 West F. Street, Room 600 San Diego , CA 92101 Phone: (none) Fax: (none) Email: serge.duarte@dhs.gov _____________________________________________________ Melvin Dubee VP Govt Relations Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: melvin.dubee@lmco.com _____________________________________________________ Ian Dubin 4929 Arctic Terrace Rockville , MD 20853 Phone: (301) 933-1885 Fax: (none) Email: ianhdubin@gmail.com _____________________________________________________ Daniel D Dubree Information Technology Operation FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: daniel.dubree@ic.fbi.gov _____________________________________________________ Drenan Dudley Cyber Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: drenan_dudley@appro.senate.gov _____________________________________________________ Mr. Charles Duecy President CPD Consultants 6049 Ramshorn Place McLean , VA 22101 Phone: (none) Fax: (none) Email: patrick@cpdconsultants.com _____________________________________________________ Regina Dugan Director DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Regina.Dugan@darpa.mil _____________________________________________________ Lynn A Dugle President, IIS Raytheon M/S AA 1200 S Jupiter Road Garland , TX 75042 Phone: (none) Fax: (972) 205-6388 Email: lynn_dugle@raytheon.com _____________________________________________________ Lynn A Dugle President, IIS Raytheon M/S AA 1200 S Jupiter Road Garland , TX 75042 Phone: (none) Fax: (972) 205-6388 Email: lynn_dugle@raytheon.com _____________________________________________________ Mr. John Duker TITLE TBD Oracle Corporation 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: john.duker@oracle.com _____________________________________________________ Kenneth Dumm Deputy Intelligence DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kenneth.dumm@usaf.mil _____________________________________________________ Arne Duncan Secretary Education Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: arne.duncan@ed.gov _____________________________________________________ Ms. Natalie Duncan 3806 Riverwood Road Alexandria , VA 22309 Phone: (none) Fax: (none) Email: cnlui@cox.net _____________________________________________________ Jen Dunham Sr. Account Executive SAS Institute 1530 Wilson Blvd Suite 800 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Dan Dunkel 4601 Green Oaks Drive Colleyville , TX 76034 Phone: (none) Fax: (none) _____________________________________________________ Daren Dunkel 4601 Green Oaks Drive Colleyville , TX 76034 Phone: (none) Fax: (none) Email: dunkel10@yahoo.com _____________________________________________________ Derek Dunkel 4601 Green Oaks Drive Colleyville , TX 76034 Phone: (none) Fax: (none) _____________________________________________________ Patrick Dunleavy 5846 pacific rim way #60 bellingham , WA 98226 Phone: (none) Fax: (none) Email: pdunleavy@msn.com _____________________________________________________ Mrs. Nina Dunn senior advisor to CEO Finmeccanica Angelica Falchi 1625 I Street, NW 12th Floor Washington , DC 20006 Phone: (none) Fax: (none) Email: nina.dunn@finmeccanica.com _____________________________________________________ Thomas Dunn Senior Advisor ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: thomajd4@dni.gov _____________________________________________________ Terry Duran 14370 Newbrook Dr. Chantilly , VA 20151 Phone: (none) Fax: (none) Email: tduran@caci.com _____________________________________________________ Terry Duran 14370 Newbrook Dr. Chantilly , VA 20151 Phone: (none) Fax: (none) Email: tduran@caci.com _____________________________________________________ Bo Durickovic EVP Defense Personnel Services Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Darrell R Durst Vice President Program Managemen Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: darrell.r.durst@lmco.com _____________________________________________________ Dr. Robert Dussault 10300 Eaton Place #500 Fairfax , VA 22030 Phone: (none) Fax: (none) Email: dussault-rob@zai.com _____________________________________________________ Gilbert Dussek Program Manager Lockheed Martin Corporation 13560 Dulles Technology Drive Room 664 Herndon , VA 20171 Phone: (none) Fax: (none) Email: gilbert.dussek@lmco.com _____________________________________________________ Ms. Carla Duy 3238 Duck Pond Court Oak Hill , VA 20171 Phone: (none) Fax: (none) Email: carladuy@hotmail.com _____________________________________________________ Mr. Joe Dvornicky TITLE TBD SafeNet, Inc. 4690 Millennium Drive Belcamp , MD 21017 Phone: (none) Fax: (none) Email: Joe.Dvornicky@safenet-inc.com _____________________________________________________ Mr. David Dzergoski 1185 Dingus Drive Westminster , MD 21158 Phone: (none) Fax: (none) Email: dzergoski@hotmail.com _____________________________________________________ Mohamed Elibiary P. O. Box 262366 Plano , TX 75026 Phone: (none) Fax: (none) Email: melibiary@gmail.com _____________________________________________________ Mr. Al Elkins TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: aelkins@potomacinstitute.org _____________________________________________________ Mr. Michael Elliott Vice President, Business Develop Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: michael.elliott@ngc.com _____________________________________________________ Mr. Zachary Elliott 20256 Grim Rd. Aurora , OR 97002 Phone: (none) Fax: (none) Email: zach.elliott@nmarion.k12.or.us _____________________________________________________ Deborah Ellis TITLE TBD DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: deborah.ellis@js.pentagon.mil _____________________________________________________ Mr. Victor A Ellis 1165 University Dr NE Atlanta , GA 30306 Phone: (none) Fax: (none) Email: victor.ellis@ang.af.mil _____________________________________________________ Harry M Elmendorf TITLE TBD Ball Corporation 2111 Wilson Blvd Suite 1120 Arlington , VA 22201 Phone: (none) Fax: (none) Email: helmendo@ball.com _____________________________________________________ Harry M Elmendorf Director, Defense and Intel Prog Ball Aerospace & Technologies Corp 2111 Wilson Blvd Suite 1120 Arlington , VA 22201 Phone: (none) Fax: (none) Email: helmendo@ball.com _____________________________________________________ Harry M Elmendorf Director, Def & Intel Ball Aerospace 2111 Wilson Blvd Suite 1120 Arlington , VA 22201 Phone: (none) Fax: (none) Email: helmendo@ball.com _____________________________________________________ Judith A Emmel Associate Director foráStrategic NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (301) 688-6198 Email: jaemmel@nsa.gov _____________________________________________________ Mr. Dan Emory Principal and Co-founder Active Assurance Corporation 43769 Clemens Terrace Ashburn , VA 20147 Phone: (none) Fax: (none) Email: demory@activeassurance.com _____________________________________________________ Erik Engebreth 21305 Arrowhead C Ashburn , VA 20147 Phone: (none) Fax: (none) Email: eenge@triumfant.com _____________________________________________________ Peter Engel Vice President SafeNet, Inc. 1655 Fort Myer Drive Suite 1150 Arlington , VA 22209 Phone: (none) Fax: (none) Email: peter.engel@safenet-inc.com _____________________________________________________ Mr. Daniel Ennis Deputy Chief, S2 NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: drennis@nsa.gov _____________________________________________________ Michael Ennis 1710 SAIC Drive SAIC McLean , VA 22102 Phone: (none) Fax: (none) Email: michael.e.ennis@saic.com _____________________________________________________ Harold Ennulat Manager Government Program Devel Software Engineering Institute, CMU NRECA Building Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Thomas Enright VP Intel Svcs Ctr Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Mr. Joseph Ensor VP, NGES Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: joseph.ensor@ngc.com _____________________________________________________ Mr. L. K Ensor Associate Director NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (410) 854-7685 Email: lkensor@nsa.gov _____________________________________________________ Mieke Eoyang Chief of Staff, Rep. Anna Eshoo Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mieke.eoyang@mail.house.gov _____________________________________________________ Dr. Mark Epstein 9209 Fox Meadow Lane Potomac , MD 20854 Phone: (none) Fax: (none) Email: mepstein@qualcomm.com _____________________________________________________ Ms Dorene Erickson 20905 Fowlers Mill Circle Ashburn , VA 21047 Phone: (none) Fax: (none) Email: dorene911@yahoo.com _____________________________________________________ Ms. Claudia Erland Arete Fellow, National & Homelan Arete Associates 1550 Crystal Drive Suite 703 Arlington , VA 22202 Phone: (none) Fax: (none) Email: cerland@arete.com _____________________________________________________ Claudia A Erland TITLE TBD Arete Associates 1550 Crystal Drive Suite 703 Arlington , VA 22202 Phone: (none) Fax: (none) Email: cerland@arete.com _____________________________________________________ Claudia A Erland 1550 Crystal Drive Suite 703 Arlington , VA 22202 Phone: (none) Fax: (none) Email: cerland@arete.com _____________________________________________________ Robert Erland Senior Analyst, Information Domi NMIC No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rerland@nmic.navy.mil _____________________________________________________ Mr. Jimmie R Erwin B.S., M.S Staff Officer National Geospatial-Intelligence Agency NGA Mail Stop D-071 4600 Sangamore Road Bethesda , MD 20816 Phone: (703) 471-7822 Fax: (none) Email: Jimmie.R.Erwin@nga.mil _____________________________________________________ Ms. Karen Esaias 3105 S. Declaration Court Waldorf , MD 20603 Phone: (none) Fax: (none) Email: esaiask@yahoo.com _____________________________________________________ Ms. Debra Esherman COO Sensa Solutions 11180 Sunrise Valley Drive Suite 100 Reston , VA 20191 Phone: (none) Fax: (none) Email: debbie@sensasolutions.com _____________________________________________________ Mark T Esper TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ LTC Paul Estavillo 2200 Wilson Blvd 102-551 Arlington , VA 22201 Phone: (none) Fax: (none) Email: paul.estavillo@us.army.mil _____________________________________________________ David Etue Manager PRTM Management Consultants, LLC 1750 Pennsylvania Avenue NW Suite 1000 Washington , DC 20006 Phone: (none) Fax: (none) Email: detue@prtm.com _____________________________________________________ Al Evans Manager, Government Program Deve Software Engineering Institute, CMU NRECA Building Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Mark R Evans TITLE TBD NSA 9800 Savage Road S2J, Suite 6657 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: mrevans@nsa.gov _____________________________________________________ Ms. Peggy Evans 211 Hart Senate Office Building Washington , DC 20510 Phone: (none) Fax: (none) _____________________________________________________ Peggy Evans Budget Director, SSCI Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: P_Evans@ssci.senate.gov _____________________________________________________ Col. Gregory Evenstad USA(Ret.) TITLE TBD NSA 9800 Savage Road L, Suite 6600 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: ghevens@nsa.gov _____________________________________________________ Mr. Dan Everett Sales Manager Qwest Communications 4250 N. Fairfax Dr. 5th Floor Arlington , VA 22203 Phone: (none) Fax: (none) Email: daniel.everett@qwest.com _____________________________________________________ Terri Everett BS,MA,MS Office of the DNI Washington , DC 20511 Phone: (none) Fax: (none) Email: theresa.a.everett@ugov.gov _____________________________________________________ Mr. Doug Evers TITLE TBD Quest Software - Public Sector Group 700 King Farm Boulevard Suite 250 Rockville , MD 20850 Phone: (none) Fax: (none) Email: douglas.evers@quest.com _____________________________________________________ Mr. Stephen Ewell Managing Director InfraGard National Members Alliance 673 Potomac Station Dr #615 Leesburg , VA 20176 Phone: (none) Fax: (none) Email: sewell@infragardnational.org _____________________________________________________ Mr. Mark Ewing Senior Adviser ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mark.w.ewing@ugov.gov _____________________________________________________ I.J Ezeonwuka 1204 S Washington St, Apt 411 ALEXANDRIA , VA 22314 Phone: (none) Fax: (none) Email: ijeomaez@gmail.com _____________________________________________________ Barbara Fast INSA Cyber Security Council Boeing Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Stephen Faulkner 7683 Antigua Drive Memphis , TN 38119 Phone: (none) Fax: (none) Email: sfaulkner09@gmail.com _____________________________________________________ Linc Faurer Required unless Parent Washington , DC 20005 Phone: 703 356-0178 Fax: (none) _____________________________________________________ Mr. Thomas Faust Asst Deputy Chief of Staff û G-2 DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: james.faust1@mi.army.mil _____________________________________________________ Vanessa Fauteux Field Marketing Manager Global Crossing 12010 Sunset Hills Road Suite 420 Reston , VA 20190 Phone: (none) Fax: (none) Email: Vanessa.Fauteux@GlobalCrossing.com _____________________________________________________ Chris Fedde TITLE TBD SafeNet, Inc. 4690 Millennium Drive Belcamp , MD 21017 Phone: (none) Fax: (none) Email: chris.fedde@safenet-inc.com _____________________________________________________ Chris Fedde TITLE TBD SafeNet, Inc. 4690 Millennium Drive Belcamp , MD 21017 Phone: (none) Fax: (none) Email: chris.fedde@safenet-inc.com _____________________________________________________ Andrew Feinsot President Moby Technologies 3203 19th St. N Arlington , VA 22201 Phone: (none) Fax: (none) Email: afeinsot@mobytechnologies.com _____________________________________________________ Dianne Feinstein Sen. Chairman Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (202) 228-3954 Email: scheduling@feinstein.senate.gov _____________________________________________________ Bradley H Feldman President, CDAI Cubic Defense Applications, Inc. 9333 Balboa Ave San Diego , CA 92123 Phone: (none) Fax: (none) Email: brad.feldman@cubic.com _____________________________________________________ John M Felker 2100 2nd Street SW Room 6613 Washington , DC 20593 Phone: (703) 736-0939 Fax: (none) Email: John.m.felker@uscg.mil _____________________________________________________ Kayla Feller 1600 South Joyce Street Apt 1526 Arlington , VA 22202 Phone: (571) 239-2170 Fax: (none) Email: kgfell@gmail.com _____________________________________________________ Jeffrey Feltman Near Eastern Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: feltmanj@state.gov _____________________________________________________ James Felton TITLE TBD General Dynamics AIS 14150 Newbrook Drive Suite 300 Chantilly , VA 20151 Phone: (none) Fax: (none) _____________________________________________________ Lorry Fenner Professional Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Lorry.Fenner@mail.house.gov _____________________________________________________ Dr Lorry M Fenner PhD Director, Conflict Records Resea Institute for National Strategic Studies, NDU 1241 4th St SW Washington , DC 20024 Phone: (202) 484-0411 Fax: (none) Email: lorryfenner@aol.com _____________________________________________________ Jessica Ferguson 601 South 12th Street Arlington , VA 22202 Phone: (none) Fax: (none) Email: jessica.ferguson@dhs.gov _____________________________________________________ Mr. Robert Ferguson Vice President, Contracts & Fina The Podmilsak Group One Fountain Square, 11911 Freed Suite 710 Reston , VA 20190 Phone: (none) Fax: (none) Email: rlfxii@hotmail.com _____________________________________________________ Mr. Thomas Ferguson Principal Deputy Undersecretary DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: thomas.ferguson@osd.mil _____________________________________________________ Joseph W Fernandez Econ, Energy, & Business Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: fernandezjw@state.gov _____________________________________________________ Ralph Fernandez PO BOX 141727 Miami , FL 33114 Phone: (none) Fax: (none) Email: sis1975@bellsouth.net _____________________________________________________ Alejandro Fernandez-Cernuda Diaz Analyst La Caixa Av. Diagonal 621 Barcelona 08041 Spain Phone: (none) Fax: (none) Email: alejandro.j.fernandez@lacaixa.es _____________________________________________________ Kelly Ferrell Sr. Director, DNI Programs GDIT Kelly Ferrell 13857 McLearen Road Herndon , VA 20171 Phone: (none) Fax: (none) Email: kelly.ferrell@gdit.com _____________________________________________________ Frederick J Ferrer Director, Cybersapce ARINC 2551 Riva Road Annapolis , MD 21401 Phone: (717) 252-6355 Fax: (none) Email: FFerrer@arinc.com _____________________________________________________ Mr. Andrew Ferris Program Manager Interf 47256 Middle Bluff Pl. Potomac Falls , VA 20165 Phone: (none) Fax: (none) Email: ferris@interf.com _____________________________________________________ Mr. Charles Fiala Senior Vice President, Governmen Corporate Office Properties Trust 6711 Columbia Gateway Drive Columbia , MD 21046-2104 Phone: (none) Fax: (none) Email: charles.fiala@copt.com _____________________________________________________ Chuck Fiala Senior VP - Gov't Services Corporate Office Properties Trust 6711 Columbia Gateway Drive Suite 300 Columbia , MD 21046 Phone: (none) Fax: (none) Email: charles.fiala@copt.com _____________________________________________________ Ms. Sarah Fiebig 7103 Hundsford Lane Springfield , VA 22153 Phone: (none) Fax: (none) Email: scfiebig@gmail.com _____________________________________________________ Ms. Sarah C Fiebig 4551 Strutfield Lane Apt 4431 Alexandria , VA 22311 Phone: (none) Fax: (none) Email: scfiebig@gmail.com _____________________________________________________ Richard Fieldhouse Strat Forces Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: richard_fieldhouse@armed-services.senate.gov _____________________________________________________ Mr. Bryan Fields 790 Village Top Canyon Lake , TX 78133 Phone: (none) Fax: (none) Email: wndwkr1@aol.com _____________________________________________________ Beth Finan Required unless Parent Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Patrick G Findlay Facilities and Logistics FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: patrick.findlay@ic.fbi.gov _____________________________________________________ Michael Finn INSA OCI Task Force Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) _____________________________________________________ Rick Finn 1421 Jefferson Davis Highway Suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) Email: rick.finn@gd-ais.com _____________________________________________________ Mr Pat Finnegan Manager Hirsch Electronics Pat Finnegan 11951 Freedom Drive Suite 1327 Reston , VA 20190 Phone: (304) 876-2923 Fax: (703) 251-4440 Email: patwv24@comcast.net _____________________________________________________ Mr Richard G Finnegan Richard G. Finnegan 2105 South Blosser Road Santa Maria , CA 93458 Phone: (none) Fax: (805) 928-9914 Email: rgfinnegan@quintron.com _____________________________________________________ Justin Firaben 5270 Navaho Dr Alexandria , VA 22312 Phone: (none) Fax: (none) Email: jfiraben@vt.edu _____________________________________________________ Mr. Thomas Fish 205 S. Whiting Street Suite 400 Alexandria , VA 22304 Phone: (none) Fax: (none) Email: thomas.fish@verizon.net _____________________________________________________ Mr. Thomas E Fish 198 Van Buren Street, Suite 250 Herndon , VA 20170 Phone: (none) Fax: (none) Email: tfish@mcmunn-associates.com _____________________________________________________ Mr. Scott D Fisher BS, MA Account Executive Capgemini Government Solutions 2250 Corporate Park Drive Suite 410 Herndon , VA 20171 Phone: (none) Fax: (none) Email: scott.fisher@capgemini-gs.com _____________________________________________________ Rand H Fisher Sr. VP, Systems Planning & Engin The Aerospace Corporation Attn: Linda Nicoll, M1-447 2310 E. El Segundo Blvd. El Segundo , CA 90245 Phone: (none) Fax: (none) Email: rand.h.fisher@aero.org _____________________________________________________ Leslie Fishpaw Product Management the SI 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: leslie.l.fishpaw@lmco.com _____________________________________________________ Mr. Bob Fitch SVice President, Government Rela BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: bob.fitch@baesystems.com _____________________________________________________ Mr. Dennis Fitzgerald 1358 Heritage Oak Way Reston , VA 20194 Phone: (none) Fax: (none) _____________________________________________________ Mr. John Fitzpatrick Director, Special Security Cente ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kathlgz@dni.gov _____________________________________________________ Kate Fitzpatrick TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Kate_Fitzpatrick@appro.senate.gov _____________________________________________________ Ms. Kelly Fitzpatrick Deputy Director of Legislative A DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kelly.fitzpatrick2@osd.mil _____________________________________________________ Bryan Flaherty MA; BA Receive grad University of Chicago 3351 Arnold Lane Falls Church , VA 22042 Phone: (none) Fax: (none) Email: bryanflaherty.info@gmail.com _____________________________________________________ Ms. Frances Fleisch TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: fjfleis@nsa.gov _____________________________________________________ Frederick Fleitz TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Frederick.Fleitz@mail.house.gov _____________________________________________________ Mr Frederick Fleitz Global analyst Newsmax Media 9037 Allington Manor Circle Frederick , MD 21703 Phone: (none) Fax: (none) Email: fredfleitz@yahoo.com _____________________________________________________ Mr. Michael G Fleming TITLE TBD NSA 9800 Savage Road I, Suite 6577 Fort George G. Meade , MD 20755 Phone: (none) Fax: (410) 854-7511 Email: mgflemi@nsa.gov _____________________________________________________ Kevin Flesher Chief Architect Lockheed Martin Space Systems 4882 Yates Circle Broomfield , CO 80020 Phone: (none) Fax: (none) Email: kevin.e.flesher@lmco.com _____________________________________________________ Mark Fletcher Federal Engagement Director Global Crossing 12010 Sunset Hills Road Suite 420 Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Curtis Flood Professional Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: CurtisFlood@mail.house.gov _____________________________________________________ Bob Flores Founder & CEO Applicology 9812 Squaw Valley Dr Vienna , VA 22182 Phone: (none) Fax: (none) Email: bob.flores@applicology.com _____________________________________________________ Ms. Michele Flournoy Under Secretary of Defense for P DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: michele.flournoy@osd.mil _____________________________________________________ Mr. David Floyd TITLE TBD LGS Innovations Accounts Payable 5440 Millstream Road Suite E210 McLeansville , NC 27301 Phone: (none) Fax: (none) Email: dfloyd@lgsinnovations.com _____________________________________________________ David Flynn President/COO SR Technologies, Inc. 4101 SW 47 Avernue Davie , FL 33314 Phone: (none) Fax: (none) Email: dflynn@srtrl.com _____________________________________________________ Mr. James Flynn Vice President, Contracts & Admi Sotera Defense Solutions, Inc 1501 Farm Credit Drive Suite 2300 McLean , VA 22102 Phone: (none) Fax: (none) Email: jflynn@theanalysiscorp.com _____________________________________________________ Mr. James Flynn TITLE TBD ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jamespf0@dni.gov _____________________________________________________ Mr. Louis Foiani Vice President Special Operations Technology, Inc. 12011 Guilford Road Suite 109 Annapolis Junction , MD 20701 Phone: (none) Fax: (none) Email: lfoiani@sotech.us _____________________________________________________ Michael J Folmar Security Division FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: michael.folmar@ic.fbi.gov _____________________________________________________ Marlin Forbes VP, Government Markets Core180, Inc. 2751 Prosperity Drive Suite 200 Vienna , VA 22031 Phone: (none) Fax: (none) _____________________________________________________ Mr. Carl Ford President Kanturk Partners, LLC. 17509 Charity Lane Germantown , MD 20874 Phone: (none) Fax: (none) Email: cford@kanturkpartners.com _____________________________________________________ Ms. Celeste Ford President Stellar Solutions, Inc. 250 Cambridge Avenue Suite 204 Palo Alto , CA 94306 Phone: (none) Fax: (none) Email: cford@stellarsolutions.com _____________________________________________________ Mr. Kevin Ford TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Richard Ford 3535 Military Trail, Suite 200 Jupiter , FL 33458 Phone: (none) Fax: (none) Email: rford@fedsys.com _____________________________________________________ Ms. Joni Forman Assoc Dean, Def Sys Mgmt Coll DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: joni.forman@dau.mil _____________________________________________________ Francine K Forney 1227 Michigan Court Alexandria , VA 22314 Phone: (none) Fax: (none) Email: ciney1@verizon.net _____________________________________________________ Mrs. Sandra J Forney 7555 Colshire Drive Fairfax , VA 22102 Phone: (none) Fax: (none) Email: sandra.forney@ngc.com _____________________________________________________ Ms. Sharon H Forrest 12024 Waterside View Drive, #13 Reston , VA 20194 Phone: (none) Fax: (none) Email: sharfor@regent.edu _____________________________________________________ Randall Fort TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Ms. Mary Forte TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Chris Foster Staff Engineer Ensco, Inc. 5400 Port Royal Road Springfield , VA 22151 Phone: (none) Fax: (none) Email: foster.christopher@ensco.com _____________________________________________________ Christopher C Foster TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Tom Foust TITLE TBD Intelsat General Corporation 6550 Rock Spring Drive Suite 450 Bethesda , MD 20817 Phone: (none) Fax: (none) Email: tom.foust@intelsatgeneral.com _____________________________________________________ MR TOM FOUST FOUST VP - GLOBAL NETWORK SOLUTIONS INTELSAT GENERAL CORPORATION 6550 ROCK SPRING DR SUITE 450 BETHESDA , MD 20817 Phone: (none) Fax: (none) Email: tom.foust@intelsatgeneral.com _____________________________________________________ TOM L FOUST 6550 ROCK SPRING DR SUITE 450 BETHESDA , MD 20852 Phone: (none) Fax: (none) Email: tom.foust@intelsatgeneral.com _____________________________________________________ Alex J Fox 1000 Wilson Blvd Suite 1800 Arlington , VA 22209 Phone: (none) Fax: (none) Email: afox@digitalglobe.com _____________________________________________________ Dr George Fox SSCP L.T Dr George Fox / Leftenant 28 Marshall St Queensland Goondiwindi , AE 4390 Australia Phone: (none) Fax: (none) Email: georgef@dark-lite.com _____________________________________________________ Mr. James P Fox Jr. 1653 21st RD N APT 6 Arlington , VA 22209 Phone: (none) Fax: (none) Email: foxer51780@gmail.com _____________________________________________________ Jay Fox Required unless Parent Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Joseph Fox Business Development Manager Cisco Systems, Inc. 7067 Balmoral Forest Road Clifton , VA 20124 Phone: (none) Fax: (none) Email: JosFox@Cisco.com _____________________________________________________ Michael Fox Space & Intel Programs Raytheon 1100 Wilson Blvd Suite 2000 Arlington , VA 22209 Phone: (none) Fax: (none) Email: michael.a.fox@raytheon.com _____________________________________________________ Michael Fox Senior Vice President White Oak Technologiese, Inc. 1300 Spring Street Suite 320 Silver Spring , VA 20910 Phone: (none) Fax: (none) _____________________________________________________ Mr. Sheldon J Fox President, National Programs Bus Harris Corporation P.O. Box 37 MS: 2-21D Melbourne , FL 32902 Phone: (none) Fax: (none) Email: sheldon.fox@harris.com _____________________________________________________ Ken Foxton 5860 Trinity Parkway Suite 400 Centerville , VA 20120 Phone: (none) Fax: (none) _____________________________________________________ Kenneth Foxton VP Intel Programs Camber Corp. 6992 Columbia Gateway Dr. Suite 150 Columbia , MD 21046 Phone: (none) Fax: (none) Email: kfoxton@camber.com _____________________________________________________ Kenneth Foxton VP National Intelligence Program Exceptional Software Strategies 849 International Drive, Ste 310 Linthicum , MD 21090 Phone: (none) Fax: (410) 694-0245 Email: kenneth.foxton@exceptionalsoftware.com _____________________________________________________ Mr. Kenneth L Foxton 8615 Open Meadow Way Columbia , MD 21045 Phone: (none) Fax: (none) Email: kfoxton@yakabod.com _____________________________________________________ Miss Samantha J Foxton B.S. LT USN LT Samantha Foxton 6509 Sampson Rd. Suite 217 Dahlgren , VA 22448 Phone: (none) Fax: (none) Email: samantha.j.foxton@gmail.com _____________________________________________________ Thomas Francis Deputy J2 DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: thomas.francis@js.pentagon.mil _____________________________________________________ Joshua Franke CMR 489 Box 1124 APO , AE 9751 Phone: (none) Fax: (none) Email: joshua.tyson.franke@us.army.mil _____________________________________________________ Mr. Thomas Franklin A.A.S. Alternate COMSEC Manager SAIC Mail Stop E-3G 4161 Campus Point Court San Diego , CA 92121 Phone: (951) 461-1951 Fax: (858) 826-5410 Email: tgfranklin59@verizon.net _____________________________________________________ Ms. Lori Franko Systems Consultant Manager Dell Inc. One Dell Way One Dell Way Round Rock , TX 78682 Phone: (none) Fax: (none) Email: lori_franko@dell.com _____________________________________________________ Ms. Lorin Frantzve 9743 E. Sharon Dr. Scottsdale , AZ 85260 Phone: (none) Fax: (none) Email: lfrantzve@imetlabs.com _____________________________________________________ Mr. Mike Fraser TITLE TBD USIS 7799 Leesburg Pike Suite 400 S Falls Church , VA 22043 Phone: (none) Fax: (none) Email: mike.fraser@usis.com _____________________________________________________ Mr. Richard Fravel Chief Operating Officer NGA 4600 Sangamore Road, D-100 Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: richard.fravel@nga.mil _____________________________________________________ Marshall Banker President, Customer Solutions BAE Systems Information Technology 1300 North 17th Street Suite 1400 Rosslyn , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Tristan A Bannon MS Director Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: tristan.bannon@lmco.com _____________________________________________________ Mr. Len Baptiste Director, Federal Security Solut Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: lbaptiste@csc.com _____________________________________________________ Mr. Greg Barac Chief, NGA Support Team to DHS NGA 4600 Sangamore Road Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: greg.barac@nga.mil _____________________________________________________ Edward J Baranoski ODNI, IARPA Director SMART Colle ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: edward.j.baranoski@ugov.gov _____________________________________________________ James Barber IT Architect-EA IBM 15036 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: jpbarber@us.ibm.com _____________________________________________________ Jeffrey Bardin 515 Oakham Road Barre , MA 1005 Phone: (none) Fax: (none) Email: jbardin@treadstone71.com _____________________________________________________ Anthony Barger DASDNII DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: anthony.barger@osd.mil _____________________________________________________ Barry M Barlow Director, Acquisition Directorat NGA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: barry.barlow@nga.mil _____________________________________________________ Mr Charles R Barlow BEE Corp. Vice President Communication Technologies, Inc (dba COMTek) Charles Barlow 3684 Centerview Dr. Suite 100 Chantilly , VA 20151 Phone: (703) 476-5244 Fax: (703) 961-1330 Email: barlowcr@aol.com _____________________________________________________ Mr. George Barnes TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. John Barnes Vice President, Legislative Oper Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: john_barnes@raytheon.com _____________________________________________________ Mr. Thomas Barnes 5504 Sir Douglas Dr Bryans Road , MD 20616 Phone: (none) Fax: (none) Email: desrtrat6@verizon.net _____________________________________________________ Mr. Max Barnett 4501 Connecticut Ave NW #906 Washington , DC 20008 Phone: (none) Fax: (none) Email: max@maximusit.com _____________________________________________________ Steve Barney TITLE TBD SRA 4350 Fair Lakes Court Fairfax , VA 22033 Phone: (none) Fax: (none) Email: sbarney@raba.com _____________________________________________________ Mr. Michael Barr Account Executive Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: mbarr@microsoft.com _____________________________________________________ John Barrass BA, MBA COO RSSi 1303 Chamberlain Woods Way Vienna , VA 22182 Phone: (none) Fax: (703) 997-8115 Email: jbarrass@rss-i.com _____________________________________________________ Mr. Hugo Barrera 11410 NW 20th Street Rm 200 Miami , FL 33172 Phone: (none) Fax: (none) Email: Hugo.Barrera@atf.gov _____________________________________________________ Mr. Michael Barrett TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: michael.barrett@nro.mil _____________________________________________________ Sophie Barrett VP of Communications QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: sophie.barrett@qinetiq-na.com _____________________________________________________ William Barroll Vice President Corporate Office Properties Trust 6711 Columbia Gateway Drive Columbia , MD 21046-2104 Phone: (none) Fax: (none) Email: bill.barroll@copt.com _____________________________________________________ Lisa Barrow TITLE TBD Deloitte Consulting, LLP No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: lbarrow@deloitte.com _____________________________________________________ Mr. David Barth US Customs and Border Proection DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: david.barth@dhs.gov _____________________________________________________ Mr. G. D Bartko TITLE TBD NSA 9800 Savage Road S31, Suite 6456 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: gdbartk@nsa.gov _____________________________________________________ Bart Bartlett Sr Director Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Mr. Thomas Frazier P.O. Box 50218 Baltimore , MD 21211 Phone: (none) Fax: (none) Email: tfrazier@attach.net _____________________________________________________ Tony Frazier Sr VP of Marketing GeoEye 2325 Dulles Corner Blvd. Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ H L Fredricks, Commissioner Intelligence Official Govt 1455 Coney Island Ave Rm : 10 B Bklyn, , NY 11230 Phone: (none) Fax: (none) Email: 13152784989@tmomail.net _____________________________________________________ Mr. Brett Freedman 1113 Fairview Court Silver Spring , MD 20910 Phone: (none) Fax: (none) Email: brettfreedman@gmail.com _____________________________________________________ Brett Freedman 1113 Fairview Ct. Silver Spring , MD 20910 Phone: (none) Fax: (none) Email: brettfreedman@gmail.com _____________________________________________________ Rob Freedman Director Ball Aerospace 2111 Wilson Blvd., Suite 1120 Arlington , VA 22201 Phone: (none) Fax: (none) _____________________________________________________ Robert Freedman Ph.D. Director Strategic Initiatives Ball Aerospace and Technologies 9675 W. 108th Circle Westminster , CO 80021 Phone: (none) Fax: (none) Email: rfreedma@ball.com _____________________________________________________ James H Freis Director, FINCEN Treasury Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: james.freis@do.treas.gov _____________________________________________________ Steven Frenz VP, Business Development Directo SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: steven.h.frenz@saic.com _____________________________________________________ Dr. Robert A Friedenberg 11921 Freedom Drive Suite 730 Reston , VA 20190 Phone: (none) Fax: (none) Email: Dr.Bob@SecureMissionSolutions.com _____________________________________________________ Mr. John Friedlander 301 West 108 Street, 2nd New York , NY 10025 Phone: (none) Fax: (none) Email: jfriedlander@nyc.rr.com _____________________________________________________ Mr. Robert Frisbie TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) _____________________________________________________ Mr. Gary Frisvold TITLE TBD NSA 9800 Savage Road DF2, Suite 6229 Fort George G. Meade , MD 20755 Phone: (none) Fax: (301) 688-5204 Email: gafrisv@nsa.gov _____________________________________________________ Ms. Libby Fritsche TITLE TBD Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Elizabeth.fritsche@ca.com _____________________________________________________ Robert Frizzelle Vice President and General Manag Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: rfrizzelle@csc.com _____________________________________________________ Mr. Dave Frostman Vice President, Strategic Initia Stellar Solutions, Inc. 250 Cambridge Avenue Suite 204 Palo Alto , CA 94306 Phone: (none) Fax: (none) Email: dfrostman@stellarsolutions.com _____________________________________________________ Mr. Robert Frucella 1410 Spring Hill Road #600 McLean , VA 22102 Phone: (none) Fax: (none) Email: offpiste@ix.netcom.com _____________________________________________________ Mr. David A Frye President DFA, Inc. Atlanta HQ 5585 Mill Gate CT. Dunwoody , GA 30338 Phone: (none) Fax: (none) Email: dafrye@dfaco.com _____________________________________________________ Ms. Deborah Frye 6809 Kenyon Dr Alexandria , VA 22307 Phone: (none) Fax: (none) Email: debbie.frye@gmail.com _____________________________________________________ Mr. Randy Fuerst Chief Operating Officer CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: rfuerst@caci.com _____________________________________________________ Chad L Fulgham Chief Information Officer FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: chad.fulgham@ic.fbi.gov _____________________________________________________ Eric Fuller Vice President, Special Programs Berico Technologies 1501 Lee Highway Suite 303 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Gary Fuller Principal Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Fuller_Gary@bah.com _____________________________________________________ Mr. Wayne Fullerton Ops Dir, National PGeneral Manag Cisco Systems, Inc. 13635 Dulles Technology Drive Herndon , VA 20171 Phone: (none) Fax: (none) Email: wfullert@cisco.com _____________________________________________________ Mr. Mel Fulton 1301 Gatesmeadow Way Reston , VA 20194 Phone: (703) 471-0358 Fax: (none) Email: melfulton@msn.com _____________________________________________________ Mel Fulton TITLE TBD BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ George Funk TITLE TBD Dell Inc. One Dell Way One Dell Way Round Rock , TX 78682 Phone: (none) Fax: (none) Email: george_funk@dell.com _____________________________________________________ Mr. Nicholas Fuqua 1140 Connecticut Ave., N.W. Ste 1140 Washington , DC 20036 Phone: (none) Fax: (none) Email: nicholas.fuqua@defensegp.com _____________________________________________________ Mr. W. Furr P.O. Box 16850 Salt Lake City , UT 84116 Phone: (none) Fax: (none) Email: frank.furr@l-3com.com _____________________________________________________ Mr. John Gannon Vice President, General Manager BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: john.gannon@baesystems.com _____________________________________________________ Dr. Lenora Gant Director of the Intelligence Com ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: lenora.p.gant@ugov.gov _____________________________________________________ Frank Garci TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: frank.garcia@mail.house.gov _____________________________________________________ Frank Garcia Jr. 9621 Podium Dr. VIenna , VA 22182 Phone: (none) Fax: (none) Email: fwgjr@verizon.net _____________________________________________________ Frank Garcia Jr. 9621 Podium Dr. Vienna , VA 22182-3339 Phone: (none) Fax: (none) Email: garciafwg@gmail.com _____________________________________________________ Mr. John Garcia 5 Oak Run Road Laurel , MD 20724 Phone: (none) Fax: (none) Email: j.garcia@hp.com _____________________________________________________ Mr. Michael Garcia Account Executive Oracle Corporation 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: mike.garcia@oracle.com _____________________________________________________ Michael Garcia Strategic Program Mgr HP Federal APG Strategic Programs Office 6600 Rockledge Drive Bethesda , MD 20817 Phone: (none) Fax: (none) Email: michael.garcia2@hp.com _____________________________________________________ Mr. Michael R Garcia 22010 Ayr Hill Court Ashburn , VA 20148 Phone: (none) Fax: (none) Email: garcia2@hp.com _____________________________________________________ Rebecca Garcia Dir. Sales & Bus. Development SAS Institute 1530 Wilson Blvd Suite 800 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Rebecca Garcia 1530 Wilson Blvd. Ste.800 Arlington , VA 22209 Phone: (none) Fax: (none) Email: rebecca.garcia@sas.com _____________________________________________________ Mark S Gardiner MA General Manager BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (703) 242-6358 Fax: (none) Email: mark.gardiner@baesystems.com _____________________________________________________ Greg Gardner 1921 Gallows Rd Vienna , VA 22182 Phone: (none) Fax: (none) Email: greg.gardner@netapp.com _____________________________________________________ Janice Gardner Assistant Secretary (Intelligenc Treasury Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Janice.Gardner@do.treas.gov _____________________________________________________ Mr. Arthur Garner 2295 Otter Rock Avenue Henderson , NV 89044-0143 Phone: (none) Fax: (none) Email: artgarner@mviewcc.com _____________________________________________________ Mr. Joseph Garofalo 1906 Kings Forest Trail Mount Airy , MD 21771 Phone: (none) Fax: (none) Email: Joseph.Garofalo@hq.dhs.gov _____________________________________________________ Mike Garramone Director Ball Aerospace 2111 Wilson Blvd., Suite 1120 Arlington , VA 22201 Phone: (none) Fax: (none) Email: rbturner@ball.com _____________________________________________________ Mr. W. Garrett 777 7th Street, N.W. Ste 326 Washington , DC 20001 Phone: (none) Fax: (none) Email: wsg45@comcast.net _____________________________________________________ Mr. William S Garrett Founder / MD SecurDigital 601 Pennsylvania Avenue NW, Suit Suite #900, South Building Washington , DC 200042642 Phone: (none) Fax: (301) 864-0291 Email: w.steven.garrett@gmail.com _____________________________________________________ Mr. Ricky Garris 10900 Scott Drive Fairfax , VA 22030 Phone: (none) Fax: (none) Email: RG4411@verizon.net _____________________________________________________ Ricky Garris Senior Director Salient Federal Solutions 8618 Westwood Center Drive Suite 100 Vienna , VA 22182 Phone: (none) Fax: (703) 940-0084 Email: Ricky.Garris@salientfed.com _____________________________________________________ Alex Garza Assistant Chief of Health Affair DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: alex.garza@hq.dhs.gov _____________________________________________________ Wayne Gaskill IT Program Manager CACI 26104 Flintonbridge Drive Chantilly , VA 20152 Phone: (none) Fax: (none) Email: waynegaskill@gmail.com _____________________________________________________ Matthew E Gaston Co-Director Software Engineering Institute, CMU NRECA Building Suite 200 Arlington , VA 22203 Phone: (412) 268-3918 Fax: (none) _____________________________________________________ Harry D Gatanas Sr VP Defense and Intelligence Serco 1622 Wyatts Ridge Crownsville , MD 21032 Phone: (none) Fax: (none) Email: harry.gatanas@serco-na.com _____________________________________________________ Ms. Janelle Gatchalian TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: jgatchalian@potomacinstitute.org _____________________________________________________ Ms. Kathleen L Harger 888 N. Quincy Street #1912 Arlington , VA 22203 Phone: (none) Fax: (none) Email: harger.kathleen@gmail.com _____________________________________________________ Mr. Drew Harker TITLE TBD Arnold & Porter 555 Twelfth Street, NW Washington , DC 20004 Phone: (none) Fax: (none) Email: Drew_Harker@aporter.com _____________________________________________________ Mr. Bill Harp MA Defense Intel Esri Bill Harp - Industry Solutions 380 New York St Redlands , CA 92373 Phone: (none) Fax: (909) 307-3039 Email: bharp@esri.com _____________________________________________________ Preston Harrelle TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Thomas J Harrington EAD Criminal Cyber Response FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: thomas.harrington@ic.fbi.gov _____________________________________________________ Adam Harris Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Adam.Harris@mail.house.gov _____________________________________________________ Mr. Basil " Harris Jr Executive for Federal ISE Progra Office of the PM-ISE, ODNI Mr. Nick Harris 2100 K ST NW Suite 300 Washington , DC 20511 Phone: (none) Fax: (none) Email: nbasilh@dni.gov _____________________________________________________ Mr. Basil N Harris TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: b.harris@radium.ncsc.mil _____________________________________________________ Ms. Gail Harris 555 Rivergate Lane B1-113 Durango , CO 81301 Phone: (none) Fax: (none) Email: Harrisg44@aol.com _____________________________________________________ Ms. Maggie M Harris President and CEO Engineering Systems Consultants, Inc. 8201 Corporate Drive Suite 1105 Landover , MD 20785-2230 Phone: (202) 554-1009 Fax: (301) 577-0136 _____________________________________________________ Ronald Harris Business Development Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: ronald.r.harris.lmco.com _____________________________________________________ Mr. William J Harris Director Raytheon Company 22270 Pacific Blvd Dulles , VA 20166 Phone: (none) Fax: (none) Email: william_J_Harris@raytheon.com _____________________________________________________ Duane Harrison TITLE TBD DIA 342 12th Street SE Washington , DC 20003 Phone: (none) Fax: (none) Email: duane.harrison@dia.mil _____________________________________________________ Mr. George Harrison 109 Middleton Drive Peachtree City , GA 30269 Phone: (none) Fax: (none) Email: george.harrison@gtri.gatech.edu _____________________________________________________ Mr. Jerry C Harrison Vice President SRI International 1100 Wilson Boulevard Suite 2800 Arlington , VA 22209 Phone: (none) Fax: (none) Email: jerry.harrison@sri.com _____________________________________________________ Dr. Steven D Harrison 12004 Governors Court Woodbridge , VA 22192 Phone: (none) Fax: (none) Email: imer71@netscape.net _____________________________________________________ Col. Stuart Harrison 5605 Doolittle Street Burke , VA 22015 Phone: (none) Fax: (none) Email: sharrison2@cox.net _____________________________________________________ Mr Stuart Harrison Vice President Parsons 100 M Street SE Washington , DC 20003 Phone: (none) Fax: (none) Email: sharrison2@cox.net _____________________________________________________ Mr. Bruce Hart COO Terremark 460 Spring Park Place Ste 1000 Herndon , VA 20170 Phone: (none) Fax: (none) Email: bhart@terremark.com _____________________________________________________ Mr. William Hart 9736 Riverside Circle Ellicott City , MD 21042 Phone: (none) Fax: (none) Email: whart13407@aol.com _____________________________________________________ P.O. Brendan E Hartford Police Officer Chicago Police Department-SWAT Team 3510 S. Michigan Chicago , IL 60653 Phone: (none) Fax: (none) Email: brendan.hartford@chicagopolice.org _____________________________________________________ Tim Hartman General Manager Government Executive ADDRESS TBD Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. James Hartney TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Deborah Harvey Director SRC 941 Glenwood Station Lane Suite 301 Charlottesville , VA 22901 Phone: (none) Fax: (none) Email: harvey@srcinc.com _____________________________________________________ Dr. Lawrence Gershwin Excellence ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: lawrekg@dni.gov _____________________________________________________ Mr. Kenneth Gertz 2133 Lee Building College Park , MD 20742-5125 Phone: (none) Fax: (none) Email: kgertz@umd.edu _____________________________________________________ Mr. Joseph Ghannam Sr. Intel Recruitment Consultant BAE Systems Inc. 2525 Network Place Herndon , VA 20171 Phone: (none) Fax: (none) Email: joseph_nad@yahoo.com _____________________________________________________ Mr. Matthew J Ghormley Pgm Mgr, DAU School of Pgm Mgmt DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: matthew.ghormley@dau.mil _____________________________________________________ Mr. Stanley Giannet 5929 Lafayette Street New Port Richey , FL 34652 Phone: (none) Fax: (none) Email: drgiannet@yahoo.com _____________________________________________________ Mr. Ben Gianni Vice President, DHS Programs Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: bgianni@csc.com _____________________________________________________ Mr. Timothy Gibson Liason to DARPA NSA 4109 John Trammell Court Fairfax , VA 22030 Phone: (none) Fax: (703) 516-8784 Email: timothy.gibson@darpa.mil _____________________________________________________ Robert Giesler VP, Cyber Security Director SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: robert.j.giesler@saic.com _____________________________________________________ Mr. Anthony Gigioli Vice President, Systems Engineer Camber Corporation 5860 Trinity Parkway Suite 400 Centerville , VA 20120 Phone: (none) Fax: (none) Email: tgigioli@i2spros.com _____________________________________________________ Mr. James Gigrich 1050 Connecticut Avenue, NW Suite 1000 Washington , DC 20036 Phone: (none) Fax: (none) Email: james_gigrich@agilent.com _____________________________________________________ RADM. Ann D Gilbride Director (Retired), National Mar DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ann.gilbride@osd.mil _____________________________________________________ Mr. Richard Gildea Vice President, US Business Deve Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: rfgildea@raytheon.com _____________________________________________________ Mr. Louis F Giles Director of Policy NSA 9800 Savage Road DC3, Suite 6248 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: lfgiles@nsa.gov _____________________________________________________ Charles Gill Principal Systems Engineer The SI Organization 15050 Conference Center Drive Chanitlly , VA 20151 Phone: (none) Fax: (none) Email: charles.w.gill@lmco.com _____________________________________________________ Peter Gill SVP, Deputy Group President SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: peter.gill@saic.com _____________________________________________________ Mr. David W Gillard Systems Director The Aerospace Corporation 15049 Conference Center Drive Chantilly , VA 20151 Phone: (703) 437-8353 Fax: (571) 307-1234 Email: david.w.gillard@aero.org _____________________________________________________ Dan Gillespie Director, Corporate Business Dev LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (703) 464-9765 Fax: (none) Email: dgillespie@lmi.org _____________________________________________________ Dan Gilliam Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Jim Gillie Director CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: jgillie@caci.com _____________________________________________________ Dr. James Giordano TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: jgiordano@potomacinstitute.org _____________________________________________________ Thomas Giroir Principal, Business Development Tresys Technology Tom Giroir 8840 Stanford Blvd. Suite 2100 Columbia , MD 21045 Phone: (none) Fax: (410) 953-0494 Email: tgiroir@tresys.com _____________________________________________________ Richard Girven Rep. TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: r_girven@ssci.senate.gov _____________________________________________________ Mrs. Natalie Givans Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Givans_Natalie@bah.com _____________________________________________________ Mr. Edmund Glabus Corporate Senior Vice President ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) Email: ed.glabus@mantech.com _____________________________________________________ Michael Glasby TITLE TBD Intelsat General Corporation 6550 Rock Spring Drive Suite 450 Bethesda , MD 20817 Phone: (none) Fax: (none) _____________________________________________________ Brendan Glasgow Federal Account Manager SafeNet, Inc. 1655 Fort Myer Drive, Suite 1150 Arlington , VA 20832 Phone: (none) Fax: (none) Email: Brendan.Glasgow@safenet-inc.com _____________________________________________________ Mr. Michael Glass Crystal Square 5 Ste 300 Washington , DC 20511 Phone: (none) Fax: (none) Email: michaeljg@dni.gov _____________________________________________________ Mr. Matthew Glaudemans 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: matthew.glaudemans@lmco.com _____________________________________________________ Mr. Gene Glazar Vice President, Business Develop BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: gene.glazar@baesystems.com _____________________________________________________ Amy Glazier BA Intern ICTS 629 Q St. NW Washington , DC 20001 Phone: (none) Fax: (none) Email: amyglazier@gmail.com _____________________________________________________ Mr. Stephen Glennan 332 Red Magnolia Court Millersville , MD 21108 Phone: (none) Fax: (none) Email: stephenglennan@netscape.net _____________________________________________________ Mr. Michael Glogow CIO Office DHS 9620 W. Russell Road, #2098 Las Vegas , NV 89148 Phone: (none) Fax: (none) Email: michael.glogow@dhs.gov _____________________________________________________ Mr. Pat Gnazzo TITLE TBD Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: patrick.gnazzo@ca.com _____________________________________________________ Lorenzo Goco Budget Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: L_Goco@ssci.senate.gov _____________________________________________________ Jeff Godbold Director of Federal Solutions Basis Technology 2553 Dulles View Drive Suite 450 Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ Mr. Dale Goddeke Director, Advanced Solutions Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: dale_h_goddeke@raytheon.com _____________________________________________________ Richard Godfrey TITLE TBD MorganFranklin 1753 Pinnacle Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: rick.godfrey@morganfranklin.com _____________________________________________________ Donald Goff TITLE TBD Criterion Systems 6613 Rosecroft Place Falls Church , VA 22043 Phone: (none) Fax: (none) Email: dgoff@criterion-sys.com _____________________________________________________ Robert Goffner 4208 Hunt Club Circle Apt. 702 Fairfax , VA 22033 Phone: (none) Fax: (none) Email: galaxypheonix@hotmail.com _____________________________________________________ Geoff Goldberg Required unless Parent Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Philip S Goldberg Intelligence and Research State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: goldbergps@state.gov _____________________________________________________ Richard Goldberg Senior VP of Public Affairs DRS Technologies, Inc. 5 Sylvan Way Parsippany , NJ 7054 Phone: (none) Fax: (none) Email: goldberg@drs.com _____________________________________________________ Richard Goldberg TITLE TBD DRS Technologies, Inc. 5 Sylvan Way Parsippany , NJ 7054 Phone: (none) Fax: (none) Email: goldberg@drs.com _____________________________________________________ Brad Goldman TITLE TBD SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: bradford.l.goldman@saic.com _____________________________________________________ Dr. Bradford L Goldman VP- Intelligence Sector Parsons Corporation 100 M Street, SE Washington , DC 20003 Phone: (none) Fax: (none) Email: Bradford.Goldman@Parsons.com _____________________________________________________ Mr. Benjamin Goldsmith 1619 R St NW Apt 206 Washington , DC 20009 Phone: (none) Fax: (none) Email: bwgoldsmith@gmail.com _____________________________________________________ Mr. Jon Goldsmith Director, Business Development Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: jgoldsmith@csc.com _____________________________________________________ David Goldstein Senior Systems Engineer Draper Laboratory 555 Technology Square Cambridge , MA 02139 Phone: (none) Fax: (none) Email: dgoldstein@draper.com _____________________________________________________ Seth Goldstein 2032 Derby Hall 154 N. Oval Mall Columbus , OH 43210 Phone: (none) Fax: (none) Email: goldstein.95@polisci.osu.edu _____________________________________________________ Peter Goldstone President Government Executive ADDRESS TBD Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ David L Goldwyn International Energy Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: goldwyndl@state.gov _____________________________________________________ David C Gombert Principal Dep Dir of Nat Intel ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: sandra.s.jimenez@ugov.gov _____________________________________________________ cathy a gombrsTest programmer gombrs line sterling , VA 20164 Phone: (none) Fax: (none) Email: ck@aol.com _____________________________________________________ Gary M Gomez M.A. Director, Business Development Delex Systems Inc. 1953 Gallows Rd. Vienna , VA 22182 Phone: (none) Fax: (none) Email: GGomez@delex.com _____________________________________________________ Magda J Gomez CNCM Board Agent National Labor Relations Board 1201 W. Mt. Royal Avenue 457 Baltimore , MD 21217 Phone: (none) Fax: (none) Email: magdajohannagomez@yahoo.com _____________________________________________________ Jose Gomez-Canaan Vice President AQUANIL Av. 27 de Febrero No.266 Edificio INACIF Santo Domingo 22195 Dominican Republic Phone: (none) Fax: (unlisted) Email: jose@aqua.com.do _____________________________________________________ Tanis Gonsalves TITLE TBD Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Mr. Peter Goobic TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Peter.Goobic@gd-ais.com _____________________________________________________ Michael Good Commander's Action Group, JFCC-N NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mjgood@nsa.gov _____________________________________________________ Randall Good Director ENSCO, Inc. 5400 Port Royal Road Springfield , VA 22151 Phone: (none) Fax: (none) Email: good.randall@ensco.com _____________________________________________________ Mr. Thomas Goodall Assistant for Program Developmen Pennsylvania State University - App. Research Labo P.O. Box 30 State College , PA 16804 Phone: (none) Fax: (none) Email: tdg10@arl.psu.edu _____________________________________________________ Thomas D Goodall TITLE TBD Pennsylvania State University - App. Research Labo P.O. Box 30 State College , PA 16804 Phone: (none) Fax: (none) Email: tdg10@only.arl.psu.edu _____________________________________________________ Mr. Linda Gooden Executive Vice President Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: linda.gooden@lmco.com _____________________________________________________ Jason P Goodfriend BA Director BAE Systems 8201 Greensboro Drive McLean , VA 22102 Phone: (none) Fax: (703) 847-5880 Email: jason.goodfriend@baesystems.com _____________________________________________________ Mr. Tom Goodman TITLE TBD Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: thomas.goodman@ca.com _____________________________________________________ Mr. John Goodson Business Development Analysis Vi Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: john.goodson@lmco.com _____________________________________________________ Mr. Cristin Goodwin Policy Counsel Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: cgoodwin@microsoft.com _____________________________________________________ Eric Goosby US Global AIDS Coordinator State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: goosbye@state.gov _____________________________________________________ Mr. Mike Gorbell 4660 Paint Horse Trail Santa Maria , CA 93455 Phone: (none) Fax: (none) Email: gorbell@msn.com _____________________________________________________ Philip H Gordon European & Eurasian Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: gordonph@state.gov _____________________________________________________ Samuel Gordy SVP, Deputy General Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: samuel.j.gordy@saic.com _____________________________________________________ Mr. Jason Gorey 19 Centre Street Wakefield , MA 1880 Phone: (none) Fax: (none) Email: jasongorey@gmail.com _____________________________________________________ Dr. Allen L Gorin TITLE TBD NSA 9800 Savage Road R6, Suite 6513 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: algorin@nsa.gov _____________________________________________________ Michael Goss Vice President BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: michael.goss@baesystems.com _____________________________________________________ Rose Gottemoeller Verification, Compliance, and Im State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: gottemoellerr@state.gov _____________________________________________________ Evan R Gottesman TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: e_gottesman@ssci.senate.gov _____________________________________________________ Mr. Robert Gourley 15017 Rumson Place Manassas , VA 20111 Phone: (none) Fax: (none) Email: bob@crucialpointllc.com _____________________________________________________ Mr. William Gouveia 7809 Mistic View Court Rockville , MD 20855 Phone: (none) Fax: (none) Email: gouveia_william@bah.com _____________________________________________________ Elizabeth Govan M.A. B.A. 135A Riverview Ave Annapolis , MD 21401 Phone: (none) Fax: (none) Email: elizabethgovan@aol.com _____________________________________________________ Dana Goward Director, Office of Assessment DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: dana.goward@dhs.gov _____________________________________________________ Ms. Diana Gowen Senior Vice President Qwest Communications 4250 N. Fairfax Dr. 5th Floor Arlington , VA 22203 Phone: (none) Fax: (none) Email: diana.gowen@qwest.com _____________________________________________________ Dr Walt Grabowski VP Business Development Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Ms. Judith Grabski Director, Operations TRSS, LLC 1410 Spring Hill Rd Suite 140 McLean , VA 22102 Phone: (none) Fax: (none) Email: judith.grabski@trssllc.com _____________________________________________________ Ms. Rae Grad 1101 Main Administration College Park , MD 20742 Phone: (none) Fax: (none) Email: rgrad@umd.edu _____________________________________________________ Liz A Grady Executive Assistant Hewlett Packard Federal APG Sales 1 Flint Pond Drive No. Grafton , MA 01536 Phone: (none) Fax: (none) Email: lizette.a.grady@hp.com _____________________________________________________ Liz A Grady 6600 Rockledge Drive Bethesda , MD 20817 Phone: (508) 839-7257 Fax: (none) Email: lizette.a.grady@hp.com _____________________________________________________ Lizette A Grady Administrative Assistant Hewlett Packard Federal APG Sales Robert Siebert 6600 Rockledge Drive Bethesda , MD 20817 Phone: (443) 852-1842 Fax: (none) Email: lizette.a.grady@hp.com _____________________________________________________ Mr. Hampton D Graham Vice President Owl Computing Technology Inc. 38A Grove Street Suite 101 Ridgefield , CT 06877 Phone: (none) Fax: (203) 894-1297 Email: dgraham@owlcti.com _____________________________________________________ Mr James S Graham Finance BS Financial Analyst NetStar-1 110 S Wise St Apt 2 Arlington , VA 22204 Phone: (571) 830-4563 Fax: (none) Email: grahamjs70@gmail.com _____________________________________________________ Tim Graham Acct Exec IBM Federal Software 2300 Dulles Station Blvd Herndon , VA 20171 Phone: (none) Fax: (703) 943-1952 Email: tim_graham@us.ibm.com _____________________________________________________ David Grannis Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: D_Grannis@ssci.senate.gov _____________________________________________________ Mr. Arthur Grant TITLE TBD Raytheon 10866 Burr Oak Way Burke , VA 22015 Phone: (none) Fax: (none) Email: arthur_v_grant@raytheon.com _____________________________________________________ Mr. Jeff Grant VP, NGAS Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: jeff.d.grant@ngc.com _____________________________________________________ Mr. Jeffrey Grant One Space Park E2/11092 Redondo Beach , CA 90278 Phone: (none) Fax: (none) Email: jeff.d.grant@ngc.com _____________________________________________________ Mr. Jeremy Grant 1655 North Fort Meyer Drive Suite 1000 Arlington , VA 22209 Phone: (none) Fax: (none) Email: jgrant@acqsolinc.com _____________________________________________________ John Grant Cyber Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john_grant@hsgac.senate.gov _____________________________________________________ Vernon Grapes TITLE TBD Stellar Solutions, Inc. 250 Cambridge Avenue Suite 204 Palo Alto , CA 94306 Phone: (none) Fax: (none) _____________________________________________________ Mr. Donald Grass 15459 Championship Drive Haymarket , VA 20169 Phone: (none) Fax: (none) Email: dakiers@vacoxmail.com _____________________________________________________ Mr. Donald Grass TITLE TBD NRO 15459 Championship Drive Haymarket , VA 20169 Phone: (none) Fax: (none) Email: donald.grass@nro.mil _____________________________________________________ Mr. Michael Grasso Vice President, Government Relat Lockheed Martin, Washington Operations 2121 Crystal Dr Arlington , VA 22202 Phone: (none) Fax: (none) Email: Michael.a.grasso@lmco.com _____________________________________________________ Bill Gravell Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Julie Gravellese INSA Innovative Tech Council MITRE Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Tracy Graves Stevens President MSM Security Services, LLC. 8401 Connecticut Ave Suite 700 Chevy Chase , MD 20815 Phone: (none) Fax: (none) _____________________________________________________ Mr. Benjamin Gray 11417 Encore Drive Silver Spring , MD 20901 Phone: (none) Fax: (none) Email: bgray@alumni.nd.edu _____________________________________________________ Donald A Gray 13 Country Manor Road Eagle Lake , MN 56024 Phone: (none) Fax: (none) Email: donald.gray83@gmail.com _____________________________________________________ mark gray Staff Officer ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: a78548@me.com _____________________________________________________ Dr. Timothy P Grayson 9704 Glenway Ct Burke , VA 22015 Phone: (none) Fax: (none) Email: tgrayson@ktech.com _____________________________________________________ Libby Greco Director, Field Marketing Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Gavin Green Business Development, Senior Man CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) _____________________________________________________ Jason Green 14825 Adriatic Court Haymarket , VA 20169 Phone: (none) Fax: (none) Email: jgreen@us.ibm.com _____________________________________________________ Katherine Green Vice President Abraxas Corp 12801 Worldgate Dr Suite # 800 Herndon , VA 20170 Phone: (none) Fax: (none) _____________________________________________________ Ms. Katherine M Green Vice President Abraxas Corporation, a Cubic Company 205 Van Buren Street Suite 210 Herndon , VA 20170 Phone: (none) Fax: (703) 821-8511 Email: katherine.green@abraxascorp.com _____________________________________________________ Matt Green Chief of Staff Finmeccanica Angelica Falchi 1625 I Street, NW 12th Floor Washington , DC 20006 Phone: (none) Fax: (none) Email: matthew.green@finmeccanica.com _____________________________________________________ Owen Greenblatt 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: owen.greenblatt@lmco.com _____________________________________________________ Creighton Greene Strat Forces/Intel Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: creighton_greene@armed-services.senate.gov _____________________________________________________ Amanda Greenland Intel/Admin Coordinator OUSD(I) Amanda Greenland 5000 Defense Pentagon Room 3C915 Washington , DC 20301 Phone: (none) Fax: (none) Email: Amanda.Greenland@osd.mil _____________________________________________________ Mr. Aaron Greenwald 3000 N. Washington Blvd Apt. 528 Arlington , VA 22201 Phone: (none) Fax: (none) Email: Aaron.Greenwald@jhu.edu _____________________________________________________ Mr. Aaron Greenwald TITLE TBD Central Technology 3000 N. Washington Blvd, No. 229 Arlington , VA 22201 Phone: (none) Fax: (none) Email: greenwalda@centratechnology.com _____________________________________________________ Eric Greenwald 5446 Broad Branch Rd NW Washington , DC 20015 Phone: (none) Fax: (none) _____________________________________________________ Eric Greenwald Counsel Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: eric.greenwald@mail.house.gov _____________________________________________________ Michael Greenwood Manager Government Program Devel Software Engineering Institute, CMU NRECA Building Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Mark Greer 6564 Loisdale Ct Ste 900 Springfield , VA 22150 Phone: (none) Fax: (none) _____________________________________________________ Bradford Gregg Senior Consultant Booz Allen Hamilton 8283 Greensboro Dr Mclean , VA 22102 Phone: (none) Fax: (none) Email: gregg_bradford@bah.com _____________________________________________________ Donna Gregg 11100 John Hopkins Road Room 17-S334 Laurel , MD 20723 Phone: (none) Fax: (none) _____________________________________________________ Mr. Daniel Gressang P.O. Box 793 Bowie , MD 20718 Phone: (none) Fax: (none) Email: Gressang@aol.com _____________________________________________________ Louis E Grever EAD Science and Technology FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: louis.grever@ic.fbi.gov _____________________________________________________ Ms. Sabra Horne MPA Director, Office of Communicatio Office of Justice Programs, Dept of Justice 810 7th Street Arlington , DC 20531 Phone: (none) Fax: (none) Email: sabra.horne@usdoj.gov _____________________________________________________ Mr. Edward Horner PSC 41 Box 918 APO , AE 9464 Phone: (none) Fax: (none) Email: tornado.isr@gmail.com _____________________________________________________ Mr. Mark T Horton TITLE TBD NSA 9800 Savage Road AT, Suite 6222 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: mthorto@nsa.gov _____________________________________________________ Doug Hoskins Mgr. NGIS Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Jim Hoskins Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Dr. Najoua Hotard PhD President Inst. of Crit LangCult Exch ( ICLCE) Dr. Najoua Hotard 4424 East catalina Ave Baton Rouge , LA 70814 Phone: (none) Fax: (none) Email: najouak@cox.net _____________________________________________________ Mr. Dewey Houck Director - IS Mission Systems The Boeing Company 7700 Boston Boulevard Springfield , VA 22153 Phone: (none) Fax: (none) Email: dewey.houck@boeing.com _____________________________________________________ Ms. Jody Houck TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Jeffrey Houle 1221 Merchant Lane Suite 1200 McLean , VA 22101 Phone: (none) Fax: (none) Email: jeffrey.houle@gmail.com _____________________________________________________ Dr. Art House Director of Communications ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: arthur.house@ugov.gov _____________________________________________________ Charlie Houy Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: charlie_houy@appro.senate.gov _____________________________________________________ Ms. Sharon Houy Associate Deputy Director DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Sharon.Houy@dia.mil _____________________________________________________ Wayne Howard Director, Business Development SYSTEMS TECHNOLOGIES 6225 Brandon Avenue Suite 220 Springfield , VA 22150 Phone: (none) Fax: (none) Email: whoward@systek.com _____________________________________________________ Mr. Lance Howden 11260 Roger Bacon Dr. Suite 406 Reston , VA 20190 Phone: (none) Fax: (none) Email: Lance@parabon.com _____________________________________________________ Cassandra Howell PMP Program Manager/FSO LexisNexis 1100 Alderman Drive Suite 1A Alpharetta , GA 30005 Phone: (none) Fax: (none) Email: cassandra.howell@lnssi.com _____________________________________________________ Ms. Gail Howell 3514 N. Ohio Street Arlington , VA 22207 Phone: (none) Fax: (none) Email: jhowell1012@comcast.net _____________________________________________________ Ms. Gail S Howell 3514 North Ohio Street Arlington , VA 22207 Phone: (none) Fax: (none) Email: jhowell1012@comcast.net _____________________________________________________ Ms. Theresa Howell TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Thomas Howell Chairman & CEO TECH USA, Inc 8334 Veterans Highway 2nd Floor Millersville , MD 21108 Phone: (none) Fax: (none) Email: tbh@techusa.net _____________________________________________________ Steny Hoyer Rep. House Majority Leader Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: hoyer.scheduling@mail.house.gov _____________________________________________________ Beth Hruz 7901 Jones Branch Dr ste 310 McLean , VA 22102 Phone: (none) Fax: (none) Email: beth.hruz@tvarsolutions.com _____________________________________________________ Francis Hsu US Citizenship & Immigration DHS 1 NoMA Station 131 M St., NE 2nd Floor Washington , DC 20529 Phone: (none) Fax: (none) _____________________________________________________ Mr. Garfield Hubbard TITLE TBD Hub Consulting Group, Inc. 11002 Swansfield Road Columbia , MD 21045 Phone: (none) Fax: (none) Email: ghubbard@hubcon.com _____________________________________________________ Gene Hubbard President & CEO Hub Consulting Group, Inc. (HUBCO) 11002 Swansfield Road Columbia , MD 21044 Phone: (301) 596-3147 Fax: (301) 596-8600 Email: ghubbard@hubcon.com _____________________________________________________ Jeremy Bash Director's Chief of Staff CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: christyt@ucia.gov _____________________________________________________ Dr. Umit Basoglu Vice President NJVC, LLC 8614 Westwood Center Drive Suite 300 Vienna , VA 22182 Phone: (none) Fax: (none) Email: umit.basoglu@njvc.com _____________________________________________________ Ms. Diane Batchik TITLE TBD White Cliffs Consulting 6445 Sundown Trail Columbia , MD 21044 Phone: (none) Fax: (none) Email: diane.batchik@whitecliffsconsulting.com _____________________________________________________ James Batt Director, Business Development & The Boeing Company 7700 Boston Blvd Springfield , VA 22153 Phone: (none) Fax: (none) Email: james.e.batt@boeing.com _____________________________________________________ Dr. Charles Battle Consultant System Planning Corporation 4000 Cathedral Ave., N.W. #121B Washington , DC 20016 Phone: (none) Fax: (none) Email: tbattle@sysplan.com _____________________________________________________ Mr. Ethan L Bauman Congressional Affairs NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (443) 479-0276 Email: elbauma@nsa.gov _____________________________________________________ Mr. Jeffrey Baxter 400 South Beverly Drive #214 Beverly Hills , CA 90212 Phone: (none) Fax: (none) Email: jbaxter@skunkhollow.com _____________________________________________________ Mr. Jon Bayless Sr. Bus. Development Manager Sypris Electronics 10901 N. McKinley Drive Tampa , FL 33612 Phone: (none) Fax: (none) Email: jon.bayless@sypris.com _____________________________________________________ Mr. James Beachell 2374 Whitestone Hill Court Falls Church , VA 22043 Phone: (none) Fax: (none) Email: james.beachell.wg96@wharton.upenn.edu _____________________________________________________ Rebecca Bean 1513 Independence Avenue SE Washington , DC 20003 Phone: (none) Fax: (none) Email: rebecab2@dni.gov _____________________________________________________ Sarah Beane Required unless Parent Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Robert Beard 3810 North Randolph Court Arlington , VA 22207 Phone: (none) Fax: (none) _____________________________________________________ Joel Beaton Client Executive HP Enterprise Services 13600 EDS Drive Herndon , VA 20171 Phone: (none) Fax: (none) Email: joel.beaton@hp.com _____________________________________________________ Ms. Marjorie Beatty 901 Ravelston Terrace Arnold , MD 21012 Phone: (none) Fax: (none) Email: marjorib@ptf.gov _____________________________________________________ Ms. Marjorie A Beatty TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mabeatt@nsa.gov _____________________________________________________ Christopher Beck TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: chris.beck@mail.house.gov _____________________________________________________ Tom Beck 43912 Felicity Place Ashburn , VA 20147 Phone: (none) Fax: (none) Email: tbeck@splunk.com _____________________________________________________ Ms. Lora Becker 3210 Wessynton Way Alexandria , VA 22309 Phone: (none) Fax: (none) Email: lora_becker@verizon.net _____________________________________________________ Christian Beckner Counsel Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: christian_beckner@hsgac.senate.gov _____________________________________________________ Mike Becraft SVP Federal Civilian Services Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Dr. Fernand D Bedard TITLE TBD NSA 9800 Savage Road R3, Suite 6513 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: fdbedar@nsa.gov _____________________________________________________ Mr. George Beebe Deputy Director, Center for Inte Defense Group, Inc. 1140 Connecticut Avenue, NW Suite 1140 Washington , DC 20036 Phone: (none) Fax: (none) Email: george.beebe@defensegp.com _____________________________________________________ Joseph Beerman Senior Manager Raytheon 7600 Leesburg Pike West Building, Suite 400 Falls Church , VA 22043 Phone: (none) Fax: (none) Email: joseph.beerman@gmail.com _____________________________________________________ Rand Beers Under Secretary DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Robert.Beers@dhs.gov _____________________________________________________ Mr Grant A Begley Jr. MS Corp Senior Vice President Alion 1750 Tysons Boulevard Suite 1300 McLean , VA 22102 Phone: (none) Fax: (703) 714-6509 Email: gbegley@alionscience.com _____________________________________________________ Mr. Bernie Guerry Vice President, National Intelli General Dynamics IT, NDIS 15000 Conference Center Drive Chantilly , VA 20121 Phone: (none) Fax: (none) Email: bernie.guerry@gdit.com _____________________________________________________ John W Hudson 605 Stillwood Drive Woodstock , GA 30189 Phone: (none) Fax: (none) Email: jwhudson@thechartwellconsultancy.com _____________________________________________________ Ms. Tracey Huff TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Jack Huffard Co-founder, President and COO Tenable Network Security 7063 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) _____________________________________________________ Mr. William Hufnagel 15238 Cedar Knoll Court Montclair , VA 22025 Phone: (none) Fax: (none) _____________________________________________________ Celes Hughes TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: celes.hughes@mail.house.gov _____________________________________________________ Mr. Chris Hughes Senior Manager CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: jahughes@caci.com _____________________________________________________ Christian A Hughes Int' Bus Sr. Policy Advisor DHS-Office of International Affairs/Policy Christian A. Hughes/CBP/INA 1300 Pennsylvania Ave, NW RRB 8th Floor Washington , DC 20220 Phone: (none) Fax: (none) Email: christian.hughes@hq.dhs.gov _____________________________________________________ Jeffrey Hughes Strategic Programs Manager Hewlett Packard Jeffrey Hughes 7230 Woodville Road Mount Airy , MD 21771 Phone: (none) Fax: (none) Email: jeffrey.l.hughes@hp.com _____________________________________________________ Mr. Jeffrey L Hughes MSEE Strategic Program Executive Hewlett Packard 7230 Woodville Road Mount Airy , MD 21771 Phone: (301) 363-8456 Fax: (none) Email: jeffrey.l.hughes@hp.com _____________________________________________________ LTG Patrick Hughes USA (Ret) 2013 South Lynn Street Arlington , VA 22202-2128 Phone: (none) Fax: (none) Email: pmh116207@aol.com _____________________________________________________ LTG Patrick Hughes USA (Ret.) Vice President-Intelligence & Co L-3 Communications, Inc. 11955 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) Email: patrick.hughes@l-3com.com _____________________________________________________ Patrick M Hughes TITLE TBD L-3 Communications, Inc. 11955 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) Email: patrick.hughes@l-3com.com _____________________________________________________ Special Agent Gary Hughey Jr Special Agent Air Force Office of Special Investigations 1413 Arkansas Rd Joint Base Andrews , MD 20762 Phone: (none) Fax: (none) Email: ghugheyjr@hotmail.com _____________________________________________________ Jay Hulings TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jay.hulings@mail.house.gov _____________________________________________________ Dave Hull Program Director SYSTEMS TECHNOLOGIES 185 STATE HIGHWAY 36 WEST LONG BRANCH , NJ 7764 Phone: (none) Fax: (none) Email: dhull@systek.com _____________________________________________________ Ms. Regina Hambleton TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Gregg Hamelin 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: gregory.hamelin@lmco.com _____________________________________________________ Mr. Tawfik Hamid TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: thamid@potomacinstitute.org _____________________________________________________ Bonnie Hamilton 3383 Dondis Creek Dr Triangle , VA 22172 Phone: (none) Fax: (none) Email: pheelyne@hotmail.com _____________________________________________________ Mr. Mark Hamilton 7746 New Providence Drive #93 Falls Church , VA 22042 Phone: (none) Fax: (none) Email: travel1Mark@verizon.net _____________________________________________________ Mr. Jeffrey Hamlin 13861 Sunrise Valley Drive Ste 400 Herndon , VA 20171 Phone: (none) Fax: (none) Email: jeff.hamlin@dlt.com _____________________________________________________ Teresa Hamlin Manager Corporate Strategy Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Mr. Frederick Hammerson Senior Language Authority DIA 7400 Defense Pentagon Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Frederick.Hammerson@dia.mil _____________________________________________________ Mr. Rob Hamrick Vice President, Advanced Project Ensco, Inc. 5400 Port Royal Road Springfield , VA 22151 Phone: (none) Fax: (none) Email: hamrick.rob@ensco.com _____________________________________________________ Larry Hanauer TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: larry.hanauer@mail.house.gov _____________________________________________________ Mr. Larry Hanauer Senior Intl. Policy Analyst RAND 1200 South Hayes Street Arlington , VA 22202 Phone: (none) Fax: (none) Email: lhanauer@rand.org _____________________________________________________ Mr. Jeffrey Handy 7403 Gateway Court Manassas , VA 20109-7313 Phone: (none) Fax: (none) Email: jhandy@gmri.com _____________________________________________________ Ms. Lee Hanna TITLE TBD The Intelligence & Security Academy, LLC 1890 Preston White Drive Suite 250 Reston , VA 20191 Phone: (none) Fax: (none) Email: lehanna@aol.com _____________________________________________________ Jeanette Hanna-Ruiz Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jeanette_hanna-ruiz@nsgac.senate.gov _____________________________________________________ Paul Hannah Jr. 7045 Berry rd Suite A1 Accokeek , MD 20607 Phone: (none) Fax: (none) Email: phannah@takt-gs.com _____________________________________________________ Mr. Morten Hansen #B01 SOD 8th Villa, 657-7 Hannam Seoul , AP 140-887 Phone: (none) Fax: (none) Email: mortenhansenbxl@hotmail.com _____________________________________________________ Lars Hanson 2160 Westglen Court Vienna , VA 22182 Phone: (none) Fax: (none) Email: parkersan@sprynet.com _____________________________________________________ Mr. William G Hanson Bachelors Sr. Vice President Agilex Technologies Jerry Hanson 5155 Parkstone Drive Chantilly , VA 20151 Phone: (703) 754-2327 Fax: (703) 483-4928 Email: jerry.hanson@agilex.com _____________________________________________________ Mr. Michael Hantke 306 Sentinel Drive Ste 100 Annapolis Junction , MD 20701 Phone: (none) Fax: (none) Email: michael_hantke@appsig.com _____________________________________________________ Bob Harding Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Richard Harding USCG Intelligence, Director of S DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: richard.harding@dhs.gov _____________________________________________________ Ms. Beth Hardison TITLE TBD USIS 7799 Leesburg Pike Suite 400 S Falls Church , VA 22043 Phone: (none) Fax: (none) Email: beth.hardison@usis.com _____________________________________________________ Mr. Jeffrey T Hardy BA, MBA 1603 Riverside Drive Annapolis , MD 21409 Phone: (none) Fax: (none) Email: jeffreythardy@gmail.com _____________________________________________________ Mr. Jeffrey T Hardy 1603 RIVERSIDE DRIVE ANNAPOLIS , MD 21409 Phone: (none) Fax: (none) Email: jeffrey.t.hardy@live.com _____________________________________________________ Mr. George Hargenrader 13233 Ladybank Lane Oak Hill , VA 20171 Phone: (none) Fax: (none) Email: grh092864@verizon.net _____________________________________________________ Kathleen Harger Chief Advocate Adaptive Initiati DARPA 3701 N. Fairfax Dr. Arlington , VA 22203 Phone: (none) Fax: (none) Email: kathleen.harger@darpa.mil _____________________________________________________ Ms. Kathleen L Harger 888 N. Quincy Street #1912 Arlington , VA 22203 Phone: (none) Fax: (none) Email: harger.kathleen@gmail.com _____________________________________________________ Mr. Drew Harker TITLE TBD Arnold & Porter 555 Twelfth Street, NW Washington , DC 20004 Phone: (none) Fax: (none) Email: Drew_Harker@aporter.com _____________________________________________________ Mr. Bill Harp MA Defense Intel Esri Bill Harp - Industry Solutions 380 New York St Redlands , CA 92373 Phone: (none) Fax: (909) 307-3039 Email: bharp@esri.com _____________________________________________________ Preston Harrelle TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Thomas J Harrington EAD Criminal Cyber Response FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: thomas.harrington@ic.fbi.gov _____________________________________________________ Adam Harris Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Adam.Harris@mail.house.gov _____________________________________________________ Mr. Basil " Harris Jr Executive for Federal ISE Progra Office of the PM-ISE, ODNI Mr. Nick Harris 2100 K ST NW Suite 300 Washington , DC 20511 Phone: (none) Fax: (none) Email: nbasilh@dni.gov _____________________________________________________ Mr. Basil N Harris TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: b.harris@radium.ncsc.mil _____________________________________________________ Ms. Gail Harris 555 Rivergate Lane B1-113 Durango , CO 81301 Phone: (none) Fax: (none) Email: Harrisg44@aol.com _____________________________________________________ Ms. Maggie M Harris President and CEO Engineering Systems Consultants, Inc. 8201 Corporate Drive Suite 1105 Landover , MD 20785-2230 Phone: (202) 554-1009 Fax: (301) 577-0136 _____________________________________________________ Ronald Harris Business Development Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: ronald.r.harris.lmco.com _____________________________________________________ Mr. William J Harris Director Raytheon Company 22270 Pacific Blvd Dulles , VA 20166 Phone: (none) Fax: (none) Email: william_J_Harris@raytheon.com _____________________________________________________ Duane Harrison TITLE TBD DIA 342 12th Street SE Washington , DC 20003 Phone: (none) Fax: (none) Email: duane.harrison@dia.mil _____________________________________________________ Mr. George Harrison 109 Middleton Drive Peachtree City , GA 30269 Phone: (none) Fax: (none) Email: george.harrison@gtri.gatech.edu _____________________________________________________ Mr. Jerry C Harrison Vice President SRI International 1100 Wilson Boulevard Suite 2800 Arlington , VA 22209 Phone: (none) Fax: (none) Email: jerry.harrison@sri.com _____________________________________________________ Dr. Steven D Harrison 12004 Governors Court Woodbridge , VA 22192 Phone: (none) Fax: (none) Email: imer71@netscape.net _____________________________________________________ Col. Stuart Harrison 5605 Doolittle Street Burke , VA 22015 Phone: (none) Fax: (none) Email: sharrison2@cox.net _____________________________________________________ Mr Stuart Harrison Vice President Parsons 100 M Street SE Washington , DC 20003 Phone: (none) Fax: (none) Email: sharrison2@cox.net _____________________________________________________ Mr. Bruce Hart COO Terremark 460 Spring Park Place Ste 1000 Herndon , VA 20170 Phone: (none) Fax: (none) Email: bhart@terremark.com _____________________________________________________ Mr. William Hart 9736 Riverside Circle Ellicott City , MD 21042 Phone: (none) Fax: (none) Email: whart13407@aol.com _____________________________________________________ P.O. Brendan E Hartford Police Officer Chicago Police Department-SWAT Team 3510 S. Michigan Chicago , IL 60653 Phone: (none) Fax: (none) Email: brendan.hartford@chicagopolice.org _____________________________________________________ Tim Hartman General Manager Government Executive ADDRESS TBD Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. James Hartney TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Deborah Harvey Director SRC 941 Glenwood Station Lane Suite 301 Charlottesville , VA 22901 Phone: (none) Fax: (none) Email: harvey@srcinc.com _____________________________________________________ Mr. Quentin Harvey 12204 Columbia Springs Way Bristow , VA 20136 Phone: (none) Fax: (none) Email: qharvey12@aol.com _____________________________________________________ James M Hass Director, IT Governance, Policy ODNI Liberty Crossing 2, 6B331 Washington , DC 20511 Phone: (301) 782-7972 Fax: (none) Email: james.m.hass@dni.gov _____________________________________________________ Dr. David C Hassell Laboratory Division FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: david.hassell@ic.fbi.gov _____________________________________________________ Christopher Hassler President & CEO Syndetics, Inc. 10395 Democracy Lane Suite B Fairfax , VA 22030 Phone: (none) Fax: (none) Email: cchassler@syndetics-inc.com _____________________________________________________ Christopher C Hassler TITLE TBD Syndetics, Inc. 10395 Democracy Lane Suite B Fairfax , VA 22030 Phone: (none) Fax: (none) Email: cchassler@syndetics-inc.com _____________________________________________________ Dr. David Hatch TITLE TBD NSA 9800 Savage Road EC, Suite 6886 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: dahatch@nsa.gov _____________________________________________________ Pete Hatfield Director AECOM 6564 Loisdale Ct Springfield , VA 22150 Phone: (none) Fax: (none) Email: pete.hatfield@aecom.com _____________________________________________________ Melissa Hathaway Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Justin Hattan 1332 Belmont St NW #101 Washington , DC 20009 Phone: (none) Fax: (none) _____________________________________________________ Jeff Haugh 913 Malvern Hill Drive Davidsonville , MD 21035-1242 Phone: (none) Fax: (none) Email: jhaugh@nss.us.com _____________________________________________________ Mr. Steven Hauptman 116K Edwards Ferry Road Leesburg , VA 20176 Phone: (none) Fax: (none) Email: steven.hauptman@fasi.com _____________________________________________________ Ms. Jan Hauser 18475 Circle Drive Los Gatos , CA 95033 Phone: (none) Fax: (none) _____________________________________________________ Nathan Hauser TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: nathan.hauser@mail.house.gov _____________________________________________________ Rita Hauser PIAB Member PIAB No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Wendy_A._Loehrs@pfiab.eop.gov _____________________________________________________ Mr. Arthur Hausman 55 Flood Circle Atherton , CA 94027 Phone: (none) Fax: (none) Email: ahhausman@aol.com _____________________________________________________ Mr. Richard Haver Consultant Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: rich.haver@ngc.com _____________________________________________________ Richard Haver TITLE TBD Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: rich.haver@ngc.com _____________________________________________________ Dr. Stephen C Hawald 4123 N 27 STREET ARLINGTON , VA 22207 Phone: (none) Fax: (none) Email: SCH500MD@GMAIL.COM _____________________________________________________ Mr. Steven Hawkins Vice President Raytheon Company 1200 S. Jupiter Road MS AA-75000 Garland , TX 75042 Phone: (none) Fax: (none) Email: steve_k_hawkins@raytheon.com _____________________________________________________ Erin Hawley Director, Federal Sales Composite Software Inc. 11921 Freedom Drive Suite 550 Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Mr. James Hawley 929 Brick Manor Circle Silver Spring , MD 20905 Phone: (none) Fax: (none) Email: jhawley@tibco.com _____________________________________________________ AJ Hawrylak Private Wealth Associate The Pagnato-Karp Group AJ Hawrylak 1152 15th Street Washington DC , DC 20005 Phone: (none) Fax: (none) Email: ahawrylak@hightoweradvisors.com _____________________________________________________ Mr. Kastriot Haxhiaj 330 Independence Ave, S.W. Rm 3720 Washington , DC 20237 Phone: (none) Fax: (none) Email: khaxhiaj@voa.gov _____________________________________________________ Joyce Hayes TITLE TBD PRTM Management Consultants, LLC 1750 Pennsylvania Avenue NW Suite 1000 Washington , DC 20006 Phone: (none) Fax: (none) Email: jhayes@prtm.com _____________________________________________________ Ms. Karyn Hayes-Ryan Director, Commercial Remote Sens NGA 4600 Sangamore Road Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: karyn.hayesryan@nga.mil _____________________________________________________ Ms. Juanita Haynesworth 11244 Chestnut Grove Square #156 Reston , VA 20190 Phone: (none) Fax: (none) Email: jehay143@yahoo.com _____________________________________________________ Mr. Anthony Hayter Director of Business Development Ivysys Technology, LLC 2001 Jefferson Davis Hwy Suite 1109 Arlington , VA 22202 Phone: (none) Fax: (none) Email: ahayter@ivysys.com _____________________________________________________ Leo Hazlewood Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. David Heagy TITLE TBD Imagery X 2235 Gerken Avenue Vienna , VA 22181-3151 Phone: (none) Fax: (none) Email: heagy@imageryx.com _____________________________________________________ Christine Healey TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: c_healey@ssci.senate.gov _____________________________________________________ Jason Healey 1200 N. Herndon St #265 Arlington , VA 22201 Phone: (none) Fax: (none) Email: jason@jasonhealey.com _____________________________________________________ Jay Healey TITLE TBD Delta Risk LLC 2804 N. Seminary Chicago , IL 60657 Phone: (none) Fax: (none) _____________________________________________________ Mr. Timothy J Healy Director DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: timothy.healy@tsc.gov _____________________________________________________ Mr. David Heath TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Dr. James Heath Directors Science Advisor NSA 9800 Savage Road Suite 6242 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) _____________________________________________________ Mr. James D Heathcote Deputy Associate Director, Offic NSA 9800 Savage Road Q, Suite 6772 Fort George G. Meade , MD 20755 Phone: (none) Fax: (410) 854-7685 Email: jdheath@nsa.gov _____________________________________________________ Mr. Kenneth Heaton 9800 Savage Rd Ste 6759 Ft George G Meade , 0 20755 Phone: (none) Fax: (none) Email: k.heaton@radium.ncsc.mil _____________________________________________________ Ms. Vonna W Heaton Director, InnoVision Directorate NGA 4600 Sanagmore Road Bethesda , MD 20816 Phone: (none) Fax: (none) Email: Vonna.W.Heaton@nga.mil _____________________________________________________ Mr. Mark Heck Director, Enterprise Programs Harris Corporation P.O. Box 37 MS: 2-21D Melbourne , FL 32902 Phone: (none) Fax: (none) Email: mheck@harris.com _____________________________________________________ Mr. Mark Heck Director, Bus. Development-ISS Sypris Electronics 10901 N. McKinley Drive Tampa , FL 33612 Phone: (none) Fax: (none) Email: mark.heck@sypris.com _____________________________________________________ Ken Heffernan VP, Business Development Directo SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: kenneth.g.heffernan@saic.com _____________________________________________________ Mr. Rob Hegstrom Director, Battlespace Awareness DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rob.hegstrom@osd.mil _____________________________________________________ Ray Heider TITLE TBD TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) Email: raymond.heider@tasc.com _____________________________________________________ kris Heim Chief Technology Officer White Oak Technologiese, Inc. 1300 Spring Street Suite 320 Silver Spring , VA 20910 Phone: (none) Fax: (none) _____________________________________________________ Mr. Dennis V Heinbuch TITLE TBD NSA 9800 Savage Road I2, Suite 6575 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: dvheinb@nsa.gov _____________________________________________________ Maj. Gen. Bradley Heithold TITLE TBD Air Force Intelligence No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Edward B Held Director of Office of Intelligen Energy Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: edward.held@in.doe.gov _____________________________________________________ Dr. Joseph Helman 4532 34 St S Arlington , VA 22206 Phone: (none) Fax: (none) Email: joehelman@hotmail.com _____________________________________________________ Mr. Dale Helmer TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: dhelmer@casl.umd.edu _____________________________________________________ Mr. James Hemschoot Director, Information Processing L-3 Communications/Com.Sys.East 1 Federal Street A&E-2C Camden , NJ 8103 Phone: (none) Fax: (none) Email: jim.hemschoot@l-3com.com _____________________________________________________ James G Hemschoot TITLE TBD L-3 Communications/Com.Sys.East 1 Federal Street A&E-2C Camden , NJ 8103 Phone: (none) Fax: (none) Email: jim.hemschoot@l-3com.com _____________________________________________________ Jim Hemschoot TITLE TBD Level 3 Communications, LLC No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jim.hemschoot@l-3com.com _____________________________________________________ Melanie Hendrick Required unless Parent Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Melanie Hendrick 905 Columbia Rd. NW Washington , DC 20001 Phone: (none) Fax: (703) 602-5457 Email: hendrick.melanie@gmail.com _____________________________________________________ Mr. Mark Hendricks APG Account Manager Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: mark.hendricks@hp.com _____________________________________________________ Ms. Kris Henley Vice President, Intelligence Pro Stellar Solutions, Inc. 250 Cambridge Avenue Suite 204 Palo Alto , CA 94306 Phone: (none) Fax: (none) Email: khenley@stellarsolutions.com _____________________________________________________ Betsey Hennigan TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: betsey.hennigan@mail.house.gov _____________________________________________________ Shawn Henry EAD Washington Field Officer FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Shawn.Henry@ic.fbi.gov _____________________________________________________ Mr. Robert Henson PSC #41, P.O. Box 3667 APO , AE 9464 Phone: (none) Fax: (none) Email: robert.henson@lakenheath.af.mil _____________________________________________________ Mr. John C Hepler 3478 South River Terrace Edgewater , MD 21037 Phone: (none) Fax: (none) Email: john.hepler@datadomain.com _____________________________________________________ Mr. Robert Herd Principal Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Herd_Robert@bah.com _____________________________________________________ Mr. Mel Heritage Assistant Deputy Director and Se ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ James Herlong 712 Oser Drive Crownsville , MD 21032 Phone: (none) Fax: (none) Email: herlongjj@mac.com _____________________________________________________ Scott Herman Sr Dir of Product Development GeoEye 2325 Dulles Corner Blvd. Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ Dr. Robert Hermann Required unless Parent Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Christie Hernandez Marketing Coordinator Carahsoft 12369 Sunrise Valley Drive STE D2 Reston , VA 20191 Phone: (none) Fax: (none) Email: christie.hernandez@carahsoft.com _____________________________________________________ Mr. Enrique Hernandez 6415 Emerald Green CT Centreville , VA 20121-3824 Phone: (none) Fax: (none) Email: hank.hernandez@vyndicar.com _____________________________________________________ Mr. Don Herndon V.P. Business Development Sypris Electronics 10901 N. McKinley Drive Tampa , FL 33612 Phone: (none) Fax: (none) Email: don.herndon@sypris.com _____________________________________________________ Mr. Don Herring President AT&T Government Solutions-NIS 7125 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) Email: dherring@att.com _____________________________________________________ Rebecca Hersman Deputy Assistant Secretary for C DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rebecca.hersman@osd.mil _____________________________________________________ Brandon Hess BD Specialist Parsons 100 M St. SE Ste. 1200 Washington , DC 20003 Phone: (none) Fax: (none) Email: brandon.hess@missionep.com _____________________________________________________ John J Hess Senior Director, Intelligence So Sotera Defense Solutions, Inc 1501 Farm Credit Drive Suite 2300 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. Stephen Hetrick 2111 Blackmore Ct. San Diego , CA 92109 Phone: (none) Fax: (none) Email: shetrick@srccomp.com _____________________________________________________ Mr. David Heurtevent 1201 S. Eads St. #103 Arlington , VA 22202 Phone: (none) Fax: (none) Email: david@heurtevent.org _____________________________________________________ Mr. Brian Hibbeln 3815 Watkins Mill Drive Alexandria , VA 22304 Phone: (none) Fax: (none) Email: Brass@comcast.net _____________________________________________________ Brian Hibbeln ADUSD for Special Capabilitiesáá DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Brian.Hibbeln@osd.mil _____________________________________________________ Allison A Hickey TITLE TBD Accenture 43254 Watershed Ct Ashburn , VA 20147 Phone: (none) Fax: (none) Email: allison.a.hickey@accenture.com _____________________________________________________ Mr. John Hicks 826 Walker Road Great Falls , VA 22066 Phone: (none) Fax: (none) Email: hicksjw@aol.com _____________________________________________________ Mr. John Hicks TITLE TBD NRO 826 Walker Road Falls Church , VA 22066 Phone: (none) Fax: (none) Email: john.hicks@nro.mil _____________________________________________________ Parker Hicks No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Russ Hierl Senior Director, Security Ops & Sotera Defense Solutions, Inc 1501 Farm Credit Drive Suite 2300 McLean , VA 22102 Phone: (none) Fax: (none) Email: rhierl@theanalysiscorp.com _____________________________________________________ Mr. Peter L Higgins 1600 Tysons Boulevard - 8th Fl. 1SecureAudit McLean , VA 22102 Phone: (none) Fax: (none) Email: HigginsP@1SecureAudit.com _____________________________________________________ Kevin Highfield 1600 S. Eads St. APT 907N Arlington , VA 22202 Phone: (none) Fax: (none) Email: highfieldk@aol.com _____________________________________________________ Mr. Karim Hijazi 9858 Clint Moore Road C-111, #261 Boca Raton , FL 33496 Phone: (none) Fax: (none) Email: khijazi@demiurgeconsulting.com _____________________________________________________ Mr. Karim Hijazi CEO Unveillance Karim Hijazi 3475 Oak Valley Road NE STE. 2740 Atlanta , GA 30326 Phone: (none) Fax: (none) Email: khijazi@unveillance.com _____________________________________________________ Mr. Jack Hild DD, Source Operations & Manageme NGA 4600 Sangamore Road Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: jack.hild@nga.mil _____________________________________________________ Alice Hill Senior Counselor to the Secretar DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Alice.Hill@hq.dhs.gov _____________________________________________________ Mr. Chris Hill TITLE TBD Adobe 8201 Greensboro Drive Suite 1000 McLean , VA 22102 Phone: (none) Fax: (none) Email: chill@adobe.com _____________________________________________________ Larry Hill SVP, Deputy General Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: larry.hill@saic.com _____________________________________________________ Mr. Martin Hill Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Hill_Marty@bah.com _____________________________________________________ Zachary Hill TITLE TBD DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Zachary.Hill@dhs.gov _____________________________________________________ Mr. Doug Himes TITLE TBD NSA 9800 Savage Road S33, Suite 6505 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) _____________________________________________________ Mr. James Hindle Executive Vice President Westway Development 14325 Willard Road Chantilly , VA 20151 Phone: (none) Fax: (none) Email: jhindle@westwaydevelopment.com _____________________________________________________ Mr. Jason Hines 1503E N. Colonial Terrace Arlington , VA 22209 Phone: (none) Fax: (none) Email: jason@viadesigns.com _____________________________________________________ Jason Hines BS, MS Head of Federal Sales Recorded Future 1503E N. Colonial Ter Arlington , VA 22209 Phone: (none) Fax: (none) Email: jason@recordedfuture.com _____________________________________________________ Ms. Elizabeth Hoag DCIPS Program Manager DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: elizabeth.hoag@osd.mil _____________________________________________________ Dr. Andrew Hock Arete Associates 9301 Corbin Avenue, Suite 2000 Northridge , CA 91324 Phone: (none) Fax: (none) Email: ahock@arete.com _____________________________________________________ Peter Hoekstra Rep. Minority Chair Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (202) 226-0779 Email: leah.scott@mail.house.gov _____________________________________________________ Mr. James W hoffman 4231 Monument Wall Way Apt 151 Fairfax , VA 22030 Phone: (none) Fax: (none) Email: jim.hoffman@Objectfx.com _____________________________________________________ Mr. Christopher Hoffmeister Intelligence Research Specialist Department of Homeland Security 1300 Pennsylvania Ave NW, 7.4 C Washington , DC 20229 Phone: (none) Fax: (none) Email: chris.hoffmeister@dhs.gov _____________________________________________________ William Holcomb TITLE TBD The MITRE Corporation 7515 Colshire Drive McLean , VA 22102 Phone: (none) Fax: (none) Email: wholcomb@mitre.org _____________________________________________________ Eric H Holder Jr. Attorney General Justice Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: linda.a.jenkins@usdoj.gov _____________________________________________________ Mr. George L Holdridge Sr. BIE CEO Global Downlink Corporation Mr. George Holdridge 13290 Solana beach Cv. Delray Beach , FL 33446 Phone: (561) 495-9801 Fax: (none) Email: usmetro@comcast.net _____________________________________________________ John Holland Graduate Student Norwich University 425 Thames Street Hagerstown , MD 21740 Phone: (none) Fax: (none) Email: hollandjf@hotmail.com _____________________________________________________ Mr. Guy Holliday VP for Programs Adapx 821 Second Avenue Ste 1150 Seattle , WA 98104 Phone: (none) Fax: (none) Email: guy.holliday@adapx.com _____________________________________________________ Ms. Nancy Holliday Director, Strategic Business Dev Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: nancyhol@microsoft.com _____________________________________________________ Christopher Hollingshead Commander U.S Coast Guard 711 Diamond Vista Dr Port Angeles , WA 98363 Phone: (none) Fax: (none) Email: christopher.hollingshead@yahoo.com _____________________________________________________ Hans Hollister SVP, Business Development L-3 Communications, Inc. 11955 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Jim Holm Staff Assistant Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Jim.Holm@mail.house.gov _____________________________________________________ Georgia Holmer TITLE TBD Pherson Associates, LLC 9902 Deerfield Pond Drive Great Falls , VA 22066 Phone: (none) Fax: (none) _____________________________________________________ Mr. Christopher Holmes TITLE TBD Goodrich 88 Wildwood Drive Avon , CT 6001 Phone: (none) Fax: (none) Email: chris.holmes@goodrich.com _____________________________________________________ Ms. Sarah Holmes Senior Consultant Sensa Solutions 11180 Sunrise Valley Drive Suite 100 Reston , VA 20191 Phone: (none) Fax: (none) Email: sarah@sensasolutions.com _____________________________________________________ Stewart Holmes TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Stewart_Holmes@appro.senate.gov _____________________________________________________ Mrs. Tonya M Holmes 2504 Buckingham Green Lane Upper Marlboro , MD 20774 Phone: (none) Fax: (none) Email: tholmes@poseidon2020.com _____________________________________________________ Ms. Jayne Homeyer Director of Competencies and Sta ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jane.m.homeyer@ugov.gov _____________________________________________________ Vanessa Hood Embedded Analyst Palantir Technologies 1660 International Drive 8th Floor McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ William L Hooton Records Management Division FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: william.hooton@ic.fbi.gov _____________________________________________________ John M Hope Office of IT Program Management FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.hope@ic.fbi.gov _____________________________________________________ Mr. Stephen J Hopkins 2703 E Towers Dr # 409 Cincinnati , OH 45238 Phone: (none) Fax: (none) Email: bkwtr22@aol.com _____________________________________________________ Carmen D Hopper MS, BA Head of Intelligence & Analytics Barclays Capital Carmen Hopper 745 Seventh Avenue 12th floor New York , NY 10019 Phone: (none) Fax: (none) Email: carmen.hopper@barcap.com _____________________________________________________ Jason Hopper 1313 Hampshire Drive Frederick , MD 21702 Phone: (none) Fax: (none) Email: jhopper86@yahoo.com _____________________________________________________ Ms Jill Hopper 901 N. Stuart Street Suite 1110 Arlington , VA 22203 Phone: (none) Fax: (none) Email: jhopper@cray.com _____________________________________________________ Mr. Robert R Horback Vice President TASC 15036 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (703) 961-0944 Email: ROBERT.HORBACK@tasc.com _____________________________________________________ Robert D Hormats Under Secretary Econ, Energy & A State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: HormatsRD@state.gov _____________________________________________________ Ms. Sabra Horne 3131 Connecticut Ave., N.W. Apt 2908 Washington , DC 20008-5030 Phone: (none) Fax: (none) _____________________________________________________ Ms. Sabra Horne Senior Advisor for Outreach ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: sabra.e.horne@ugov.gov _____________________________________________________ Ms. Sabra Horne MPA Director, Office of Communicatio Office of Justice Programs, Dept of Justice 810 7th Street Arlington , DC 20531 Phone: (none) Fax: (none) Email: sabra.horne@usdoj.gov _____________________________________________________ Mr. Edward Horner PSC 41 Box 918 APO , AE 9464 Phone: (none) Fax: (none) Email: tornado.isr@gmail.com _____________________________________________________ Mr. Mark T Horton TITLE TBD NSA 9800 Savage Road AT, Suite 6222 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: mthorto@nsa.gov _____________________________________________________ Doug Hoskins Mgr. NGIS Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Jim Hoskins Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Dr. Najoua Hotard PhD President Inst. of Crit LangCult Exch ( ICLCE) Dr. Najoua Hotard 4424 East catalina Ave Baton Rouge , LA 70814 Phone: (none) Fax: (none) Email: najouak@cox.net _____________________________________________________ Mr. Dewey Houck Director - IS Mission Systems The Boeing Company 7700 Boston Boulevard Springfield , VA 22153 Phone: (none) Fax: (none) Email: dewey.houck@boeing.com _____________________________________________________ Ms. Jody Houck TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Jeffrey Houle 1221 Merchant Lane Suite 1200 McLean , VA 22101 Phone: (none) Fax: (none) Email: jeffrey.houle@gmail.com _____________________________________________________ Dr. Art House Director of Communications ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: arthur.house@ugov.gov _____________________________________________________ Charlie Houy Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: charlie_houy@appro.senate.gov _____________________________________________________ Ms. Sharon Houy Associate Deputy Director DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Sharon.Houy@dia.mil _____________________________________________________ Wayne Howard Director, Business Development SYSTEMS TECHNOLOGIES 6225 Brandon Avenue Suite 220 Springfield , VA 22150 Phone: (none) Fax: (none) Email: whoward@systek.com _____________________________________________________ Mr. Lance Howden 11260 Roger Bacon Dr. Suite 406 Reston , VA 20190 Phone: (none) Fax: (none) Email: Lance@parabon.com _____________________________________________________ Cassandra Howell PMP Program Manager/FSO LexisNexis 1100 Alderman Drive Suite 1A Alpharetta , GA 30005 Phone: (none) Fax: (none) Email: cassandra.howell@lnssi.com _____________________________________________________ Ms. Gail Howell 3514 N. Ohio Street Arlington , VA 22207 Phone: (none) Fax: (none) Email: jhowell1012@comcast.net _____________________________________________________ Ms. Gail S Howell 3514 North Ohio Street Arlington , VA 22207 Phone: (none) Fax: (none) Email: jhowell1012@comcast.net _____________________________________________________ Ms. Theresa Howell TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Thomas Howell Chairman & CEO TECH USA, Inc 8334 Veterans Highway 2nd Floor Millersville , MD 21108 Phone: (none) Fax: (none) Email: tbh@techusa.net _____________________________________________________ Steny Hoyer Rep. House Majority Leader Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: hoyer.scheduling@mail.house.gov _____________________________________________________ Beth Hruz 7901 Jones Branch Dr ste 310 McLean , VA 22102 Phone: (none) Fax: (none) Email: beth.hruz@tvarsolutions.com _____________________________________________________ Francis Hsu US Citizenship & Immigration DHS 1 NoMA Station 131 M St., NE 2nd Floor Washington , DC 20529 Phone: (none) Fax: (none) _____________________________________________________ Mr. Garfield Hubbard TITLE TBD Hub Consulting Group, Inc. 11002 Swansfield Road Columbia , MD 21045 Phone: (none) Fax: (none) Email: ghubbard@hubcon.com _____________________________________________________ Gene Hubbard President & CEO Hub Consulting Group, Inc. (HUBCO) 11002 Swansfield Road Columbia , MD 21044 Phone: (301) 596-3147 Fax: (301) 596-8600 Email: ghubbard@hubcon.com _____________________________________________________ Mr. Robert A Hubbard Principal KPMG LLP Tony Hubbard, Principal 1676 International Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (202) 315-2573 Email: thubbard@kpmg.com _____________________________________________________ John W Hudson 605 Stillwood Drive Woodstock , GA 30189 Phone: (none) Fax: (none) Email: jwhudson@thechartwellconsultancy.com _____________________________________________________ Ms. Tracey Huff TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Jack Huffard Co-founder, President and COO Tenable Network Security 7063 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) _____________________________________________________ Mr. William Hufnagel 15238 Cedar Knoll Court Montclair , VA 22025 Phone: (none) Fax: (none) _____________________________________________________ Celes Hughes TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: celes.hughes@mail.house.gov _____________________________________________________ Mr. Chris Hughes Senior Manager CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: jahughes@caci.com _____________________________________________________ Christian A Hughes Int' Bus Sr. Policy Advisor DHS-Office of International Affairs/Policy Christian A. Hughes/CBP/INA 1300 Pennsylvania Ave, NW RRB 8th Floor Washington , DC 20220 Phone: (none) Fax: (none) Email: christian.hughes@hq.dhs.gov _____________________________________________________ Jeffrey Hughes Strategic Programs Manager Hewlett Packard Jeffrey Hughes 7230 Woodville Road Mount Airy , MD 21771 Phone: (none) Fax: (none) Email: jeffrey.l.hughes@hp.com _____________________________________________________ Mr. Jeffrey L Hughes MSEE Strategic Program Executive Hewlett Packard 7230 Woodville Road Mount Airy , MD 21771 Phone: (301) 363-8456 Fax: (none) Email: jeffrey.l.hughes@hp.com _____________________________________________________ LTG Patrick Hughes USA (Ret) 2013 South Lynn Street Arlington , VA 22202-2128 Phone: (none) Fax: (none) Email: pmh116207@aol.com _____________________________________________________ LTG Patrick Hughes USA (Ret.) Vice President-Intelligence & Co L-3 Communications, Inc. 11955 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) Email: patrick.hughes@l-3com.com _____________________________________________________ Patrick M Hughes TITLE TBD L-3 Communications, Inc. 11955 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) Email: patrick.hughes@l-3com.com _____________________________________________________ Special Agent Gary Hughey Jr Special Agent Air Force Office of Special Investigations 1413 Arkansas Rd Joint Base Andrews , MD 20762 Phone: (none) Fax: (none) Email: ghugheyjr@hotmail.com _____________________________________________________ Jay Hulings TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jay.hulings@mail.house.gov _____________________________________________________ Dave Hull Program Director SYSTEMS TECHNOLOGIES 185 STATE HIGHWAY 36 WEST LONG BRANCH , NJ 7764 Phone: (none) Fax: (none) Email: dhull@systek.com _____________________________________________________ Ms. Patty Hullinger 500 Grove Street Suite 300 Herndon , VA 20170 Phone: (none) Fax: (none) Email: patricia.hullinger@netwitness.com _____________________________________________________ Mr. David Humenansky Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Humenansky_David@bah.com _____________________________________________________ Mr. Robert Hummel TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: rhummel@potomacinstitute.org _____________________________________________________ John Humphrey Senior VP Salient Federal Solutions 8618 Westwood Center Drive Suite 100 Vienna , VA 22182 Phone: (none) Fax: (703) 940-0084 Email: John.Humphrey@salientfed.com _____________________________________________________ John Humphrey TITLE TBD Salient Federal Solutions 8618 Westwood Center Drive Suite 100 Vienna , VA 22182 Phone: (none) Fax: (none) Email: jhumphrey@sgis.com _____________________________________________________ Michael Humphrey P.O. Box 13326 Fairlawn , OH 44334-8726 Phone: (none) Fax: (none) Email: mhumphrey@kpmg.com _____________________________________________________ Tamara Hunt TITLE TBD DIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: tamara.hunt@dia.mil _____________________________________________________ Andrew Hunter TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: andrew.hunter@mail.house.gov _____________________________________________________ Elizabeth Hunter Government Business Development AT&T Government Solutions 3033 Chain Bridge RD Oakton , VA 22185 Phone: (none) Fax: (none) Email: eh9924@att.com _____________________________________________________ Mr. Robert F Behler 7502 Round Pond Road North Syracuse , NY 13212 Phone: (none) Fax: (none) Email: rfb@srcinc.com _____________________________________________________ Mr. Thomas Behling 6517 Deidre Terrace McLean , VA 22101 Phone: (none) Fax: (none) _____________________________________________________ Mr. Thomas Behling Former Deputy Under Secretary of DoD 6517 Deidre Terrace McLean , VA 22101 Phone: (none) Fax: (none) Email: thomas.behling@nro.mil _____________________________________________________ Mr. James Beida Deputy Director, CTO NSA 9800 Savage Road Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) _____________________________________________________ James Beirne 11328 Nancyann Way Fairfax , VA 22030 Phone: (none) Fax: (none) Email: beirnejd@mac.com _____________________________________________________ Karen Beirne-Flint 8300 Grainfield Road Severn , MD 21144 Phone: (none) Fax: (none) Email: karen.beirne-flint@ogn.af.mil _____________________________________________________ Mr. Per Beith 3370 Miraloma Anaheim , CA 92803 Phone: (none) Fax: (none) Email: per.beith@boeing.com _____________________________________________________ Mr. Gregory Bell 1401 Old Sage Ct Glen Allen , VA 23059 Phone: (none) Fax: (none) Email: gbell@bluecanary.us _____________________________________________________ Thomas Bell Deputy Director of National Inte CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1739 Email: lakecia.s.graham@ugov.gov _____________________________________________________ Mr. Chris Bellios Vice President BAE Systems 8201 Greensboro Dr McLean , VA 22102 Phone: (none) Fax: (none) Email: chris.bellios@baesystems.com _____________________________________________________ Chris G Bellios MBA Vice President BAE Systems 8201 Greensboro Dr Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: chris.bellios@baesystems.com _____________________________________________________ Stephanie Bellistri TBD Title Palantir Technologies 1660 International Drive 8th Floor McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Ms Leslee Belluchie 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 Email: leslee.belluchie@si-intl.com _____________________________________________________ Leslee Belluchie Managing Member FedCap Partners, LLC 11951 Freedom Drive 13th Floor Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Mr. Scott Belodeau Vice President TECH USA, Inc 8334 Veterans Highway 2nd Floor Millersville , MD 21108 Phone: (none) Fax: (none) Email: sbelodeau@techusa.net _____________________________________________________ Simone Bemporad CEO Finmeccanica Angelica Falchi 1625 I Street, NW 12th Floor Washington , DC 20006 Phone: (none) Fax: (none) Email: simone.bemporad@finmeccanica.com _____________________________________________________ Mr. Charles Bender Director, Special R&D Intel PGen SRI International 1100 Wilson Boulevard Suite 2800 Arlington , VA 22209 Phone: (none) Fax: (none) Email: bender@wdc.sri.com _____________________________________________________ Andrea Benham 4204 Columbia Pike Apt. #2 Arlington , VA 22204 Phone: (none) Fax: (none) Email: andreabenham@hotmail.com _____________________________________________________ Stephanie Benham Content Manager NGA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: stephasb@dni.gov _____________________________________________________ Daniel Benjamin Counterterrorism State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: benjamind@state.gov _____________________________________________________ Jeff Benjamin 7223 Willow Oak Place Springfield , VA 22153 Phone: (none) Fax: (none) Email: benjaminja@saic.com _____________________________________________________ Thomas J Benjamin Senior Vice President and COO Analytic Services Inc. 2900 South Quincy Street Suite 800 Arlington , VA 22206 Phone: (none) Fax: (none) Email: thomas.benjamin@anser.org _____________________________________________________ Brian Bennett Reporter Tribune Washington Bureau 1090 Vermont Ave. NW Suite 1000 Washington , DC 20005 Phone: (none) Fax: (none) Email: bbennett@tribune.com _____________________________________________________ Ms. Elizabeth Bennett Senior Staff Scientist Ensco, Inc. 5400 Port Royal Road Springfield , VA 22151 Phone: (none) Fax: (none) Email: bennett.elizabeth@ensco.com _____________________________________________________ Mr. Corey A Bent BS ChE Chief, Media Services Department of Homeland Security 3009 S Hill St Arlington , VA 22202 Phone: (none) Fax: (none) Email: coreybent@gmail.com _____________________________________________________ Ms. Lesia Hunter TITLE TBD The Potomac Advocates 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (none) Email: lesia.hunter@serco-na.com _____________________________________________________ DSS Randy T Hunter Mr NC/BA AP/M Dir Systems Security CSSI Randy Hunter 284 Cranes Cir West Altamonte Springs , FL 32701 Phone: (407) 339-9467 Fax: 1-800-439-2216 Email: rhunter42@hotmail.com _____________________________________________________ Mr. William Huntington Deputy Director for Human Intell DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: William.Huntington@dia.mil _____________________________________________________ John A Hurley 9001 Cherrytree Drive Alexandria , VA 22309-2902 Phone: (none) Fax: (none) Email: jhurley@republiccapitalaccess.com _____________________________________________________ Mel Hurley Director - IT Professional Servi Wyle Information Systems 1600 Intenational Dr Suite 800 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. David Hurry TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mark Hutnan Senior Manager General Dynamics AIS 10560 Arrowhead Drive Fiarfax , VA 22030 Phone: (none) Fax: (none) _____________________________________________________ Doug Huttar Senior Manager Grant Thornton LLP 333 John Carlyle Street Suite 500 Alexandria , VA 22314 Phone: (none) Fax: (none) _____________________________________________________ Church Hutton Cyber Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: church_hutton@armed-services.senate.gov _____________________________________________________ Steve Hyde TITLE TBD TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) Email: stephen.hyde@tasc.com _____________________________________________________ John Hynes Jr. SVP, General Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: john.p.hynes.jr@saic.com _____________________________________________________ Mr. Karl Jensen TITLE TBD Raytheon Company 1200 S. Jupiter Road MS AA-75000 Garland , TX 75042 Phone: (none) Fax: (none) Email: Karl_Jensen@raytheon.com _____________________________________________________ Karl Jensen VP, BD-Intelligence Solutions L-3 Communications, Inc. 11955 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Rick Jensen Director Business Finance Serco 1050 North Newport Rd Colorado Springs , CO 80916 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Kristin Jepson Director of Security Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Kristin.Jepson@mail.house.gov _____________________________________________________ Mr. Donald Jewell 9368 Duff Court Ellicott City , MD 21042 Phone: (none) Fax: (none) Email: donjewell15@comcast.net _____________________________________________________ Rod Smith Jim Balentine President Abraxas/Cubic Mission Support Services Rod Smith 12801 Worldgate Drive Suite 800 Herndon , DC 20170 Phone: (none) Fax: (703) 563-9541 Email: rod.smith@abraxascorp.com _____________________________________________________ Mr. David Jimenez 7122 Rock Ridge Lane Apartment I Alexandria , VA 22315 Phone: (none) Fax: (none) Email: swnmia@juno.com _____________________________________________________ Mr. Jose Jimenez Chief Diversity Offiver Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: jjimene4@csc.com _____________________________________________________ Jose Jiminez Acting Assistant to Special Agen DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jose.j.jiminez1@dhs.com _____________________________________________________ Mr. Alexander Joel Civil Liberties Protection Offic ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: alexander.w.joel@ugov.gov _____________________________________________________ Alexander Joel Civil Liberties Officer ODNI ODNI Washington DC , DC 20511 Phone: (none) Fax: (none) Email: alexawj@dni.gov _____________________________________________________ Annie John TITLE TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. John Johns Business Development Senior Mana CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: jjohns@caci.com _____________________________________________________ Mr. John Johns VP, BD Six3 Systems 1430 Spring Hill Road Suite 525 McLean , VA 22102 Phone: (none) Fax: (703) 852-1218 Email: john.johns@six3systems.com _____________________________________________________ Barbara A Johnson TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Bart Johnson Principal Deputy Under Secretary DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: bart.johnson@dhs.gov _____________________________________________________ Bobby Johnson Smartline Project Manager DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: brjohnson@nmic.navy.mil _____________________________________________________ Clete Johnson TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: c_johnson@ssci.senate.gov _____________________________________________________ Craig Johnson P.O. Box 748 MZ 1246 Fort Worth , TX 76101 Phone: (none) Fax: (none) Email: craig.r.johnson@lmco.com _____________________________________________________ David T Johnson International Narcotics & Law En State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ambdavidjohnson@gmail.com _____________________________________________________ Mr. Dean Johnson President Entegra Systems 2342 Ballard Way Ellicott City , MD 21042 Phone: (none) Fax: (410) 418-4785 Email: dean.johnson@entegrasystems.com _____________________________________________________ Ivy Johnson TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ivy_johnson@hsgac.senate.gov _____________________________________________________ Mr. J. M Johnson TITLE TBD NSA 9800 Savage Road V4, Suite 6566 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: jmjohns@nsa.gov _____________________________________________________ Jeffrey Johnson CTO FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jeffery.johnson@ic.fbi.gov _____________________________________________________ Ms. Kathleen D Johnson 555 Herndon Parkway Parkway One Office Buildi , VA 20171 Phone: (none) Fax: (none) Email: Kathleen.Johnson@cdsinc.com _____________________________________________________ Mr. Karl Jensen TITLE TBD Raytheon Company 1200 S. Jupiter Road MS AA-75000 Garland , TX 75042 Phone: (none) Fax: (none) Email: Karl_Jensen@raytheon.com _____________________________________________________ Karl Jensen VP, BD-Intelligence Solutions L-3 Communications, Inc. 11955 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Rick Jensen Director Business Finance Serco 1050 North Newport Rd Colorado Springs , CO 80916 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Kristin Jepson Director of Security Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Kristin.Jepson@mail.house.gov _____________________________________________________ Mr. Donald Jewell 9368 Duff Court Ellicott City , MD 21042 Phone: (none) Fax: (none) Email: donjewell15@comcast.net _____________________________________________________ Rod Smith Jim Balentine President Abraxas/Cubic Mission Support Services Rod Smith 12801 Worldgate Drive Suite 800 Herndon , DC 20170 Phone: (none) Fax: (703) 563-9541 Email: rod.smith@abraxascorp.com _____________________________________________________ Mr. David Jimenez 7122 Rock Ridge Lane Apartment I Alexandria , VA 22315 Phone: (none) Fax: (none) Email: swnmia@juno.com _____________________________________________________ Mr. Jose Jimenez Chief Diversity Offiver Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: jjimene4@csc.com _____________________________________________________ Jose Jiminez Acting Assistant to Special Agen DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jose.j.jiminez1@dhs.com _____________________________________________________ Mr. Alexander Joel Civil Liberties Protection Offic ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: alexander.w.joel@ugov.gov _____________________________________________________ Alexander Joel Civil Liberties Officer ODNI ODNI Washington DC , DC 20511 Phone: (none) Fax: (none) Email: alexawj@dni.gov _____________________________________________________ Annie John TITLE TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. John Johns Business Development Senior Mana CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: jjohns@caci.com _____________________________________________________ Mr. John Johns VP, BD Six3 Systems 1430 Spring Hill Road Suite 525 McLean , VA 22102 Phone: (none) Fax: (703) 852-1218 Email: john.johns@six3systems.com _____________________________________________________ Barbara A Johnson TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Bart Johnson Principal Deputy Under Secretary DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: bart.johnson@dhs.gov _____________________________________________________ Bobby Johnson Smartline Project Manager DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: brjohnson@nmic.navy.mil _____________________________________________________ Clete Johnson TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: c_johnson@ssci.senate.gov _____________________________________________________ Craig Johnson P.O. Box 748 MZ 1246 Fort Worth , TX 76101 Phone: (none) Fax: (none) Email: craig.r.johnson@lmco.com _____________________________________________________ David T Johnson International Narcotics & Law En State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ambdavidjohnson@gmail.com _____________________________________________________ Mr. Dean Johnson President Entegra Systems 2342 Ballard Way Ellicott City , MD 21042 Phone: (none) Fax: (410) 418-4785 Email: dean.johnson@entegrasystems.com _____________________________________________________ Ivy Johnson TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ivy_johnson@hsgac.senate.gov _____________________________________________________ Mr. J. M Johnson TITLE TBD NSA 9800 Savage Road V4, Suite 6566 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: jmjohns@nsa.gov _____________________________________________________ Jeffrey Johnson CTO FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jeffery.johnson@ic.fbi.gov _____________________________________________________ Ms. Kathleen D Johnson 555 Herndon Parkway Parkway One Office Buildi , VA 20171 Phone: (none) Fax: (none) Email: Kathleen.Johnson@cdsinc.com _____________________________________________________ Mr. Keith Johnson 411 Tudor Ct Leesburg , VA 20176 Phone: (none) Fax: (none) Email: keith.e.johnson@lmco.com _____________________________________________________ Ken Johnson Minority Deputy Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: K_Johnson@ssci.senate.gov _____________________________________________________ Laura M Johnson 510 Alalea Drive Rockville , MD 20850-2001 Phone: (none) Fax: (none) Email: laura.m.johnson@dhs.gov _____________________________________________________ Laura M Johnson Ph.D. Dep Chief Deliberate Plans DHS 3801 Nebraska Ave. NW Bldg 81, Rm 103 Washington , DC 20528 Phone: (none) Fax: (none) Email: laura.manning.johnson@hq.dhs.gov _____________________________________________________ Laura M Johnson PhD Acting Branch Chief, Deliberate DHS 3801 Nebraska Ave NAC bldg 81, rm 103 Washington , DC 20528 Phone: (none) Fax: (none) Email: lauramanning@comcast.net _____________________________________________________ Ms. Mary Alice Johnson 1110 Herndon Parkway Herndon , VA 20170 Phone: (none) Fax: (none) Email: maryalice@connellyworks.com _____________________________________________________ Mr. Michael M Johnson Senior Scientist Sandia National Laboratories 7011 East Avenue MS 9152 Livermore , CA 94550 Phone: (none) Fax: (none) Email: mmjohns@sandia.gov _____________________________________________________ Mr. Robert Johnson Federal Market Account Director SRC, Inc 7502 Round Pond Road North Syracuse , NY 13212 Phone: (none) Fax: (none) Email: johnson@srcinc.com _____________________________________________________ Terry Johnson Acquisition Mgmt Supervisor Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Mr. Ty Johnson Ty Johnson 1550 Crystal Drive Suite 502B Arlington , VA 22202 Phone: (none) Fax: (none) Email: ty.johnson@osd.mil _____________________________________________________ Mr. Bayne Johnston 310 W. 80th St. APT 2E New York , NY 10024 Phone: (none) Fax: (none) Email: baynejohnston@gmail.com _____________________________________________________ Mikeal Johnston Dir JFO-PMO DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mikeal.johnston@hq.dhs.gov _____________________________________________________ John Jolly VP and General Manager General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) _____________________________________________________ Mr. Pierre Joly 8432 Ambrose Court Springfield , VA 22153 Phone: (none) Fax: (none) Email: pjoly@intellpros.com _____________________________________________________ Mr. Adam Jones Staff ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: adam.jones@ugov.gov _____________________________________________________ Ashley Jones Communications Specialist Wyle Information Systems 1600 Intenational Dr Suite 800 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. Charles Jones Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Jones_Chuck@bah.com _____________________________________________________ Mr. Dalton Jones Senior Biometrics Executive ODNI 4251 Suitland Road Washington , D.C. 20593-5765 Phone: (none) Fax: (none) Email: dalton.jones@dhs.gov _____________________________________________________ Dan Jones TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: d_jones@ssci.senate.gov _____________________________________________________ Mr. Dennis Jones VP, Services & DoD Sales GeoEye 21700 Atlantic Boulevard Dulles , VA 20166 Phone: (none) Fax: (none) Email: jones.dennis@geoeye.com _____________________________________________________ Jaime Jones Director, Corporate Operations Delta Risk LLC 2213 N Street NW #302 Washington DC , DC 20037 Phone: (none) Fax: (none) Email: jjones@delta-risk.net _____________________________________________________ James L Jones National Security Advisor NSC No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: james_l._jones@nsc.eop.gov _____________________________________________________ Mr. Jesse Jones CEO Special Operations Technology, Inc. 12011 Guilford Road Suite 109 Annapolis Junction , MD 20701 Phone: (none) Fax: (none) Email: jjones@sotech.us _____________________________________________________ Jesse S Jones TITLE TBD Special Operations Technology, Inc. 12011 Guilford Road Suite 109 Annapolis Junction , MD 20701 Phone: (none) Fax: (none) Email: jjones@sotech.us _____________________________________________________ Kerri-Ann Jones Ocean, Environment, & Science State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jonesk@state.gov _____________________________________________________ Kimberly Q Jones Policy Officer DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kimberly.quirk@gmail.com _____________________________________________________ Mr. Kyle Jones 4002 West Crowly Court Visalia , CA 93291 Phone: (none) Fax: (none) Email: kjones100m@aol.com _____________________________________________________ Mr. Robert D Jones Ch, Infra Dev & Opns, Suite 6575 NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rdjones@nsa.gov _____________________________________________________ Mr. S. Jones 815 Ritchie Hwy. #214 Severna Park , MD 21146 Phone: (none) Fax: (none) _____________________________________________________ William P Jones TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Thomas Joost Vice President, Tactical Systems General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Thomas.joost@gd-ais.com _____________________________________________________ Mr. Cazzy J Jordan JD, PMP Sr. Developer Instructional General Dynamics IT 5875 BARCLAY DRIVE SUITE 5 ALEXANDRIA , VA 22315 Phone: (703) 992-4578 Fax: (none) Email: cazzy.jordan@gdit.com _____________________________________________________ Mr. Everette E Jordan TITLE TBD NSA 9800 Savage Road NVTC, Suite 6486 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: eejorda@nsa.gov _____________________________________________________ Mr. Shunil Joseph 2451 Atrium Way 3rd Floor Nashville , TN 37214 Phone: (none) Fax: (none) Email: sjoseph@thinkingahead.com _____________________________________________________ paul m joyal BA, MA managing director National Strategies 1400 I Street NW suite 900 Washington , DC 20005 Phone: (301) 439-5066 Fax: (none) Email: pjoyal@nationalstrategies.com _____________________________________________________ Patrick Joyce TITLE TBD Deloitte Consulting, LLP No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Robert Joyce TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Sean Joyce International Operations Divisio FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: sean.joyce@ic.fbi.gov _____________________________________________________ Mr. Steven Judd Account Sales Rep/INTEL Oracle Corporation 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: steven.judd@oracle.com _____________________________________________________ Rich Julien 1700 N. Moore St. Suite 1705 Arlington , VA 22209 Phone: (none) Fax: (none) Email: rjulien@eastportanalytics.com _____________________________________________________ Paul Juola Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: paul.juola@mail.house.gov _____________________________________________________ Keith G Kauffman Asst Admin for Intelligence & An DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: keith.g.kauffman@dhs.gov _____________________________________________________ Michael Kauffman Vice President of Contracts Proteus Technologies 133 National Business Parkway Suite 150 Annapolis Junction , MD 20701 Phone: (none) Fax: (none) _____________________________________________________ Richard Kauzlarich 7019 Ted Drive Falls Church , VA 22042 Phone: (703) 536-3486 Fax: (none) _____________________________________________________ Ms. Wendy Kay 7507 Brad St Falls Church , VA 22042 Phone: (none) Fax: (none) Email: wendy.kay1@navy.mil _____________________________________________________ Wendy Kay Senior Director for Intelligence DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: wendy.kay@navy.mil _____________________________________________________ Juliette Kayyem Assistant Secretary of Intergove DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: juliette.kayyem@hq.dhs.gov _____________________________________________________ Ms. Suzanne Kecmer Manager, Strategy Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: suzanne_kecmer@raytheon.com _____________________________________________________ Steve Kee VP Hughes 11717 Exploration Lane Germantown , MD 20876 Phone: (none) Fax: (none) Email: steven.kee@hughes.com _____________________________________________________ Mr. Michael Keebaugh President, IIS Raytheon Company 1200 S. Jupiter Road MS AA-75000 Garland , TX 75042 Phone: (none) Fax: (none) Email: mike_keebaugh@raytheon.com _____________________________________________________ Mr. John Keefe Assistant Deputy Director of Nat ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.p.keefe@ugov.gov _____________________________________________________ James Keenan TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Terry Kees 2945 Gray Street Oakton , VA 22124 Phone: (none) Fax: (none) Email: terrykees@gmail.com _____________________________________________________ Ioanna T Kefalas Executive Assistant to Secretary Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Ioanna.T.Kefalas@hud.gov _____________________________________________________ Mr Marshall Keith Vice President The SI Organization, Inc. Chris Nolan 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: marshall.keith@theSIorg.com _____________________________________________________ Mr. Hans Keithly 10008 Park Royal Drive Great Falls , VA 22066 Phone: (none) Fax: (none) Email: hjkeithley@cox.net _____________________________________________________ BG(R) Brian Keller 14688 Lee Road Chantilly , VA 22039 Phone: (none) Fax: (none) Email: brian.keller@saic.com _____________________________________________________ Patrick W Kelley Office of Integrity and Complian FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: patrick.kelley@ic.fbi.gov _____________________________________________________ Jason Kello TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) _____________________________________________________ Declan Kelly Econ Envoy to Northern Ireland State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kellyd@state.gov _____________________________________________________ Ian C Kelly Dept Spokesman State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kellyic@state.gov _____________________________________________________ Mr. Kevin Kelly Vice President, Corporate Strate LGS Innovations Accounts Payable 5440 Millstream Road Suite E210 McLeansville , NC 27301 Phone: (none) Fax: (none) Email: klkelly@lgsinnovations.com _____________________________________________________ Kevin L Kelly VP Corporate Strategy LGS Innovations Kevin Kelly 13665 Dulles Technology Drive Suite 301 Herndon , VA 20169 Phone: (703) 753-5115 Fax: (703) 394-1420 Email: klkelly@lgsinnovations.com _____________________________________________________ Ms. Laurie Kelly TITLE TBD DIA DIOCC/DJA Defense Intelligence Agency 200 MacDill Blvd Bldg 6000 Washington , DC 20340 Phone: (none) Fax: (none) Email: laurie.kelly@dia.mil _____________________________________________________ Mr. Rodney P Kelly TITLE TBD NSA 9800 Savage Road DC4, Suite 6249 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: rpkelly@nsa.gov _____________________________________________________ Stephen Kelly Office of Congressional Affairs FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: stephen.kelly@ic.fbi.gov _____________________________________________________ Mr. Ronald Kemper 5213 SW 10th Avenue Cape Coral , FL 33914-7019 Phone: (none) Fax: (none) Email: ronkemper@att.net _____________________________________________________ Karyn Kendall TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: karyn.kendall@mail.house.gov _____________________________________________________ Colonel Laura Kennedy USAF TITLE TBD NRO 3500 Pecan Place Fairfax , VA 22033 Phone: (none) Fax: (none) Email: laura.kennedy@nro.mil _____________________________________________________ Patrick F Kennedy Under Secretary Management State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: KennedyPF@state.gov _____________________________________________________ Tracy S Kennedy Technical Director General Dynamics AIS 8800 Queen Ave South Bloomington , MN 55431 Phone: (none) Fax: (952) 921-6552 _____________________________________________________ Paul Kennett Vice President, ISS KGS 2750 Prosperity Ave Ste 300 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: pkennett@kforcegov.com _____________________________________________________ Andrew Kerr TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: a_kerr@ssci.senate.gov _____________________________________________________ Mr. Charles Kerschner 7904 Curtis Street Chevy Chase , MD 20815 Phone: (none) Fax: (none) _____________________________________________________ Mr. Paul Kerstanski 2231 Crystal Drive Suite 1114 Arlington , VA 22202 Phone: (none) Fax: (none) Email: pkerstanski@greenlinesystems.com _____________________________________________________ David Kervin Chief Strategy Officer KeyPoint Government Solutions, Inc. 1750 Foxtrail Drive Loveland , CO 80538 Phone: (none) Fax: (none) Email: david.kervin@keypoint.us.com _____________________________________________________ Dr. Frank Kesterman 4 Winterberry Court Bethesdsa , MD 20817 Phone: (none) Fax: (none) Email: kestermans@hotmail.com _____________________________________________________ Jamie Kettren 2000 S Eads St Apt 615 Arlington , VA 22202 Phone: (none) Fax: (none) Email: jket85@gmail.com _____________________________________________________ Mr. Ryan Kezar 3753 Gekeler Lane V202 Boise , ID 83706 Phone: (none) Fax: (none) Email: rpkezar@cableone.net _____________________________________________________ David Khol 3904 Sulgrave Dr Alexandria , VA 22309 Phone: (none) Fax: (none) Email: david.khol@ic.fbi.gov _____________________________________________________ Charles Kieffer Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: charles_kieffer@appro.senate.gov _____________________________________________________ Stephanie L Kiel M.A. Cyber Analyst USD(I) 1425 S. Eads APT. 505 ARLINGTON , VA 22202 Phone: (none) Fax: (none) Email: stephkiel@gmail.com _____________________________________________________ David Kier CEO Arete Associates 1550 Crystal Drive Suite 703 Arlington , VA 22202 Phone: (none) Fax: (none) Email: dkier@arete.com _____________________________________________________ Mr David A Kier BS, MS CEO Arete Associates 1550 Crystal Dr Arlington , VA 22203 Phone: (none) Fax: (none) Email: Dkier@arete.com _____________________________________________________ Kathleen Kiernan No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kiernan@kiernangroupholdings.com _____________________________________________________ Mr. Gregory T Kiley 313 4th Street NE Washington , DC 20002 Phone: (202) 544-6897 Fax: (none) Email: gregory.kiley@gmail.com _____________________________________________________ Mr. Lance Killoran 11573 Hemingway Drive Reston , VA 20194 Phone: (none) Fax: (none) _____________________________________________________ Frida Kim TITLE TBD FTS International 200 Spring Street, Suite 360 Herndon , VA 20170 Phone: (none) Fax: (none) Email: Frida.Kim@fts-intl.com _____________________________________________________ Mr. Hyeon C Kim MS Senior Scientist CACI Hyeon Kim 8530 Corridor Road Savage , MD 20763 Phone: (none) Fax: (none) Email: hyeon.kim560@gmail.com _____________________________________________________ Ryan Kim 3900 Watson Place #B-636 Washington , DC 20016 Phone: (none) Fax: (none) Email: RK2085a@american.edu _____________________________________________________ Mr. Michael Kimberling P.O. Box 1055 Leesburg , VA 20177 Phone: (none) Fax: (none) _____________________________________________________ LTG John Kimmons Director, Intelligence Staff ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: shari.a.mcmahan@ugov.gov _____________________________________________________ LTG John Kimmons USA Director of the Intelligence Sta ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: linnea.b.thompson@ugov.gov _____________________________________________________ Ms. Bonnie Kind TITLE TBD NSA 9800 Savage Road Comptroller, Suite 6200 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: bkind@nsa.gov _____________________________________________________ Mr. Larry Kindsvater 6901 McLean Province Circle Falls Church , VA 22043-1666 Phone: (none) Fax: (none) Email: Kindsvater.Consulting@Verizon.net _____________________________________________________ Bob King BSE, MBA 1721 Candlewood Drive Leavenworth , KS 66048 Phone: (none) Fax: (none) Email: subbob@gmail.com _____________________________________________________ Mr. Dennis M King BA Manager, Business Development ABSI Corporation 9210 Corporate Drive Suite 150 Rockville , MD 20850 Phone: (410) 224-6508 Fax: (301) 997-0260 Email: kingdm4@verizon.net _____________________________________________________ Mr. Jay G King 7360 Guilford Drive, Suite 201 Frederick , MD 21704 Phone: (none) Fax: (none) Email: gking@integrity.us.com _____________________________________________________ Jeremy King Managing Partner, Federal Practi Benchmark Executive Search 1984 Isaac Newton Square, suite Reston , VA 20190 Phone: (none) Fax: (none) Email: jeremy@benchmarkes.com _____________________________________________________ Peter T King Rep. Ranking Member Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: michele.ingwerson@mail.house.gov _____________________________________________________ Steven King 245 Murray Ln, SW Mail Code 0602 Arlington , VA 20598 Phone: (none) Fax: (none) _____________________________________________________ Donna Kinnal Marketing Director ASI Government 1655 North Fort Meyer Drive Suite 1000 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Ms. Laurie Kinney TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: lkinney@potomacinstitute.org _____________________________________________________ Thomas Kirchamier TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Thomas.Kirchamier@gd-ais.com _____________________________________________________ Mr. Thomas Kirchmaier 13857 McLearen Road Herndon , VA 20171 Phone: (none) Fax: (703) 268-7568 Email: thomas.kirchmaier@gdit.com _____________________________________________________ Mike Kirkland 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) _____________________________________________________ John A Kirschner TITLE TBD ABSi Corporation 9210 Corporate Drive Suite 150 Rockville , MD 20850 Phone: (none) Fax: (none) Email: john.kirschner@absicorp.com _____________________________________________________ Mr. Sam Kirton TITLE TBD USIS 7799 Leesburg Pike Suite 400 S Falls Church , VA 22043 Phone: (none) Fax: (none) Email: sam.kirton@usis.com _____________________________________________________ Sam Kirton TITLE TBD USIS 7799 Leesburg Pike Suite 400 S Falls Church , VA 22043 Phone: (none) Fax: (none) Email: sam.kirton@usis.com _____________________________________________________ Mr. K Kitchen PO Box 4703 Oak Brook , IL 60521 Phone: (none) Fax: (none) Email: cyberskip@aol.com _____________________________________________________ Mr. Richard Kitchen Senior Vice President CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: rkitchen@caci.com _____________________________________________________ Kevin Klein TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kevin.klein@mail.house.gov _____________________________________________________ Laine Klein TITLE TBD General Dynamics AIS 12950 Worldgate Drive Herndon , VA 20170 Phone: (none) Fax: (none) _____________________________________________________ Mr. Eric Kleppinger TITLE TBD FBI 8104 Overlake Court Fairfax Station , VA 22039 Phone: (none) Fax: (none) Email: eric.kleppinger@ic.fbi.gov _____________________________________________________ Mr. Richard Klingler 1501 K Street, NW Washington , DC 20005 Phone: (none) Fax: (none) Email: rklingler@sidley.com _____________________________________________________ Ms. Elaine Knauf TITLE TBD Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: elaine.knauf@ngc.com _____________________________________________________ Jean Knighten 2111 Wilson Blvd. Ste 1000 Arlington , VA 22032 Phone: (none) Fax: (none) Email: Knightenj@battelle.org _____________________________________________________ Ms. Katie Knipper TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: KKnipper@potomacinstitute.org _____________________________________________________ Clark Knop Principal FedCap Partners, LLC 11951 Freedom Drive 13th Floor Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Rick Knop Managing Member FedCap Partners, LLC Judy St. George 11951 Freedom Drive 13th Floor Reston , VA 20190 Phone: (none) Fax: (703) 251-4440 Email: RKnop@FedCapPartners.com _____________________________________________________ Karen Knowles TITLE TBD SAS Institute 1530 Wilson Blvd Suite 800 Arlington , VA 22209 Phone: (none) Fax: (none) Email: karen.knowles@sas.com _____________________________________________________ Mr. Brian Knutsen 7700 Boston Boulevard Springfield , VA 22153 Phone: (none) Fax: (none) Email: brian.knutsen@boeing.com _____________________________________________________ Mr. Ryan Kociolek Director, Business Development Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: rkociolek@csc.com _____________________________________________________ Ms. Rebekah Koffler 1933 Hull Road Vienna , VA 22182-3716 Phone: (none) Fax: (none) Email: rebekahkoffler@aol.com _____________________________________________________ David Koger TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: d_koger@ssci.senate.gov _____________________________________________________ Mr. James Kohlhaas 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: james.j.kohlhaas@lmco.com _____________________________________________________ Chris Kojm Deputy Director of National Inte ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1739 Email: deborahn@dni.gov _____________________________________________________ Kim Kok National Security Programs Marklogic Michael Reynolds 1600 Tysons Blvd Suite 800 Mclean , VA 22102 Phone: (none) Fax: (none) Email: kim.kok@marklogic.com _____________________________________________________ Mr. Ron Kolb 1421 Jefferson Davis Highway Suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) Email: Ron.Kolb@gd-ais.com _____________________________________________________ Mr. Paul Kolbe 9910 Chase Hill Ct Vienna , VA 22182 Phone: (none) Fax: (none) Email: paul.kolbe@bp.com _____________________________________________________ Josh Kolchins TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: joshua.kolchins@gd-ais.com _____________________________________________________ Mr. Josh Kolchins 10560 Arrowhead Drive Fairfax , VA 22030 Phone: (none) Fax: (none) Email: joshua.kolchins@gd-ais.com _____________________________________________________ Mr. Curt Kolcun Vice President, Federal Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: curtk@microsoft.com _____________________________________________________ Dr. Elizabeth Kolmstetter Deputy to Ronald Sanders, Intell ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: elizabeth.b.kolmstetter@ugov.gov _____________________________________________________ Cindy Komanowski TITLE TBD AT&T Government Solutions-NIS 7125 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) Email: ckomanowski@att.com _____________________________________________________ Ms. Jennifer Kondal 7789 Royal Sydney Dr. Gainesville , VA 20155 Phone: (none) Fax: (none) Email: jkondal@yahoo.com _____________________________________________________ Matthijs R. Koot Science Park 904 Amsterdam 1098 XH Netherlands Phone: (none) Fax: (none) Email: koot@uva.nl _____________________________________________________ Michael P Kortan Office of Public Affairs FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: michael.kortan@ic.fbi.gov _____________________________________________________ Ms. Kristine Korva 1211 C ST NE Washington , DC 20002 Phone: (none) Fax: (none) Email: kkorva@deloitte.com _____________________________________________________ Kristen Kosinski TITLE TBD Applied Signal Technology 460 West California Avenue Sunnyvale , CA 94086 Phone: (none) Fax: (none) Email: kristen_kosinski@appsig.com _____________________________________________________ Michael Kostiw Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Mike_Kostiw@armed-services.senate.gov _____________________________________________________ Mr. Paul Kozemchak DARPA 3701 N. Fairfax Drive Arlington , VA 22203 Phone: (none) Fax: (none) Email: pkozemchak@darpa.mil _____________________________________________________ Paul Kozemchak Special Assistant to Director DARPA 3701 N. Fairfax Drive Arlington , VA 22203 Phone: (none) Fax: (none) Email: pkozemchak@darpa.mil _____________________________________________________ LT. GEN. Craig Koziol TITLE TBD DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: craig.koziol@osd.mil _____________________________________________________ Mr. Ron Krakower 317 Meadowbrook Lane South Orange , NJ 7079 Phone: (none) Fax: (none) Email: rkrakower@sarnoff.com _____________________________________________________ Eric Krebs Director of Strategy Blue Glacier Management Group Inc 8315 Lee Highway Suite 230 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: eric.krebs@blueglacier.com _____________________________________________________ Ms. Kelly Krechmer 1855 Saint Francis Street Apt 1604 Reston , VA 20190 Phone: (none) Fax: (none) Email: kelly_krechmer@hotmail.com _____________________________________________________ Kelly Krechmer 1350 Beverly Road, Apt. 818 McLean , VA 22101 Phone: (none) Fax: (none) Email: kkny10021@hotmail.com _____________________________________________________ Kelly Krechmer TITLE TBD ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kellyk@dni.gov _____________________________________________________ Dean Kremer TITLE TBD Intelsat General Corporation 6550 Rock Spring Drive Suite 450 Bethesda , MD 20817 Phone: (none) Fax: (none) _____________________________________________________ Alexander L Kronick BS, MS Graduate Assistant NJCU 68 Blackford Road Newton , NJ 07860 Phone: (none) Fax: (none) Email: alk555@gmail.com _____________________________________________________ Mr. Allen Krum NRO & Special Projects Senior Ex Harris Corporation P.O. Box 37 MS: 2-21D Melbourne , FL 32902 Phone: (none) Fax: (none) Email: akrum@harris.com _____________________________________________________ Mr. Robert Krysick Senior Acquisition Executive NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rhkrysi@nsa.gov _____________________________________________________ Ms. Nancy Kudla Chairman & CEO Kforce Government Solutions 2750 Prosperity Ave. Suite 300 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: nkudla@dnovus.com _____________________________________________________ Alex Kugajevsky TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: alex.kugajevsky@mail.house.gov _____________________________________________________ Mitch Kugler TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Christina Kuhn 2721 Technology Drive Annapolis Junction , MD 20701 Phone: (none) Fax: (none) Email: christina.kuhn@gd-ais.com _____________________________________________________ Ms. Karen Kuhn Program Support Camber Corporation 5860 Trinity Parkway Suite 400 Centerville , VA 20120 Phone: (none) Fax: (none) Email: kkuhn@i2spros.com _____________________________________________________ Mr. Michael Kuhn TITLE TBD DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Michael.Kuhn@dia.mil _____________________________________________________ Tina Kuhn TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Christina.Kuhn@gd-ais.com _____________________________________________________ Mr. Martin Kurdys 10330 Old Columbia Rd Suite 102 Columbia , MD 21046 Phone: (none) Fax: (none) Email: mkurdys@comcast.net _____________________________________________________ Alexandra Kuscher TITLE TBD NetApp 1921 Gallows Road Suite 600 Vienna , VA 22182 Phone: (none) Fax: (none) Email: kuscher@netapp.com _____________________________________________________ Cory Kutcher 2300 24th Road South #1130 Arlington , VA 22206 Phone: (none) Fax: (none) Email: cory.kutcher@gmail.com _____________________________________________________ Carolyn Kwieraga Dir, NGIS Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr Howard W Kympton III 909 N. Washington Street Suite 300B Alexandria , VA 22314 Phone: (none) Fax: (703) 299-0799 Email: hkympton@chglobalsecurity.com _____________________________________________________ Matthew I Bentley B.A. 1124 Beechwood Ave Farrell , PA 16121 Phone: (none) Fax: (none) Email: mianbentley@gmail.com _____________________________________________________ Ms. Jessica E Berardinucci 4200 Cathedral Avenue, NW Washington , DC 20016 Phone: (none) Fax: (none) Email: j.berardinucci@gmail.com _____________________________________________________ Michael Bergen TITLE TBD Deloitte Consulting, LLP No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Russ Berkoff Services Manager Dell Inc. One Dell Way One Dell Way Round Rock , TX 78682 Phone: (none) Fax: (none) Email: russ_berkoff@federal.dell.com _____________________________________________________ Mr. Donald Berlin President Investigative Consultants 2020 Pennsylvania Avenue NW Ste 813 Washington , DC 20006 Phone: (none) Fax: (none) Email: dberlin@icioffshore.com _____________________________________________________ Mr. Jon-Paul D Bernard BA Jobs/Internship Coordinator Georgetown University 37th and O Streets, N.W. Washington DC , DC 20057 Phone: (none) Fax: (none) Email: isrpoet00@hotmail.com _____________________________________________________ Mr. Richard Bernard 3104 Evergreen Ridge Drive Cincinnati , OH 45215-5716 Phone: (none) Fax: (none) Email: bernard@erols.com _____________________________________________________ Kent Berner Group President, Intel Solutions A-T Solutions, Inc. 1934 Old Gallows Road Suite 360 Vienna , VA 22182 Phone: (none) Fax: (703) 288-3401 Email: kentberner@a-tsolutions.com _____________________________________________________ Mr. I. Bernstein 2133 Lee Building College Park , MD 20742-5125 Phone: (none) Fax: (none) Email: mbern@umd.edu _____________________________________________________ Ms. Kristin H Berry 6917 Bonheim Court McLean , VA 22101 Phone: (none) Fax: (none) Email: kberry@r3consulting.com _____________________________________________________ Mr. Robert Berry Jr., Principal Deputy General Co DIA Building 6000 Washington , DC 20340-5100 Phone: (none) Fax: (none) Email: Robert.Berry@dia.mil _____________________________________________________ Alan Bersin Commissioner DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: alan.bersin@dhs.gov _____________________________________________________ Mr. Michael Bessette 1226 W. Argyle St. #3E Chicago , IL 60640 Phone: (none) Fax: (none) Email: michael.bessette@gmail.com _____________________________________________________ John Betar 7 Woodland Drive Newville , PA 17241 Phone: (none) Fax: (none) Email: jebbetar@verizon.net _____________________________________________________ RADM Thomas Betterton USN (Ret) 7977 Wellington Drive Warrenton , VA 20186 Phone: (none) Fax: (none) Email: tom.bett03@gmail.com _____________________________________________________ Rear Admiral Thomas Betterton US Former Director Program C (senio DoD 7977 Wellington Drive Warrington , VA 20186 Phone: (none) Fax: (none) Email: thomas.betterton@osd.mil _____________________________________________________ Mr. Tom Bevan TITLE TBD Kforce Government Solutions 2750 Prosperity Ave. Suite 300 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: tbevan@dnovus.com _____________________________________________________ Brig Gen Richard Beyea USAF(Ret) 7832 Lee Avenue Alexandria , VA 22308 Phone: (none) Fax: (none) Email: dickbeyea@aol.com _____________________________________________________ Bhavesh C Bhagat Founding Chairman Cloud Security Alliance DC / EnCrisp 12020 Sunrise Valley Drive Suite 100 Reston , VA 20191 Phone: (none) Fax: (none) Email: bb@encrisp.com _____________________________________________________ Sameer Bhalotra Professional Staff Member Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: s_bhalotra@ssci.senate.gov _____________________________________________________ Mr. Brian Biesecker TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Gary R Biggs Director, Office of Protocol NGA 4600 Sangamore Road, D-105 Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: gary.r.biggs@nga.mil _____________________________________________________ Mr. Mark Bigham Director Raytheon Company 1200 S. Jupiter Road MS AA-75000 Garland , TX 75042 Phone: (none) Fax: (none) Email: mark_a_bigham@raytheon.com _____________________________________________________ Robert W Bilbo B.A. Office of Intel Plans & Policy U.S. Coast Guard LT Robert W. Bilbo, USCG USCG Headquarters (Room 3402) 2100 2nd Street S.W., STOP 7360 Washington , DC 20593 Phone: (540) 720-7969 Fax: (none) Email: robert.w.bilbo@uscg.mil _____________________________________________________ Kari Bingen TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kari.bingen@mail.house.gov _____________________________________________________ Alexander Major Attorney Sheppard Mullin RIchter & Hampton LLP 1300 I Street NW 11th Floor East Washignton , DC 20005 Phone: (none) Fax: (none) Email: amajor@sheppardmullin.com _____________________________________________________ Michael Makfinsky MBA President AM/PM 217 Bonifant Rd. Silver Spring , MD 20905 Phone: (none) Fax: (none) Email: michael@makfinsky.com _____________________________________________________ Peter Makowsky Strategy Consultant, Senior Expe CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: 703-460-1232 Fax: (none) _____________________________________________________ Ellen Maldonado TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ellen_maldonado@appro.senate.gov _____________________________________________________ Kris Mallard TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Kris.Mallard@mail.house.gov _____________________________________________________ Brittain Mallow Principal Mitre 806 Lee Street Alexandria , VA 22314 Phone: (none) Fax: (none) Email: bmallow@mitre.org _____________________________________________________ Kristopher M Malloy 52 Brandon Road Newport News , VA 23601 Phone: (none) Fax: (none) Email: kristopher.malloy@langley.af.mil _____________________________________________________ Mr. Brian Malone TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: brian.malone@nro.mil _____________________________________________________ Jack Malone Consultant Network Designs, Inc. 501 Church St. Suite 210 Vienna , VA 22180-4711 Phone: (none) Fax: (none) _____________________________________________________ Dr. Michele L Malvesti TITLE TBD SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: michele.l.malvesti@saic.com _____________________________________________________ Ed Mangiero Sales Director Intelsat General Corporation 6550 Rock Spring Drive Suite 450 Bethesda , MD 20817 Phone: (none) Fax: (none) Email: edward.mangiero@intelsatgeneral.com _____________________________________________________ EDWARD MANGIERO MANGIERO 6550 ROCK SPRING DR SUITE 450 BETHESDA , MD 20817 Phone: (none) Fax: (none) Email: ED.MANGIERO@INTELSATGENERAL.COM _____________________________________________________ Richard Mangogna Chief Information Officer DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: richard.mangogna@dhs.gov _____________________________________________________ Cliff Mangum VP Business Capture Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Katy Mann TITLE TBD Composite Software Inc. 11921 Freedom Drive Suite 550 Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Dr. Laura Manning Johnson Deputy Director of Fusion, Ops C DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: lauramanning@comcast.net _____________________________________________________ Claudio Manno Director of Intelligence FAA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: claudio.manno@faa.gov _____________________________________________________ Tiffini Manson 15513 Tuxedo Lane Gainesville , VA 20155 Phone: (none) Fax: (none) Email: tiffini.manson@dni.gov _____________________________________________________ Mr. Jim Manzelmann Deputy Director of Mission Servi DIA Building 6000 Washington , DC 20340-5100 Phone: (none) Fax: (none) Email: James.Manzelmann@dia.mil _____________________________________________________ Mike Manzo Director General Dynamics AIS 12950 Worldgate Drive Herndon , VA 20170 Phone: (none) Fax: (none) _____________________________________________________ RADM, USN Ret Dan March 3608 Launcelot Way Annandale , VA 22003 Phone: (703) 207-0482 Fax: (703) 207-9351 Email: tomcat61@earthlink.net _____________________________________________________ RADM USN Ret Dan March Independent Consultant EXCOM INSA, INSA/NCWG Natl Sec Studioes Council 3608 Launcelot Way Annandale , VA 22003 Phone: (703) 207-9351 Fax: (703) 207-0482 Email: tomcat61@earthlink.net _____________________________________________________ RADM USN Ret Dan March 3608 Launcelot Way Annandale , VA 22003 Phone: (703) 207-0482 Fax: (703) 207-9351 Email: tomcat61@earthlink.net _____________________________________________________ RADM Daniel March USN (Ret) 3608 Launcelot Way Annandale , VA 22003-1360 Phone: (none) Fax: (none) Email: tomcat61@earthlink.net _____________________________________________________ Daniel P March 3608 Launcelot Way Annandale , VA 22003-1360 Phone: (none) Fax: (none) Email: tomcat61@earthlink.net _____________________________________________________ Mr. Philip Marcum General Manager, Global Analysis BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: philip.marcum@baesystems.com _____________________________________________________ Lisa Marcus 12817 Glen Mill Potomac , MD 20854 Phone: (none) Fax: (none) Email: lmarcus@msn.com _____________________________________________________ Catherine Marinis-Yaqub Manager PricewaterhouseCoopers 1800 Tysons Blvd McLean , VA 22102 Phone: (none) Fax: (none) Email: catherine.v.marinis-yaqub@us.pwc.com _____________________________________________________ Shant Markarian 8010 Towers Crescent Dr. 5th Floor Vienna , VA 22182 Phone: (none) Fax: (none) Email: shantmarkarian@targusinfo.com _____________________________________________________ Mr. Ronald Marks 7004 Dunningham Place McLean , VA 22101 Phone: (none) Fax: (none) Email: rmarksster@gmail.com _____________________________________________________ Mr. Andrew Marshall 107 S. West Street #759 Alexandria , VA 22314 Phone: (none) Fax: (none) Email: andrew.marshall@osd.pentagon.mil _____________________________________________________ Mr. Andrew Marshall Director, Office of Net Assessme DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: andrew.marshall@osd.mil _____________________________________________________ Keith Marshall 15052 Conference Center Dr Chantilly , VA 20151 Phone: (none) Fax: (none) Email: ann.sullivan@lmco.com _____________________________________________________ Richard H Marshall Director of Global Cyber Securit DHS 1110 Glebe Road Arlington , VA 21044 Phone: (none) Fax: (none) Email: richard.marshall1@dhs.gov _____________________________________________________ Mr. William J Marshall Chief of Staff, IA Directorate NSA 9800 Savage Road Info Assurance CofS, Suite 6468 Fort George G. Meade , MD 20755 Phone: (none) Fax: (410) 854-7511 Email: wjmarsh@nsa.gov _____________________________________________________ Mr. B. Martin 9530 Morning Walk Drive Hagerstown , MD 21740 Phone: (none) Fax: (none) Email: inrebuttal2u@gmail.com _____________________________________________________ Brian Martin 966 Wayne Drive Winchester , VA 22601-6395 Phone: (none) Fax: (none) Email: brian.martin@atf.gov _____________________________________________________ Brian T Martin 966 Wayne Dr Winchester , VA 22601 Phone: (none) Fax: (none) Email: Inrebuttal2u@gmail.com _____________________________________________________ Mr. Bryan Martin Chief Technology Officer Man Tech ManTech Mission, Cyber & Technol 2250 Corporate Drive Suite 500 Herndon , VA 20171 Phone: (none) Fax: (none) Email: bryan.martin@mantech.com _____________________________________________________ Charles Martin Director DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Charles.Martin.ctr@darpa.mil _____________________________________________________ Mr. James Martin Director of Intelligence, Survei DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: james.martin@osd.mil _____________________________________________________ Paul Martin TITLE TBD Sierra Nevada Corporation 444 Salomon Circle Sparks , NV 89434 Phone: (none) Fax: (none) Email: paul.martin@sncorp.com _____________________________________________________ Mr. Stephen Martin 10010 Junction Drive Annapolis Junction , MD 20701 Phone: (none) Fax: (none) Email: srmartin@nciinc.com _____________________________________________________ Stephen R Martin MS, EMBA SVP, Deputy GM NCI Information Systems, Inc. Stephen Martin 10010 Junction Drive Annapolis Junction , MD 20701 Phone: (410) 952-1778 Fax: (301) 483-6928 Email: srmartin07@gmail.com _____________________________________________________ Ms. Wendy Martin Business Development Director, C Harris Corporation P.O. Box 37 MS: 2-21D Melbourne , FL 32902 Phone: (none) Fax: (none) Email: wmarti01@harris.com _____________________________________________________ Wendy Martin TITLE TBD Accenture No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: wendy.a.martin@accenture.com _____________________________________________________ Wendy Martin Program Manager Harris Corporation Crucial Security Programs Ann Boyter 14900 Conference Center Dr Suite 225 Chanitlly , VA 20151 Phone: (none) Fax: (none) Email: wmarti01@harris.com _____________________________________________________ Chris Martins TITLE TBD General Dynamics AIS 2721 Technology Drive Suite 400 Annapolis Junction , MD 20701 Phone: (none) Fax: (none) _____________________________________________________ Charlotte K Martinsson PIAB Member PIAB 9902 Deerfield Pond Drive Great Falls , VA 22066 Phone: (none) Fax: (none) Email: Charlotte_K._Martinsson@pfiab.eop.gov _____________________________________________________ Mr. Donald Maruca TITLE TBD Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: donald.maruca@ca.com _____________________________________________________ Mr. Robert Leonard 75 Coromar Drive Goleta , CA 93117 Phone: (none) Fax: (none) Email: rlleonard@raytheon.com _____________________________________________________ Joe Leonelli Vice President, Strategic Initia Applied Signal Technology 470 Spring Park Place, Ste. 700 Herndon , VA 20170 Phone: (none) Fax: (none) Email: joe_leonelli@appsig.com _____________________________________________________ Michele Leonhart Administrator Justice Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Vickki.f.mcalpine@usdoj.gov _____________________________________________________ David Lerner Strat Forces Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: david_lerner@armed-services.senate.gov _____________________________________________________ Jeff Lessner Business Development, National S General Dynamics AIS 10560 Arrowhead Drive Fairfax , VA 22030 Phone: (none) Fax: (none) Email: jeffrey.lessner@gd-ais.com _____________________________________________________ Gordon Letterman TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: gordon_letterman@hsgac.senate.gov _____________________________________________________ Mr. Glenn Leuschner TITLE TBD NSA 9800 Savage Road D, Suite 6242 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) _____________________________________________________ Mr. Brian Levay 504 Dill Pointe Drive Severna Park , MD 21146 Phone: (none) Fax: (none) Email: brian.levay@hp.com _____________________________________________________ Emma Levert MM/HRM 3137 Kevington Ave Eugene , OR 97405 Phone: (541) 685-1340 Fax: (none) Email: EmmLvrt@aol.com _____________________________________________________ Stuart A Levey Under Secretary of the Treasury Treasury Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: stuart.levey@do.treas.gov _____________________________________________________ Carl Levin Sen. Chairman Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Ms. Sharon Levin Consultant Booz Allen Hamilton 1506 Wakefield Rd Edgewater , MD 21037 Phone: (none) Fax: (none) Email: levin_sharon@bah.com _____________________________________________________ Ken Levinrad Director Special Programs Lockheed Martin Corporation-Washington Ops Lockheed Martin Corp Wash OPS 2121 Crystal Drive Arlington , VA 22202 Phone: (none) Fax: (none) Email: ken.d.levinrad@lmco.com _____________________________________________________ Curtis Levinson TITLE TBD Qwest Communications 4250 N. Fairfax Dr. 5th Floor Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Ms Rosanne M LeVitre Masters ODNI ADNI/PE-MP Wsshington , DC 20511 Phone: (none) Fax: (none) Email: rlevitre@sprynet.com _____________________________________________________ Rosanne M LeVitre Director Office of the Director of National Intelligence Tysons Corner Plaza Washington , DC 20511 Phone: (703) 760-5076 Fax: (none) Email: rosannml@dni.gov _____________________________________________________ Ms. Rose Levitre TITLE TBD LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) Email: rlevitre@sprynet.com _____________________________________________________ Mr. Barry Levy TITLE TBD USIS 7799 Leesburg Pike Suite 400 S Falls Church , VA 22043 Phone: (none) Fax: (none) Email: barry.levy@usis.com _____________________________________________________ David Levy M.S., Ph.D Director of Technology General Dynamics AIS 2721 Technology Drive Annapolis Junction , MD 20701 Phone: (none) Fax: (none) _____________________________________________________ Jacob J Lew Deputy Secretary for Management State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: LewJJ@state.gov _____________________________________________________ Mr. Ed Lewandoski Vice President General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Ed.lewandoski@gd-ais.com _____________________________________________________ Allen Lewis TITLE TBD General Dynamics AIS 14700 Lee Road Chantilly , VA 20151 Phone: (none) Fax: (none) _____________________________________________________ Ms. Roslyn Mazer Inspector General ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rosyln.a.mazer@ugov.gov _____________________________________________________ Mr. Joseph Mazzafro 10313 Congressional Court Ellicott City , MD 21042 Phone: (none) Fax: (none) Email: mazzafro_joe@emc.com _____________________________________________________ Carrie Mazzaro TITLE TBD DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Carrie.Mazzaro@dhs.gov _____________________________________________________ Mr. Mark Lewis TITLE TBD Quest Software - Public Sector Group 700 King Farm Boulevard Suite 250 Rockville , MD 20850 Phone: (none) Fax: (none) Email: geoff.brown@quest.com _____________________________________________________ Mr. Mark Lewis 9861 Brokenland Parkway Suite 300 Columbia , MD 21046 Phone: (none) Fax: (none) Email: mlewis@LingualISTek.com _____________________________________________________ Mark Lewis President L&M Management Services Mark Lewis 212 Blackhaw Ct Millersville , MD 21108 Phone: (none) Fax: (none) Email: melewis56@gmail.com _____________________________________________________ Mr. Robert E Lewis TITLE TBD NSA 9800 Savage Road IT IS, Suite 6222 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: relewis@nsa.gov _____________________________________________________ Ron Lewis SVP Chief Technology Officer Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: 703-939-6670 Fax: (703) 939-6001 _____________________________________________________ Mr. Ryan Lewis 6907 Wake Forest Drive College Park , MD 20740 Phone: (none) Fax: (none) Email: rstephen.lewis@gmail.com _____________________________________________________ Sam Lewis Dir of Operations Def and Intel Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Tom Lexington 78 Shuttle Meadow Avenue New Britain , CT 06051 Phone: (none) Fax: (none) Email: tlex@gwu.edu _____________________________________________________ Richard LHeureux 12975 Worldgate Drive Herndon , VA 20170 Phone: (none) Fax: (none) Email: richard.lheureux@itt.com _____________________________________________________ Dr. Alan Lieberman 18425 Long Lake Drive Boca Raton , FL 33496 Phone: (none) Fax: (none) Email: anl335@aol.com _____________________________________________________ Joseph I Lieberman Sen. Chair Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: joseph_lieberman@hsgac.senate.gov _____________________________________________________ Mr. John E Liebsch Director, Office of Future Warfa NGA 4600 Sangamore Road, P-037 Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: john.e.liebsch@nga.mil _____________________________________________________ Michael Liggett Mr. Director, Adv. Tech. Programs Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ MR JAMES G LIGHTBURN CEO InfoAssure, Inc. 1997 Annapolis Exchange Parkway suite 210 Annapolis , MD 21401 Phone: (none) Fax: (410) 224-4022 Email: j.lightburn@infoassure.net _____________________________________________________ Mr. Samuel Liles MSCS Associate Professor Purdue University Calumet 2200 169th Street Hammond , IN 46323 Phone: (none) Fax: (none) Email: sam@selil.com _____________________________________________________ Mr. William Liles 2513 Foxcroft Way Reston , VA 20191-3707 Phone: (none) Fax: (none) Email: aerie10@aol.com _____________________________________________________ Patrick Linardi Criminal Research Specialist U.S. Immigration and Customs Enforcement/HSI/TTU 500 12th Street SW MS 5107 Washington , DC 20536 Phone: (none) Fax: (none) Email: Patrick.Linardi@dhs.gov _____________________________________________________ Mr. Bryon Line 10401 Grosvenor Place #123 Rockville , MD 20852-4628 Phone: (none) Fax: (none) Email: bline1@starpower.net _____________________________________________________ James R Lint MBA Director, G2, Intell and Sec US Army Communication and Electronic Command 4803 Atlas Cedar Way Aberdeen , MD 21001 Phone: (none) Fax: (none) Email: james.lint@us.army.mil _____________________________________________________ Mr. Robert Linthicum 1903 Sawyer Place McLean , VA 22101 Phone: (none) Fax: (none) Email: linthicum@gmail.com _____________________________________________________ Evonne Lipscomb 7500 GEOINT Dr Springfield , VA 22150 Phone: (none) Fax: (none) Email: Evonne.Lipscomb@nga.mil _____________________________________________________ Glenn Lipscomb TITLE TBD Level 3 Communications, LLC No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: glenn.lipscomb@level3.com _____________________________________________________ Mason McDaniel Program Dir Intelligence Ctr Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Michael McDaniel Deputy Assistant Secretary for H DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: michael.mcdaniel@osd.mil _____________________________________________________ Tom L McDivitt Intelligence Analyst Booz Allen Hamilton Tom McDivitt (544757) 8283 Greensboro Drive Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: mcdivitt_thomas@bah.com _____________________________________________________ Paul Littmann TITLE TBD Deloitte Consulting, LLP No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: plittmann@deloitte.com _____________________________________________________ Mr. Alexis Livanos Chief Technology Officer Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: alexis.livanos@ngc.com _____________________________________________________ Vince Lively TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) _____________________________________________________ Jack Livingston TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: j_livingston@ssci.senate.gov _____________________________________________________ John Llaneza Required unless Parent Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Luis Llorens TITLE TBD SR Technologies, Inc. 4101 SW 47 Ave Suite 102 Fort Lauderdale , FL 33314 Phone: (none) Fax: (none) _____________________________________________________ RADM Daniel Lloyd Senior Military Advisor DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: daniel.lloyd@osd.mil _____________________________________________________ Andrew Lluberes Director of Communications for I DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Andrew.Lluberes@dhs.gov _____________________________________________________ Mr. Andrew L Lluberes 8613 Eagle Glen Terrace Fairfax Station , VA 22039 Phone: (none) Fax: (none) Email: andrew.lluberes@dhs.gov _____________________________________________________ Rick Lober General Manager Hughes 11717 Exploration Lane Germantown , MD 20876 Phone: (none) Fax: (none) Email: rick.lober@hughes.com _____________________________________________________ Cynthia Loboski TITLE TBD DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: clobosky@verizon.net _____________________________________________________ Cynthia Lobosky BA, MPA Prefer not to give out Alexandria , VA 22314 Phone: (none) Fax: (none) Email: cynthia.m.lobosky@gmail.com _____________________________________________________ Gary F. Locke Secretary Commerce Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: thesec@doc.gov (address to Secretary Locke) _____________________________________________________ Mr. John Locke 97 Ruddy Duck Road Heathsville , VA 22473 Phone: (none) Fax: (none) Email: jwljrcpa@netscape.com _____________________________________________________ Mr. Donald Logar Vice President, Division Group M CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: dlogar@caci.com _____________________________________________________ Mr. Jaan Loger 10090 McCarty Crest Court Fairfax , VA 22030 Phone: (none) Fax: (none) Email: jloger@cox.net _____________________________________________________ Mr. William C Lohnes MEA 2333 Bollinger Mill Road Finksburg , MD 21048-2727 Phone: (none) Fax: (410) 552-6482 Email: wclohnes@earthlink.net _____________________________________________________ Mr. Gary Lombardo 11990 Market Street #415 Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Dr. J. P. London Executive Chairman, CACI Board o CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: jlondon@caci.com _____________________________________________________ mr gregory s mcinnis aircraft parts sales none 4635 mclemoresville rd huntingdon , TN 38344 Phone: (731) 986-5800 Fax: (none) Email: woodrot1@att.net _____________________________________________________ James W McJunkin National Security Branch, Direct FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: james.mcjunkin@ic.fbi.gov _____________________________________________________ Ashley McKannon 16659 Malory Ct Dumfries , VA 22025 Phone: (703) 730-2379 Fax: (none) Email: aem2189@columbia.edu _____________________________________________________ Mr. Thomas McKannon Manager, Space & Airborne System Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: mckannon@raytheon.com _____________________________________________________ Thomas McKannon BS/MS/AeE Strategy & Business Capture Raytheon 1100 Wilson Blvd Suite 1900 Arlington , VA 22209 Phone: (703) 730-2379 Fax: (none) Email: t.mckannon@gmail.com _____________________________________________________ Dean McKendrick TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) _____________________________________________________ Mr. Mark Lonsdale 1750 Tyson\\\'s Blvd., 4th Floor McLean , VA 22102 Phone: (none) Fax: (none) Email: mvlonsdale@aol.com _____________________________________________________ Mr. Esteban A Lopez PO Box 605 Lisbon , MD 21765 Phone: (none) Fax: (none) Email: stephen.lopez@urs.com _____________________________________________________ Mr. Marco A Lopez Jr. Chief of Staff, US Customs DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: marco.lopez@dhs.gov _____________________________________________________ Steve Lopez Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Donald Loren Rear Admiral, USN (ret) The Tauri Group 6504 John Thomas Drive Alexandria , VA 22315 Phone: (none) Fax: (none) Email: don.loren@taurigroup.com _____________________________________________________ David Louis Account Director AT&T Government Solutions-NIS 7125 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) Email: dlouis@att.com _____________________________________________________ Mr. John J Lovegrove Director, Business Development TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) Email: john.lovegrove@tasc.com _____________________________________________________ Dr. Mark Lowenthal TITLE TBD The Intelligence & Security Academy, LLC 1890 Preston White Drive Suite 250 Reston , VA 20191 Phone: (none) Fax: (none) Email: mml@intellacademy.com _____________________________________________________ Dennis Lowrey TITLE TBD General Dynamics AIS 1200 Joe Hall Drive Ypsilanti , MI 48197 Phone: (none) Fax: (none) _____________________________________________________ Ashley Lowry TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Ashley.Lowry@mail.house.gov _____________________________________________________ Admiral James M Loy Senior Counselor The Cohen Group 500 8th Street, NW Suite 200 Washington , DC 20004 Phone: (none) Fax: (none) _____________________________________________________ Patrick Lucas Assistant to the President Berico Technologies 1501 Lee Highway Suite 303 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Carlo L Lucchesi Office of IT Policy and Planning FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: carlo.lucchesi@ic.fbi.gov _____________________________________________________ David Luckey 5000 Defense Pentagon Room 3C1063A Washington , DC 20301 Phone: (none) Fax: (none) Email: david.luckey@osd.mil _____________________________________________________ Mr. John Lueders Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Lueders_John@bah.com _____________________________________________________ Mr. Chet Lunner TITLE TBD Department of Homeland Security NAC Rm 19148 Washington , DC 20528 Phone: (none) Fax: (none) Email: chet.lunner@dhs.gov _____________________________________________________ Mr. Adam Lurie Program Director USIS 7799 Leesburg Pike Suite 400 S Falls Church , VA 22043 Phone: (none) Fax: (none) Email: adam.lurie@usis.com _____________________________________________________ Adam Lurie TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: adam.lurie@mail.house.gov _____________________________________________________ Nicholas Lusas 77 Corbin Ridge Bristol , CT 6010 Phone: (none) Fax: (none) _____________________________________________________ Edward McNamee TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) _____________________________________________________ Mr. Michael McNamee TITLE TBD NSA 9800 Savage Road SP, Suite 6468 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: mkmcnam@nsa.gov _____________________________________________________ Mr. Tim McNeil TITLE TBD DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Timothy.McNeil@dia.mil _____________________________________________________ Mr. Frank B Meade 425 West 23 Street 11-B New York , NY 10011 Phone: (none) Fax: (none) Email: gothamite2@juno.com _____________________________________________________ Mr. C. Meador Chairman mgiss 85 Speen Street Suite 201 Framingham , MA 01701 Phone: (none) Fax: (none) Email: meador@mgiss.com _____________________________________________________ Mr. David Meadows Affiliant AT&T Government Solutions-NIS 7125 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) Email: demeadows@att.com _____________________________________________________ Amy Lyons Inspection Division FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: amy.lyons@ic.fbi.gov _____________________________________________________ Mr. Dwight Lyons TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: dlyons@potomacinstitute.org _____________________________________________________ Mr. Jack Lyons 3420 Churchill Court Owings , MD 20736-9146 Phone: (none) Fax: (none) Email: SandyNeckSandDunes@comcast.net _____________________________________________________ John Lyons VP of North American Sale Tenable Network Security 7063 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) _____________________________________________________ Alexander Major Attorney Sheppard Mullin RIchter & Hampton LLP 1300 I Street NW 11th Floor East Washignton , DC 20005 Phone: (none) Fax: (none) Email: amajor@sheppardmullin.com _____________________________________________________ Michael Makfinsky MBA President AM/PM 217 Bonifant Rd. Silver Spring , MD 20905 Phone: (none) Fax: (none) Email: michael@makfinsky.com _____________________________________________________ Peter Makowsky Strategy Consultant, Senior Expe CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: 703-460-1232 Fax: (none) _____________________________________________________ Ellen Maldonado TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ellen_maldonado@appro.senate.gov _____________________________________________________ Kris Mallard TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Kris.Mallard@mail.house.gov _____________________________________________________ Brittain Mallow Principal Mitre 806 Lee Street Alexandria , VA 22314 Phone: (none) Fax: (none) Email: bmallow@mitre.org _____________________________________________________ Kristopher M Malloy 52 Brandon Road Newport News , VA 23601 Phone: (none) Fax: (none) Email: kristopher.malloy@langley.af.mil _____________________________________________________ Mr. Brian Malone TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: brian.malone@nro.mil _____________________________________________________ Jack Malone Consultant Network Designs, Inc. 501 Church St. Suite 210 Vienna , VA 22180-4711 Phone: (none) Fax: (none) _____________________________________________________ Dr. Michele L Malvesti TITLE TBD SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: michele.l.malvesti@saic.com _____________________________________________________ Ed Mangiero Sales Director Intelsat General Corporation 6550 Rock Spring Drive Suite 450 Bethesda , MD 20817 Phone: (none) Fax: (none) Email: edward.mangiero@intelsatgeneral.com _____________________________________________________ EDWARD MANGIERO MANGIERO 6550 ROCK SPRING DR SUITE 450 BETHESDA , MD 20817 Phone: (none) Fax: (none) Email: ED.MANGIERO@INTELSATGENERAL.COM _____________________________________________________ Richard Mangogna Chief Information Officer DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: richard.mangogna@dhs.gov _____________________________________________________ Cliff Mangum VP Business Capture Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Katy Mann TITLE TBD Composite Software Inc. 11921 Freedom Drive Suite 550 Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Dr. Laura Manning Johnson Deputy Director of Fusion, Ops C DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: lauramanning@comcast.net _____________________________________________________ Claudio Manno Director of Intelligence FAA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: claudio.manno@faa.gov _____________________________________________________ Tiffini Manson 15513 Tuxedo Lane Gainesville , VA 20155 Phone: (none) Fax: (none) Email: tiffini.manson@dni.gov _____________________________________________________ Mr. Jim Manzelmann Deputy Director of Mission Servi DIA Building 6000 Washington , DC 20340-5100 Phone: (none) Fax: (none) Email: James.Manzelmann@dia.mil _____________________________________________________ Mike Manzo Director General Dynamics AIS 12950 Worldgate Drive Herndon , VA 20170 Phone: (none) Fax: (none) _____________________________________________________ RADM, USN Ret Dan March 3608 Launcelot Way Annandale , VA 22003 Phone: (703) 207-0482 Fax: (703) 207-9351 Email: tomcat61@earthlink.net _____________________________________________________ RADM USN Ret Dan March Independent Consultant EXCOM INSA, INSA/NCWG Natl Sec Studioes Council 3608 Launcelot Way Annandale , VA 22003 Phone: (703) 207-9351 Fax: (703) 207-0482 Email: tomcat61@earthlink.net _____________________________________________________ RADM USN Ret Dan March 3608 Launcelot Way Annandale , VA 22003 Phone: (703) 207-0482 Fax: (703) 207-9351 Email: tomcat61@earthlink.net _____________________________________________________ RADM Daniel March USN (Ret) 3608 Launcelot Way Annandale , VA 22003-1360 Phone: (none) Fax: (none) Email: tomcat61@earthlink.net _____________________________________________________ Daniel P March 3608 Launcelot Way Annandale , VA 22003-1360 Phone: (none) Fax: (none) Email: tomcat61@earthlink.net _____________________________________________________ Mr. Philip Marcum General Manager, Global Analysis BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: philip.marcum@baesystems.com _____________________________________________________ Lisa Marcus 12817 Glen Mill Potomac , MD 20854 Phone: (none) Fax: (none) Email: lmarcus@msn.com _____________________________________________________ Catherine Marinis-Yaqub Manager PricewaterhouseCoopers 1800 Tysons Blvd McLean , VA 22102 Phone: (none) Fax: (none) Email: catherine.v.marinis-yaqub@us.pwc.com _____________________________________________________ Shant Markarian 8010 Towers Crescent Dr. 5th Floor Vienna , VA 22182 Phone: (none) Fax: (none) Email: shantmarkarian@targusinfo.com _____________________________________________________ Mr. Ronald Marks 7004 Dunningham Place McLean , VA 22101 Phone: (none) Fax: (none) Email: rmarksster@gmail.com _____________________________________________________ Mr. Andrew Marshall 107 S. West Street #759 Alexandria , VA 22314 Phone: (none) Fax: (none) Email: andrew.marshall@osd.pentagon.mil _____________________________________________________ Mr. Andrew Marshall Director, Office of Net Assessme DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: andrew.marshall@osd.mil _____________________________________________________ Keith Marshall 15052 Conference Center Dr Chantilly , VA 20151 Phone: (none) Fax: (none) Email: ann.sullivan@lmco.com _____________________________________________________ Richard H Marshall Director of Global Cyber Securit DHS 1110 Glebe Road Arlington , VA 21044 Phone: (none) Fax: (none) Email: richard.marshall1@dhs.gov _____________________________________________________ Mr. William J Marshall Chief of Staff, IA Directorate NSA 9800 Savage Road Info Assurance CofS, Suite 6468 Fort George G. Meade , MD 20755 Phone: (none) Fax: (410) 854-7511 Email: wjmarsh@nsa.gov _____________________________________________________ Mr. B. Martin 9530 Morning Walk Drive Hagerstown , MD 21740 Phone: (none) Fax: (none) Email: inrebuttal2u@gmail.com _____________________________________________________ Brian Martin 966 Wayne Drive Winchester , VA 22601-6395 Phone: (none) Fax: (none) Email: brian.martin@atf.gov _____________________________________________________ Brian T Martin 966 Wayne Dr Winchester , VA 22601 Phone: (none) Fax: (none) Email: Inrebuttal2u@gmail.com _____________________________________________________ Mr. Bryan Martin Chief Technology Officer Man Tech ManTech Mission, Cyber & Technol 2250 Corporate Drive Suite 500 Herndon , VA 20171 Phone: (none) Fax: (none) Email: bryan.martin@mantech.com _____________________________________________________ Charles Martin Director DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Charles.Martin.ctr@darpa.mil _____________________________________________________ Mr. James Martin Director of Intelligence, Survei DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: james.martin@osd.mil _____________________________________________________ Paul Martin TITLE TBD Sierra Nevada Corporation 444 Salomon Circle Sparks , NV 89434 Phone: (none) Fax: (none) Email: paul.martin@sncorp.com _____________________________________________________ Mr. Stephen Martin 10010 Junction Drive Annapolis Junction , MD 20701 Phone: (none) Fax: (none) Email: srmartin@nciinc.com _____________________________________________________ Stephen R Martin MS, EMBA SVP, Deputy GM NCI Information Systems, Inc. Stephen Martin 10010 Junction Drive Annapolis Junction , MD 20701 Phone: (410) 952-1778 Fax: (301) 483-6928 Email: srmartin07@gmail.com _____________________________________________________ Ms. Wendy Martin Business Development Director, C Harris Corporation P.O. Box 37 MS: 2-21D Melbourne , FL 32902 Phone: (none) Fax: (none) Email: wmarti01@harris.com _____________________________________________________ Wendy Martin TITLE TBD Accenture No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: wendy.a.martin@accenture.com _____________________________________________________ Wendy Martin Program Manager Harris Corporation Crucial Security Programs Ann Boyter 14900 Conference Center Dr Suite 225 Chanitlly , VA 20151 Phone: (none) Fax: (none) Email: wmarti01@harris.com _____________________________________________________ Chris Martins TITLE TBD General Dynamics AIS 2721 Technology Drive Suite 400 Annapolis Junction , MD 20701 Phone: (none) Fax: (none) _____________________________________________________ Charlotte K Martinsson PIAB Member PIAB 9902 Deerfield Pond Drive Great Falls , VA 22066 Phone: (none) Fax: (none) Email: Charlotte_K._Martinsson@pfiab.eop.gov _____________________________________________________ Mr. Donald Maruca TITLE TBD Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: donald.maruca@ca.com _____________________________________________________ Scott Marvin Special Agent/Liaison Officer Department of Homeland Security POB 221403 Chantilly , VA 20153 Phone: (none) Fax: (none) Email: scott.marvin@dhs.gov _____________________________________________________ Mr. William Marvin 25711 DonerailsChase Drive Chantilly , VA 20152 Phone: (none) Fax: (none) Email: whmarvin@yahoo.com _____________________________________________________ Mr. Keith Masback 2325 Dulles Corner Blvd Suite 450 Herndon , VA 20171 Phone: (none) Fax: (none) Email: keith.masback@usgif.org _____________________________________________________ Mr. L. Mason Ph.D. 3150 Fairview Park Drive, South Falls Church , VA 22042 Phone: (none) Fax: (none) Email: roger.mason@noblis.org _____________________________________________________ L. R Mason ADNI for Systems and Resource An ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: roger.mason@ugov.gov _____________________________________________________ Mr. William Mason CEO United Placements P.O. Box 810211 Boca Raton , FL 33481 Phone: (none) Fax: (none) Email: info@unitedplacements.com _____________________________________________________ Mark Massop TITLE TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Benjamin Matherne Business Development Lead Salient Federal Solutions Ben Matherne 8618 Westwood Center Drive Suite 100 Vienna , VA 22182 Phone: (none) Fax: (none) Email: benjamin.matherne@sgis.com _____________________________________________________ Asha Mathew Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Asha_Mathew@hsgac.senate.gov _____________________________________________________ Mr. John I Mathews Ch, Client Engage & Comm Outreac NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jimathe@nsa.gov _____________________________________________________ Kent Matlick 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) _____________________________________________________ Gordon Matlock TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: g_matlock@ssci.senate.gov _____________________________________________________ Mr. Daniel Matthews TITLE TBD NSA 9800 Savage Road I3, Suite 6703 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: dpmatth@nsa.gov _____________________________________________________ Mr. Thomas Matthews Director, Warfighter Requirement DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: thomas.matthews@osd.mil _____________________________________________________ Project Leader, Michael Mattson 3805 9th Road South Arlington , VA 22204 Phone: (none) Fax: (none) Email: mattson@ebrinc.com _____________________________________________________ Michael Mattson Senior Consultant, National Inte Invertix Corporation 8201 Greensboro Drive Suite 800 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Paul Matulic TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: p_matulic@ssci.senate.gov _____________________________________________________ Mr. Philip Maxon 11720 Plaza America Drive Reston , VA 20190 Phone: (none) Fax: (none) Email: pmaxon@input.com _____________________________________________________ Ms. Peggy Maxson Dir, Natl Cybersecurity Educatio DHS 1110 N. glebe Road Arlington , VA 22243 Phone: (none) Fax: (none) Email: pegstelau@aol.com _____________________________________________________ Mr. Gerald Mayefskie TITLE TBD QSS Group Inc. 4500 Forbes Blvd. Lanham , MD 20706 Phone: (none) Fax: (none) Email: gmayefsk@qssgroupinc.com _____________________________________________________ Gerry Mayer ISR Systems L-3 Communications 1 Federal St Camden , NJ 08103 Phone: (none) Fax: (none) Email: gerry.mayer@l-3com.com _____________________________________________________ Mr. Jason Mayer 1501 Farm Credit Dr. Ste 2300 McLean , VA 22101 Phone: (none) Fax: (none) Email: jmayer1@theanalysiscorp.com _____________________________________________________ Ms. Roslyn Mazer Inspector General ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rosyln.a.mazer@ugov.gov _____________________________________________________ Mr. Joseph Mazzafro 10313 Congressional Court Ellicott City , MD 21042 Phone: (none) Fax: (none) Email: mazzafro_joe@emc.com _____________________________________________________ Carrie Mazzaro TITLE TBD DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Carrie.Mazzaro@dhs.gov _____________________________________________________ Mr. Christopher Biow Federal CTO MarkLogic 11980 Sentinel Point Ct Reston , VA 20191 Phone: (none) Fax: (none) Email: Chris.Biow@marklogic.com _____________________________________________________ Terry Birck TITLE TBD Reed Illinois Corporation 600 W. Jackson Boulevard Suite 500 Chicago , IL 60661-5625 Phone: (none) Fax: (none) Email: wbirck@reedcorp.com _____________________________________________________ Terry Birck TITLE TBD Reed Illinois Corporation 600 W. Jackson Boulevard Suite 500 Chicago , IL 60661-5625 Phone: (none) Fax: (none) Email: wbirck@reedcorp.com _____________________________________________________ Mr. Terry L Birck Chairman Reed Illinois Corporation Terry Birck 600 W. Jackson Blvd. Chicago , IL 60661 Phone: (none) Fax: (312) 943-8141 Email: tbirck@reedcorp.com _____________________________________________________ Mr. Michael D Bisacre Senior Vice President Six3 Systems 1430 Spring Hill Road Suite 525 McLean , VA 22102 Phone: (none) Fax: (none) Email: mbisacre@harding-security.com _____________________________________________________ Mike Bisacre SVP Six3 Systems 1430 Spring Hill Road Suite 525 McLean , VA 22102 Phone: (none) Fax: (none) Email: mbisacre@six3systems.com _____________________________________________________ Mr. Frank Biscardi 500 La Costa Court Melbourne , FL 32940 Phone: (none) Fax: (none) Email: FrankBiscardi@yahoo.com _____________________________________________________ Ms. Cynthia Bishop TITLE TBD SAIC 9926 Wooden Hawk Court Burke , VA 22015 Phone: (none) Fax: (none) Email: cynthia.a.bishop@saic.com _____________________________________________________ Dr. David Bishop CTO LGS Innovations Accounts Payable 5440 Millstream Road Suite E210 McLeansville , NC 27301 Phone: (none) Fax: (none) Email: djb@lgsinnovations.com _____________________________________________________ Ms. Ebone Bishop 73 Eastern Parkway apt. 4B Brooklyn , NY 11238 Phone: (none) Fax: (none) Email: ebone.bishop@gmail.com _____________________________________________________ Robert Bishop 4251 Suitland Road Suitland , MD 20746 Phone: (none) Fax: (none) Email: rebishop1717@gmail.com _____________________________________________________ Bill Bistany Account Manager Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Bill Bistrican AA Busines Account Executive Vermillion Group- MRI Network Bill Bistrican 1801 25th Street West Des Moines , IA 50266 Phone: (515) 221-1208 Fax: (515) 224-7187 Email: wpb@vermilliongroup.com _____________________________________________________ Paul Bize INSA OCI Task Force Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) _____________________________________________________ Richard Bizzell 8201 Greensboro Dr Ste 300 McLean , VA 22102 Phone: (none) Fax: (none) Email: rick@usintelgroup.com _____________________________________________________ Lars Bjorn 219 N. Evergreen St. Arlington , VA 22203 Phone: (none) Fax: (none) Email: lars.bjorn@centauri-solutions.com _____________________________________________________ Mr. Andrew Black TITLE TBD Black Watch Global 5235 Connecticut Avenue, N.W. Washington , DC 20015 Phone: (none) Fax: (none) Email: ablack@blackwatchglobal.com _____________________________________________________ Mr. Fred Blackburn TITLE TBD Northrop Grumman Corporation 15036 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: fred.blackburn@ngc.com _____________________________________________________ Anthony M Bladen Human Resources Division FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: anthony.bladen@ic.fbi.gov _____________________________________________________ Mr. Allan Blades Manager, Business Development, D BAE Systems 124 Gaither Drive Ste 100 Mt. Laurel , NJ 8054 Phone: (none) Fax: (none) Email: allan.blades@baesystems.com _____________________________________________________ The Honorable Dennis C Blair Director of National Intelligenc ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: dni-pao-outreach@ugov.gov _____________________________________________________ Mike Blair DHS S&T DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Thomas.Blair@dhs.gov _____________________________________________________ Thomas M Blair P.O. Box 240 White Hall , MD 21161-0240 Phone: (none) Fax: (none) Email: tmblairbvi@aol.com _____________________________________________________ Robert O Blake South & Central Asian Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: blakero@state.gov _____________________________________________________ Clarence Blakley TITLE TBD Law Enforcement Online 5840 Cameron Run Terrace #1628 Alexandria , VA 22303 Phone: (none) Fax: (none) Email: cblakley@leo.gov _____________________________________________________ Dr. Dennis McBride TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: dmcbride@potomacinstitute.org _____________________________________________________ Kimberly McCabe President ASI Government 1655 North Fort Meyer Drive Suite 1000 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Ms. Mary R McCaffrey Director, Office of Security NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: mary.mccaffrey@nro.mil _____________________________________________________ John McCain Sen. Ranking Minority Member Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john_mccain@armed-services.senate.gov _____________________________________________________ Mickey McCarter Correspondent Homeland Security Today PO Box 5843 Washington , DC 20016 Phone: (none) Fax: (none) Email: mickey@hstoday.us _____________________________________________________ Mr. Steve McCaslin Director, Business Development Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: smccaslin@csc.com _____________________________________________________ Kel McClanahan 1200 South Courthouse Road Apartment #124 Arlington , VA 22204 Phone: (none) Fax: (none) Email: kellybmcc@gmail.com _____________________________________________________ Tim McClees TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: tim.mcclees@mail.house.gov _____________________________________________________ Lauren McCollum Director Legislative Affairs Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: lauren.mccollum@lmco.com _____________________________________________________ Lauren M McCollum TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Bruce W McConnell NPP Counselor to Phil Reitinger DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Bruce.McConnell@hq.dhs.gov _____________________________________________________ Kirk McConnell Strat Forces/Intel Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kirk_mcconnell@armed-services.senate.gov _____________________________________________________ Mr. Lester McConville PO Box 312 260 Rose Airy Lane Millwood , VA 22646 Phone: (none) Fax: (540) 837-1628 Email: chip.mcconville@jb-a-inc.com _____________________________________________________ Mr. Thomas J McCormick Dir, Enterprise Ops Directorate NGA 4600 Sangamore Road, D-199 Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: thomas.j.mccormick@nga.mil _____________________________________________________ Mr Mark McCourt President Dalani Media Mark McCourt PO Box 457 Newtown Square , PA 19073 Phone: (none) Fax: (none) Email: mmccourt@dlnmedia.com _____________________________________________________ Ms. Diann McCoy TITLE TBD ASI Government 1655 North Fort Meyer Drive Suite 1000 Arlington , VA 22209 Phone: (none) Fax: (none) Email: dmccoy@acqsolinc.com _____________________________________________________ Mr. John McCreary Director, National Intelligence Kforce Government Solutions 2750 Prosperity Ave. Suite 300 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: lcm@tidalwave.net _____________________________________________________ John McCreary Chief Analysis Officer KGS 2750 Prosperity Ave Ste 300 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: jmccreary@kforcegov.com _____________________________________________________ Mr. Thomas McCreary Director IBM Corporation 12533 Ridgemoor Lake Court St. Louis , MO 63131 Phone: (none) Fax: (none) Email: mccreary@us.ibm.com _____________________________________________________ John McCreight 40 Richards Avenue Suite 7 Norwalk , CT 06854-2320 Phone: (none) Fax: (none) Email: jmc@implementstrategy.com _____________________________________________________ John McCreight 803 Silvermine Avenue New Canaan , CT 6840 Phone: (none) Fax: (none) Email: jmc@implementstrategy.com _____________________________________________________ John McCreight Chairman & Founder McCreight & Company 803 Silvermin Road New Canaan , CT 06840 Phone: (none) Fax: (none) Email: jmc@implementstrategy.com _____________________________________________________ Mason McDaniel Program Dir Intelligence Ctr Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Michael McDaniel Deputy Assistant Secretary for H DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: michael.mcdaniel@osd.mil _____________________________________________________ Tom L McDivitt Intelligence Analyst Booz Allen Hamilton Tom McDivitt (544757) 8283 Greensboro Drive Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: mcdivitt_thomas@bah.com _____________________________________________________ Mr. Cecil McDonald 7781 S. Lakeview Street Littleton , CO 80120 Phone: (none) Fax: (none) Email: ceelinmac2@comcast.net _____________________________________________________ Jonathan McDonald VP Agilex Technologies 5155 Parkstone Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: jonathan.mcdonald@agilex.com _____________________________________________________ Mr. Richard McDonald Director General Dynamics AIS 10560 Arrowhead Drive Fairfax , VA 22030 Phone: (none) Fax: (none) Email: rich.mcdonald@gd-ais.com _____________________________________________________ Mr. Richard McDonald Jr. TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Rich.McDonald@gd-ais.com _____________________________________________________ Mr. Richard McDonald Jr. 10560 Arrowhead Drive Fairfax , VA 22192 Phone: (none) Fax: (none) Email: rich.mcdonald@gd-ais.com _____________________________________________________ Jerry McDowell TITLE TBD Sandia National Laboratories P.O. Box 5800 Albuquerque , NM 87185 Phone: (none) Fax: (none) _____________________________________________________ Mr. Mike McDuffie Vice President, Public Sector Sv Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: mikemcdu@microsoft.com _____________________________________________________ Michael McElmurry 15811 Foxgate Rd Houston , TX 77079 Phone: (none) Fax: (none) Email: mcelmmp@gmail.com _____________________________________________________ Mr. Deron McElroy 503 South Henry Street Alexandria , VA 22314 Phone: (none) Fax: (none) _____________________________________________________ Mr. Gordon McElroy 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: gordon.mcelroy@lmco.com _____________________________________________________ Mr. Richard McFarland Director, Congressional Relation Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: rich_mcfarland@raytheon.com _____________________________________________________ Mr. Ronald C McGarvey Threat Assessment officer USMC, MCNCRC G3 Mission Assurance Branch R. McGarvey 2350 Catlin Ave. Room 016 Quantico , VA 22134 Phone: (none) Fax: (none) Email: ronald.mcgarvey@usmc.mil _____________________________________________________ Kathleen McGhee Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: K_Mcghee@ssci.senate.gov _____________________________________________________ Maureen McGovern MBA, BS President KSB Solutions 2302 Birch Court Warrington , PA 18976 Phone: (none) Fax: (none) Email: maureen.a.mcgovern@gmail.com _____________________________________________________ Brad McGowan Senior Managing Director The SPECTRUM Group 11 Canal Center Plaza Suite 103 Alexandria , VA 22314 Phone: (none) Fax: (none) Email: bmcgowan@spectrumgrp.com _____________________________________________________ Bradley W McGowan Senior Managing Director The SPECTRUm Group 11 Canal Center Plaza Suite # 103 Alexandria , VA 22314 Phone: (none) Fax: (none) Email: bmcgowan@spectrumgrp.com _____________________________________________________ Kevin McGreevy CEO Network Designs, Inc. 501 Church St. Suite 210 Vienna , VA 22180-4711 Phone: (none) Fax: (none) _____________________________________________________ Judith McHale Under Sec Public Diplomacy & Pol State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mchalej@state.gov _____________________________________________________ Maj Gen James McInerney USAF (Re 2111 Wilson Blvd. Suite 400 Arlington , VA 22201 Phone: (none) Fax: (none) Email: jmcinerney@ndia.org _____________________________________________________ mr gregory s mcinnis aircraft parts sales none 4635 mclemoresville rd huntingdon , TN 38344 Phone: (731) 986-5800 Fax: (none) Email: woodrot1@att.net _____________________________________________________ James W McJunkin National Security Branch, Direct FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: james.mcjunkin@ic.fbi.gov _____________________________________________________ Ashley McKannon 16659 Malory Ct Dumfries , VA 22025 Phone: (703) 730-2379 Fax: (none) Email: aem2189@columbia.edu _____________________________________________________ Mr. Thomas McKannon Manager, Space & Airborne System Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: mckannon@raytheon.com _____________________________________________________ Thomas McKannon BS/MS/AeE Strategy & Business Capture Raytheon 1100 Wilson Blvd Suite 1900 Arlington , VA 22209 Phone: (703) 730-2379 Fax: (none) Email: t.mckannon@gmail.com _____________________________________________________ Dean McKendrick TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) _____________________________________________________ Dean McKendrick Vice President Intelligence Prog ManTech INTL 2250 Corporate Park Drive Suite 500 Herndon , VA 20171 Phone: (none) Fax: (none) Email: dean.mckendrick@mantech.com _____________________________________________________ Howard McKeon Rep. Ranking Minority Member Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: howard.mckeon@mail.house.gov _____________________________________________________ David McKeough Director of Sales McAfee, Inc. 12010 Sunset Hills Road 5th Floor Reston , VA 20190 Phone: (none) Fax: (none) Email: david_mckeough@mcafee.com _____________________________________________________ Ms. Chris McKeowen Assistant Deputy Under Secretary DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Christine.McKeowen@dia.mil _____________________________________________________ Todd McKinley 733 15th Street, NW Apartment# 916 Washington , DC 20005 Phone: (none) Fax: (none) Email: Toddmac78@yahoo.com _____________________________________________________ Mr. Glenn McKnab TITLE TBD HP 921 Burnett Avenue Arnold , MD 21012 Phone: (none) Fax: (none) Email: Glenn.mcknab@hp.com _____________________________________________________ Tom McLemore Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: tom.mclemore@mail.house.gov _____________________________________________________ Joseph McLeod Manager Government Program Devel Software Engineering Institute, CMU NRECA Building Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Dr. Edward McMahon 8719 Burdette Road Bethesda , MD 20817 Phone: (none) Fax: (none) Email: epmcm1@verizon.net _____________________________________________________ Mr. James McMahon TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: james.mcmahon@nro.mil _____________________________________________________ John McMahon Required unless Parent Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Ms. Darcy McMillan Executive Assistant Sotera Defense Solutions, Inc 1501 Farm Credit Drive Suite 2300 McLean , VA 22102 Phone: (none) Fax: (none) Email: dmcmillan@the-analysis-corp.com _____________________________________________________ Mr. Jason McMillan 107 S. West St #525 Alexandria , VA 22314 Phone: (none) Fax: (none) Email: jmcmillan@ockim.com _____________________________________________________ Jason McMillan President Ockim, Inc. 107 S. West St #525 Alexandria , VA 22314 Phone: (none) Fax: (none) Email: jmcmillan@ockim.com _____________________________________________________ Tim McMillan Business Analyssts Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: tim.mcmillan@lmco.com _____________________________________________________ Mr. John McMullen 2340 Dulles Corner Blvd MS: 6S02 Herndon , VA 20171 Phone: (none) Fax: (none) Email: john.mcmullen@ngc.com _____________________________________________________ David McMunn Intel Sector Manager Parsons Corporation 198 Van Buren Street Suite 250 Herndon , VA 20170 Phone: (none) Fax: (703) 481-6013 Email: dmcmunn@mcmunn-associates.com _____________________________________________________ Miss Barbara McNamara 3003 Van Ness Street, N.W. #828W Washington , DC 20008 Phone: (none) Fax: (none) Email: b.mcnamara@starpower.net _____________________________________________________ Timothy C McNamara TITLE TBD Boyden 217 E Redwood St Suite 1500 Baltimore , MD 21202 Phone: (none) Fax: (none) Email: tmcnamara@boyden.com _____________________________________________________ Edward McNamee TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) _____________________________________________________ Mr. Michael McNamee TITLE TBD NSA 9800 Savage Road SP, Suite 6468 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: mkmcnam@nsa.gov _____________________________________________________ Mr. Tim McNeil TITLE TBD DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Timothy.McNeil@dia.mil _____________________________________________________ Mr. Frank B Meade 425 West 23 Street 11-B New York , NY 10011 Phone: (none) Fax: (none) Email: gothamite2@juno.com _____________________________________________________ Mr. C. Meador Chairman mgiss 85 Speen Street Suite 201 Framingham , MA 01701 Phone: (none) Fax: (none) Email: meador@mgiss.com _____________________________________________________ Mr. David Meadows Affiliant AT&T Government Solutions-NIS 7125 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) Email: demeadows@att.com _____________________________________________________ Carmen Medina 901 N Stuart St suite 205 Arlington , VA 22203 Phone: (none) Fax: (none) Email: camedina@concentric.net _____________________________________________________ Mr. CB Mee Liason Officer to DHS NSA Perception I&A 628 Chapelgate Dr Odenton , MD 21113 Phone: (none) Fax: (none) Email: cb_mee@yahoo.com _____________________________________________________ ADM, Tom Meek Director, National Maritime Inte DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: tmeek@nmic.gov _____________________________________________________ Mr. Mike Meermans VP, Strategic Planning Sierra Nevada Corporation 12706 Westport Lane Woodbridge , VA 22192 Phone: (none) Fax: (none) Email: mike.meermans@sncorp.com _____________________________________________________ Mr. Jim Meginley COO Intec Billing, Inc. 301 North Perimeter Center Suite 200 Atlanta , GA 30346 Phone: (none) Fax: (none) Email: james.meginley@intecbilling.com _____________________________________________________ Mr. Kevin Meiners 1708 N. Utah Street Arlington , VA 22207-2329 Phone: (none) Fax: (none) Email: kevin.meiners@osd.mil _____________________________________________________ Kevin Meiners Acting Deputy, Undersecretary of DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Kevin.Meiners@osd.mil _____________________________________________________ Mr. Brendan Melley Associate Vice President Cohen Group 103 Harvard Street Alexandria , VA 22314 Phone: (none) Fax: (none) Email: bmelley@cohengroup.net _____________________________________________________ Ms. Lindsey A Mellon B.A. Intelligence Analyst BAE Systems 8201 Greensboro Drive Mclean , VA 22102 Phone: (831) 917-6376 Fax: (none) Email: lindseymellon@gmail.com _____________________________________________________ Mr. A. Melnick TITLE TBD Portable Export P.O. Box 5501 Falmouth , VA 22403 Phone: (none) Fax: (none) Email: info@portableexpert.com _____________________________________________________ Mr. Raymond Melnyk TITLE TBD L-3 Communications - Government Services, Inc. 15049 Conference Center Drive Suite 200 Chantilly , VA 20151 Phone: (none) Fax: (none) Email: raymond.melnyk@l-3com-spg.com _____________________________________________________ Mary Ann Melosh 11251 Roger Bacon Drive Reston , VA 20190 Phone: (none) Fax: (none) Email: meloshm@saic.com _____________________________________________________ Caylin Mendelowitz Staff Scientist ENSCO, Inc. 5400 Port Royal Rd. Springfield , VA 22151 Phone: (none) Fax: (none) Email: mendelowitz.caylin@ensco.com _____________________________________________________ Mr. Justin Mentzer 205 Van Buren Suite 450 Herndon , VA 20170 Phone: (none) Fax: (none) Email: justin.mentzer@etginc.com _____________________________________________________ Justin Mentzer TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) Email: Justin.mentzer@mantech.com _____________________________________________________ Ms. Courtney Merriman TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: cmerriman@potomacinstitute.org _____________________________________________________ Mr. David Merritt CISSP, CIS 201 Vanderpool Lane Suite 97 Houston , TX 77024 Phone: (none) Fax: (none) Email: david.d.merritt@gmail.com _____________________________________________________ Mr. Beirut Mesfin TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: bmesfin@potomacinstitute.org _____________________________________________________ James Mesick Director Human Capital The SI 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: helen.d.demes@lmco.com _____________________________________________________ David Messina Director, Program Management Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: david.e.messina@lmco.com _____________________________________________________ Christina Mestre 7553 Alaska Ave NW Washington , DC 20012 Phone: (none) Fax: (none) Email: christinawmestre@gmail.com _____________________________________________________ Dr. Sheldon Meth 3601 Wilson Boulevard Arlington , VA 22201 Phone: (none) Fax: (none) Email: smeth@sysplan.com _____________________________________________________ James Metsala 10328 Sager Avenue Unit 402 Fairfax , VA 22030 Phone: (none) Fax: (703) 877-2144 Email: james@metsala.com _____________________________________________________ Karen Metzler TITLE TBD Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Rachel Meyer TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rachel_meyer@appro.senate.gov _____________________________________________________ Ms. Renee Meyer TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rmmeyer@nsa.gov _____________________________________________________ Mr. Richard J Meyer Deputy Director, TD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rlmeyer@nsa.gov _____________________________________________________ Ms. Dawn Meyerriecks DDNI for Acquisition & Technolog ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: dawn.c.meyerriecks@ugov.gov _____________________________________________________ Mr. Randall Meyers Vice President Camber Corporation 5860 Trinity Parkway Suite 400 Centerville , VA 20120 Phone: (none) Fax: (none) Email: rmeyers@i2spros.com _____________________________________________________ Randall Meyers Vice President National Security Camber 6992 Columbia Gateway Dr Suite 150 Columbia , MD 21042 Phone: (none) Fax: (none) Email: rmeyers@camber.com _____________________________________________________ Mr. Andrew Michels TITLE TBD Interlocutor 1701 Kalorama Road, N.W. Washington , DC 20009 Phone: (none) Fax: (none) Email: amichels@interlocutor.net _____________________________________________________ Tom Middleton VP Strategic Planning & Ops General Dynamics Information Technology 13857 McLearen Rd Herndon , VA 20171 Phone: (none) Fax: (none) Email: tom.middleton@gdit.com _____________________________________________________ Mr. Vincent Mihalik Cyber Security Solutions Archite Wyle Information Systems 1600 Intenational Dr Suite 800 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Wanda Mikovch TITLE TBD DIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: wanda.mikovch@dia.mil _____________________________________________________ milan milenkovic 131 s. west street alexandria , VA 22314 Phone: (none) Fax: (none) Email: milanzm1963@yahoo.com _____________________________________________________ Mr. Jack Milewski General Manager, Defense Intelli BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: john.milewski@baesystems.com _____________________________________________________ Mr. Russ Milheim Deputy Targeting DIA 7400 Defense Pentagon Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Russell.Milheim@dia.mil _____________________________________________________ Brandon Milhorn TITLE TBD Raytheon Company - IIS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: brandon.milhorn@raytheon.com _____________________________________________________ Brandon Milhorn Director, Integrated Defense Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Alex Miller SVP and Senior Account Executive L-3 Communications, Inc. 11955 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Britney Miller Communications Specialist U.S. Department of Homeland Security 7005 Fawn Trail Ct. Bethesda , MD 20817 Phone: (none) Fax: (none) Email: britneyamiller@gmail.com _____________________________________________________ Ms. Connie Miller TITLE TBD Department of Justice 5344 Admiral Peary Highway Eldersburg , PA 15931 Phone: (none) Fax: (none) Email: Connie.M.Miller@usdoj.gov _____________________________________________________ James Miller Principal Deputy Under Secretary DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Kelly.McKnight@osd.mil _____________________________________________________ Jennifer Miller TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jennifer.miller@mail.house.gov _____________________________________________________ John Miller TITLE TBD ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.j.miller@ugov.gov _____________________________________________________ Jonathan Miller Director Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: jonathan.e.miller@lmco.com _____________________________________________________ Mr. Kelly A Miller Deputy Director, CIO NSA 9800 Savage Road Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: kamille@nsa.gov _____________________________________________________ Laila Miller N/A N/A 1250 4 St SW Apt W411 Washington , DC 20024 Phone: (none) Fax: (none) Email: lmi4142@aol.com _____________________________________________________ Linda Miller TITLE TBD TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) Email: linda.miller@tasc.com _____________________________________________________ Michael J Miller 225 Kenneth Drive Rochester , NY 14623 Phone: (none) Fax: (none) Email: michael.j.miller@globalcrossing.com _____________________________________________________ Michael J Miller VP Federal Sector Global Crossing 12010 Sunset Hills Road Suite 420 Reston , VA 20190 Phone: (none) Fax: (none) Email: Michael.J.Miller@GlobalCrossing.com _____________________________________________________ Michael J Miller 225 Kenneth Drive 134 Rochester , NY 14623 Phone: (none) Fax: (none) Email: michael.j.miller@globalcrossing.com _____________________________________________________ Michael J Miller 225 Kenneth Drive Rochester , NY 14623 Phone: (none) Fax: (none) Email: michael.j.miller@globalcrossing.com _____________________________________________________ Michael J Miller 225 Kenneth Drive Rochester , NY 14623 Phone: (none) Fax: (none) Email: michael.j.miller@globalcrossing.com _____________________________________________________ Mr. Scotty Miller 13901 E. Laurel Lane Scottsdale , AZ 85259 Phone: (none) Fax: (none) Email: scotty.miller@gdds.com _____________________________________________________ Brig Gen Stephen J Miller USAF TITLE TBD NSA 9800 Savage Road D7, Suite 6242 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: sjmille@nsa.gov _____________________________________________________ Steve Miller Senior Director, Federal Progams GeoEye GeoEye 21700 Atlantic Blvd, 5th Floor Dulles , VA 20166 Phone: (none) Fax: (none) Email: miller.steve@geoeye.com _____________________________________________________ Mr. Steven G Miller TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: sgmille@nsa.gov _____________________________________________________ Dr. Susanne Miller Director Ensco, Inc. 5400 Port Royal Road Springfield , VA 22151 Phone: (none) Fax: (none) Email: miller.susanne@ensco.com _____________________________________________________ Mr. Brad Millick Director of Collections DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: brad.millick@osd.mil _____________________________________________________ Mr. Karl Milligan 348 Thompson Creek Mall #237 Stevensville , MD 21666 Phone: (none) Fax: (none) Email: kmilligan@patriotsecuritygroup.com _____________________________________________________ Ms. Linda Millis 610 N. Pitt Street Alexandria , VA 22314 Phone: (none) Fax: (none) Email: lmillis@markle.org _____________________________________________________ Ms. Linda Millis Director of Pirvate Sector Partn ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: linda.millis@ugov.gov _____________________________________________________ Linda Millis Director, Private Sector Partner Office of the Director of National Intelligence Room 4B-171 Washington , DC 20511 Phone: (none) Fax: (none) Email: linda.millis@dni.gov _____________________________________________________ Cheryl Mills Counselor and Chief of Staff State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: millsc@state.gov _____________________________________________________ Linda Mills President, NGIS Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Robert F Minehart TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Robert.Minehart@mail.house.gov _____________________________________________________ Ken Minihan Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ John E MINITER PO Box 630 Ipswich , MA 1938 Phone: (none) Fax: (none) _____________________________________________________ Jennifer A Minton Program Director Raytheon 1311 N Abingdon Street Arlington , VA 22207 Phone: (none) Fax: (none) Email: jenminton@gmail.com _____________________________________________________ Daniel Mintz Chief Technology Officer, Civil Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) _____________________________________________________ Jami Miscik PIAB Member PIAB No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Wendy_A._Loehrs@pfiab.eop.gov _____________________________________________________ Dave Missal Practice Manager Oracle 8812 Stony Creek Drive Colorado Springs , CO 80924 Phone: (none) Fax: (none) Email: dave.missal@oracle.com _____________________________________________________ Mr. Jamison Mitchell FSI State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jrmitchell@me.com _____________________________________________________ Lawrence A Mitchell Senior Vice President Sierra Nevada Corporation 444 Salomon Circle Sparks , NV 89434 Phone: (none) Fax: (none) Email: larry.mitchell@sncorp.com _____________________________________________________ Lawrence A Mitchell TITLE TBD Sierra Nevada Corporation 444 Salomon Circle Sparks , NV 89434 Phone: (none) Fax: (none) Email: larry.mitchell@sncorp.com _____________________________________________________ Mr. Bill Mixon TITLE TBD USIS 7799 Leesburg Pike Suite 400 S Falls Church , VA 22043 Phone: (none) Fax: (none) Email: bill.mixon@usis.com _____________________________________________________ eric mock 2805 Clearmeadow street Bedford , TX 76021 Phone: (none) Fax: (631) 410-1160 Email: emock@caci.com _____________________________________________________ Bill Moeller 1421 Jefferson Davis Highway Suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) Email: William.Moeller@gd-ais.com _____________________________________________________ Mr. Edward Moffett TITLE TBD NRO 14675 Lee Road Room 15B20L Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: edward.moffett@nro.mil _____________________________________________________ MS DIANA M MOHLER MBA DIANA MOHLER 7930 JONES BRANCH DRIVE SUITE 800 MCLEAN , VA 22102 Phone: (301) 820-5235 Fax: (703) 854-1680 Email: dmohler@itllc.com _____________________________________________________ Mr. William Mohr Director, Defense & Intel. PGene SRI International 1100 Wilson Boulevard Suite 2800 Arlington , VA 22209 Phone: (none) Fax: (none) Email: william.mohr@sri.com _____________________________________________________ Michael Molino Vice President SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: Mrm35@Cornell.edu _____________________________________________________ Mr. Jon A Monett BS, MA Chairman The Quality of Life Program 6748 Old McLean Village Drive, S Suite 200 Mclean , VA 22101 Phone: (703) 893-7757 Fax: (none) Email: jon@monetts.com _____________________________________________________ Mr. Arthur Money 3803 Riverwood Road Alexandria , VA 22309-2726 Phone: (none) Fax: (none) Email: moneyarthurl@cs.com _____________________________________________________ Mr. Jonathan Moneymaker Director - Missions Systems CT The Boeing Company 7700 Boston Boulevard Springfield , VA 22153 Phone: (none) Fax: (none) Email: Jonathan.p.moneymaker@boeing.com _____________________________________________________ Audrey Monish VP Govt Relations DRS Defense Solutions 2011 Crystal Drive Suite 433 Arlington , VA 22202 Phone: (none) Fax: (none) Email: amonish@drs-ds.com _____________________________________________________ Gary Monroe Solution Strategist Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Lucian Montagnino 37 Far View Commons Southbury , CT 6488 Phone: (none) Fax: (none) Email: loutmg@earthlink.net _____________________________________________________ Matt Monte 2100 Reston Parkway Reston , VA 20191 Phone: (none) Fax: (none) Email: mattmm17@gmail.com _____________________________________________________ Mr. Edward Montes Business Development Mgr, NSG Oracle Corporation 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: edward.montes@oracle.com _____________________________________________________ Oscar Montes Project Mgr Logistics Ctr Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Jennifer Montesano Director, Marketing & Public Rel General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) _____________________________________________________ Ms. Susan Moody APG Account Manager, NSA Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: susan.moody@hp.com _____________________________________________________ Beth Moore 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Catherine Moore TITLE TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Felicia Moore Bachelors Research Analyst Deltek 8400 westpark drive mclean , VA 22102 Phone: (none) Fax: (none) Email: fepsteinmoore@gmail.com _____________________________________________________ Ms. Heather Moore 12440 Casbeer Drive Fairfax , VA 22033 Phone: (none) Fax: (none) Email: hmoor1@newhaven.edu _____________________________________________________ Mr. James Moore 14840 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: jmoore@omniplex.com _____________________________________________________ Ms. Jeannette Moore Director Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: jeannette_a_moore@raytheon.com _____________________________________________________ Jim Moore TITLE TBD Omniplex World Services Corporation 14840 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: jmoore@omniplex.com _____________________________________________________ Jim Moore TITLE TBD Omniplex World Services Corporation 14840 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: jmoore@omniplex.com _____________________________________________________ Mr. John Moore 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: john.ja.moore@lmco.com _____________________________________________________ Mr. Keith Moore Business Development Analysis Vi Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: keith.w.moore@lmco.com _____________________________________________________ Mr. William Moore Executive Vice President LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) Email: wmoore@lmi.org _____________________________________________________ Mr. Thomas Moorman Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Moorman_Thomas@bah.com _____________________________________________________ Anthony Moraco SVP, General Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: anthony.j.moraco@saic.com _____________________________________________________ Mrs. Pamela Moraga Strategic Programs Manaager Hewlett-Packard Company 13600 EDS Drive Herndon , VA 20171 Phone: (none) Fax: (none) Email: gamechanger@hp.com _____________________________________________________ Pamela Moraga Business Development Executive Hewlett-Packard 6600 Rockledge Dr #150 Bethesda , MD 20817 Phone: (none) Fax: (none) Email: pamela.j.moraga@hp.com _____________________________________________________ Pam Morage 6600 Rockledge Drive Bethesda , MD 20817 Phone: (none) Fax: (none) Email: pamela.moraga@hp.com _____________________________________________________ Mr. Isidoro Moran Masters Chief Strategy Advisor Dell Services Federal Government Isidoro Moran 6800 Fleetwood Road Apt 1117 Mclean , VA 22101 Phone: (703) 761-4372 Fax: (none) Email: isidoro_moran@federal.dell.com _____________________________________________________ Mr. Frank A Moret 906 La Grande Road Silver Spring , MD 20903 Phone: (none) Fax: (none) _____________________________________________________ Erol Morey Senior Director, NGA GeoEye GeoEye 12076 Grant Street Thornton , CO 80241 Phone: (none) Fax: (none) Email: morey.erol@geoeye.com _____________________________________________________ John Morgan 3415 Meridian Way Highland Park Winston-Salem , NC 27104 Phone: (none) Fax: (none) Email: jj7282@mac.com _____________________________________________________ Ms. Jessica Morgenstern TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Jessica.Morgenstern@gd-ais.com _____________________________________________________ Ms. Wendy Morigi Director of Public Affairs ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: wendy.morigi@ugov.gov _____________________________________________________ Jay Mork TITLE TBD General Dynamics AIS 8800 Queen Ave South Bloomington , MN 55431 Phone: (none) Fax: (none) _____________________________________________________ Ed Mornston Director, JITF-Counterintelligen DIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Edward.Mornston@dia.mil _____________________________________________________ Ms. Karen Morr 2023 Willow Branch Court Vienna , VA 22181 Phone: (none) Fax: (none) Email: Karen.T.Morr@saic.com _____________________________________________________ Mr. Brian Morra VP, NGES Northrop Grumman Corporation Brian Morra 1580A West Nursery Road MS A550 Linthicum , MD 21090 Phone: (none) Fax: (410) 993-2425 Email: brian.morra@ngc.com _____________________________________________________ Michael J Morrell Deputy Director for Analysis CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1739 Email: christyt@ucia.gov _____________________________________________________ C. Morris 5392 Brunswick Lane Broad Run , VA 20137 Phone: (none) Fax: (none) Email: ccmorris@hughes.net _____________________________________________________ Ms. Carleda Morris Deputy Equality Executive NGA 4600 Sangamore Road Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: carleda.morris@nga.mil _____________________________________________________ Caroline R Morris communications coordinator Finmeccanica Angelica Falchi 1625 I Street, NW 12th Floor Washington , DC 20006 Phone: (none) Fax: (202) 223-6584 Email: caroline.morris@finmeccanica.com _____________________________________________________ Clementina Morris 2562 Glenridge Circle Merritt Island , FL 32953-2933 Phone: (none) Fax: (none) _____________________________________________________ Michael Morris Sr. Spec. Govt. Bus Dev AT&T Government Solutions-NIS 7125 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) Email: mmorris@att.com _____________________________________________________ Mr. Michael G Morris BS Senior Specialist, Bus. Dev. AT&T Corporation Michael G. Morris 3033 Chain Bridge Road Oakton , VA 22185 Phone: (none) Fax: (703) 885-0046 Email: mm3125@att.com _____________________________________________________ Sean Morris Principal Deloitte 1001 G. St, NW Suite 900W Washington , DC 20001 Phone: (none) Fax: (none) Email: semorris@deloitte.com _____________________________________________________ Brian Morrison Deputy Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: brian.morrison@mail.house.gov _____________________________________________________ Gregg Morrison TITLE TBD Solers 950 N. Glebe Road Suite 1100 Arlington , VA 22203 Phone: (none) Fax: (none) Email: gregg.morrison@solers.com _____________________________________________________ Gregg Morrison TITLE TBD Solers 950 N. Glebe Road Suite 1100 Arlington , VA 22203 Phone: (none) Fax: (none) Email: gregg.morrison@solers.com _____________________________________________________ Mr. Gregg Morrison BBA, MS VP Solers, Inc 950 North Glebe Road Suite 1100 Arlington , VA 22203 Phone: (none) Fax: (none) Email: gregg.morrison@solers.com _____________________________________________________ Mr. Michael Morrow 15059 Conference Center Drive Suite 110 Chantilly , VA 20151 Phone: (none) Fax: (none) Email: mmorrow@rri-usa.org _____________________________________________________ Mr. Amos Morse VP Proprietary Program Harris Corporation P.O. Box 37 MS: 2-21D Melbourne , FL 32902 Phone: (none) Fax: (none) Email: amorse@harris.com _____________________________________________________ Mr. Jack C Mortick TITLE TBD NSA 9800 Savage Road S3, Suite 6305 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: jcmorti@nsa.gov _____________________________________________________ Assistant Secre John Morton TITLE TBD DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.morton@dhs.gov _____________________________________________________ Mr. Michael Moskal BS, MBA Vice President CUBRC 4455 Genesee St. Buffalo , NY 14225 Phone: (none) Fax: (none) Email: moskal@cubrc.org _____________________________________________________ Mosheh Moskowitz Chief Technology Officer Flexispine 9700 Great Seneca Hwy Rockville , MD 20850 Phone: (none) Fax: (none) Email: mosheh.moskowitz@flexispine.com _____________________________________________________ Chafiq Moummi 6803 Morning Brook Terrace Alexandria , AL 22315 Phone: (none) Fax: (none) Email: moummi@hotmail.com _____________________________________________________ Mr. David Moya Director, Program Management Pro Sypris Electronics 10901 N. McKinley Drive Tampa , FL 33612 Phone: (none) Fax: (none) Email: dave.moya@sypris.com _____________________________________________________ Charles Mrozek Manager, Classified Projects URS 9755 Patuxent Woods Drive Suite 300 Columbia , MD 21046 Phone: (none) Fax: (none) Email: Chuck.mrozek@urs.com _____________________________________________________ Robert Mueller Director FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Robert.muelleriii@ic.fbi.gov _____________________________________________________ Mr. Paul E Muench Deputy CIO NGA 4600 Sangamore Road, D-199 Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: paul.e.muench@nga.mil _____________________________________________________ Mr. Bryan K Mulholland Senior Account Executive Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: bryanmulholland@live.com _____________________________________________________ Mr. Mark Mullaney 10 Keith\'s Lane Alexandria , VA 22314 Phone: (none) Fax: (none) Email: mmullaney@csc.com _____________________________________________________ Mr. Brian Mullen TITLE TBD BEA 2477 Chelmsford Drive Crofton , MD 21114 Phone: (none) Fax: (none) Email: bmullen@bea.com _____________________________________________________ John Mullen Associate EAD National Security FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.mullen@ic.fbi.gov _____________________________________________________ Admiral Mike Mullen Chairman DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: michael.mullen@js.pentagon.mil or mike.mullen@js.pentagon.mil _____________________________________________________ Rob Mullen TITLE TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. Robert Mullen Manager, Special Programs L-3 Communications/Com.Sys.East 1 Federal Street A&E-2C Camden , NJ 8103 Phone: (none) Fax: (none) Email: robert.mullen@l-3com.com _____________________________________________________ Mr. Carl Muller Senior Vice President CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: cmuller@caci.com _____________________________________________________ Mr. James Mulvenon 1140 Connecticut Ave NW Ste 1140 Washington , DC 20036 Phone: (none) Fax: (none) Email: james.mulvenon@defensegp.com _____________________________________________________ Amy Mummert Strategic Marketing Manager SafeNet, Inc. 4690 Millennium Drive Belcamp , MD 21017 Phone: (none) Fax: (none) _____________________________________________________ Mr. Al Munson TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: amunson@potomacinstitute.org _____________________________________________________ Al Munson consultant Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Alden Munson 215 Wolfe St. Alexandria , VA 22314 Phone: (none) Fax: (none) Email: amunson857@aol.com _____________________________________________________ Mrs. Margaret Munson Partner The Intelligence & Security Academy, LLC 1890 Preston White Drive Suite 250 Reston , VA 20191 Phone: (none) Fax: (none) Email: mmunson@ec.rr.com _____________________________________________________ Mr. William Murdock TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: william.murdock@harris.com _____________________________________________________ Mr. Leon Murphey TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Leon.Murphey@gd-ais.com _____________________________________________________ Mr. Charles Murphy Professor Liberty University 202 Capital Lane Forest , VA 24551 Phone: (none) Fax: (none) Email: cmurphy@liberty.edu _____________________________________________________ John Murphy Director of Staff DARPA P.O.Box 2861 Arlington , VA 22202 Phone: (none) Fax: (none) Email: john.murphy@darpa.mil _____________________________________________________ Ms. Katharine Murphy TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: katharine.murphy@gd-ais.com _____________________________________________________ Kyle Murphy No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kmurphy557@aol.com _____________________________________________________ Mr. Michael Murphy 225 Dover Road Westwood , MA 2090 Phone: (none) Fax: (none) Email: mike@millcp.com _____________________________________________________ Michael Murphy 225 Dover Road Westwood , MA 2090 Phone: (none) Fax: (none) Email: mike@millcp.com _____________________________________________________ Richard Murphy CEO Core180, Inc. 2751 Prosperity Drive Suite 200 Vienna , VA 22031 Phone: (none) Fax: (none) _____________________________________________________ Timothy P Murphy Associate Deputy Director FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: timothy.murphy@ic.fbi.gov _____________________________________________________ Mr. Wayne M Murphy Chief S2 NSA 9800 Savage Road S21, Suite 6228 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: wmmurph@nsa.gov _____________________________________________________ Allen Murray Sr. Program Director Hughes 11717 Exploration Lane Germantown , MD 20876 Phone: (none) Fax: (none) _____________________________________________________ Mr. Bruce Murray APG Account Manager Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: bruce.murray@hp.com _____________________________________________________ Ms Mickey Murray Security Manager Intelligent Decisions Inc 21445 Beaumeade Cir Ashburn , VA 20147 Phone: (none) Fax: (none) Email: mmurray@intelligent.net _____________________________________________________ Mickey V Murray TITLE TBD Intelligent Decisions Inc 21445 Beaumeade Cir Ashburn , VA 20147 Phone: (none) Fax: (none) Email: mmurray@intelligent.net _____________________________________________________ VADM Robert B Murrett USN Director NGA 4600 Sangamore Road, D-100 Bethesda , MD 20816-5003 Phone: (none) Fax: (301) 227-3696 Email: Robert.b.murrett@nga.mil _____________________________________________________ Katherine Muse Duma 9079 Golden Sunset Ln. Springfield , VA 22153 Phone: (none) Fax: (none) Email: k.muse.duma@gmail.com _____________________________________________________ Dr. Clyde Musgrave 3620 Fairfield Place Suite 820 Frisco , TX 75035 Phone: (none) Fax: (none) Email: DrClyde@me.com _____________________________________________________ Frank F Blanco President/CED The Pola Group 1915 Towne Centre Blvd Ste 309 Annapolis , MD 21401 Phone: (none) Fax: (none) Email: fblanco@thepolagroup.com _____________________________________________________ Rick Blankenship Account Manager, Federal Intel MicroStrategy 1850 Towers Crescent Plaza Vienna , VA 22182 Phone: (none) Fax: (none) Email: rblankenship@microstrategy _____________________________________________________ Ms. Rhonda Blatman 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: rhonda.j.blatman@lmco.com _____________________________________________________ Mr. David Blauch NSA Account Manager, APG Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: david.blauch@hp.com _____________________________________________________ Robert A Blecksmith Director, Critical Incident Resp FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: robert.blecksmith@ic.fbi.gov _____________________________________________________ Mr. Donald Blersch 14807 Windrift Court Centreville , VA 20120 Phone: (none) Fax: (none) Email: don@blersch.net _____________________________________________________ Donald Blersch Director, capability requirement ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: donald.j.blersch@ugov.gov _____________________________________________________ Mr. Donald J Blersch 14807 Windrift Court Centreville , VA 20120 Phone: (none) Fax: (none) Email: donald.j.blersch@ugov.gov _____________________________________________________ Mike Blinde Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Michael.Blinde@mail.house.gov _____________________________________________________ Kristen Blough Account Manager Cisco Systems, Inc. 13635 Dulles Technology Drive Herndon , VA 20171 Phone: (none) Fax: (none) Email: krblough@cisco.com _____________________________________________________ James Blue Vice President, Finance BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: james.blue@basesystems.com _____________________________________________________ Jennie Blumenthal Principal PRTM Management Consultants, LLC 1730 Pennsylvania Ave NW Washington , DC 20006 Phone: (none) Fax: (none) Email: jblumenthal@prtm.com _____________________________________________________ Mr. Randall Blystone TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: randall.blystone@nro.mil _____________________________________________________ Mr. Zdzislaw Bochynski 111 W. 67th Street Apt 26F New York , NY 10023 Phone: (none) Fax: (none) _____________________________________________________ Ms. Sandi Bock Ex. Administrataive Assistant Sypris Electronics 10901 N. McKinley Drive Tampa , FL 33612 Phone: (none) Fax: (none) Email: sandi.bock@sypris.com _____________________________________________________ Mr. Kenneth Bodzioch Vice President, Engineering L-3 Communications/Com.Sys.East 1 Federal Street A&E-2C Camden , NJ 8103 Phone: (none) Fax: (none) Email: Kenneth.Bodzioch@L-3Com.com _____________________________________________________ Mr. Paul Boedges TITLE TBD NRO 14675 Lee Road Suite 32D07 Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: paul.boedges@nro.mil _____________________________________________________ John Boehner Rep. House Republican Leader Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: boehnerscheduler@mail.house.gov _____________________________________________________ Mr. Mark Bogart Acquisition Executive DIA Building 6000 Washington , DC 20340-5100 Phone: (none) Fax: (none) Email: Mark.Bogart@dia.mil _____________________________________________________ brandi bohannon 4415 harrison st nw washington , DC 20016 Phone: (none) Fax: (none) Email: brandibohannon@hotmail.com _____________________________________________________ Ms. Jane Bohlin Project Manager Ensco, Inc. 5400 Port Royal Road Springfield , VA 22151 Phone: (none) Fax: (none) Email: bohlin.jane@ensco.com _____________________________________________________ Tina Bohse Sr. Account Manager Qwest Communications 4250 N. Fairfax Dr. 5th Floor Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Daniel R Bolchoz 4019 Windsor Ridge Williamsburg , VA 23188 Phone: (none) Fax: (none) Email: dbolchoz@yahoo.com _____________________________________________________ Mr. Randy Boldosser Director AT&T Government Solutions-NIS 7125 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) Email: boldosser@att.com _____________________________________________________ Mr. Steve Bolen TITLE TBD NRO 122 Goldswatch Terrace, S.W. Leesburg , VA 20175 Phone: (none) Fax: (none) Email: steve.bolen@nro.mil _____________________________________________________ Mr. Marc Mussoline 8618 Westwood Center Drive #315 Vienna , VA 22182 Phone: (none) Fax: (none) Email: mmussoline@sgis.com _____________________________________________________ Bob Mutchler SVP Corporate Development Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Mr. David Muzzy TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Try dfmuzzy@nsa.gov or dbmuzzy@nsa.gov _____________________________________________________ Mike Myers Director of New Business Eagle Alliance 2711 Technology Drive Annapolis Junction , MD 20701 Phone: (none) Fax: (none) Email: dstrong2@csc.com _____________________________________________________ Todd G Myers B.F.A. Chief Technology Advisor NGA 2618 Culpeper Road Alexandria , VA 22308 Phone: (none) Fax: (none) Email: todd.g.myers@gmail.com _____________________________________________________ Angela Smigel (aka Maroz, Dea) Sr. Staff Administrator Ensco, Inc. 5400 Port Royal Road Springfield , VA 22151 Phone: (none) Fax: (703) 321-4609 Email: smigel.angela@ensco.com _____________________________________________________ Mr. Jayme Newell TITLE TBD Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jayme.newell@ca.com _____________________________________________________ Jeannette Newlen 1001 Research Park Blvd., Suite Charlottesville , VA 22911 Phone: (703) 580-7844 Fax: (none) Email: jeannette.newlen@us.army.mil _____________________________________________________ Mr. Aaron Newman Senior Principal Analyst Innovative Decisions 6464 Manhasset Lane Alexandria , VA 22312 Phone: (none) Fax: (none) Email: anewman@innovativedecisions.com _____________________________________________________ Ms. Patricia Newman 657 Quail Run Court Arnold , MD 21012 Phone: (none) Fax: (none) Email: pmnewma657@yahoo.com _____________________________________________________ Long Nguyen BSC System Analyst Senior CACI, INC. 14370 Newbrook Dr Commonwealth Building A Chantilly , VA 20151 Phone: (none) Fax: (none) Email: lnguyen@caci.com _____________________________________________________ Steve Nguyen Vice President, LNSSI & Federal LexisNexis Mr. Steve Nguyen 1150 18th Street, NW suite 250 Washington , DC 20036 Phone: (none) Fax: (none) Email: steve.nguyen@lnssi.com _____________________________________________________ Vinh Nguyen 1220 East West Hwy 1601 Silver Spring , MD 20910 Phone: (none) Fax: (none) Email: dc.vinh@gmail.com _____________________________________________________ Ms. Sherrill Nicely Deputy Associate Director of Nat ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: sherrill.l.nicely@ugov.gov _____________________________________________________ Mr. Paul Nicholas Security Strategist Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: pnichol@microsoft.com _____________________________________________________ BGEN. Theodore Nicholas Defense Counterintelligence and DIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: theodore.nicholas@dia.mil _____________________________________________________ Mr. Douglas Nichols 325 Cool Ridge Court Millersville , MD 21108 Phone: (none) Fax: (none) Email: nichols.dm@verizon.net _____________________________________________________ Mr. John Nichols Partner The Potomac Advocates 7360 Bloomington Court Springfield , VA 22150 Phone: (none) Fax: (none) Email: john@potadv.com _____________________________________________________ Rhonda Nichols TITLE TBD Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: rnichols2@csc.com _____________________________________________________ Ms. Wilma Nichols Director of Finance The Potomac Advocates 7360 Bloomington Court Springfield , VA 22150 Phone: (none) Fax: (none) Email: wil@potadv.com _____________________________________________________ Wilma D Nichols TITLE TBD The Potomac Advocates 7360 Bloomington Court Springfield , VA 22150 Phone: (none) Fax: (none) Email: wil@potadv.com _____________________________________________________ Ben Nicholson Minority Staff Director, Cyber Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ben.nicholson@mail.house.gov _____________________________________________________ Mr. James Nicholson 409 Walnut Avenue Gloucester , NJ 08030-2246 Phone: (none) Fax: (none) _____________________________________________________ Janet Nickloy Dir, Space Comm Sys BD Harris Corporation PO Box 37 Melbourne , FL 329020037 Phone: (none) Fax: (321) 674-2828 Email: jnickloy@harris.com _____________________________________________________ Linda Nicoll TITLE TBD The Aerospace Corporation Attn: Linda Nicoll, M1-447 2310 E. El Segundo Blvd. El Segundo , CA 90245 Phone: (none) Fax: (none) Email: linda.a.nicoll@aero.org _____________________________________________________ Daniel Nielsen Senior Procurement Executive ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Daniel.nielsen@ugov.gov _____________________________________________________ Mr. Alex Nieves SVice President, Computer Forens ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) Email: alex.nieves@mantech.com _____________________________________________________ Mr. Steve Niezgoda Vice President, Terrorist Screen Sotera Defense Solutions, Inc 1501 Farm Credit Drive Suite 2300 McLean , VA 22102 Phone: (none) Fax: (none) Email: sniezgoda@theanalysiscorp.com _____________________________________________________ Joseph L Nimmich Senior Advisor Penn State Applied Research Lab 3535 Loyola Ct Dunkirk , MD 20754 Phone: (none) Fax: (none) Email: jlnuscg@yahoo.com _____________________________________________________ Donald P Nixon III Analyst SRA 4350 Fair Lakes Court Fairfax , VA 22033 Phone: (none) Fax: (none) Email: dpn4@georgetown.edu _____________________________________________________ Mr. Tripop Noiwan 1107 N. Vernon Street Arlington , VA 22201 Phone: (none) Fax: (none) Email: tnoiwan@sysplan.com _____________________________________________________ Mr. Chris Nolan Director, Washington Operations The SI Organization, Inc. Chris Nolan 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: chris.s.nolan@lmco.com _____________________________________________________ Chris S Nolan Director, Government Relations The SI 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: helen.d.demes@lmco.com _____________________________________________________ Christopher S Nolan Director, Govenment Relations Lockheed Martin Corporation 15052 Conference Center Drive SG2 4D430H Chantilly , VA 20151 Phone: (none) Fax: (none) Email: chris.s.nolan@lmco.com _____________________________________________________ Matthew Nolan Nebraska Ave Washington , DC 20016 Phone: (none) Fax: (none) Email: matthewwnolan@gmail.com _____________________________________________________ Matthew Nolan 8924 Maurice Lane Annandale , VA 22003 Phone: (none) Fax: (none) Email: matthew.nolan@hq.dhs.gov _____________________________________________________ Mr. Gilbert C Nolte TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: gcnolte@nsa.gov _____________________________________________________ Dr. William Nolte 2758 Gracefield Road Silver Spring , MD 20904 Phone: (none) Fax: (none) Email: wnolte@umd.edu _____________________________________________________ Robert Noonan INSA Board of Advisors Booz Allen Hamilton Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Glen Nordin Senior Language Authority DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: glen.nordin@osd.mil _____________________________________________________ Glenn Nordin 500 Canterbury Lane Alexandria , VA 22314 Phone: (none) Fax: (703) 604-1226 Email: glenn.nordin@osd.mil _____________________________________________________ GM2 JASON N NORDIN GUNNERS MATE SECOND CLASS US NAVY 809-B CUESTA DRIVE #2187 MOUNTAIN VIEW , CA 94040 Phone: (none) Fax: (none) Email: JASON.NORDIN@NAVY.MIL _____________________________________________________ Mr. Nels Nordquist TITLE TBD ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: nels.p.nordquist@ugov.gov _____________________________________________________ John Norjen Jr. managing Director Investments Corporate Office Properties Trust 6711 Columbia Gateway Drive Columbia , MD 21046-2104 Phone: (none) Fax: (none) Email: john.norjen@copt.com _____________________________________________________ Colonel Ron Norman USAF TITLE TBD NSA 9800 Savage Road F1J, Suite 6672 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: ronald.norman@jiddo.dod.mil _____________________________________________________ Mr. Douglas Norton TITLE TBD Siemens Government Services 619 Kings Cloister Circle Alexandria , VA 22302-4025 Phone: (none) Fax: (none) Email: douglas.norton@siemensgovt.com _____________________________________________________ Mr. James Norton TITLE TBD General Dynamics C4 Systems 2231 Crystal Drive Suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) Email: susan.hernandez-francis@gdc4s.com _____________________________________________________ James Norton Director General Dynamics C4 Systems 2231 crystal drive suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) Email: Susan.Hernandez-Francis@gdc4s.com _____________________________________________________ Mr. Paul Norton 1101 30th Street, N.W. Suite 100B Washington , DC 20007 Phone: (none) Fax: (none) Email: norton@eurasiagroup.net _____________________________________________________ Christina Norwich Embedded Analyst Palantir Technologies 1660 International Drive 8th Floor McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. E. Novak TITLE TBD Novak Biddle 1313 Aintree Road Baltimore , MD 21286 Phone: (none) Fax: (none) Email: roger@novakbiddle.com _____________________________________________________ Jay Nussbaum COO Agilex Jay Nussbaum 5155 Parkstone Drive Chantilly , VA 20151 Phone: (none) Fax: (703) 483-4900 Email: jay.nussbaum@agilex.com _____________________________________________________ Ms. M-J OBOROCEANU MSLS, MA INFORMATION RESEARCH SPECIALIST CONGRESSIONAL RESEARCH SERVICE 5112 MACARTHUR BLVD NW #309 WASHINGTON , DC 20016 Phone: (none) Fax: (none) Email: MOBOROCEANU@CRS.LOC.GOV _____________________________________________________ Mr. John Odegaard 17788 Brookwood Way Purcellville , VA 20132-9027 Phone: (none) Fax: (none) Email: jodegaard_1@radiantblue.com _____________________________________________________ David Odgers 4430 Po Valley Rd Ft Drum , NY 13602 Phone: (none) Fax: (none) _____________________________________________________ OGHENETEJIRI ODIETE 118 akpakpava street, benin city EDO STATE NIGERIA BENIN CITY P.O. BOX 6654 Nigeria Phone: (none) Fax: (none) Email: odietetejiri@yahoo.com _____________________________________________________ Dr. Anthony Oettinger 33 Oxford St.,125 Maxwell Dworki Cambridge , MA 2138 Phone: (none) Fax: (none) Email: anthony.oettinger@verizon.net _____________________________________________________ Andy Ogielski President Renesys 1750 Elm Street Suite 101 Manchester , NH 3104 Phone: (none) Fax: (none) Email: ato@renesys.com _____________________________________________________ Andy T Ogielski President Renesys 1750 Elm Street Suite 101 Manchester , NH 3104 Phone: (none) Fax: (none) Email: ato@renesys.com _____________________________________________________ Jacob S Olcott Subcommittee Director and Counse Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jacob.olcott@mail.house.gov _____________________________________________________ Mr Stephen Olechnowicz Ops Researcher IDA ITSD 8450 Mark Center Drive Alexandria , VA 22311 Phone: (none) Fax: (none) Email: stevessurf@yahoo.com _____________________________________________________ Alexander Olesker Research Associate Crucial Point LLC 3525 S St. NW Washington , DC 20007 Phone: (none) Fax: (none) Email: aolesker@crucialpointllc.com _____________________________________________________ Mr. Peter Oleson 4846 Riverside Drive Galesville , MD 20765 Phone: (none) Fax: (none) Email: psa@comcast.net _____________________________________________________ Mr Peter Oleson P.O. Box 383 Galesville , MD 20765 Phone: (none) Fax: (none) Email: peter.c.oleson@gmail.com _____________________________________________________ Ms. Deborah Oliver 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: deborah.g.oliver@lmco.com _____________________________________________________ Ryan E Olivett 5325 Westbard Ave #620 Bethesda , MD 20816 Phone: (none) Fax: (none) Email: ro9730a@student.american.edu _____________________________________________________ Mr. David Olsen Manager, Ground Operations East The Boeing Company 7700 Boston Boulevard Springfield , VA 22153 Phone: (none) Fax: (none) Email: david.m.olsen@boeing.com _____________________________________________________ Sparky Olsen Boeing IS Director Mission Operations 7700 Boston Blvd. Springfield, VA , VA 22153 Phone: (none) Fax: (703) 270-6893 Email: sparky.olsen@boeing.com _____________________________________________________ James M Olson George Bus TITLE TBD Texas A&M TX 77843-4220 , -979 jolson@bushsc Phone: (none) Fax: (none) Email: jolson@bushschool.tamu.edu _____________________________________________________ Paul Oostberg Sanz Counsel Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: paul.oostbergsanz@mail.house.gov _____________________________________________________ Falken Robert Ord CEO Falken Industries, LLC 9510 technology drive Manassas , VA 20110 Phone: (none) Fax: (571) 292-1860 Email: rord@falken.us _____________________________________________________ Dr. Henry Orejuela CEO Space and Defense Systems, Inc. 10700 Parkridge Boulevard Suite 410 Reston , VA 20191 Phone: (none) Fax: (none) Email: horejuela@sdsi.net _____________________________________________________ Henry Orejuela TITLE TBD Space and Defense Systems, Inc. 10700 Parkridge Boulevard Suite 410 Reston , VA 20191 Phone: (none) Fax: (none) Email: horejuela@sdsi.net _____________________________________________________ Mr. Fran J Orlosky TITLE TBD NSA 9800 Savage Road B, Suite 6533 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: fjorlos@nsa.gov _____________________________________________________ Aurora E Ortega 6597 Quiet Hours Apt 201 Columbia , MD 21045 Phone: (none) Fax: (none) Email: aeortega@hotmail.com _____________________________________________________ Mr. Neil Orth Sp.Cmd. & DoDIIS Com. Western Re Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: neil.orth@hp.com _____________________________________________________ Ryan Orth TITLE TBD General Dynamics AIS 2305 Mission College Boulevard Santa Clara , CA 95054 Phone: (none) Fax: (none) _____________________________________________________ Mr. Francisco Ortiz Urb. Bonneville Gardens, Calle # Caguas , 0 725 Phone: (none) Fax: (none) Email: FVPR@PRTC.net _____________________________________________________ Ms. Stefanie R Osburn Chief of Staff PIAB No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Stefanie_R._Osburn@pfiab.eop.gov _____________________________________________________ Mr John L Osterholz BA, MS VP BAE Systems 11487 Sunset Hills Rd Reston , VA 20190 Phone: (none) Fax: (none) Email: john.osterholz@baesystems.com _____________________________________________________ Mr. John A Oswald Director, Analysis and Productio NGA MS: L-05, 3838 Vogel Road Arnold , MO 63010-6238 Phone: (none) Fax: (none) Email: John.A.Oswald@nga.mil _____________________________________________________ Mr. Stephen S Oswald Vice President/General Manager The Boeing Company Stephen Oswald 1215 South Clark Street Suite 500 Arlington , VA 22202 Phone: (none) Fax: (703) 414-6442 Email: stephen.s.oswald@boeing.com _____________________________________________________ Mr. Stephen S Oswald Chief Operating Officer The Boeing Company Steve Oswald 1215 South Clark Street Suite 500 Arlington , VA 22202 Phone: (none) Fax: (703) 414-6442 Email: stephen.s.oswald@boeing.com _____________________________________________________ Maria Otero Under Secretary Democracy & Glob State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: OteroM@state.gov _____________________________________________________ Roger Oussoren Director GDIT 13857 McLearen Rd Herndon , VA 20171 Phone: (none) Fax: (none) Email: roger.oussoren@gdit.com _____________________________________________________ Roger Oussoren Director GDIT 13857 McLearen Rd Herndon , VA 20171 Phone: (none) Fax: (none) Email: roger.oussoren@gdit.com _____________________________________________________ Mr. Grover Outland Senior VP and General Counsel TECH USA, Inc 8334 Veterans Highway 2nd Floor Millersville , MD 21108 Phone: (none) Fax: (none) Email: outland@techusa.net _____________________________________________________ Grover C Outland TITLE TBD TECH USA, Inc 8334 Veterans Highway 2nd Floor Millersville , MD 21108 Phone: (none) Fax: (none) Email: outland@techusa.net _____________________________________________________ Mrs. Doris Over Chief of Protocol NSA 9800 Savage Road DC6P, Suite 6258 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: dcover@nsa.gov _____________________________________________________ Mr. Ray Owen Vice President, Strategy & Busin General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Ray.owen@gd-ais.com _____________________________________________________ Mr. James Owens Director, Military Services Ops BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: james.d.owens@bluelink.net _____________________________________________________ Judith Oxman Vice Acquisition Executive DIA Judith Oxman DIA-AE 200 MacDill Boulevard Washington , DC 20340 Phone: (410) 956-3080 Fax: (703) 907-2807 Email: judith.oxman@dia.mil _____________________________________________________ Judith R Oxman Vice Acquisition Executive DIA DIA-AE 200 MacDill Boulevard Washington , DC 20340 Phone: (none) Fax: (703) 907-2807 Email: judith.oxman@dia.mil _____________________________________________________ Mike Ozatalar BS, MS VP - Program Manager Parsons 100 M Street SE Washington , DC 20003 Phone: (none) Fax: (none) Email: michael.ozatalar@parsons.com _____________________________________________________ Mr. Fatih Ozman President & CEO Sierra Nevada Corporation 444 Salomon Circle Sparks , NV 89434 Phone: (none) Fax: (none) Email: vickie.breunig@sncorp.com _____________________________________________________ Bill Parker COO Salient Federal Solutions 4000 Legato Road Suite 600 Fairfax , VA 22033 Phone: (none) Fax: (none) Email: bill.parker@salientfed.com _____________________________________________________ Bill Parker COO Salient Federal Solutions 4000 Legato Road Fairfax , VA 22033 Phone: (none) Fax: (none) Email: bill.parker@salientfed.com _____________________________________________________ John Parker TITLE TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ John P Parker 3365 Lakeside View Dr Falls Church , VA 22041 Phone: (none) Fax: (none) Email: johnpaulparker@gmail.com _____________________________________________________ John Paul Parker Chief of Acquisition, ONDI CIO B ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: johnpaulparker@gmail.com _____________________________________________________ Kevin Parker President and CEO Deltek 13880 Dulles Corner Lane Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ Lauren Parker B.A. HR Specialist (Intern) Department of Navy HRSC East Norfolk Naval Shipyard Portsmouth , VA 23709 Phone: (none) Fax: (none) Email: lauren.parker@navy.mil _____________________________________________________ Richard Parker LLNL, 700 eEast Avenue mail stop L 449 Livermore , CA 94550 Phone: (none) Fax: (none) Email: parker27@llnl.gov _____________________________________________________ Tawanda Parker TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: t_parker@ssci.senate.gov _____________________________________________________ Mr Tim Parker Sr Manager Strategic Development Lockheed Martin IS&GS 700 N Frederick Avenue Gaithersburg , MD 20879 Phone: (none) Fax: (none) Email: tim.parker@lmco.com _____________________________________________________ Tim Parker Strategic Planning Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: tim.parker@lmco.com _____________________________________________________ Deborah Parkinson Cyber Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: deborah_parkinson@hsgac.senate.gov _____________________________________________________ Mr. Jacob Parness 1001 Lamberton Drive Silver Spring , MD 20902 Phone: (none) Fax: (none) Email: jayparness@yahoo.com _____________________________________________________ Joe Parsley VP Strategy and BD QinetiQ North America 315 Bob heath Dr Huntsville , AL 35808 Phone: (none) Fax: (none) _____________________________________________________ Norman Parsons 6403 N 15th st Tampa , FL 33610 Phone: (none) Fax: (none) Email: norman.parsons41@yahoo.com _____________________________________________________ Mr Oliver Parsons President Opti-Tech, LLC 614 Knollwood Road Severna Park , MD 21146 Phone: (none) Fax: (410) 982-6817 Email: oparsons@optitechis.com _____________________________________________________ Mr. Joseph Paska 1595 Spring Hill Road Suite 250 Vienna , VA 22182 Phone: (none) Fax: (none) Email: paska@ebrinc.com _____________________________________________________ Neelam D Patel TITLE TBD QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: Neelam.patel@Qinetiq-NA.com _____________________________________________________ Sangita Patel TITLE TBD Composite Software Inc. 11921 Freedom Drive Suite 550 Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Jennifer Paterson 8201 Greensboro Dr Ste 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: jennifer.paterson@baesystems.com _____________________________________________________ Rachel Patricca 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: rachel.patricca@oracle.com _____________________________________________________ Rachel Patricca 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: rachel.patricca@oracle.com _____________________________________________________ Mr. Michael Patrick APG Account Manager Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: michael.patrick@hp.com _____________________________________________________ Mr. Leonard Patterson 12504 Plantation Drive Brandywine , MD 20613 Phone: (none) Fax: (none) Email: lepatt@hughes.net _____________________________________________________ Mr. Tom Patterson 1710 Apollo Ct. Seal Beach , CA 90740 Phone: (none) Fax: (none) _____________________________________________________ Mr. Robert Pattishall Sector Vice President and Genera Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: bob.pattishall@ngc.com _____________________________________________________ Christopher Paul Strat Forces Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: christopher_paul@armed-services.senate.gov _____________________________________________________ John R Pearce Director, BD- Intel Solutions L-3 STRATIS 11955 Freedom Drive Suite 15049 Reston , VA 20190 Phone: (none) Fax: (703) 234-1078 Email: john.pearce@l-3com.com _____________________________________________________ Adam R Pearlman J.D. Associate Deputy General Counsel United States Department of Defense 1600 Defense Pentagon Room 3B688 Washington , DC 20301 Phone: (none) Fax: (none) Email: adam.r.pearlman@gmail.com _____________________________________________________ Mr. Curtis Pearson Director, Information Dominance Northrop Grumman 895 Oceanic Dr Annapolis , MD 21404 Phone: (none) Fax: (410) 981-4918 Email: curtis.pearson@ngc.com _____________________________________________________ Mr. Kendell Pease TITLE TBD General Dynamics Corporation 2941 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: kpease@gd.com _____________________________________________________ Mr. Bob Pecha Vice President CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: rpecha@caci.com _____________________________________________________ Mr. Robert Pecha TITLE TBD DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Robert.Pecha@dia.mil _____________________________________________________ Mr. Gardner G Peckham Managing Director Prime Policy Group 1110 Vermont Avenue, NW Suite 1000 Washington , DC 20005 Phone: (none) Fax: (202) 530-4600 Email: gardner.peckham@prime-policy.com _____________________________________________________ Mr. George Pedersen CEO ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) Email: george.pedersen@mantech.com _____________________________________________________ Mr Daniel H Pedowitz Business Unit Executive IBM 6710 Rockledge Drive Bethesda , MD 20878 Phone: (none) Fax: (none) Email: pedowitz@us.ibm.com _____________________________________________________ James Peery TITLE TBD Sandia National Laboratories P.O. Box 5800 Albuquerque , NM 87185 Phone: (none) Fax: (none) _____________________________________________________ Ammon Peffley Account Manager Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) _____________________________________________________ Mr. George Peirce General Council DIA Building 6000 Washington , DC 20340-5100 Phone: (none) Fax: (none) Email: George.Peirce@dia.mil _____________________________________________________ David Pekoske Group President, Global Security A-T Solutions, Inc. 1934 Old Gallows Road Suite 360 Vienna , VA 22182 Phone: (none) Fax: (703) 288-3401 _____________________________________________________ David Pekoske MPA, MBA 1934 Old Gallows Road Suite 360 Vienna , VA 22182 Phone: (none) Fax: (703) 288-3401 Email: davidpekoske@a-tsolutions.com _____________________________________________________ David Pekoske Group President, Global Security A-T Solutions 1934 Old Gallows Road Vienna , VA 22182 Phone: (none) Fax: (none) Email: davidpekoske@alum.mit.edu _____________________________________________________ Nancy Pelosi Speaker of the House Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (202) 225-4188 Email: scheduler.pelosi@mail.house.gov _____________________________________________________ Mr Mark D Pendleton MSEE, BSEE Director Northrop Grumman Corporation 1-Space Park Redondo Beach , CA 90278 Phone: (310) 214-2628 Fax: (none) Email: mark.pendleton@ngc.com _____________________________________________________ Kirsten Penn Director Strategic Development NJVC, LLC 8614 Westwood Center Drive Suite 300 Vienna , VA 22182 Phone: (none) Fax: (none) _____________________________________________________ Catherine Pennington Director, NGA Program The MITRE Corporation 7515 Colshire Dr, MS H135 McLean , VA 22102 Phone: (none) Fax: (none) Email: cpenning@mitre.org _____________________________________________________ Greg Pennington Academic Programs Intern United States Geospatial Intelligence Foundation 2325 Dulles Corner Boulevard Herndon , VA 20171 Phone: (none) Fax: (none) Email: greg.pennington@usgif.org _____________________________________________________ Jonathan Peppard TITLE TBD ASI Government 1655 North Fort Meyer Drive Suite 1000 Arlington , VA 22209 Phone: (none) Fax: (none) Email: jpeppard@acqsolinc.com _____________________________________________________ Mr. Richard Pera 200 MacDrill Blvd 5C355 Bolling AFB Washington , DC 20340-5100 Phone: (none) Fax: (none) Email: Richard.Pera@dia.mil _____________________________________________________ Mr. Richard J Pera 3114 Rittenhouse St. NW Washington , DC 20015 Phone: (none) Fax: (none) Email: pera@mindspring.com _____________________________________________________ David Percelay MBA Executive Director AIRescue David Percelay PO Box 8067 Van Nuys , CA 91409 Phone: (none) Fax: (none) Email: dpercelay@post.harvard.edu _____________________________________________________ John Pereira Director for Support CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: christyt@ucia.gov _____________________________________________________ Michael Perelman P.O. Box 56555 Philadelphia , PA 19111 Phone: (none) Fax: (none) _____________________________________________________ Mr. John Perkins 14660 Rothgeb Dr. Ste 102 Rockville , MD 21014 Phone: (none) Fax: (none) _____________________________________________________ Kevin L Perkins Criminal Investigative Division FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kevin.perkins@ic.fbi.gov _____________________________________________________ Mr. Eric Perlstein Director - IT Services Applied Integrated Technologies, Inc. 6305 Ivy Lane Suite 520 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: eric.perlstein@ait-i.com _____________________________________________________ Mr. Douglas Perritt 103 Stonestep Court Millersville , MD 21108 Phone: (none) Fax: (none) Email: dougperritt@aol.com _____________________________________________________ Mr. Joe Perry Senior Financial Manager NGA 4600 Sangamore Road Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: joseph.perry@nga.mil _____________________________________________________ William Perry Required unless Parent Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Dr. Lenora Peters Gant Deputy ADNI CHCO ODNI 1000 Colonial Farm Rd. Gate 5 McLean , VA 22101 Phone: (none) Fax: (703) 275-1297 Email: Kyles2@dni.gov _____________________________________________________ Mr. David Peters PO Box 100581 Arlington , VA 22210 Phone: (none) Fax: (none) Email: dp1811us@cox.net _____________________________________________________ Mr. Jack Peters Director CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: jpeters@caci.com _____________________________________________________ Mr. Thomas Peters TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: tjpeter@nsa.gov _____________________________________________________ Mr. Martin Petersen 7102 Westmoreland Drive Warrenton , VA 20187 Phone: (none) Fax: (none) Email: martin.c.petersen@saic.com _____________________________________________________ J. M. Peterson 5251-18 John Tyler Highway #323 Williamsburg , VA 23185 Phone: (none) Fax: (none) Email: jmpeterson@policeone.com _____________________________________________________ John M Peterson III Consultant CTSERF 5251-18 John Tyler Highway #323 Williamsburg , VA 23185 Phone: (none) Fax: (none) Email: jmpeterson@iacsp.com _____________________________________________________ Mr John M Peterson III Consultant CTSERF 1490 Quarterpath Road Suite 5A, #323 Williamsburg , VA 23185 Phone: (none) Fax: (none) Email: jmpeterson@iacsp.com _____________________________________________________ Max Peterson Area Vice President - Federal Dell Inc. One Dell Way One Dell Way Round Rock , TX 78682 Phone: (none) Fax: (none) Email: max_peterson@dell.com _____________________________________________________ Ms. Doris E Petitti 1804 Greer Court Gambrills , MD 21054 Phone: (none) Fax: (none) Email: petittid@aol.com _____________________________________________________ Suzanne Petrie-Liscouski TITLE TBD TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) Email: suzanne.petrie@tasc.com _____________________________________________________ Pete Petrihos Vice President The Cohen Group 500 8th Street, NW Suite 200 Washington , DC 20004 Phone: (none) Fax: (none) _____________________________________________________ Mr. Benjamin V Petrone 5650 Assateague Place Manassas , VA 20112 Phone: (none) Fax: (none) Email: BenPetrone@Gmail.com _____________________________________________________ Linda Petrone 9015 Admiral Vernon Terrace Alexandria , VA 22309 Phone: (none) Fax: (none) Email: linda.petrone@osd.mil _____________________________________________________ Walter Petruska 1510 Eddy Street PH 1A San Francisco , CA 94115 Phone: (none) Fax: (none) Email: wpetruska@usfca.edu _____________________________________________________ Michael Pevzner TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: m_pevzner@ssci.senate.gov _____________________________________________________ MG Cloyd Pfister USA (Ret) 4653 Kirkpatrick Lane Alexandria , VA 22311 Phone: (none) Fax: (none) Email: chpfister@comcast.net _____________________________________________________ Ms. Katherine H Pherson CEO Pherson Associates, LLC 9902 Deerfield Pond Drive Great Falls , VA 22066 Phone: (none) Fax: (none) Email: kpherson@pherson.org _____________________________________________________ Katherinr H Pherson TITLE TBD Pherson Associates, LLC 9902 Deerfield Pond Drive Great Falls , VA 22066 Phone: (none) Fax: (none) Email: kpherson@pherson.org _____________________________________________________ Mr. Randolph H Pherson TITLE TBD Pherson Associates, LLC 9902 Deerfield Pond Drive Great Falls , VA 22066 Phone: (none) Fax: (none) Email: rpherson@pherson.org _____________________________________________________ John Philbin 10455 White Granite Drive Suite 400 Oakton , VA 22124 Phone: (none) Fax: (none) Email: john.philbin@gdit.com _____________________________________________________ Betsy Philips S&I Professional Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: betsy.philips@mail.house.gov _____________________________________________________ Mrs. Elizabeth Phillips Executive Vice President McBee Strategic Consulting, LLC 455 Massachusetts Ave., NW 12th Floor Washington , DC 20001 Phone: (none) Fax: (none) Email: bphillips@mcbeestrategic.com _____________________________________________________ Elizabeth Phillips Executive Vice President McBee Strategic Consulting, LLC 455 Massachusetts Ave., NW 12th Floor Washington , DC 20001 Phone: (none) Fax: (none) Email: bphillips@mcbeestrategic.com _____________________________________________________ Elizabeth Phillips Executive Vice President McBee Strategic Consulting, LLC 455 Massachusetts Ave., NW Suite 1200 Washington , DC 20001 Phone: (none) Fax: (none) Email: bphillips@mcbeestrategic.com _____________________________________________________ Ms. Elizabeth A Phillips Executive Vice President McBee Strategic Consulting E. Phillips 601 Pennyslvania Ave., NW Suite 800 - North Building Washington , DC 20004 Phone: (none) Fax: (none) Email: bphillips@mcbeestrategic.com _____________________________________________________ Ms. Elizabeth A Phillips 6312 Seven Corners Center, #203 Falls Church , VA 22044 Phone: (none) Fax: (none) Email: bphillips@mcbeestrategic.com _____________________________________________________ Jeanette Phillips Planning Manager Texas Office of Homeland Security-SAA 5805 N Lamar Blvd Austin , TX 78759 Phone: (512) 334-9259 Fax: (none) Email: jeanette.phillips@txdps.state.tx.us _____________________________________________________ Mr. Jack Picard Director CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: jpicard@caci.com _____________________________________________________ Mr. James C Picard BA History VP Operations CACI Jim Picard 4224 Avon Drive Dumfries , VA 22025 Phone: (703) 400-8342 Fax: (none) Email: jpicard@caci.com _____________________________________________________ Mr. Michael Pick Chief, Deputy Enterprise Managem DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Michael.Pick@dia.mil _____________________________________________________ Mr. Matt Pickett 8618 Westwood Center Drive #315 Vienna , VA 22182 Phone: (none) Fax: (none) Email: mpickett@sgis.com _____________________________________________________ Jessica Pierce 12000 Market Street Unit 484 Reston , VA 20190 Phone: (none) Fax: (none) Email: nieman_jessica@bah.com _____________________________________________________ Dr. michael pillsbury 3017 O St NW washington , DC 20007 Phone: (none) Fax: (none) _____________________________________________________ Ms. Betsy Pimentel Vice President, Defense Programs Stellar Solutions, Inc. 250 Cambridge Avenue Suite 204 Palo Alto , CA 94306 Phone: (none) Fax: (none) Email: bpimentel@stellarsolutions.com _____________________________________________________ William Pinard 11108 Cavalier Ct Apt 5F Fairfax , VA 22030 Phone: (none) Fax: (none) Email: wpinard@gmu.edu _____________________________________________________ Mr. Natalio C Pincever TITLE TBD McAfee, Inc. 12010 Sunset Hills Road 5th Floor Reston , VA 20190 Phone: (none) Fax: (none) Email: Natalio_Pincever@McAfee.com _____________________________________________________ Mr. John Pineda 7906 Hadley Court Severn , MD 21144 Phone: (none) Fax: (none) Email: pineda_john@hotmail.com _____________________________________________________ Jason Pinegar Intelligence Analyst FBI 935 Pennsylvania Ave. Washington , DC 20535 Phone: (none) Fax: (none) Email: jason.pinegar@ic.fbi.gov _____________________________________________________ Mr. Anthony D Pinson 119 Wolfe Street Alexandria , VA 22314 Phone: (none) Fax: (none) Email: pinsonad@gmail.com _____________________________________________________ Dr. Victor Piotrowski National Science Foundation 4201 Wilson Blvd Suite 835 Arlington , VA 22230 Phone: (none) Fax: (none) Email: vpiotrow@nsf.gov _____________________________________________________ Al Pisani VP, Intelligence Operations TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) Email: albert.pisani@tasc.com _____________________________________________________ Mr. Scott Pischinger Sales Manager Dell Inc. One Dell Way One Dell Way Round Rock , TX 78682 Phone: (none) Fax: (none) Email: scott_pischinger@dell.com _____________________________________________________ Mr. Richard A Piske lll vp & managing director Manpower Public Sector 143 Spa Drive Annapolis , MD 21403 Phone: (410) 267-9067 Fax: (703) 516-9269 Email: richard.piske@na.manpower.com _____________________________________________________ Mr. Richard Piske 6305 Ivy Lane Suite 100 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: richard_piske@kellyservices.com _____________________________________________________ John Pistole Deputy Director FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.pistole@ic.fbi.gov _____________________________________________________ Mr. Paul Pittelli TITLE TBD NSA 9800 Savage Road R2, Suite 6529 Fort George G. Meade , MD 20755 Phone: (none) Fax: (301) 688-0255 Email: papitte@nsa.gov _____________________________________________________ Hannah Pitts Consultant Delta Risk LLC 2804 N. Seminary Chicago , IL 60657 Phone: (none) Fax: (none) Email: hpitts@delta-risk.net _____________________________________________________ Jim Pitts President, NGES Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Anthony P Placido Director of Intelligence Justice Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: anthony.p.placido@usdoj.gov _____________________________________________________ Michele Platt Senior Vice President, Division CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: mplatt@caci.com _____________________________________________________ Dr. Stephanie Platz-Vieno TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: stephanie.platzvieno@nro.mil _____________________________________________________ RADM James Plehal USN(Ret.) Senior Advisor, NPPD DHS Nebraska Avenue Center Washington , D.C. 20528 Phone: (none) Fax: (none) Email: james.plehal@dhs.gov _____________________________________________________ Mark Plozay TITLE TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ John Plummer Business Development Kelly Government Solutions 8403 Colesville Road Silver Spring , MD 20910 Phone: (none) Fax: (none) Email: plummjc@kellyservices.com _____________________________________________________ Ms. Debora A Plunkett Deputy Director, Information Ass NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: daplunk@nsa.gov _____________________________________________________ Mike Plymack SVP Strategic Programs Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Mr. Ronald Podmilsak President & CEO The Podmilsak Group One Fountain Square, 11911 Freed Suite 710 Reston , VA 20190 Phone: (none) Fax: (none) Email: podmilsakgroup@cox.net _____________________________________________________ Ronald Podmilsak TITLE TBD The Podmilsak Group One Fountain Square, 11911 Freed Suite 710 Reston , VA 20190 Phone: (none) Fax: (none) Email: podmilsakgroup@cox.net _____________________________________________________ Mr. Larry Poe 11325 Ethan Court Issue , MD 20645 Phone: (none) Fax: (none) _____________________________________________________ Christopher Poirier Emergency Management Deputy Prog Department of the Treasury 6517 Coachleigh Way Alexandria , VA 22315 Phone: (none) Fax: (none) Email: christopher.poirier@do.treas.gov _____________________________________________________ Mark Polansky CI Special Agent DIA Box 323 West River , MD 20778 Phone: (none) Fax: (none) Email: paladinhill@hotmail.com _____________________________________________________ Dr Len Polizzotto PhD Vice President Draper Laboratory 555 Technology Sq Cambridge , MA 02139 Phone: (none) Fax: (617) 258-2626 Email: lpolizzotto@draper.com _____________________________________________________ Dr Len Polizzotto 555 Tech Sq Cambridge , MA 02139 Phone: (none) Fax: (617) 258-2626 Email: lpolizzotto@draper.com _____________________________________________________ Matt Pollard TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: m_pollard@ssci.senate.gov _____________________________________________________ Michael Polmar TSG-Snr. VP ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) _____________________________________________________ Mariam Al-Botani Intern Mission Concepts 902A Prince St Alexandria , VA 22314 Phone: (703) 822-0191 Fax: (571) 970-4593 Email: malbotani@yahoo.com _____________________________________________________ Mr Ali D Alami 2007 Nordlie Pl Falls Church , VA 22043 Phone: (none) Fax: (none) Email: there4u06@gmail.com _____________________________________________________ Steven Albers 19904 Collingdale Place Gaithersburg , MD 20886 Phone: (none) Fax: (none) Email: steven.albers@unisys.com _____________________________________________________ Chris Albert Federal Intelligence Sales Esri Bill Harp - Industry Solutions 380 New York St Redlands , CA 92373 Phone: (none) Fax: (909) 307-3039 _____________________________________________________ Rebecca Albert Program Manager BAE Systems 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: rebecca.albert@baesystems.com _____________________________________________________ Ms. Catherine Albright Sales Director TRSS, LLC 1410 Spring Hill Rd Suite 140 McLean , VA 22102 Phone: (none) Fax: (none) Email: catherine.albright@trssllc.com _____________________________________________________ Ms. Lisa Albuquerque TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: onrdogpm@gmail.com _____________________________________________________ Barbara Alexander Dir. Cyber, Infrastructure & Sci DHS 4801 Nebraska Ave, NW Washington , DC 20528 Phone: (none) Fax: (none) _____________________________________________________ LTG Keith B Alexander USA Director NSA 9800 Savage Road Suite 6242 Fort George G. Meade , MD 20755-6242 Phone: (none) Fax: (301) 688-7741 Email: kbalex2@nsa.gov _____________________________________________________ Mike Alexander Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: michael_alexander@HSGAC.senate.gov _____________________________________________________ Sarita Alexander Administration Deloitte Consulting, LLP 1919 N. Lynn Street Rosslyn , VA 22209 Phone: (none) Fax: (none) Email: saalexander@deloitte.com _____________________________________________________ Dr. Yonah Alexander TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: YAlexander@potomacinstitute.org _____________________________________________________ Ms. Karen Alexandre 47248 Middle Bluff Place Sterling , VA 20165 Phone: (none) Fax: (none) Email: karen.alexandre@gmail.com _____________________________________________________ Sondra D Alexis Chemistry Chief, Customer Assurance Department of Homeland Security S. Alexis 245 Murray Lane Bldg 19, G-001-22 Washington, DC , DC 20578 Phone: (none) Fax: (none) Email: sondra.alexis@hq.dhs.gov _____________________________________________________ Jeffrey Allan Political Affairs Officer United Nations 32950 Amicus Pl. Apt 314 Abbotsford , British Columbia V2S6G9 Canada Phone: (none) Fax: (none) Email: jfausa@live.com _____________________________________________________ Charlie Allen INSA Senior Intelligence Advisor Chertoff Group 1110 Vermont Avenue NW Suite 1200 Washington , DC 20005 Phone: (none) Fax: (none) _____________________________________________________ Dan Allen Chief Operating Officer CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) _____________________________________________________ Mr. Edward Allen 12125 Club Commons Drive Glen Allen , VA 23059-7029 Phone: (none) Fax: (none) Email: EdwardLAllen@earthlink.net _____________________________________________________ Jim Allen TITLE TBD Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ John Allen CEO/Founder BlueStone Capital Partners 1600 Tysons Boulevard 8th Floor McLean , VA 22102 Phone: (none) Fax: (703) 852-4496 _____________________________________________________ Mr. Mike Allen Vice President, Intel Analysis Camber Corporation 5860 Trinity Parkway Suite 400 Centerville , VA 20120 Phone: (none) Fax: (none) Email: mallen@i2spros.com _____________________________________________________ Ms. Phoebe Allen 1120C Benfield Blvd Millersville , MD 21108 Phone: (none) Fax: (none) Email: pallen@camber.com _____________________________________________________ VADM Thad Allen USCG Commandant DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: thad.allen@dhs.gov _____________________________________________________ Ms. Victoria Allen 501 E. 38th Street HP 539 Erie , PA 16546 Phone: (none) Fax: (none) Email: vallen05@mercyhurst.edu _____________________________________________________ Christopher Alligood MBA Program Director LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) Email: calligood@lmi.org _____________________________________________________ Michael Abadie Vice President Info Systems ITT 141 National Business Pky Suite 200 Annapolis Junction , MD 21032 Phone: (none) Fax: (none) Email: michael.abadie@itt.com _____________________________________________________ Mike Abadie TITLE TBD ITT 12975 Worldgate Dr. Building M1 Herdon , VA 20170 Phone: (none) Fax: (none) _____________________________________________________ Mr. Mark Abel 1651 Old Meadow Road McLean , VA 22102 Phone: (none) Fax: (none) Email: Mark.Abel@wyle.com _____________________________________________________ Mr. Mark Abel VP of Business Development Wyle Information Systems 1600 Intenational Dr Suite 800 McLean , VA 22102 Phone: (none) Fax: (none) Email: mark.abel@wyle.com _____________________________________________________ Mr. Abe M Abraham 3832 Longmeadow way Fort Worth , TX SW13 OJP Phone: (none) Fax: (none) Email: abecaptn@aol.com _____________________________________________________ Mr. James Abramson 13038 Maple View Lane Fairfax , VA 22033 Phone: (none) Fax: (none) Email: abramsonj@saic.com _____________________________________________________ Mr. Daniel Abreu Analyst SRA International 13508 Fallen Oak Court Chantilly , VA 20151 Phone: (none) Fax: (none) Email: daniel_abreu@sra.com _____________________________________________________ Nikolas Acheson IC Business Development Manager SAIC Nikolas Acheson 6841 Benjamin Franklin Dr. Mail Stop F1-3-N3 Columbia , MD 21046 Phone: (none) Fax: (443) 367-7921 Email: nikolas.s.acheson@saic.com _____________________________________________________ Veronica Acker Program Manager BAE Systems 5808 Atteentee Rd McLean , VA 22102 Phone: (none) Fax: (none) Email: veronica.acker@baesystems.com _____________________________________________________ Russell Adamchak 1421 Jefferson Davis Highway Suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) Email: Russell.Adamchak@gd-ais.com _____________________________________________________ Colin Adams Federal Planner DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Colin.Adams@hq.dhs.gov _____________________________________________________ Mr. Dennis Adams TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: dennis.adams@nro.mil _____________________________________________________ Michael Adams Account Manager Carahsoft Technology Corp 12369 Sunrise Valley Dr Suite D2 Reston , VA 20191 Phone: (none) Fax: (none) Email: andrea.terrazas@carahsoft.com _____________________________________________________ Mr. Lou Addeo TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) _____________________________________________________ Mr. Gary Adkins VP, National & Federal Security GeoEye 21700 Atlantic Boulevard Dulles , VA 20166 Phone: (none) Fax: (none) Email: adkins.gary@geoeye.com _____________________________________________________ Mr. Harvey Adler 6633 Thurlton Drive Alexandria , VA 22315 Phone: (none) Fax: (none) Email: eagle724@cox.net _____________________________________________________ Mr. Jorge Aguila Diagonal 621 barcelona , AL 8028 Phone: (none) Fax: (none) _____________________________________________________ Mr. jorge aguila Av. Diagonal, 621-629 Barcelona 08028 Spain Phone: (none) Fax: (none) Email: jorge.aguila@lacaixa.es _____________________________________________________ David Aguilar Acting Deputy Commissioner DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: david.aguilar@dhs.gov _____________________________________________________ Mr. Peter Ahearn 806 Polo Place Great Falls , VA 22066 Phone: (none) Fax: (none) Email: peterja0@dni.gov _____________________________________________________ Commissioner Jayson P Ahern Retired DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jayson.ahern@dhs.gov _____________________________________________________ Brandon Ahrens Senior Manager Accenture 11951 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) Email: brandon.k.ahrens@accenture.com _____________________________________________________ Nick Aievoli 7900 Westpark drive Mclean , VA 22102 Phone: (none) Fax: (none) Email: naievoli@gcsinfo.com _____________________________________________________ Mr. Mark Aitken communications manager Finmeccanica Angelica Falchi 1625 I Street, NW 12th Floor Washington , DC 20006 Phone: (none) Fax: (none) Email: mark.aitken@finmeccanica.com _____________________________________________________ Scott Aken VP, Cyber Operations Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: scott.aken@saic.com _____________________________________________________ Mrs. Carol Ann Babcock TITLE TBD IEEE 12459 Wendell Holmes Road Herndon , VA 20171 Phone: (none) Fax: (none) Email: cabeta@ieee.org _____________________________________________________ Dr. James Babcock 12459 Wendell Holmes Road Herndon , VA 20171 Phone: (none) Fax: (none) Email: jhbeta@ieee.org _____________________________________________________ Matthew Babin TITLE TBD Palantir Technologies 1660 International Drive 8th Floor McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Ms. Carrie L Bachner President, CEO Mission Concepts 220 20th Street South Suite 209 Arlington , VA 22202 Phone: (none) Fax: (none) Email: carrie_bachner@missionconcepts.com _____________________________________________________ David Baciocco VP Corporate Business Developmen Applied Signal Technology 460 West California Avenue Sunnyvale , CA 94086 Phone: (none) Fax: (none) Email: dave_baciocco@appsig.com _____________________________________________________ Mr. Thomas Badoud 15520 Horseshoe Lane Woodbridge , VA 22191 Phone: (none) Fax: (none) Email: tbadoud@theanalysiscorp.com _____________________________________________________ Mr. Craig Baer Director of Intelligence Program TECH USA, Inc 8334 Veterans Highway 2nd Floor Millersville , MD 21108 Phone: (none) Fax: (none) Email: cbaer@techusa.net _____________________________________________________ Dr. Louis Baer Director, Office of Policy NSA 9800 Savage Road S02L, Suite 6425 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: labaer@nsa.gov _____________________________________________________ Maureen Baginski VP Intelligence Service Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 Email: Maureen.Baginski@serco-na.com _____________________________________________________ Bart Bailey CEO Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: bbailey@3001inc.com _____________________________________________________ Marianne Bailey Director ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Marianne.bailey@ugov.gov _____________________________________________________ Brittany Baird TITLE TBD Proteus Technologies 133 National Business Parkway Suite 150 Annapolis Junction , MD 20701 Phone: (none) Fax: (none) _____________________________________________________ Ms. Magdalena Bajll 524 Redland Blvd. Rockville , MD 20850 Phone: (none) Fax: (none) Email: magdalena.a.bajll@dhs.gov _____________________________________________________ Beverley Baker DEA Atlanta Division/Atlanta HID 763 Juniper St, NE Atlanta , GA 30308 Phone: (none) Fax: (none) Email: Beverly.F.Baker@usdoj.gov _____________________________________________________ Mr. Dean Bakeris 2200 Defense Highway Ste 405 Crofton , MD 21114 Phone: (none) Fax: (none) Email: dbakeris@sfa.com _____________________________________________________ Dean Bakeris VP Program Development Custom Engineering and Designs, Inc. 78 Boonton Avenue Montville , NJ 07045 Phone: (none) Fax: (none) Email: dbakeris@marotta.com _____________________________________________________ Mr. David Balch Director of Sales, NSG Oracle Corporation 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: dave.balch@oracle.com _____________________________________________________ Sherry Baldwin Director, Office of Small Busine DIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Sherry.Baldwin@dia.mil _____________________________________________________ Jim Balentine Abraxas Corp 12801 Worldgate Dr Herndon , VA 20170 Phone: (none) Fax: (none) _____________________________________________________ Christina Balis 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (none) Email: christina.balis@serco-na.com _____________________________________________________ Phil Balisle EVP, Washington Operations DRS Technologies, Inc. 5 Sylvan Way Parsippany , NJ 7054 Phone: (none) Fax: (none) Email: pbalisle@drs.com _____________________________________________________ Katherine Ballard 1744 N Rhodes St #310 Arlington , VA 22201 Phone: (none) Fax: (none) Email: katherineballard1982@hotmail.com _____________________________________________________ Joel Balzer INSA OCI Task Force TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) _____________________________________________________ Gail Bamford TITLE TBD SAS Institute 1530 Wilson Blvd Suite 800 Arlington , VA 22209 Phone: (none) Fax: (none) Email: gail.bamford@sas.com _____________________________________________________ George Bamford Chief, Cyber Thrat Branch DHS Office of Intelligence & Analysis 3801 Nebraska Ave NW Washington , DC 20528 Phone: (none) Fax: (none) Email: gbamford2@yahoo.com _____________________________________________________ Mr. Paul A Cabral TITLE TBD NSA 9800 Savage Road DF, Suite 6229 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: pacabra@nsa.gov _____________________________________________________ Mr. Joseph Cabrera 42701 Rolling Rock Square South Riding , VA 20152 Phone: (none) Fax: (none) Email: jcabrera@harris.com _____________________________________________________ Mr. Paul Cadaret 20622 Shadow Rock Lane Trabulo Canyon , CA 92679 Phone: (none) Fax: (none) Email: psc@usd.com _____________________________________________________ R S Cadogan Vice President, Intelligence and Newberry Group 2510 Old Highway 94 South St. Charles , MO 63303 Phone: (none) Fax: (none) Email: RCadogan@thenewberrygroup.com _____________________________________________________ Gerald Cady Intelligence Analyst DIA 6211 Swords Way Bethesda , MD 20817 Phone: (none) Fax: (none) Email: gerald.cady@dia.mil _____________________________________________________ Mr Less Calahan Master's Director, National Capitol Regio Specrtum Comm Inc. 1401 Wilson Blvd Arlington , VA 22209 Phone: (301) 534-9588 Fax: (571) 312-8156 Email: Lester.Calahan@SPTRM.Com _____________________________________________________ Mr Less Calahan Master's Director, Nat'l Capitol Region Spectrum Comm Inc. 1401 Wilson Blvd Arlington , VA 22209 Phone: (703) 232-1584 Fax: (571) 312-8156 Email: Lester.Calahan@SPTRM.Com _____________________________________________________ Mr. Lester Calahan Director, National Capitol Regio Spectrum 1401 Wilson Blvd Suite 1007 Arlington , VA 22209 Phone: (none) Fax: (757) 224-7501 Email: lester.calahan@Sptrm.com _____________________________________________________ Lester Calahan Masters Director,National Capitol Region Spectrum Comm Inc. 1601 North Kent Street Rosslyn , VA 22209 Phone: (none) Fax: (571) 312-8156 Email: Lester.Calaha@SPTRM.Com _____________________________________________________ Theresa Calbi Sr. Spec. Government Bus. Dev. AT&T Government Solutions 3033 Chain Bridge RD Oakton , VA 22185 Phone: (none) Fax: (none) Email: tc4591@att.com _____________________________________________________ Theresa Calbi Business Manager AT&T Government Solutions-NIS 3033 Chain Bridge Rd. Oakton , VA 22124 Phone: (none) Fax: (none) Email: tcalbi@att.com _____________________________________________________ Mr. Joe Call Senior Advisor to the Assistant DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Joe.Call@uscg.mil _____________________________________________________ Mr. Dan Callahan Principal Consultant Venona Consulting, LLC 8300 Boone Boulevard Vienna , VA 22151 Phone: (none) Fax: (703) 848-4586 Email: lindsay@venonaconsulting.com _____________________________________________________ Lindsay K Callahan Executive Administrator Venona Consulting, LLC Lindsay Callahan 7633 Dunston Street Springfield , VA 22151 Phone: (none) Fax: (none) Email: lindsay@venonaconsulting.com _____________________________________________________ Mr. Albert Calland Executive Vice President CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: bcalland@caci.com _____________________________________________________ Steve Cambone EVP Strategic Development QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: steve.cambone@qinetiq-na.com _____________________________________________________ Mr. Jack Camm Vice President, Foreign Affairs Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: jcamm@csc.com _____________________________________________________ Ms. Danielle Camner Lindholm Vice President for Policy Business Executives for National Security 1717 Pennsylvania Avenue, NW Suite 350 Washington , DC 20037 Phone: (none) Fax: (none) _____________________________________________________ Ann Campbell TITLE TBD Sandia National Laboratories P.O. Box 5800 Albuquerque , NM 87185 Phone: (none) Fax: (none) _____________________________________________________ Chelsey Campbell TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: chelsey.campbell@mail.house.gov _____________________________________________________ Don Campbell TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Don.Campbell@mail.house.gov _____________________________________________________ Lt Gen (Ret) John Campbell EVP Government Programs Iridium Communications Inc John Campbell 1750 Tyson's Blvd Suite 1400 McLean , VA 22102 Phone: (none) Fax: (none) Email: john.campbell@iridium.com _____________________________________________________ Kurt M Campbell East Asian & Pacific Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: campbellkm@state.gov _____________________________________________________ Mr Rob Campbell MBA 9756 Sinclair Keller , TX 76244 Phone: (none) Fax: (none) Email: rob.campbell@verizon.net _____________________________________________________ Robert Campbell 2335 Audrey Manor Ct Waldorf , MD 20603 Phone: (none) Fax: (none) Email: robert.e.campbell@baesystems.com _____________________________________________________ Mr. Joe D'Andrea 76 Wendt Ave #3H Larchmont , NY 10538 Phone: (none) Fax: (none) Email: jadandrea@hotmail.com _____________________________________________________ Michael D'Andrea Vice President SRA International 4300 Fair Lakes Court Fairfax , VA 22033 Phone: (none) Fax: (none) Email: mike_dandrea@sra.com _____________________________________________________ Mr. William D'Arcangelo 21261 Thatcher Terrace #103 Ashburn , VA 20147 Phone: (none) Fax: (none) Email: william.darcangelo@stanleyassociates.com _____________________________________________________ SHASHI DABIR 5200 Leesburg Pk #1232 Falls Church , VA 22041 Phone: (none) Fax: (none) Email: dabirs@gmail.com _____________________________________________________ Mr. Dana Dalton TBD CVG Inc. 709 Canyon Greens Drive Las Vegas , NV 89144-0834 Phone: (none) Fax: (none) Email: danahdalton@gmail.com _____________________________________________________ Dr. Marc Damasha TITLE TBD NSA 9800 Savage Road Suite 6513 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: bmcrumm@nsa.gov _____________________________________________________ Chad DAmore 12466 Ansin Circle Drive POtomac , MD 20854 Phone: (none) Fax: (none) Email: chaddamore@aol.com _____________________________________________________ Richard Danforth President, DRS Defense Solutions DRS Technologies, Inc. 5 Sylvan Way Parsippany , NJ 7054 Phone: (none) Fax: (none) Email: rdanforth@drs-ds.com _____________________________________________________ Michael Daniel Director for Intelligence Progra OMB No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: J._Michael_Daniel@omb.eop.gov _____________________________________________________ Mark Daniels TITLE TBD Intelsat General Corporation 6550 Rock Spring Drive Suite 450 Bethesda , MD 20817 Phone: (none) Fax: (none) _____________________________________________________ Lisa Danzig Special assistant to Secretary D Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Miss Kelly Darmer Academic Researcher University of Dallas Kelly Darmer 1705 East West Highwat Apt 201 Silver Spring , MD 20910 Phone: (none) Fax: (none) Email: KellyDarmer@gmail.com _____________________________________________________ Miss Kelly N Darmer BA, MA Student/Natl Sec & Intel Researc Institute of World Politics Kelly Darmer 1705 E West Hwy #201 Silver Spring , MD 20910 Phone: (none) Fax: (none) Email: KellyDarmer@gmail.com _____________________________________________________ Mr. Brian Darmody 2133 Lee Building College Park , MD 20742-5125 Phone: (none) Fax: (none) Email: bdarmody@umd.edu _____________________________________________________ Mr. Robert Daubenspeck 12100 Sunset Hills Road #4073 Reston , VA 20190 Phone: (none) Fax: (none) Email: daubenspeckr@saic.com _____________________________________________________ Dr. Kenneth Daugherty 3712 Woodland Circle Falls Church , VA 22041 Phone: (none) Fax: (none) _____________________________________________________ Mr. Bill Daumer Director AT&T Government Solutions-NIS 7125 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) Email: daumer@att.com _____________________________________________________ Joanna Davenport Gavel NGA Account Manager Science Applications International Corporation 14668 Lee Road Chantilly , VA 20151 Phone: (none) Fax: (703) 676-1902 Email: davenportgav@saic.com _____________________________________________________ Jennifer David Human Development Directorate NGA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jennifer.david@nga.mil _____________________________________________________ mr john b david associate fraud examiner zeb nigeria limited john bassey david p o box 1112, eket, akwa ibom state, nigeria Eket 2341 Nigeria Phone: +2348035847710 Fax: (none) Email: johnbassey108@gmail.com _____________________________________________________ Michael Davidson Counsel Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: M_Davidson@ssci.senate.gov _____________________________________________________ Heather Davies Lead Associate Booz Allen Hamilton 1615 Murray Canyon Road Suite 140 San Diego , CA 92108 Phone: (none) Fax: (none) Email: davies_heather@bah.com _____________________________________________________ Rebecca Davies Minority Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rebecca_davies@appro.senate.gov _____________________________________________________ Mr. Arthur Davis President SAVA Solutions 6616 Rock Lawn Drive Clifton , VA 20124 Phone: (none) Fax: (none) Email: adavis@savasolutions.com _____________________________________________________ Mr. Brett Davis Account Executive Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: brettd@microsoft.com _____________________________________________________ Kimberly Easterling BBA Senior Associate PricewaterhouseCoopers 1800 Tysons Blvd McLean , VA 22102 Phone: (none) Fax: (none) Email: kimberly.easterling@us.pwc.com _____________________________________________________ Mr. Robert E Eastman Program Management Vice Presiden Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: robert.e.eastman@lmco.com _____________________________________________________ Ms.. Widad Echahly 24 Stoke Street Sumner Christchurch 8081 New Zealand Phone: (none) Fax: (none) Email: wechahly@gmail.com _____________________________________________________ Mr. Reinaldo Echevarria 487 Spring St Herndon , VA 20170 Phone: (none) Fax: (none) Email: echevarria_reinaldo@bah.com _____________________________________________________ Dr. Philip Eckman 104 Old Glory Court Williamsburg , VA 23185 Phone: (none) Fax: (none) Email: philipeckman@earthlink.net _____________________________________________________ Mr. George Economou Major Account Executive Akamai 11111 Sunset Hills Road Ste 250 Reston , VA 20190 Phone: (none) Fax: (none) Email: economou@akamai.com _____________________________________________________ Mr. Regan Edens 1732 Remington Crofton , MD 21114 Phone: (none) Fax: (none) Email: edensr6@gmail.com _____________________________________________________ Scott Eder Mgr, NGES Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Charles Edge TITLE TBD Harding Security 19286 Spotswood Glade Dr. Gordonsville , VA 22942 Phone: (none) Fax: (none) Email: eedge@harding-security.com _____________________________________________________ Mary Edington Senior Consultant Deloitte Consulting 10310 Deer Trail Drive Dunkirk , MD 20754 Phone: (none) Fax: (none) Email: maryedington@comcast.net _____________________________________________________ David Edmonds Vice President, Govt Opns & Stra Syndetics, Inc. 10395 Democracy Lane Suite B Fairfax , VA 22030 Phone: (none) Fax: (none) Email: bedmonds@syndetics-inc.com _____________________________________________________ Kristen Edmondson Wolfe VP Marketing Deltek 13880 Dulles Corner Lane Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ Ms. Lauren B Edris Research Analyst The Potomac Advocates Potomac Advocates 122 C Street, NW, Suite 280 Washington , DC 20001 Phone: (none) Fax: (none) Email: lbe8721@esu.edu _____________________________________________________ Mr. Albert Edwards Director AT&T Government Solutions-NIS 7125 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) Email: burt@att.com _____________________________________________________ John Edwards President, Intel/Defense Sector Agilex Technologies, Inc 5155 Parkstone Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: john.edwards@agilex.com _____________________________________________________ John Edwards President, Intel Agilex John Edwards 5155 Parkstone Drive Chantilly , VA 20151 Phone: (none) Fax: (703) 483-4928 Email: john.edwards@agilex.com _____________________________________________________ Mr. Thomas A Edwards TITLE TBD NSA 9800 Savage Road DP3, Suite 6203 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: taedwar@nsa.gov _____________________________________________________ Michael Edwins Director, BD-Intel Solutions L-3 Communications, Inc. 11955 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Mr Sal Egea MS/BS Mgmt 6626 Hunter Creek Lane Alexandria , VA 22315 Phone: (703) 863-8107 Fax: (none) Email: salvadoe@dni.gov _____________________________________________________ Todd Egeland 3002 Cedar Hill Rd. Falls Church , VA 22042 Phone: (none) Fax: (none) Email: egeland@verizon.net _____________________________________________________ Mr. John Eiden TITLE TBD Westway Development 14325 Willard Road Chantilly , VA 20151 Phone: (none) Fax: (none) Email: jjeiden@westwaydevelopment.com _____________________________________________________ John J Eiden TITLE TBD Westway Development 14325 Willard Road Chantilly , VA 20151 Phone: (none) Fax: (none) Email: jjeiden@westwaydevelopment.com _____________________________________________________ Mr. Eric Eifert TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) _____________________________________________________ Ms. Dawn R Eilenberger Director, Office of Internationa NGA 4600 Sangamore Road Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: dawn.r.eilenberger@nga.mil _____________________________________________________ Rosalinda Elias 10115 Duportail Road Bldg 363 Ft Belvoir , VA 22060 Phone: (none) Fax: (none) Email: rosalinda.elias@us.army.mil _____________________________________________________ Mr. Craig Fabina 5531 Stephen Reid Rd. Huntingtown , MD 20639 Phone: (none) Fax: (none) Email: bob68@comcast.net _____________________________________________________ Mr. Martin Faga 21700 Atlantic Blvd Sterling , VA 20166 Phone: (none) Fax: (none) Email: mfaga@mitre.org _____________________________________________________ Matt Fahle Senior Executive Accenture No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: matthew.r.fahle@accenture.com _____________________________________________________ Matthew Fahle VP, Intelligence Programs Accenture Cara Knox 211 North Broadway Suite 2950 St. Louis , MO 63102 Phone: (none) Fax: (none) Email: matthew.r.fahle@accenture.com _____________________________________________________ Matthew Fahle VP, Intelligence Programs Accenture 11951 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) Email: matthew.r.fahle@accenture.com _____________________________________________________ Matthew Fahle Senior Executive Accenture Cara Knox 211 North Broadway Suite 2950 St. Louis , MO 63102 Phone: (none) Fax: (none) Email: matthew.r.fahle@accenture.com _____________________________________________________ Rick Faint CEO Exceptional Software Strategies Inc 849 International Drive Suite 310 Linthicum , MD 21090 Phone: (none) Fax: (none) _____________________________________________________ Larry Fairchild VP & Sr. Account Executive L-3 Communications 11955 Freedom Dr. Suite 10048 Reston , VA 20190 Phone: (none) Fax: (none) Email: larry.fairchild@l-3com.com _____________________________________________________ Mr. Fred Faithful Equality Executive NGA 4600 Sangamore Road, D-100 Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: fred.faithful@nga.mil _____________________________________________________ Ms. Judy Falanga TITLE TBD NSA 9800 Savage Road Suite 6435 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) _____________________________________________________ Mr. Alexander Falatovich 32 Chrissy Lane Sugarloaf , PA 18249 Phone: (none) Fax: (none) Email: afalat55@mercyhurst.edu _____________________________________________________ Angelica Falchi Dir.- Corporate Communications Finmeccanica Angelica Falchi 1625 I Street, NW 12th Floor Washington , DC 20006 Phone: (none) Fax: (none) Email: angelica.falchi@finmeccanica.com _____________________________________________________ Mary Kay Falise BS Director, IC Red Hat, Inc. 503 Broadwater Road Arnold , MD 21012 Phone: (none) Fax: (none) Email: mkfalise@redhat.com _____________________________________________________ Paul Falkler VP, Strategic Development Direct SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: paul.t.falkler@saic.com _____________________________________________________ Mr. Pack Fancher Vice President KippsDeSanto & Co. 1600 Tysons Boulevard Suite 375 McLean , VA 22102 Phone: (202) 997-6169 Fax: (703) 442-1498 Email: pfancher@kippsdesanto.com _____________________________________________________ Aaron Fansler 100604 Hillview Dr Kennewick , WA 99338 Phone: (none) Fax: (none) Email: aaron.fansler@pnl.gov _____________________________________________________ Ms. Gail Faraon Senior Research Manager PhaseOne 6080 Center Drive Ste 4050 Los Angeles , CA 90045 Phone: (none) Fax: (none) Email: gailchunfaraon@phaseone.net _____________________________________________________ Ms. Cindy M Farkus Economics Managing Director DHS Intelligence and Analysis 1704 Culpepper Ct Severn , MD 21144 Phone: (410) 551-3717 Fax: (none) Email: cmfarku@aol.com _____________________________________________________ Mr. Michael Farley 42798 Pilgrim Square Chantilly , VA 20152 Phone: (none) Fax: (none) Email: mfarley@nova.org _____________________________________________________ Sandra M Farr Senior Consultant LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) Email: farr.michelle@yahoo.com _____________________________________________________ Alycia Farrell TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: alycia_farrell@appro.senate.gov _____________________________________________________ Mr. Jeffrey Farrell 11303 Seneca Circle Great Falls , VA 22066 Phone: (none) Fax: (none) Email: jeff.farrell@gd-ais.com _____________________________________________________ john m farrell Director HP Fortify 12573 Cricket Lane Woodbridge , VA 22192 Phone: (none) Fax: (none) Email: jmfarrell@hp.com _____________________________________________________ Dr. Robert Farrell P.O. Box 3705 Reston , VA 20195 Phone: (none) Fax: (none) Email: bob.farrell@senecatechnologygroup.com _____________________________________________________ Mr. Joe Fasching Chief Financial Executive DIA Building 6000 Washington , DC 20340-5100 Phone: (none) Fax: (none) Email: Joseph.Fasching@dia.mil _____________________________________________________ David Etue (aka Gray, Benjamin) Manager PRTM Management Consultants, LLC 1750 Pennsylvania Avenue NW Suite 1000 Washington , DC 20006 Phone: (none) Fax: (none) Email: detue@prtm.com _____________________________________________________ Mr. William H Gaal BS 1419 Woodhurst Blvd. McLean , VA 22102 Phone: (none) Fax: (none) Email: wgaal@us.ibm.com _____________________________________________________ Dr. C. Gabbard Executive Vice President Defense Group Inc 429 Santa Monica Blvd. Ste 460 Santa Monica , CA 90401 Phone: (none) Fax: (none) Email: gabbard@defgrp.com _____________________________________________________ Derek Gabbard CEO Lookingglass Cyber Solutions 1001 S. Kenwood St Suite 200 Baltimore , MD 21224 Phone: (none) Fax: (none) Email: dgabbard@lgscout.com _____________________________________________________ Mr. Michael Gabbay 200 W. Mercer St #410 Seattle , WA 98119 Phone: (none) Fax: (none) Email: mgabbay@islinc.com _____________________________________________________ Bill Gaches Dir. of Intelligence Analysis Arete Associates 1550 Crystal Drive Suite 703 Arlington , VA 22202 Phone: (none) Fax: (none) Email: William.Gaches@ngc.com _____________________________________________________ Ms. Lynn Gaches Intel Analyst Camber Corporation 5860 Trinity Parkway Suite 400 Centerville , VA 20120 Phone: (none) Fax: (none) Email: lgaches@camber.com _____________________________________________________ Willard Gaefcke, Jr. 4417 McNab Avenue Lakewood , CA 90713 Phone: (none) Fax: (none) Email: gaefcke@verizon.net _____________________________________________________ Glenn Gaffney Deputy Director for Science and CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1739 Email: barbarbt@ucia.gov _____________________________________________________ Mr. Mike Gaffney President,Business Development, Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: mgaffney@csc.com _____________________________________________________ Mr. Gary Gagnan Executive Director MITRE 46731 Manchester Ter Potomac Falls , VA 20165 Phone: (none) Fax: (none) Email: gjg_@mitre.org _____________________________________________________ Gary Gagnon TITLE TBD The MITRE Corporation 7515 Colshire Drive McLean , VA 22102 Phone: (none) Fax: (none) Email: gjg@mitre.org _____________________________________________________ Mr Bob Gajda Consultant Bob Gajda 5819 Appleford Drive Alexandria , VA 22315 Phone: (none) Fax: (none) Email: bobgajda@aol.com _____________________________________________________ bob gajda IC Consultant 5819 appleford drive alexandria , VA 22315 Phone: (none) Fax: (none) Email: bobgajda@aol.com _____________________________________________________ Mr. Robert Gajda 5819 Appleford Drive Alexandria , VA 22315 Phone: (none) Fax: (none) Email: bobgajda@aol.com _____________________________________________________ Joe M Galindo Supervisory IT Specialist Federal Government 935 Pennsylvania Ave NW Washington , DC 20024 Phone: (202) 554-8115 Fax: (none) Email: galindojoe@hotmail.com _____________________________________________________ Sean Gallagher Senior Director, National Intell Invertix Corporation 8201 Greensboro Drive Suite 800 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mrs. Laurene Gallo Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Gallo_Laurene@bah.com _____________________________________________________ Laurene Gallo 8283 Greensboro Drive McLean , VA 22102 Phone: (none) Fax: (none) Email: gallo_laurene@bah.com _____________________________________________________ Oliver Galloway TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: o_galloway@ssci.senate.gov _____________________________________________________ Ryan Galluzzo Ryan Galluzzo 49 Claudette Cir Framingham , MA 01701 Phone: (508) 877-0093 Fax: (none) Email: ryanjglluzzo@gmail.com _____________________________________________________ Mr. Timothy Galpin Assistant Director for Programs Johns Hopkins University, APL 11100 Johns Hopkins Road Room 17-S344 Laurel , MD 20723 Phone: (none) Fax: (none) Email: timothy.galpin@jhuapl.edu _____________________________________________________ Timothy J Galpin TITLE TBD Johns Hopkins University, APL 11100 Johns Hopkins Road Room 17-S344 Laurel , MD 20723 Phone: (none) Fax: (none) Email: timothy.galpin@jhuapl.edu _____________________________________________________ Dr. Gulu Gambhir SVP, Chief Technology Officer SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: gambhirs@saic.com _____________________________________________________ Tom Gann Vice President of Public Affairs McAfee, Inc. 12010 Sunset Hills Road 5th Floor Reston , VA 20190 Phone: (none) Fax: (none) Email: thomas_gann@mcafee.com _____________________________________________________ Mr. Christopher Haakon 8012 Apollo Street Mason Neck , VA 22079 Phone: (none) Fax: (none) Email: cphaakon@aol.com _____________________________________________________ Richard N Haass President of the Council on Fore Council on Foreign Relations 58 East 68th Street New York , NY 10065 Phone: (none) Fax: (none) Email: president@cfr.org _____________________________________________________ Biff Hadden 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Mr. Joel Haenlein Senior Scientist Ensco, Inc. 5400 Port Royal Road Springfield , VA 22151 Phone: (none) Fax: (none) Email: haenlein.joel@ensco.com _____________________________________________________ Katy Hagan TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Katy_Hagan@appro.senate.gov _____________________________________________________ SEN Chuck Hagel PIAB Member PIAB No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Wendy_A._Loehrs@pfiab.eop.gov _____________________________________________________ Chris Hagner Project Manager White Oak Technologiese, Inc. 1300 Spring Street Suite 320 Silver Spring , VA 20910 Phone: (none) Fax: (none) _____________________________________________________ Annette Hagood Director Deloitte Consulting, LLP 1001 G St Washington , DC 20001 Phone: (none) Fax: (none) Email: ahagood@deloitte.com _____________________________________________________ Cassee Haines Executive Assistant Camber Corporation 5860 Trinity Parkway Suite 400 Centerville , VA 20120 Phone: (none) Fax: (none) _____________________________________________________ Mr. Kevin Hair Vice President, Corporate Busine SRC, Inc 7502 Round Pond Road North Syracuse , NY 13212 Phone: (none) Fax: (none) Email: hair@srcinc.com _____________________________________________________ Katie Hairfield Summer Intern the SI 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: kathleen.s.hairfield@lmco.com _____________________________________________________ Lance Haldeman Alliances Director Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Lance Haldeman 2291 Wood Oak Dr Herndon , VA 20171 Phone: (none) Fax: (none) Email: lance.haldeman@ca.com _____________________________________________________ Lance Haldeman Alliances Director Computer Associates 2291 Wood Oak Dr Herndon , VA 20171 Phone: (none) Fax: (none) Email: lance.haldeman@ca.com _____________________________________________________ Michael M Hale Deputy Director, SIGINT Director NRO No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: halemi@nro.mil; tohailhale@comcast.net _____________________________________________________ Richard L Haley Finance Division FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: richard.haleyii@ic.fbi.gov _____________________________________________________ Dean E Hall Deputy Chief Information Officer FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: dean.hall@ic.fbi.gov _____________________________________________________ Ms. Katherine Hall 6924 Fairfax Drive # 304 Arlington , VA 22213 Phone: (none) Fax: (none) Email: katherine.hall@baesystems.com _____________________________________________________ Mr. Keith Hall Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Hall_Keith@bah.com _____________________________________________________ Mr. Larry P Hall TITLE TBD NSA 9800 Savage Road S33, Suite 6549 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: lphall@nsa.gov _____________________________________________________ Ms. Leslie Hall 12900 Federal Systems Park Drive MS FP1-5166 Fairfax , VA 22033 Phone: (none) Fax: (none) Email: leslie.hall@ngc.com _____________________________________________________ Mrs. Susan Hall SVP, Business Development NJVC, LLC 8614 Westwood Center Drive Suite 300 Vienna , VA 22182 Phone: (none) Fax: (none) Email: susan.hall@njvc.com _____________________________________________________ Mr. Ralph Haller Deputy Director (DDNRO) NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: ralph.haller@nro.mil _____________________________________________________ Ms. Vanessa Hallihan Chief, Custom Solutions, Suite 6 NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: vnhalli@nsa.gov _____________________________________________________ Brigadier Gener Irving Halter US Vice Director, Operations, Joint NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: irving.halter@nro.mil _____________________________________________________ Kevin Iaquinto CMO Deltek 13880 Dulles Corner Lane Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ Mrs. Gretchen Idsinga Business Development, Senior Man CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: gidsinga@caci.com _____________________________________________________ Ms. Patricia L Ihnat Deputy NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: plihnat@nsa.gov _____________________________________________________ Chris Incardona Director, Government Programs GeoEye GeoEye 21700 Atlantic Blvd Suite 500 Dulles , VA 20166 Phone: (none) Fax: (none) Email: incardona.chris@geoeye.com _____________________________________________________ Paul R Ingholt BA., JD Principal Booz Allen Hamilton 8283 Greensboro Drive McLean , VA 22182 Phone: (none) Fax: (none) Email: ingholt_paul@bah.com _____________________________________________________ Mr. J. C Inglis Deputy Director NSA 9800 Savage Road Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: jcingli@nsa.gov _____________________________________________________ Bobby R Inman Required unless Parent Arlington , VA 22203 Phone: (512) 328-0444 Fax: (512) 471-8408 _____________________________________________________ Nancy Inman 3200 Riva Ridge Road Austin , TX 78746 Phone: (512) 328-0444 Fax: (none) Email: elcaro2@aol.com _____________________________________________________ Jennifer Internicola Manager General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Jennifer.Internicola@gd-ais.com _____________________________________________________ S. L Ireland Assistant Secretary for Intellig Treasury Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Ms. Mary M Irvin Director, Source Operations and NGA 4600 Sangamore Road, D-165 Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: mary.m.irvin@nga.mil _____________________________________________________ Mr. John Irvine 14900 Conference Center Dr. #225 Chantilly , VA 20151 Phone: (none) Fax: (none) Email: jirvine@crucialsecurity.com _____________________________________________________ Matthew S Irvine 3718 Appleton St., NW Washington , DC 20016 Phone: (none) Fax: (none) Email: mattirvine@gmail.com _____________________________________________________ Mr. Rob Irvine Counterintelligence DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: robert.irvine@dhs.gov _____________________________________________________ Jeff Isaacson TITLE TBD Sandia National Laboratories P.O. Box 5800 Albuquerque , NM 87185 Phone: (none) Fax: (none) _____________________________________________________ Mr. David Isacoff TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Stephen Isacoff P.O. Box 465 Hudson , MA 01749 Phone: (none) Fax: (none) Email: stephen@networkconsultantsgroup.com _____________________________________________________ Joanne Isham Required unless Parent Washington , DC 20005 Phone: (none) Fax: (none) _____________________________________________________ Tanvirul Islam CEO TerminusNet 2/4 Outer Circuler Road. OreantPoint. Flat B-3, Moghbazar Dhaka 1217 Bangladesh Phone: +88-02-9362262 Fax: (none) Email: Travis@TerminusNet.com _____________________________________________________ Roderick Isler 1421 Jefferson Davis Highway Suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) Email: Rod.isler@gd-ais.com _____________________________________________________ MG Roderick Isler USA 1703 Mansion Ridge Rd. Annapolis , MD 21401 Phone: (none) Fax: (none) Email: goaisler@aol.com _____________________________________________________ Adam Isles TITLE TBD Raytheon Company 1200 S. Jupiter Road MS AA-75000 Garland , TX 75042 Phone: (none) Fax: (none) _____________________________________________________ Mr. Steven Isola 10993 S. Camino Escorpion Vail , AZ 85641-6429 Phone: (none) Fax: (none) Email: stevenisola@gmail.com _____________________________________________________ Michael Isom J.D. President/CEO IsomCorp 1655 N. Fort Myer Drive Suite 700 Arlington , VA 22209 Phone: (none) Fax: (877) 770-4766 Email: michael.isom@isomcorp.com _____________________________________________________ Robert Ivery Research Fellow LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. John Ives 1619 Hartsville Trail The Villages , FL 32162 Phone: (none) Fax: (none) Email: johnives@eagle32.com _____________________________________________________ Raymond Ivie TITLE TBD General Dynamics AIS 12950 Worldgate Drive Herndon , VA 20170 Phone: (none) Fax: (none) _____________________________________________________ Chuck Izzo TITLE TBD i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. Bill Jack Consultant Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: bill.jack@comcast.net _____________________________________________________ Galen B Jackman TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Alan W Jackson Managing Member Jade Enterprises, LLC 15859 Berlin Turnpike Purcellville , VA 20132 Phone: (540) 882-4534 Fax: (540) 882-4535 Email: alanwjack@aol.com _____________________________________________________ Kevin G Jackson B.S AVP Business Development SAIC 6909 Metro Park Drive Alexandria , VA 22310 Phone: (none) Fax: (none) Email: kevin.g.jackson@saic.com _____________________________________________________ Ms. Miriam Jackson TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: mjackson@potomacinstitute.org _____________________________________________________ Janice L Jacobs Consular Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jacobsjl@state.gov _____________________________________________________ Mike Jacobs Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Jake Jacoby Executive Vice President, Nation CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: jjacoby@caci.com _____________________________________________________ Jake Jacoby TITLE TBD CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: jjacoby@caci.com _____________________________________________________ Mr. Richard Jacques Ph.D. DHS Operations Directorate DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Steve Jacques 1511 22nd St. N. Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. John Jadik Vice President, C4ISR Networked Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: john.jadik@ngc.com _____________________________________________________ Jim Jaeger TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (210) 468-3433 Fax: (none) Email: Jim.Jaeger@gd-ais.com _____________________________________________________ Adrienne Janetti 4850 Mark Center Drive JAWD/IDA Alexandria , VA 22311 Phone: (none) Fax: (none) Email: adriennejanetti@yahoo.com _____________________________________________________ Ms. Adrienne Janetti TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: ajanetti@potomacinstitute.org _____________________________________________________ Mr. Michael D Janeway 116 Chimney Ridge Place Potomac Falls , VA 20165 Phone: (none) Fax: (none) Email: mike.janeway@apgtech.com _____________________________________________________ Ms. Tammy Janorske TITLE TBD Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: tammy.janorske@ca.com _____________________________________________________ Brian Janosko Engineering Program Manager Lockheed Martin IS&GS Brian Janosko DEPI 415C 13530 Dulles Technology Dr Herndon , VA 20171 Phone: (none) Fax: (none) Email: brian.j.janosko@lmco.com _____________________________________________________ William Janssen TITLE TBD The Boeing Company 7700 Boston Boulevard Springfield , VA 22153 Phone: (none) Fax: (none) _____________________________________________________ Mr. Peter Jantzen Vice President, Sales Intec Billing, Inc. 301 North Perimeter Center Suite 200 Atlanta , GA 30346 Phone: (none) Fax: (none) Email: peter.jantzen@intecbilling.com _____________________________________________________ Elise M Jarvis Associate Director, Law Enforcem Anti-Defamation League 1100 Connecticut Avenue, NW Suite 1020 Washington , DC 20036 Phone: (none) Fax: (none) Email: ejarvis@adl.org _____________________________________________________ Mr. Larry Jaski Jr. MBA, BS Director DHS-I&A Production Mangement Division No Address Available No City Available , MD 21220 Phone: (none) Fax: (none) Email: LARRY.JASKI@HQ.DHS.GOV _____________________________________________________ Frank Jaworski TITLE TBD SRA 4350 Fair Lakes Court Fairfax , VA 22033 Phone: (none) Fax: (none) Email: fjaworski@raba.com _____________________________________________________ Mr. K. Jenkins 105 Kingswood Road Annapolis , MD 21401 Phone: (none) Fax: (none) Email: brucejenkins@windsorvisions.com _____________________________________________________ Mr. Karl Jensen Director, Strategy Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: karl_jensen@raytheon.com _____________________________________________________ Lynda Burroughs (aka Kaur, Harjeet) 12015 Lee Jackson Highway Fairfax , VA 22033 Phone: (none) Fax: (none) Email: lynda.burroughs@mantech.com _____________________________________________________ Mr. Thomas Kacena 6650 Rock Island Rd. Apt 304 Springfield , VA 22150 Phone: (none) Fax: (none) Email: tkacena@aol.com _____________________________________________________ Dr. James Kadtke PhD Senior Scientist & Policy Analys National Nanotechnology Coordinating Office 1701 16th Street, NW Apt. 824 Washington , DC 20009 Phone: (none) Fax: (none) Email: jkadtke@aol.com _____________________________________________________ Mr. Hans Kaeser 3623 S Street, NW Washington , DC 20008 Phone: (none) Fax: (none) Email: huk3@georgetown.edu _____________________________________________________ Mr. Mark Kagan 5432 Connecticut Ave., NW Apt. 706 Washington , DC 20015 Phone: (none) Fax: (none) Email: mhkagan@gmail.com _____________________________________________________ Mr Robert I Kahane 13530 Dulles Executive Park Herndon , VA 20171 Phone: (none) Fax: (703) 466-2692 Email: bob.kahane@lmco.com _____________________________________________________ Ralph Kahn Director of Sales McAfee, Inc. 12010 Sunset Hills Road 5th Floor Reston , VA 20190 Phone: (none) Fax: (none) Email: ralph_kahn@mcafee.com _____________________________________________________ James Kahrs TITLE TBD DATRA 2020 Pennsylvania Ave NW Washington , DC 20006 Phone: (none) Fax: (none) _____________________________________________________ Dr. Eugene Kaiser TITLE TBD Defense Information Systems Agency 2508 Goldcup Lane Reston , VA 22091 Phone: (none) Fax: (none) Email: eugene.kaiser@disa.mil _____________________________________________________ Mr. James Kalkbrenner VP Communication Systems ITT Mr. Jim Kalkbrenner 141 National Business Parkway Suite 200 Annapolis Junction , MD 20701 Phone: (none) Fax: (none) Email: jim.kalkbrenner@itt.com _____________________________________________________ Mr. Michael Kalogeropoulos 2783 Mansway Dr. Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ Robert Kames PO Box 3342 Annapolis , MD 21403 Phone: (none) Fax: (none) Email: Robert@Kames.com _____________________________________________________ Paul Kaminski PIAB Member PIAB No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Wendy_A._Loehrs@pfiab.eop.gov _____________________________________________________ Jordan Kanter Senior Consultant Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: kanter_jordan@bah.com _____________________________________________________ Jeff Kaplan TITLE TBD PRTM Management Consultants, LLC 1750 Pennsylvania Avenue NW Suite 1000 Washington , DC 20006 Phone: (none) Fax: (none) Email: jkaplan@prtm.com _____________________________________________________ Mr. Leonard Kaplan 7403 Gateway Court Manassas , VA 20109 Phone: (none) Fax: (none) Email: lkaplan@gmri.com _____________________________________________________ Stephen R Kappes Deputy Director CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1111 Email: brendjh@ucia.gov _____________________________________________________ Jan Karcz Director, Analytic Development ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jansk@dni.gov _____________________________________________________ Jan Karcz Col. (Ret) 10827 Cross School Road Reston , VA 20191 Phone: (none) Fax: (none) Email: jansk@odci.gov _____________________________________________________ Mike Karpovich Former INSA Intern FBI Required unless Parent Arlington , VA 22203 Phone: 518-588-7098 Fax: (none) _____________________________________________________ Rajendra Karwasra 9/6J, Medical Campus, PGIMS, Rohtak , IN India Phone: (126) 221-3331 Fax: (none) Email: karwasra@yahoo.com _____________________________________________________ Joy Kasaaian PM IBG IBG 2001 Jefferson Highway Ste 310 Arlington , VA 22202 Phone: (none) Fax: (none) Email: jkasaaian@biometricgroup.com _____________________________________________________ Colonel Beth M Kaspar USAF TITLE TBD NSA 9800 Savage Road DA1, Suite 6540 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: bmkaspa@nsa.gov _____________________________________________________ John Kastanowski systems engineer TASC, Inc. 5358 blue aster circle centreville , VA 20120 Phone: (none) Fax: (none) Email: jkastanowski@gmail.com _____________________________________________________ Kate Kaufer TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Kate_Kaufer@appro.senate.gov _____________________________________________________ Mr. Joseph J La Pilusa Director, Business Development Dynamics Reseach Corporation 11440 Commerce Park Drive Suite 400 Reston , VA 20191 Phone: (none) Fax: (none) Email: jlapilusa@drc.com _____________________________________________________ Diane La Voy TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: diane.lavoy@mail.house.gov _____________________________________________________ David Lacey Sr. Director Hughes 11717 Exploration Lane Germantown , MD 20876 Phone: (none) Fax: (none) Email: david.lacey@hughes.com _____________________________________________________ Phillip Lacombe 8700 Cathedral Forest Drive Fairfax Station , VA 22039 Phone: (none) Fax: (none) Email: phil.lacombe@securemissionsolutions.com _____________________________________________________ DAVID B LACQUEMENT DIRECTOR OF OPERATIONS CYBERCOM 9800 SAVAGE ROAD FORT GEORGE G. MEADE , MD 20755 Phone: (none) Fax: (none) Email: RFTYGAR@NSA.GOV _____________________________________________________ Rudy A Laczkovich President Nexidia Federal Solutions, Inc 19984 Augusta Village Pl Ashburn , VA 20147 Phone: (none) Fax: (none) Email: rlaczkovich@nexidia.com _____________________________________________________ Mr. Steve Lafata Senior Vice President of Busines Spectrum 1 Compass Way Suite 300 Newport News , VA 23606 Phone: (none) Fax: (none) Email: Steve.lafata@sptrm.com _____________________________________________________ Ray LaHood Secretary Transportation No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: secretaryscheduler@dot.gov _____________________________________________________ Ellen Laipson PIAB Member PIAB No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Wendy_A._Loehrs@pfiab.eop.gov _____________________________________________________ Ms. Karen Lamb 4801 Stonecroft Boulevard Chantilly , VA 20151 Phone: (none) Fax: (none) Email: karen.lamb@ngc.com _____________________________________________________ Karen Lamb TITLE TBD BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. Peter Lamb APG Account Manager Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: peter.lamb@hp.com _____________________________________________________ Dennis Lambell Vice President/General Manager BAE Systems 10920 Technology Place San diego , CA 92127 Phone: (none) Fax: (858) 592-1086 Email: dennis.lambell@baesystems.com _____________________________________________________ Brett Lambert TITLE TBD Densmore Group 2711 Jenifer Street Washington , DC 20015 Phone: (none) Fax: (none) Email: blambert@densmoregroup.com _____________________________________________________ Brett Lambert Deputy Assist. Sec. of Defense OSD (AT&L) 3330 Defense Pentagon Rm 3B854 Washington , VA 20301 Phone: (none) Fax: (none) Email: brett.lambert@osd.mil _____________________________________________________ Captain Mike Lambert 7930 Jones Branch Dr Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: mike.lambert@centurum.com _____________________________________________________ Brian D Lamkin Training and Education FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: brian.lamkin@ic.fbi.gov _____________________________________________________ Joseph E Lampert IV Si Account Executive Verizon Business 22001 Loudoun County Parkway Asburn , VA 20147 Phone: (none) Fax: (none) Email: joseph.lampert@one.verizon.com _____________________________________________________ Mr. Robert Landgraf Client Principal - DoD Agencies Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: bob.landgraf@hp.com _____________________________________________________ Stephen Landman 2812 9th Street S. Apt. 201 Arlington , VA 22204 Phone: (none) Fax: (none) Email: Landman_Stephen@yahoo.com _____________________________________________________ John Landon VP, NGC Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Kevin Landy Chief Counsel Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kevin_landy@hsgac.senate.gov _____________________________________________________ Ms. Carol Lane Vice President Ball Aerospace Ball Aerospace & Technologies Co 2111 Wilson Blvd, Suite 1120 Arlington , VA 22201 Phone: (none) Fax: (none) Email: rbturner@ball.com _____________________________________________________ MS CAROL LANE VICE PRESIDENT BALL AEROSPACE 2111 WILSON BLVD #1120 ARLINGTONV , VA 22201 Phone: (none) Fax: (none) Email: clane@ball.com _____________________________________________________ MS CAROL LANE VICE PRESIDENT BALL AEROSPACE RONDI TURNER 2111 WILSON BLVD #1120 ARLINGTON , VA 22201 Phone: (none) Fax: (none) Email: rbturner@ball.com _____________________________________________________ Dr. Alan MacDougall Chief, Counter Proliferation Sup DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Alan.MacDougall@dia.mil _____________________________________________________ Dr. Michael Macedonia Director NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kcremona@casl.umd.edu(Kelly Cremona-office mgr-DTO/ODNI)301-226-9124 _____________________________________________________ Mr. David Macfarlane TITLE TBD Innovative Information Solutions 43647 Warbler Square Leesburg , VA 20176 Phone: (none) Fax: (none) Email: dmacfarlane@iis-us.com _____________________________________________________ John MacGaffin Advisor CSIS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: macgaffinj@centratechnology.com _____________________________________________________ Stacy Macik Administrative Executive, Acquis Software Engineering Institute, CMU NRECA Building Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Cynthia Mack Vice President General Dynamics AIS 10560 Arrowhead Drive Fairfax , VA 22030 Phone: (none) Fax: (none) _____________________________________________________ John Mackay Sales Director Endeca 12369 Sunrise Valley Dr Reston , VA 20191 Phone: (none) Fax: (none) Email: andrea.terrazas@carahsoft.com _____________________________________________________ Mr. Richard MacKnight 105 Summers Drive Alexandria , VA 22301 Phone: (none) Fax: (none) Email: ramackjr@gmail.com _____________________________________________________ Ms. Jo MacMichael HCMO Chief of Staff DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jo.macmichael@osd.mil _____________________________________________________ Jo MacMichael 1550 Crystal Drive Suite 502a Arlington , VA 22202 Phone: (703) 566-0835 Fax: (none) Email: jo.macmichael@osd.mil _____________________________________________________ Ms. Schira Madan TITLE TBD ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: schira.t.madan@ugov.gov _____________________________________________________ Mr. Reese Madsen Director of Training and Educati DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: reese.madsen@osd.mil _____________________________________________________ Mr. Tom Madson TITLE TBD General Dynamics Corporation 2941 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: tmadson@gd.com _____________________________________________________ Mark Magee TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: mark.magee@gd-ais.com _____________________________________________________ John Maguire TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: j_maguire@ssci.senate.gov _____________________________________________________ Mr. Larry Maguire Deputy ITTF DIA 7400 Defense Pentagon Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Laurence.Maguire@dia.mil _____________________________________________________ Mr. Edward Mahen TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: edward.mahen@nro.mil _____________________________________________________ Gina Mahin TITLE TBD ExecuTech Strategic Consulting 712 Northwood Avenue Cherry Hill , NJ 8002 Phone: (none) Fax: (none) Email: gina.mahin@esc-techsolutions.com _____________________________________________________ Thomas Mahlik 180 Cameron Station Blvd Alexandria , VA 22304 Phone: (none) Fax: (none) Email: tmahlik@hotmail.com _____________________________________________________ Mr. Bruno Mahlmann VP Business Development Salient Federal Solutions 8618 Westwood Center Drive Suite 100 Vienna , VA 22182 Phone: (none) Fax: (703) 940-0084 Email: Bruno.Mahlmann@salientfed.com _____________________________________________________ Mr Bruno Mahlmann III MS Vice President Salient Federal Solutions 4000 Legato Rd, Suite 510 Fairfax , VA 22033 Phone: (none) Fax: (none) Email: bmahlmann2@comcast.net _____________________________________________________ Sabahat Mahmood 2030 N. Adams St. Apartment 1412 Arlington , VA 22201 Phone: (none) Fax: (none) Email: smahmoo3@gmu.edu _____________________________________________________ Cody Majerus Cody Majerus 4615 Rose Creek Parkway Fargo , ND 58104 Phone: (none) Fax: (none) Email: codymajerus@gmail.com _____________________________________________________ Vahid Majidi National Security Branch, WMD FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: vahid.majidi@ic.fbi.gov _____________________________________________________ Alexander Major Attorney Sheppard Mullin RIchter & Hampton LLP 1300 I Street NW 11th Floor East Washinton , DC 20005 Phone: (none) Fax: (none) Email: amajor@sheppardmullin.com _____________________________________________________ Michael Nacht Assistant Secretary of Defense f DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: michael.nacht@osd.mil _____________________________________________________ Mr. J. T Nader TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jtnader@nsa.gov _____________________________________________________ Kevin Nagel Senior Executive Accenture No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kevin.s.nagel@accenture.com _____________________________________________________ Mr. John Nagengast Director AT&T Government Solutions-NIS 7125 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) Email: nagengast@att.com _____________________________________________________ Garo Nalabandian Sr. Associate Advisory KPMG LLP Garo Nalabandian 1676 International Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (202) 330-5417 Email: gnalabandian@kpmg.com _____________________________________________________ Adam E Namm Overseas Buildings and Operation State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: nammae@state.gov _____________________________________________________ Mr. Samir H Nanavati 1 Battery Park Plaza 29th Floor New York , NY 10004 Phone: (none) Fax: (none) Email: snanavati@ibgweb.com _____________________________________________________ Scott Nance Professional Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Scott_Nance@appro.senate.gov _____________________________________________________ Mr. John Nannen Vice President Raytheon Company 1200 S. Jupiter Road MS AA-75000 Garland , TX 75042 Phone: (none) Fax: (none) Email: jnannen@raytheon.com _____________________________________________________ The Honorable Janet Napolitano Secretary, Department of Homelan DHS Nebraska Avenue Center Washington , D.C. 20528 Phone: (none) Fax: (none) Email: janet.napolitano@hq.dhs.gov _____________________________________________________ Len Napolitano TITLE TBD Sandia National Laboratories P.O. Box 5800 Albuquerque , NM 87185 Phone: (none) Fax: (none) _____________________________________________________ James Navarro Director, Military Intelligence CSC 8613 Lee Highway Fairfax , VA 22031 Phone: (none) Fax: (none) Email: jnavarro3@csc.com _____________________________________________________ Aradhana Nayak-Rhodes DIA DIA 3223 Walbridge Place, NW Washington , DC 20010 Phone: (none) Fax: (none) Email: anayakrhodes@gmail.com _____________________________________________________ Michael Neal TITLE TBD General Dynamics C4 Systems 2231 Crystal Drive Suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) _____________________________________________________ Mr. Patrick Neary TITLE TBD ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: patrick.c.neary@ugov.gov _____________________________________________________ Mr. Patrick C Neary 5126 Knapp Pl Alexandria , VA 22304 Phone: (none) Fax: (none) Email: patrick.neary@dhs.gov _____________________________________________________ Mr. Jack Neigel 1449 Colleen Lane McLean , VA 22101 Phone: (none) Fax: (none) Email: jack@neigelcorp.com _____________________________________________________ Mr. Gail Nelson Ph.D. 645 Poplar Avenue Boulder , CO 80304 Phone: (none) Fax: (none) Email: NelsonSD_83@msn.com _____________________________________________________ Mr. John Nelson 10302 Eaton Place Suite 500 Fairfax , VA 22030 Phone: (none) Fax: (none) Email: nelson-john@zai.com _____________________________________________________ Robert Nesbit TITLE TBD The MITRE Corporation 7515 Colshire Drive McLean , VA 22102 Phone: (none) Fax: (none) Email: rfnesbit@mitre.org _____________________________________________________ Julia Nesheiwat Senior Advisor State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: nesheiwatj@state.gov _____________________________________________________ Ms. Tamara Nestuk Deputy S1 NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Joel Neubert 3160 Challenger Point Dr. Loveland , CO 80538 Phone: (none) Fax: (none) Email: jneube@acxiom.com _____________________________________________________ Tim Neun Manager, Corporate Communication Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Jeff Neurauter Attorney Advisor DHS Office of General Counsel 1616 Ft. Myer Dr Arlington , VA 22209 Phone: (none) Fax: (none) Email: jeff.neurauter@dhs.gov _____________________________________________________ Devin O'Brien Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Devin_Obrien@hsgac.senate.gov _____________________________________________________ Geoff O'Connell Deputy Director, NCTC CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1739 Email: brendalo1@nctc.gov _____________________________________________________ Mr. Matthew O'Connell 21700 Atlantic Boulevard Dulles , VA 20166 Phone: (none) Fax: (none) Email: oconnell@geoeye.com _____________________________________________________ Mr. Matthew O'Connell CEO/President GeoEye 2325 Dulles Corner Blvd. 10th Floor Herndon , VA 20171 Phone: (none) Fax: (703) 480-8175 Email: o'connell.matthew@geoeye.com _____________________________________________________ 2LT Daniel O'Connor USA 4905 172nd Avenue Bristol , WI 53104 Phone: (none) Fax: (none) Email: daniel.oconnor30@yahoo.com _____________________________________________________ Michael P O'Donnell MS, BS 4201 Wilson Blvd. Room 455-I Arlington , VA 22230 Phone: (none) Fax: (703) 292-9145 Email: modonnel@nsf.gov _____________________________________________________ Darcey O'Halloran TITLE TBD Deloitte Consulting, LLP No Address Available No Address Available No City , VA 22203 Phone: (401) 862-9025 Fax: (none) _____________________________________________________ Dr. John O'Hara 3038 Traymore Lane Bowie , MD 20715-2024 Phone: (none) Fax: (none) Email: jhohara@aol.com _____________________________________________________ John O'Hara NSA government employee (GGD-15) NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jhohara@nsa.gov _____________________________________________________ Rob O'Keefe Chief Technology Officer Arc Aspicio LLC 3318 Lorcom Lane Arlington , VA 22207 Phone: (none) Fax: (none) Email: rfo@arcaspicio.com _____________________________________________________ Richard O'Lear 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: richard.j.olear@lmco.com _____________________________________________________ Mr. Cassian O'Rourke 302 Emilies Lane Severna Park , MD 21146-1513 Phone: (none) Fax: (none) Email: cashorourke@yahoo.com _____________________________________________________ Maj Gen Gary O'Shaughnessy USAF Vice President, NSG Oracle Corporation 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: gary.oshaughnessy@oracle.com _____________________________________________________ Grace O'Sullivan 950 N. Glebe Rd. Suite 1100 Arlington , VA 22203 Phone: (none) Fax: (none) Email: gosullivan@solers.com _____________________________________________________ Grace O'Sullivan Business Development Solers Inc. 950 N. Glebe Rd. Suite 1100 Arlington , VA 22203 Phone: (none) Fax: (none) Email: gosullivan@solers.com _____________________________________________________ Grace O'Sullivan Marketing and Communications Solers 950 N. Glebe Road Suite 1100 Arlington , VA 22203 Phone: (none) Fax: (none) Email: gosullivan@solers.com _____________________________________________________ Stephanie O'Sullivan Associate Deputy Director CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1739 Email: bettycd@ucia.gov _____________________________________________________ Brian O'Toole Chief Technology Officer GeoEye 2325 Dulles Corner Blvd. Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ Dr. Tara O'Toole Undersecretary for Science & Tec DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: loretta.young@dhs.gov _____________________________________________________ Dr. William S Oakes TITLE TBD Raytheon Company 1200 S. Jupiter Road MS AA-75000 Garland , TX 75042 Phone: (none) Fax: (none) Email: oakes@raytheon.com _____________________________________________________ Mr. David Oakley 2124 Fox Meadows Manhattan , KS 66503 Phone: (none) Fax: (none) Email: oakley_david@hotmail.com _____________________________________________________ Douglas Oakley VP Agency Consulting Group 5457 Twin Knolls Road Columbia , MD 21045 Phone: (none) Fax: (none) Email: doakley@acg-hq.com _____________________________________________________ Mr Armando J Obdola President Advanced Security and Intelligence Management Solu 8072 11th ave Burnaby , British Columbia V3N 2N7 Canada Phone: (none) Fax: (none) Email: johan.obdola@asims.ca _____________________________________________________ Mr. Edward Obloy TITLE TBD Booz Allen Hamilton 13200 Woodland Park Drive Herndon , VA 20171 Phone: (none) Fax: (none) Email: obloy_edward@bah.com _____________________________________________________ Mr. Richard Oborn TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: richard.oborn@nro.mil _____________________________________________________ Mr. Kevin Doyle (aka Pushkin, Matthew) Director, Cyber Programs SRC, Inc 7502 Round Pond Road North Syracuse , NY 13212 Phone: (none) Fax: (none) Email: doyle@srcinc.com _____________________________________________________ Alex P Computer Consultant Northrop Grumman 1000 Wilson Boulevard Arlington , VA 22209 Phone: (none) Fax: (none) Email: swardheld@gmail.com _____________________________________________________ Lon P 1000 Wilson Boulevard Arlington , VA 22209 Phone: (703) 834-7980 Fax: (none) Email: puzzleboks@gmail.com _____________________________________________________ Donald E Packham EAD Human Resources FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: donald.packham@ic.fbi.gov _____________________________________________________ Michael Pafford Project Manager The Johns Hopkins University Applied Physics Lab 11100 Johns Hopkins Road MS: MP6 N-629 Laurel , MD 20723 Phone: (none) Fax: (240) 228-6864 Email: mike.pafford@jhuapl.edu _____________________________________________________ Mr. Joe Page TITLE TBD Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: joseph.page@ca.com _____________________________________________________ Thomas Page Advanced Technology Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: thomas.j.page@lmco.com _____________________________________________________ Linda Pagelson TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: linda.pagelson@mail.house.gov _____________________________________________________ Christopher Painter Deputy Director, Cyber NSC No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: christopher_m_painter@nsc.eop.gov _____________________________________________________ Will Painter TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: will.painter@mail.house.gov _____________________________________________________ Mr. Chris Pallotta APG Account Manager, NIMA Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: chris.pallotta@hp.com _____________________________________________________ Douglas Palmer TITLE TBD Deloitte Consulting, LLP No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: dpalmer@deloitte.com _____________________________________________________ Mr. Andrew Palowitch 1800 Old Meadow Drive #1119 McLean , VA 22102 Phone: (none) Fax: (none) Email: awp82@verizon.net _____________________________________________________ Leon E Panetta Director CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1739 Email: christyt@ucia.gov _____________________________________________________ Mr. Steve Panzer ObjectFX 10440 Little Patuxent Parkway Columbia , MD 21044 Phone: (none) Fax: (none) Email: steve.panzer@objectfx.com _____________________________________________________ Mike Papay TITLE TBD Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ COL Leesa Papier Director of Analytics Under Secretary of Defense (Intelligence) 8125 Sea Water Path Columbia , MD 21045 Phone: (410) 814-1037 Fax: (none) Email: leesa.papier@osd.mil _____________________________________________________ Robert J Papp Potential USCG Commandant DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: robert.j.papp@uscg.mil _____________________________________________________ Mr. Aris Pappas Senior Director, Inst. For Adv. Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: Aris.Pappas@microsoft.com _____________________________________________________ Aris Pappas TITLE TBD Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: aris.pappas@microsoft.com _____________________________________________________ George Pappas TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: george.pappas@mail.house.gov _____________________________________________________ Ms. Christina Pappas-Moir TITLE TBD Geospatial Concepts 6212 Squires Hill Drive Falls Church , VA 22044 Phone: (none) Fax: (none) Email: chris.moir@geospatialconcepts.com _____________________________________________________ Mr. Alexander J Paranicas Business Development Analyst Lockheed Martin IS&GS 13560 Dulles Technology Drive Dep 2 - 4th Floor Herndon , VA 20171 Phone: (none) Fax: (none) Email: alexander.j.paranicas@lmco.com _____________________________________________________ Craig Parisot Chief Operating Officer Invertix Corporation 8201 Greensboro Drive Suite 800 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Bill Parker COO Salient Federal Solutions 4000 Legato Road Ste 510 Fairfax , VA 22033 Phone: (none) Fax: (none) Email: bill.parker@salientfed.com _____________________________________________________ John Quattrocki Director CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) _____________________________________________________ Frank Quick TITLE TBD The MITRE Corporation 7515 Colshire Drive McLean , VA 22102 Phone: (none) Fax: (none) Email: fquick@mitre.org _____________________________________________________ Mr. J. Quinn Vice President, Missile & Space Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Kate Quinn 900 North Washington Street #302E Alexandria , VA 22314 Phone: (none) Fax: (none) Email: marykatequinn@aol.com _____________________________________________________ Ms. Mary E Quinn Director, TCA OUSDI 5000 Defense Pentagon Washington , DC 203015000 Phone: (none) Fax: (none) Email: mary.quinn@osd.mil _____________________________________________________ Mr. Robert F Behler (aka Roberts, Robert) 7502 Round Pond Road North Syracuse , NY 13212 Phone: (none) Fax: (none) Email: rfb@srcinc.com _____________________________________________________ Mr. Robert T Rabito Jr. 46 saunders st lawrence , MA 1841 Phone: (none) Fax: (none) Email: rrabito@yahoo.com _____________________________________________________ Keny Rader Project Leader III Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Mr. John Rado 1376 Apple Hollow Arnold , MO 63010 Phone: (none) Fax: (none) Email: john.rado@nga.mil _____________________________________________________ Dr. Daniel J Ragsdale Ph.D. Program Manager DARPA Dr Ragsdale 3701 Fairfax Drive Arlington , VA 22203 Phone: (703) 241-2850 Fax: (none) Email: daniel.ragsdale@darpa.mil _____________________________________________________ Mr. Donald J Raines BS, MBA Director, Business Development ManTech International Corporation 7799 Leesburg Pike Suite 700 South Falls Church , VA 22043 Phone: (none) Fax: (none) Email: donald.raines@mantech.com _____________________________________________________ Danny E Rains BA Special Agent DHS/FEMA DHS/FEMA 1201 Maryland Ave, SW Office of Security room 205 Washington , DC 20024 Phone: (none) Fax: (202) 646-4646 Email: danny.rains@dhs.gov _____________________________________________________ Mr. Daniel Ramey 2195 Greenkeepers Court Reston , VA 20191 Phone: (none) Fax: (none) Email: dbr1211@verizon.net _____________________________________________________ Johann Ramos Homeland S 1102 Ronstan dr # 6 killeen , TX 76543 Phone: (none) Fax: (none) Email: hsuyang55@hotmail.com _____________________________________________________ Ms. Kendra Ramos 2901 Graham Rd. Falls Church , VA 22042 Phone: (none) Fax: (none) Email: kendra.ramos@sri.com _____________________________________________________ Clark Rampton 11251 Roger Bacon Dr Reston , VA 20190 Phone: (none) Fax: (none) Email: ramptonc@saic.com _____________________________________________________ Adrienne Ramsay TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: adrienne.ramsay@mail.house.gov _____________________________________________________ Ms. Sherri Ramsay Chief, NTOC NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: swramsa@nsa.gov _____________________________________________________ Dafna Rand TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: d_rand@ssci.senate.gov _____________________________________________________ Rick Randall 12012 Sunset Hills Road Suite 800 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 Email: rick.randall@cobham.com _____________________________________________________ Rick Randall 1911 N. Fort Myer Dr. Suite 1100 Arlington , VA 22209 Phone: (none) Fax: (none) Email: rick.randall@cobham.com _____________________________________________________ Rick Randall Vice President, Business Develop Cobham Analytic Solutions 2303 Dulles Station Blvd. Suite 200 Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ Rick Randall VP, Business Development Cobham Analytic Solutions Cobham Analytic Solutions 2303 Dulles Station Blvd Suite 200 Herndon , VA 20171 Phone: (none) Fax: (none) Email: rick.randall@cobham.com _____________________________________________________ Chris Randolph No Title - gratis as of Charlie DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: christopher.b.randolph@dhs.gov _____________________________________________________ Christopher Randolph TITLE TBD Department of Homeland Security 802 S. Lee St. Alexandria , VA 22314 Phone: (none) Fax: (none) Email: chrisrandolph11@gmail.com _____________________________________________________ Mr. Dick Rankin 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: dick.rankin@lmco.com _____________________________________________________ John Ransom 1427 C St NE Washington , DC 20002 Phone: (none) Fax: (none) Email: jransom1984@yahoo.com _____________________________________________________ Mr. Jeffrey Rapp Director, Joint Intelligence Tas DIA Building 6000 Washington , DC 20340-5100 Phone: (none) Fax: (none) Email: Jeffrey.Rapp@dia.mil _____________________________________________________ Mr. Martijn Rasser 8319 Midwood Street Alexandria , VA 22308 Phone: (none) Fax: (none) Email: mrasser@alumni.bates.edu _____________________________________________________ Mr. Martijn Rasser 8319 Midwood Street Alexandria , VA 22308 Phone: (none) Fax: (none) Email: martijn.rasser@gmail.com _____________________________________________________ Rod Smith Jim Balentine (aka Smith Balentine, Rod Jimmy) President Abraxas/Cubic Mission Support Services Rod Smith 12801 Worldgate Drive Suite 800 Herndon , DC 20170 Phone: (none) Fax: (703) 563-9541 Email: rod.smith@abraxascorp.com _____________________________________________________ Michael J Miller (aka Sutton, John) VP Federal Sector Global Crossing 12010 Sunset Hills Road Suite 420 Reston , VA 20190 Phone: (none) Fax: (none) Email: Michael.J.Miller@GlobalCrossing.com _____________________________________________________ Jennifer Sabbagh 34605 West Twelve Mile Road Farmington Hills , MI 48331 Phone: (none) Fax: (none) Email: sabbaghj@trinity-health.org _____________________________________________________ Mr. Patrick Sack Vice President, Technical/INTEL Oracle Corporation 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: patrick.sack@oracle.com _____________________________________________________ John Saddler TITLE TBD General Dynamics AIS 2673 Commons Boulevard Beavercreek , OH 45431 Phone: (937) 488-1079 Fax: (937) 427-6416 _____________________________________________________ Roland Saenz TITLE TBD Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: saenz_ron@bah.com _____________________________________________________ Mr. Roland Saenz USN Retire Senior Associate Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: saenz_ron@bah.com _____________________________________________________ Mr. Tony W Sager TITLE TBD NSA 9800 Savage Road Chief, Vul Analysis & Ops, Suite Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: twsager@nsa.gov _____________________________________________________ Kenneth L. Salazar Secretary Interior Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: scheduling@ios.doi.gov (Attn: Secretary Salazar) _____________________________________________________ Keith Salette TITLE TBD FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Keith.Salette@ic.fbi.gov _____________________________________________________ John Saling Director, Special Programs MetaCarta, a Division of Qbase 1943 Isaac Newton Square East Suite 200 Reston , VA 20190 Phone: (none) Fax: (none) Email: jsaling@metacarta.com _____________________________________________________ Mr. Gary Salisbury Vice President, Business Develop Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: gary.salisbury@ngc.com _____________________________________________________ Mr. Charles Salvaggio TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. John Salvatori Deputy Undersecretary for Analys DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.salvatori@osd.mil _____________________________________________________ James Sample 1101 Market St Chattanooga , TN 37402 Phone: (none) Fax: (none) Email: j31k@pge.com _____________________________________________________ Timothy R Sample VP, Special Programs Organizatio Battelle Colonial Place Operations 2111 Wilson Blvd Suite 1000 Arlington , VA 22201 Phone: (none) Fax: (none) Email: crockerr@battelle.org _____________________________________________________ Timothy R Sample VP, Special Programs Organizatio Battelle Colonial Place Operations Tim Sample 2111 Wilson Blvd Suite 1000 Arlington , VA 22201 Phone: (none) Fax: (none) Email: crockerr@battelle.org _____________________________________________________ Mr. Zachary K Sams Technical Recruiter SRC 14685 Avion Parkway Chantilly , VA 20151 Phone: (none) Fax: (none) Email: zsams@srcinc.com _____________________________________________________ Justin Samuel 888 N. Quincy Street 603 Arlington , VA 22203 Phone: (none) Fax: (none) Email: samuel_justin@bah.com _____________________________________________________ Mr. Jeffrey Sanders 1551 N. Glenville Drive Richardson , TX 75081 Phone: (none) Fax: (none) _____________________________________________________ MRS Barbara S Sanderson BSEE Dir, NGC Northrop Grumman 1000 Wilson Blvd Arlington , VA 22209 Phone: (703) 532-2444 Fax: (703) 741-7790 Email: barbara.sanderson@ngc.com _____________________________________________________ Neil Sandhoff Director of Business Development Sotera Defense Solutions, Inc 1501 Farm Credit Drive Suite 2300 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Ms. Lara Sanford TITLE TBD DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Lara.Sanford@dia.mil _____________________________________________________ Terry Santavicca TITLE TBD TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) Email: terry.santavicca@tasc.com _____________________________________________________ Anthony Santino 11717 Exploration Lane Germantown , MD 20876 Phone: (none) Fax: (none) Email: anthony.santino@hughes.com _____________________________________________________ Matt Stern TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Matthew.Stern@gd-ais.com _____________________________________________________ Mrs. Tracy G Stevens President Innoviss 8401 Connecticut Avenue Chevy Chase , MD 20815 Phone: (301) 879-9433 Fax: (301) 656-0625 Email: tgraves@innoviss.com _____________________________________________________ Mr. Bruce Stewart SVP CACI 40 Wyoming Dr. Jackson , NJ 8527 Phone: (none) Fax: (none) Email: Bstewart@caci.com _____________________________________________________ Mr. Bruce Stewart Senior Vice President CACI 40 Wyoming Dr Jackson , NJ 8527 Phone: (none) Fax: (none) Email: BStewart@caci.com _____________________________________________________ Michael Stewart 8301 Greensboro Drive McLean , VA 22079 Phone: (none) Fax: (none) Email: stewartmj@saic.com _____________________________________________________ Michael J Stewart VP, Business Development Directo SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: michael.j.stewart@saic.com _____________________________________________________ Vincent Stewart Director of Intelligenceáááááááá DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Vincent.stewart@usmc.mil _____________________________________________________ Mr. Stan Stimms Director, Security DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: stan.stimms@osd.mil _____________________________________________________ Brian Stites CAG for the Consolidated Staff ( NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: bmstite@nsa.gov _____________________________________________________ Ms. Kathryn N Stockhausen 1220 East West Highway Apt 218 Silver Spring , MD 20910 Phone: (none) Fax: (none) Email: knicolestockhausen@gmail.com _____________________________________________________ Paul Stockton Assistant Secretary for Homeland DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Don Stokes Director, Strategic Tech, Joint CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1739 Email: donaljo@ucia.gov _____________________________________________________ Mr. Michael Stolarik President,COO QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: mike.stolarik@analex.com _____________________________________________________ Ms. Corin Stone Deputy General Counsel and Actin ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: corin.stone@ugov.gov _____________________________________________________ Don Stone TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: d_stone@ssci.senate.gov _____________________________________________________ Mr. Garnett Stowe Vice President, National Intelli Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: gstowe@raytheon.com _____________________________________________________ Sam Stowers 412 East 21st Street Sioux Falls , SD 57105 Phone: (none) Fax: (none) Email: stowers.sam@spectrumresolutions.com _____________________________________________________ Mr. Timothy A Strait 25050 Riding Plaza #130-150 South Riding , VA 20152 Phone: (none) Fax: (none) Email: tstrait@msshq.com _____________________________________________________ Andy Strampach Vice President Business Developm Cobham Analytic Solutions 5875 Trinity Parkway Suite 300 Centreville , VA 20120 Phone: (none) Fax: (none) _____________________________________________________ Richard Strathearn Sr. Mgr Business Development Lockheed Martin 1111 Lockheed Martin Way O/P7AS, B/156E Sunnyvale , CA 94089 Phone: (none) Fax: (none) Email: richard.a.strathearn@lmco.com _____________________________________________________ Ms. Linda Strating 1521 16th St. NW Washington , DC 20036 Phone: (none) Fax: (none) Email: strating@iwp.edu _____________________________________________________ Steve Stratton SVP Business Development QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. Herbert Strauss 6230 Jean Louise Way Alexandria , VA 22310 Phone: (703) 313-9664 Fax: (none) Email: herb.strauss@gartner.com _____________________________________________________ Rob Strayer TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rob_strayer@hsgac.senate.gov _____________________________________________________ Cara J Streb VP/Division Manager CACI 14046 Eagle Chase Circle Chantilly , VA 20151 Phone: (none) Fax: (none) Email: cstreb@caci.com _____________________________________________________ Dr. Jennifer E Sims 3600 N St. NW, Georgetown Univ. Mortara Ctr. Washington , DC 20057 Phone: (none) Fax: (none) Email: Sims.jennifer@gmail.com _____________________________________________________ Stan Sims Dir Of Security DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ssims@cox.net _____________________________________________________ Mr. Joshua Sinai 1501 Farm Credit Dr. Ste 2300 McLean , VA 22102 Phone: (none) Fax: (none) Email: joshua.sinai@comcast.net _____________________________________________________ Mr Justin M Sinclair MS Intelligence Analyst Dept of Defense 4603 Holborn Ave Annandale , VA 22003 Phone: (571) 282-5802 Fax: (none) Email: jmsinclair@gmx.com _____________________________________________________ RADM Andrew M Singer Chair for Intelligence US Navy 6 Deer Forest Dr Monterey , CA 93940 Phone: (none) Fax: (none) Email: singer.andy@gmail.com _____________________________________________________ Hilery Sirpis Vice President Government Executive ADDRESS TBD Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Ike Skelton Rep. Chair Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ike.skelton@mail.house.gov _____________________________________________________ John Skordas TITLE TBD SRA 4350 Fair Lakes Court Fairfax , VA 22033 Phone: (none) Fax: (none) Email: jskordas@raba.com _____________________________________________________ Mr. Richard Skulte Program Manager LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) Email: rskulte@lmi.org _____________________________________________________ R. D Slack Department speaker of the faculty senate at Texas A&M TX 77843-2258 , -979 D-slack@tamu. Phone: (none) Fax: (none) Email: D-slack@tamu.edu _____________________________________________________ Jason Slackney 1746 Gilson St. Falls Church , VA 22043 Phone: (none) Fax: (none) Email: j_slackney@yahoo.com _____________________________________________________ Bob Slapnik MBA & BS 7212 Chestnut Street Chevy Chase , MD 20815 Phone: (none) Fax: (301) 654-8745 Email: bob@hbgary.com _____________________________________________________ Anne-Marie Slaughter Policy Planning State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: slaughtera@state.gov _____________________________________________________ Dr. J. C Smart TITLE TBD NSA 9800 Savage Road NSOC, Suite 6433 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: jcsmart@nsa.gov _____________________________________________________ Ms. Teresa Smetzer Strategic Account Executive LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) Email: tsmetzer@lmi.org _____________________________________________________ Angela Smigel Sr. Staff Administrator Ensco, Inc. 5400 Port Royal Road Springfield , VA 22151 Phone: (none) Fax: (703) 321-4609 Email: smigel.angela@ensco.com _____________________________________________________ Lynn Smiroldo Director of Business Managment QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: lynn.smiroldo@qinetiq-na.com _____________________________________________________ Melissa Smislova Director DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Melissa.Smislova@hq.dhs.gov _____________________________________________________ Brandon Smith TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: brandon.smith@mail.house.gov _____________________________________________________ Bryan Smith TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: B_Smith@ssci.senate.gov _____________________________________________________ Clifton L Smith TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Conrad Smith TITLE TBD SR Technologies, Inc. 4101 SW 47 Ave Suite 102 Fort Lauderdale , FL 33314 Phone: (none) Fax: (none) _____________________________________________________ Courtney Smith GeoEye 21700 Atlantic Blvd. Suite 500 Dulles , VA 20166 Phone: (none) Fax: (none) Email: smith.courtney@geoeye.com _____________________________________________________ Mr. David Smith TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: dsmith@potomacinstitute.org _____________________________________________________ Mr. H. G Smith Chief Scientist NGA 4600 Sangamore Rd., M/D D-82 Bethesda , MD 20816 Phone: (none) Fax: (none) Email: Harold.G.Smith@nga.mil _____________________________________________________ Kay Sears President Intelsat General Corporation 6550 Rock Spring Drive Suite 450 Bethesda , MD 20817 Phone: (none) Fax: (none) Email: kay.sears@intelsatgeneral.com _____________________________________________________ Kim Seastrom Admin The MITRE Corporation 7515 Colshire Dr McLean , VA 22102 Phone: (none) Fax: (none) Email: seastrom@mitre.org _____________________________________________________ Kathleen Sebelius Secretary Health and Human Services Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Shelly.watson@hhs.gov _____________________________________________________ Mr. John Sebra Director, Recruiting BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: john.sebra@baesystems.com _____________________________________________________ Adam Sedgewick Cyber Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: adam_sedgewick@hsgac.senate.gov _____________________________________________________ Mr. Mark Segal Director, Westfield Ops L-3 Communications - Government Services, Inc. 15049 Conference Center Drive Suite 200 Chantilly , VA 20151 Phone: (none) Fax: (none) Email: mark.segal@l-3com.com _____________________________________________________ Mark Segal TITLE TBD L-3 Communications - Government Services, Inc. 15049 Conference Center Drive Suite 200 Chantilly , VA 20151 Phone: (none) Fax: (none) Email: mark.segal@l-3com.com _____________________________________________________ CHARLES SEGARS 2850 OCEAN PARK BLVD STE 225 SANTA MONICA , CA 90405 Phone: (none) Fax: (none) Email: CDSEGARS@LASD.ORG _____________________________________________________ Heather Seidl Business Analyst SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: heather.seidl@saic.com _____________________________________________________ Mr. Michael Seidl 1490 Garden of the Gods Road Suite B Colorado Springs , CO 80907 Phone: (none) Fax: (none) Email: mike.seidl@rpssol.com _____________________________________________________ John Sekula 2111 Wilson Blvd., Suite 1120 Arlington , VA 22201 Phone: (none) Fax: (none) _____________________________________________________ Ms. Sharon Sellars TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Ms. Kathleen Sellers Program Manager Sensa Solutions 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) Email: Kathleen.Sellers@sensasolutions.com _____________________________________________________ Amber Sells Unknown Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. William Semancik TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: wsemancik54@comcast.net; or wsemancik@ieee.net; or wjseman@nsa.gov _____________________________________________________ Mr. Ralph Semmel Director Johns Hopkins University, APL 11100 Johns Hopkins Road Room 17-S344 Laurel , MD 20723 Phone: (none) Fax: (none) Email: ralph.semmel@jhuapl.edu _____________________________________________________ Mr. Peter Senholzi Director, Business Development Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: psenholzi@csc.com _____________________________________________________ Mr. William Senich 7220 Old Dominion Drive McLean , VA 22101 Phone: (none) Fax: (none) Email: wmsenich@us.ibm.com _____________________________________________________ Arthur Sepeta Assistant General Counsel FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: arthur.sepeta@ic.fbi.gov _____________________________________________________ Arun Seraphin Cyber Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: arun_seraphin@armed-services.senate.gov _____________________________________________________ Mr. Allan Servi Senior Vice President Terremark 460 Spring Park Place Suite 1000 Herndon , VA 20170 Phone: (none) Fax: (none) Email: aservi@terremark.com _____________________________________________________ Stephanie Sever Operations Manager The Intelligence & Security Academy, LLC 1890 Preston White Drive Suite 250 Reston , VA 20191 Phone: (none) Fax: (none) Email: stephanie@intellacademy.com _____________________________________________________ Kristin Seward TITLE TBD DIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kristin.seward@dia.mil _____________________________________________________ Mr. Matthew A Shabat 7541 Heatherton Lane Potomac , MD 20854 Phone: (none) Fax: (none) _____________________________________________________ Mr. Michael Shackelford 47317 Ox Bow Potomac Falls , VA 20165 Phone: (none) Fax: (none) Email: mikeshackelford@gmail.com _____________________________________________________ Mrs. Michelle Shader Director of Marketing Qwest Communications 4250 N. Fairfax Dr. 5th Floor Arlington , VA 22203 Phone: (none) Fax: (none) Email: michelle.shader@qwest.com _____________________________________________________ Michelle Shader TITLE TBD Qwest Communications 4250 N. Fairfax Dr. 5th Floor Arlington , VA 22203 Phone: (none) Fax: (none) Email: michelle.shader@qwest.com _____________________________________________________ Michelle Shader Marketing Director Qwest Government Services, Inc. 4250 N. Fairfax Dr 5th Fl Arlington , VA 22203 Phone: (none) Fax: (none) Email: michelle.shader@qwest.com _____________________________________________________ Mr. Curt Shaffer Executive Director Global Tech Ops 2 Davenport Drive Downingtown , PA 19335 Phone: (none) Fax: (none) Email: cshaffer@globaltechops.com _____________________________________________________ Mr. Glen Shaffer President & COO Kforce Government Solutions 2750 Prosperity Ave. Suite 300 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: gshaffer@dnovus.com _____________________________________________________ Glen Shaffer Executive Vice President KGS 1355 Central Parkway S. Ste 100 San Antonio , TX 78232 Phone: (none) Fax: (none) Email: gshaffer@kgsgov.com _____________________________________________________ Glen Shaffer Executive Vice President KGS 1355 Central Parkway S Ste 100 San Antonio , TX 78232 Phone: (none) Fax: (none) Email: gshaffer@kforcegov.com _____________________________________________________ Tiffany Shaffery Intelligence Analyst CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: tshaffery@caci.com _____________________________________________________ Mr. Paul Shahady 4390 Powder Horn Drive Beavercreek , OH 45432 Phone: (none) Fax: (none) Email: pashahady@aol.com _____________________________________________________ Mr. Mark Shaheen 8509 Hempstead Avenue Bethesda , MD 20817 Phone: (none) Fax: (none) Email: mshaheen@civitasgroup.com _____________________________________________________ Mr. John A Shakespeare 9417 Goldfield Lane Burke , VA 22015-4213 Phone: (none) Fax: (none) _____________________________________________________ Zani Drizan Shala YES Coordinator off AKC Association of Kosovo Criminallist -Justice Prishtina Prishtina 11000 Yugoslavia Phone: (none) Fax: (none) Email: drizan.shala@gmail.com _____________________________________________________ Stanley Shanfield PhD Technical Program Director Draper Laboratory 555 Technology Square Cambridge , MA 02465 Phone: (none) Fax: (none) Email: sshanfield@draper.com _____________________________________________________ Michael Shank TITLE TBD General Dynamics AIS 2727 Technology Drive Annapolis Junction , MD 20701 Phone: (none) Fax: (none) _____________________________________________________ Ms. Susan Shapero Director, Advd Tech PGeneral Man Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: susan.shapero@hp.com _____________________________________________________ Andrew J Shapiro Political-Military Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: shapiroaj@state.gov _____________________________________________________ Tammi Shapiro Public Sector Operations Manager Quest Software - Public Sector Group 700 King Farm Boulevard Suite 250 Rockville , MD 20850 Phone: (none) Fax: (none) Email: tammi.shapiro@quest.com _____________________________________________________ Mark B Shappee 674 County Square Drive, Suite 1 Ventura , CA 93003 Phone: (none) Fax: (none) Email: mark@venturemanagement.com _____________________________________________________ Theodore Sharp Business Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: sharptd@saic.com _____________________________________________________ mr nigel l sharpe Nigel Sharpe 410X, Ridgeway, Lusaka 100100 Zambia Phone: (none) Fax: (none) Email: nigelsharpe07@gmail.com _____________________________________________________ Pleaman F Shaver 4048 Higley Rd Bldg 1452 Dahlgren , VA 22448 Phone: (540) 775-0477 Fax: (none) Email: pshaver@jwac.mil _____________________________________________________ Mr. K. Shea 14668 Lee Road Chantilly , VA 20151 Phone: (none) Fax: (none) Email: k.stuart.shea@saic.com _____________________________________________________ K. S Shea President, Intelligence, Securit SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: k.stuart.shea@saic.com _____________________________________________________ Mr. Philip Shea Director, Intelligence, DHS QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: phil.shea@qinetiq-na.com _____________________________________________________ Stu Shea Group President SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: sheaks@saic.com _____________________________________________________ Mr. Daniel Shostak 2445 Lyttonsville Road #1505 Silver Spring , MD 20910 Phone: (none) Fax: (none) Email: danielshos@aol.com _____________________________________________________ Justin Shum INSA OCI Task Force Raytheon Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Stephen Sibold 12 Pennsbury Ct. Fredericksburg , VA 22406 Phone: (none) Fax: (none) Email: lecsas0930@earthlink.net _____________________________________________________ Mr. Vincent Sica Program Management Vice Presiden Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: vincent.n.sica@lmco.com _____________________________________________________ Mr. Robert Siebert Director, Defense Agencies Group Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: robert.siebert@hp.com _____________________________________________________ Robert A Siebert Director, HP APG Fed Sales Hewlett Packard Robert Siebert 1582 Rossback Road Davidsonville , MD 21035 Phone: (none) Fax: (none) Email: robert.siebert@hp.com _____________________________________________________ Mr. David Siebs Vice President, Deputy Business CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: dsiebs@caci.com _____________________________________________________ Steve Sieke SVP IT and Professional Svcs Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Renee Siemiet 4504 West Juniper Drive, Apt B USAF Academy , CO 80840 Phone: (none) Fax: (none) Email: renee.siemiet@gmail.com _____________________________________________________ Ms. Rhea Siers TITLE TBD NSA 9800 Savage Road DC3, Suite 6248 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: rdsiers@nsa.gov _____________________________________________________ Jenn Silk TITLE TBD DoD 13646 Forest Pond Court Centreville , VA 20121 Phone: (none) Fax: (none) Email: jksilk@nsa.gov _____________________________________________________ Jennifer Silk 13646 Forest Pond Ct Centreville , VA 20121 Phone: (none) Fax: (none) Email: jennifer.silk@gmail.com _____________________________________________________ Captain Joel Silk 702 E. Capitol St NE Washington , DC 20003 Phone: (none) Fax: (none) Email: joel.silk@gmail.com _____________________________________________________ Joel Silk TITLE TBD NSA 13646 Forest Pond Court Centreville , VA 20121 Phone: (none) Fax: (none) Email: joel.silk@osd.mil _____________________________________________________ Mark Silver Acting Deputy DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mark.silver@usmc.mil _____________________________________________________ Robert Silver MSC 3BF New Mexico State University Las Crusez , NM 88003 Phone: (none) Fax: (none) Email: rsilver@msu.edu _____________________________________________________ Mr. Ariel Silverstone 3530 Berkeley Park Ct Duluth , GA 30096 Phone: (none) Fax: (none) Email: arielsilverstone@hotmail.com _____________________________________________________ Bob Simmons Minority Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: bob.simmons@mail.house.gov _____________________________________________________ Janet A Simmons Masters EVP and COO Global Resource Solutions, Incorporated Janet Simmons 1001 N. Fairfax Street Suite 420 Alexandria , VA 22314 Phone: (301) 274-0741 Fax: (703) 535-7866 Email: jsimmons@grsco.com _____________________________________________________ Mr. Paul Simmons Account Executive Dell Inc. One Dell Way One Dell Way Round Rock , TX 78682 Phone: (none) Fax: (none) Email: paul_e_simmons@dell.com _____________________________________________________ Denis Simon School of International Affairs 245 Katz Building University Park , PA 16802 Phone: (none) Fax: (none) _____________________________________________________ Mr. Jim Simon General Manager, Inst. For Adv. Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: jisimon@microsoft.com _____________________________________________________ Mr. Alan Simpson 1520 Spruce Street #101 Philadelphia , PA 19102 Phone: (none) Fax: (none) Email: intel@comlinks.com _____________________________________________________ Renee Simpson S&I Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Renee_Simpson@ssci.senate.gov _____________________________________________________ Dr. Jennifer Sims School of Foreign Service Washington , DC 20057 Phone: (none) Fax: (none) Email: jes67@georgetown.edu _____________________________________________________ Mr. James Sheaffer President, N.American Public Sec Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: jsheaffer@csc.com _____________________________________________________ Mr. Hal Shear TITLE TBD GrayDome, Inc. P.O. Box 5902 Annapolis , MD 21403 Phone: (none) Fax: (none) Email: hshear@graydome.com _____________________________________________________ Mr. Jacob Shebel 5574 Burnside Drive #4 Rockville , MD 20853 Phone: (none) Fax: (none) Email: jacob.shebel@gmail.com _____________________________________________________ Jacob Shebel TITLE TBD FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jacob.shebel@ic.fbi.gov _____________________________________________________ Mr. Earl Sheck Vice President, Defense Intellig Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: earl.sheck@ngc.com _____________________________________________________ Mr. David Shedd Deputy Director of National Inte DIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: david.shedd@dia.mil _____________________________________________________ Mr. Steve Sheldon TITLE TBD NSA 9800 Savage Road K8, Suite 6672 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) _____________________________________________________ Andrea Shemel Principal Consultant Oracle 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: andrea.shemel@oracle.com _____________________________________________________ Lori Shepard TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: l_shepard@ssci.senate.gov _____________________________________________________ Mr. Robert Sheppard Vice President, Geo-Intel Group BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: robert.sheppard@baesystems.com _____________________________________________________ Veronica C Sherard Divison Manager, Strategic BD ENSCO, Inc. Veronica Sherard 3110 Fairview Park Drive Suite 300 Falls Church , VA 22042 Phone: (321) 724-6487 Fax: (321) 783-9511 Email: sherard.veronica@ensco.com _____________________________________________________ Mr. Brian E Sheridan 8 Woodmere Circle Middletown , MD 21769 Phone: (none) Fax: (none) Email: briansheridan9@comcast.net _____________________________________________________ Mr. Brian E Sheridan BAE Systems 4075 Wilson Blvd Suite 900 Arlington , VA 22203 Phone: (none) Fax: (703) 387-7607 Email: brian.sheridan@baesystems.com _____________________________________________________ William Shernit Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Marc Shichman Project Manager White Oak Technologiese, Inc. 1300 Spring Street Suite 320 Silver Spring , VA 20910 Phone: (none) Fax: (none) _____________________________________________________ Patrick Shields TITLE TBD ASI Government 1655 North Fort Meyer Drive Suite 1000 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Jorge Shimabukuro Chief of Staff, Security DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jorge.shimabukuro@osd.mil _____________________________________________________ Eric Shinseki Secretary, General Veterans Affairs No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: secva@va.gov _____________________________________________________ Mr. Masahiro Shiomi 1800 K st NW Washington , DC 20006 Phone: (none) Fax: (none) Email: msiomijp@gmai.com _____________________________________________________ Ms. Jean M Shipley Communication Marketing Manager Ciena Corporation 1185 Sanctuary Parkway Suite 300 Alpharetta , GA 30004 Phone: (none) Fax: (none) Email: jshipley@ciena.com _____________________________________________________ Mr. John Shissler P.O. Box 2153 Ellicott City , MD 21041 Phone: (none) Fax: (none) Email: John.Shissler@jhuapl.edu _____________________________________________________ Bryan Shonka Security Technology MPI Research 54943 N Main Street Mattawan , MI 49071 Phone: (none) Fax: (none) Email: bryan.shonka@mpiresearch.com _____________________________________________________ Mr. Marvin Shoop TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Craig Short TITLE TBD Aligent 1615 7th Street S.W. MS: 130 Everett , WA 98203-6261 Phone: (none) Fax: (none) Email: craig_short@agilent.com _____________________________________________________ Nadia Short TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Nadia.Short@gd-ais.com _____________________________________________________ Ms. Cara Jo Streb Director, Line CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: cstreb@caci.com _____________________________________________________ Travis Stright Student American University 6490 River Run Columbia , MD 21044 Phone: (none) Fax: (none) Email: travis.stright@american.edu _____________________________________________________ COL Donald Strimbeck USA(Ret) 109 Broad St. P.O Box 519 Granville , WV 26534 Phone: (none) Fax: (none) Email: dcsoinks@comcast.net _____________________________________________________ Dayna Strong Executive Assistant to the VP Eagle Alliance 2711 Technology Drive Annapolis Junction , MD 20701 Phone: (none) Fax: (none) Email: dstrong2@csc.com _____________________________________________________ Angela Stubblefield TSA Intelligence DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Angela.H.Stubblefield@faa.gov _____________________________________________________ Richard Stubblefield 1000 Independence Ave. Washington , DC 20585 Phone: (none) Fax: (none) Email: richard.stubblefield@nnsa.doe.gov _____________________________________________________ Mr. Bruce Stubbs EA for Maritime Domain Awareness DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: bruce.stubbs@osd.mil _____________________________________________________ Mr. Robert Stuckey 3867 Chain Bridge Road Fairfax , VA 22030-3903 Phone: (none) Fax: (none) Email: Bookbear1@verizon.net _____________________________________________________ Bill Studeman Consultant Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Carl Stuekerjuergen 102 Norwood Place Sterling , VA 20164 Phone: (none) Fax: (none) Email: carlrita.stuekerjuergen@verizon.net _____________________________________________________ Alicia Stump Marketing Communications Coordin Cobham Analytic Solutions 5875 Trinity Parkway Suite 300 Centreville , VA 20120 Phone: (none) Fax: (none) _____________________________________________________ Mr. Jerry Stump 3734 Thomas Point Road Annapolis , MD 21403 Phone: (none) Fax: (none) Email: jerry.stump@centurum.com _____________________________________________________ Ms. Mary Sturtevant Vice President, Intelligence Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: mary.k.sturtevant@lmco.com _____________________________________________________ Sarita Subbarao Former INSA Intern Chertoff Group, LLC 1110 Vermont Ave. NW Suite 1200 Washington , DC 20005 Phone: (none) Fax: (none) _____________________________________________________ Dr. Minda Suchan Director ITT Geospatial Minda Suchan 12930 Worldgate Dr, Suite 150 Herndon , VA 20170 Phone: (310) 919-7687 Fax: (571) 703-7471 Email: minda.suchan@itt.com _____________________________________________________ Laura Sucre Program Manager IBM - Federal Public Sector 2902 Beau Lane Fairfax , VA 22031 Phone: (none) Fax: (none) Email: lsucre@us.ibm.com _____________________________________________________ Daniel Suh 110 s.wise st arlington , VA 22204 Phone: (none) Fax: (none) Email: donchicus@gmail.com _____________________________________________________ Michael Sulick Chief, National Clandestine Serv CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1973 Email: christyt@ucia.gov _____________________________________________________ Ms. Linda Sullivan TITLE TBD NRO 6319 Rockwell Road Burke , VA 22015 Phone: (none) Fax: (none) Email: linda.sullivan@nro.mil _____________________________________________________ Ms. Sally Sullivan TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) _____________________________________________________ Tim Sullivan Tim Sullivan 305 Rockrimmon S Colorado Springs , CO 80919 Phone: (none) Fax: (none) Email: tsullivan@pcscm.com _____________________________________________________ Mr. Troy Sullivan Director, Counterintelligence DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: troy.sullivan@osd.mil _____________________________________________________ Yvette Sullivan Program Director The SI 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: helen.d.demes@lmco.com _____________________________________________________ Yvette Sullivan Program Management the SI 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: yvette.f.sullivan@lmco.com _____________________________________________________ George Sumrall 15036 Conference Center Dr. Suite 500 East Chantilly , VA 20151 Phone: (none) Fax: (none) _____________________________________________________ Mr. Richard E Sunday TITLE TBD NSA 9800 Savage Road F6, Suite 6905 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: resunda@nsa.gov _____________________________________________________ Laura Sunden Marketing Manager SR Technologies, Inc. 4101 SW 47 Ave Suite 102 Fort Lauderdale , FL 33314 Phone: (none) Fax: (none) Email: Lsunden _____________________________________________________ Mr Thomas D Sundling CEO Secure Mission Solutions 11921 Freedom Drive Suite 730 Reston , VA 20190 Phone: (none) Fax: (none) Email: tsundling@securemissionsolutions.com _____________________________________________________ Mr. Robert Surrette 1919 Storm Drive Falls Church , VA 22043 Phone: (none) Fax: (none) Email: RJSurrette@aol.com _____________________________________________________ John Sutton SVP Business Development QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. John Swain TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: jswain@potomacinstitute.org _____________________________________________________ Darin Swan Masters 6517 Livingston Rd Apt 103 Oxon Hill , MD 20745 Phone: (none) Fax: (none) Email: digdug113@yahoo.com _____________________________________________________ Mr. James K Swanson MBA, MIPP Senior Vice Presidneet Finmeccanica 1625 Eye Street, NW 12th Floor WASHINGTON , DC 20006 Phone: (none) Fax: (202) 225-6584 Email: james.swanson@finmeccanica.com _____________________________________________________ Mr. Scott Swanson 1431 Hunter Suite A. Naperville , IL 60540 Phone: (none) Fax: (none) Email: chief@delphiresearch.us _____________________________________________________ Mr. William Swanson Chairman & CEO Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: william_h_swanson@raytheon.com _____________________________________________________ Susan Swart Asst Sec Chief Info Officer State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: swarts@state.gov _____________________________________________________ Mr. Joseph Swartz 6454 Woodmere Place Centreville , VA 20120 Phone: (none) Fax: (none) Email: joseph.h.swartz@lmco.com _____________________________________________________ Mr. Michael Swetnam TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: mikeswet@potomacinstitute.org _____________________________________________________ Mike Swetnam TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: mswetnam@potomacinstitute.org _____________________________________________________ Khizer Syed TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: khizer.syed@mail.house.gov _____________________________________________________ Mr. Sherill Sylvertooth 1855 Saint Francis Street #2105 Reston , VA 20190 Phone: (none) Fax: (none) Email: ssylvertooth@yahoo.com _____________________________________________________ Mr. John Syphrit 2324 Fairview Terrace Alexandria , VA 22303 Phone: (none) Fax: (none) Email: john.syphrit@pentagon.af.mil _____________________________________________________ Mr. John Syphrit Targeting Action Officer DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.syphrit@osd.mil _____________________________________________________ Laszlo Szente 2455 Rolling Plains Drive Herndon , VA 20171-2275 Phone: (none) Fax: (none) Email: SzenteLS@gmail.com _____________________________________________________ Mr. James Sheaffer President, N.American Public Sec Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: jsheaffer@csc.com _____________________________________________________ Mr. Hal Shear TITLE TBD GrayDome, Inc. P.O. Box 5902 Annapolis , MD 21403 Phone: (none) Fax: (none) Email: hshear@graydome.com _____________________________________________________ Mr. Jacob Shebel 5574 Burnside Drive #4 Rockville , MD 20853 Phone: (none) Fax: (none) Email: jacob.shebel@gmail.com _____________________________________________________ Jacob Shebel TITLE TBD FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jacob.shebel@ic.fbi.gov _____________________________________________________ Mr. Earl Sheck Vice President, Defense Intellig Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: earl.sheck@ngc.com _____________________________________________________ Mr. David Shedd Deputy Director of National Inte DIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: david.shedd@dia.mil _____________________________________________________ Mr. Steve Sheldon TITLE TBD NSA 9800 Savage Road K8, Suite 6672 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) _____________________________________________________ Andrea Shemel Principal Consultant Oracle 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: andrea.shemel@oracle.com _____________________________________________________ Lori Shepard TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: l_shepard@ssci.senate.gov _____________________________________________________ Mr. Robert Sheppard Vice President, Geo-Intel Group BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: robert.sheppard@baesystems.com _____________________________________________________ Veronica C Sherard Divison Manager, Strategic BD ENSCO, Inc. Veronica Sherard 3110 Fairview Park Drive Suite 300 Falls Church , VA 22042 Phone: (321) 724-6487 Fax: (321) 783-9511 Email: sherard.veronica@ensco.com _____________________________________________________ Mr. Brian E Sheridan 8 Woodmere Circle Middletown , MD 21769 Phone: (none) Fax: (none) Email: briansheridan9@comcast.net _____________________________________________________ Mr. Brian E Sheridan BAE Systems 4075 Wilson Blvd Suite 900 Arlington , VA 22203 Phone: (none) Fax: (703) 387-7607 Email: brian.sheridan@baesystems.com _____________________________________________________ William Shernit Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Marc Shichman Project Manager White Oak Technologiese, Inc. 1300 Spring Street Suite 320 Silver Spring , VA 20910 Phone: (none) Fax: (none) _____________________________________________________ Patrick Shields TITLE TBD ASI Government 1655 North Fort Meyer Drive Suite 1000 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Jorge Shimabukuro Chief of Staff, Security DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jorge.shimabukuro@osd.mil _____________________________________________________ Eric Shinseki Secretary, General Veterans Affairs No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: secva@va.gov _____________________________________________________ Mr. Masahiro Shiomi 1800 K st NW Washington , DC 20006 Phone: (none) Fax: (none) Email: msiomijp@gmai.com _____________________________________________________ Ms. Jean M Shipley Communication Marketing Manager Ciena Corporation 1185 Sanctuary Parkway Suite 300 Alpharetta , GA 30004 Phone: (none) Fax: (none) Email: jshipley@ciena.com _____________________________________________________ Mr. John Shissler P.O. Box 2153 Ellicott City , MD 21041 Phone: (none) Fax: (none) Email: John.Shissler@jhuapl.edu _____________________________________________________ Bryan Shonka Security Technology MPI Research 54943 N Main Street Mattawan , MI 49071 Phone: (none) Fax: (none) Email: bryan.shonka@mpiresearch.com _____________________________________________________ Mr. Marvin Shoop TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Craig Short TITLE TBD Aligent 1615 7th Street S.W. MS: 130 Everett , WA 98203-6261 Phone: (none) Fax: (none) Email: craig_short@agilent.com _____________________________________________________ Nadia Short TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Nadia.Short@gd-ais.com _____________________________________________________ Mr. Jamileh Soudah 1000 Indendence Ave SW NA-116, FOR 4B-044 Washington , DC 20585 Phone: (none) Fax: (none) Email: jamileh.soudah@nnsa.doe.gov _____________________________________________________ Mr. Trumbull D Soule TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: tdsoule@nsa.gov _____________________________________________________ Peter Sowa Program Dir Intel Svcs Ctr Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Mr. Anthony Spadaro President Spadaro & Associates 4634 North 38th Street Suite 100 Arlington , VA 22207 Phone: (none) Fax: (none) Email: spadaro@aol.com _____________________________________________________ Ms. Kathryn Spear Kathryn Spear 1000 Technology Dr. Pittsburgh , PA 15219 Phone: (none) Fax: (none) Email: Kathryn.Spear@ansaldo-sts.us _____________________________________________________ Elyssa J Speier Kipps DeSanto & Company 1600 Tysons Blvd Suite 375 McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Elizabeth Spiegle Program Manager BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: elizabeth.spiegle@baesystems.com _____________________________________________________ Mr. Larry Spilman 13542 Travilah Road North Potomac , MD 20878-3800 Phone: (none) Fax: (none) Email: l.spilman@att.net _____________________________________________________ Mr. Karl Spinnenweber Director, Business Development Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: kspinnen@csc.com _____________________________________________________ Noah Spivak Principal Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: spivak_noah@bah.com _____________________________________________________ Mr. George Spix Architect, Inst. For Adv. Tech i Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: gspix@microsoft.com _____________________________________________________ Mr. Daniel Spohn TITLE TBD The Intelligence & Security Academy, LLC 1890 Preston White Drive Suite 250 Reston , VA 20191 Phone: (none) Fax: (none) Email: danspohn@msn.com _____________________________________________________ William Springer 25208 Larks Terrace South Riding , VA 20152 Phone: (none) Fax: (none) Email: bllspringer@gmail.com _____________________________________________________ DJ Spry 2454 Chelmsford Dr Crofton , MD 21114 Phone: (none) Fax: (none) Email: djspry@gmail.com _____________________________________________________ Jeffrey Spugnardi 5849 North 26th St Arlington , VA 22207 Phone: (none) Fax: (none) Email: jspug@vt.edu _____________________________________________________ Ms. Lisa Spuria Deputy Director, Analysis and Pr NGA 4600 Sangamore Road Bethesda , MD 20816-5003 Phone: (none) Fax: (301) 227-7451 Email: lisa.j.spuria@nga.mil _____________________________________________________ Mr. Michael Squier Police Dept, 100 Bureau Dr. Bldg 101,Rm A-16 Gaithersburg , MD 20899-1911 Phone: (none) Fax: (none) Email: michael.squier@nist.gov _____________________________________________________ Judy St. George Executive Assistant FedCap Partners, LLC 11951 Freedom Drive 13th Floor Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Mr. Craig A Stafford II II 13510 Oaklands Manor Drive Laurel , MD 20708 Phone: (none) Fax: (none) Email: StaffordC88@yahoo.com _____________________________________________________ Mr. Carl Stahlman 10241 Bristol Channel Ellicott City , MD 21042 Phone: (none) Fax: (none) Email: carl.stahlman@mac.com _____________________________________________________ Sandra Stanar-Johnson NSA Liaison to DHS NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: sstanar@nsa.gov _____________________________________________________ Eric Stange Senior Executive Accenture No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: eric.s.stange@accenture.com _____________________________________________________ Joe Stanisha 4501 N. Fairfax Dr Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Leon R Stanley TITLE TBD NSA 9800 Savage Road SSG, Suite 6441 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: lrstanl@nsa.gov _____________________________________________________ Mr. John Stanton 619 S Garfield St Arlington , VA 22204 Phone: (none) Fax: (none) Email: camus666ster@gmail.com _____________________________________________________ Dave Stapley SVP, International Business Deve DRS Technologies, Inc. 5 Sylvan Way Parsippany , NJ 7054 Phone: (none) Fax: (none) Email: dstapley@drs.ca.com _____________________________________________________ Wayne Starrs Sr Director, Apps Dev General Dynamics IT, NDIS 13857 McLearen Road Herndon , VA 20171 Phone: (none) Fax: (none) Email: wayne.starrs@gdit.com _____________________________________________________ Alissa Starzak TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: a_starzak@ssci.senate.gov _____________________________________________________ CJ Staton INSA OCI Task Force CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) _____________________________________________________ Mrs. Carol Staubach 11659 Gilman Lane Herndon , VA 20170-2420 Phone: (703) 430-0924 Fax: (none) Email: carols2002@aol.com _____________________________________________________ Ms. Carol Staubach Vice President Booz Allen Hamilton 11659 Gilman Lane Herndon , VA 20170-2420 Phone: (none) Fax: (none) Email: staubach_carol@bah.com _____________________________________________________ Mr. Thomas Staubach 11659 Gilman Ln Herndon , VA 20170 Phone: (none) Fax: (none) Email: tstaubach@aol.com _____________________________________________________ Rodolfo Steckerl U.S. EMBASSY BOGOTA DOJ RODOLFO STECKERL 70452 HWY 21 SUITE 200-125 COVINGTON , LA 70433 Phone: (none) Fax: (none) _____________________________________________________ Mr. George Steeg Consultant ProposalCrafter 20550 Falcons Landing Circle #5005 Potomac Falls , VA 20165-3586 Phone: (none) Fax: (none) Email: gfsteeg@proposalcrafter.com _____________________________________________________ Catherine J Steele VP, Strategic Space Ops The Aerospace Corporation Attn: Linda Nicoll, M1-447 2310 E. El Segundo Blvd. El Segundo , CA 90245 Phone: (none) Fax: (none) Email: catherine.j.steele@aero.org _____________________________________________________ Mr. Delvicciho Steele 814 Sero Pine Lane Fort Washington , MD 20744 Phone: (none) Fax: (none) Email: dsteele128@comcast.net _____________________________________________________ Mr. Delvicciho Steele TITLE TBD DIA 814 Sero Pine Lane Fort Washington , MD 20744 Phone: (none) Fax: (none) Email: Delvicciho.Steele@dia.mil _____________________________________________________ Mr. Kent Steen 121 North Cove Drive Ponte Vedra Beach , FL 32082 Phone: (none) Fax: (none) Email: kent.steen@gmail.com _____________________________________________________ Mr. William Stefan 5485 Ashleigh Road Fairfax , VA 22030 Phone: (none) Fax: (none) Email: wfstefan@aol.com _____________________________________________________ Mr. William Stefan 5485 Ashleigh Road Fairfax , VA 22030 Phone: (none) Fax: (none) _____________________________________________________ Victoria Steffes 42 Dixon Street Madison , WI 53704 Phone: (none) Fax: (none) Email: vsteffes@wisc.edu _____________________________________________________ Mark Steidler Marketing Coordinator NeoSystems Corp. 8000 Towers Crescent Drive Suite 710 Vienna , VA 22182 Phone: (none) Fax: (none) Email: msteidler@neosystemscorp.com _____________________________________________________ Christopher Steinbach TITLE TBD Newberry Group 2510 Old Highway 94 South St. Charles , MO 63303 Phone: (none) Fax: (none) _____________________________________________________ Christopher J Steinbach President & CEO Newberry Group 2510 Old Highway 94 South St. Charles , MO 63303 Phone: (none) Fax: (none) Email: csteinbach@thenewberrygroup.com _____________________________________________________ Mr. craig Steinberg Sr Partner Meridian Group International 219 S.E. 25th Ave. Boynton Beach , FL 33435 Phone: (none) Fax: (none) Email: csteinberg@meridiangroupintl.com _____________________________________________________ James B Steinberg Deputy Secretary State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: SteinbergJB@state.gov _____________________________________________________ Mr. James Steinke 6034 Richmond Hwy. Apt 505 Alexandria , VA 22303-2109 Phone: (none) Fax: (none) Email: james.steinke@dia.mil _____________________________________________________ Kristen Stephen Legislative Assistant/Legis Fell DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Kristen.Stephen@mail.house.gov _____________________________________________________ Trae Stephens Forward Deployed Engineer Palantir Technologies 1660 International Drive 8th Floor McLean , VA 22102 Phone: (none) Fax: (none) _____________________________________________________ Mr. George Stephenson Dir, NGES Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: george.stephenson@ngc.com _____________________________________________________ Jim Smythers TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: j_smythers@ssci.senate.gov _____________________________________________________ Mr. Albert Snell TITLE TBD Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: albert.snell@ca.com _____________________________________________________ Mr. Fredd Snell TITLE TBD USIS 7799 Leesburg Pike Suite 400 S Falls Church , VA 22043 Phone: (none) Fax: (none) Email: fredd.snell@usis.com _____________________________________________________ Gordon Snow Acting Director, Cyber Division FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: gordon.snow@ic.fbi.gov _____________________________________________________ Asst. Sec. James Snyder Deputy Assistant Secretary, NPPD DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: james.snyder@dhs.gov _____________________________________________________ Jeffrey C Snyder TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Michael A Snyder Associate Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (410) 858-7706 Fax: (none) Email: snyder_michael@bah.com _____________________________________________________ Mr. Rodney Snyder 20704 Parkside Circle Potomac Falls , VA 20165 Phone: (none) Fax: (none) Email: RodneyASnyder@gmail.com _____________________________________________________ Mr. Scott Snyder TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Vince Snyder 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) _____________________________________________________ Vince Snyder Vice President, Defense Systems The SI 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: helen.d.demes@lmco.com _____________________________________________________ Mr. Gary Sojka Partner The Potomac Advocates 7360 Bloomington Court Springfield , VA 22150 Phone: (none) Fax: (none) Email: gary@potadv.com _____________________________________________________ Dan Soliman TITLE TBD General Dynamics AIS 2305 Mission College Boulevard Santa Clara , CA 95054 Phone: (none) Fax: (none) _____________________________________________________ Sarah Soliman 1115 Old Cedar Road McLean , VA 22102 Phone: (none) Fax: (none) Email: sklovell@gmail.com _____________________________________________________ Hilda L. Solis Secretary Labor Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ExecutiveSecretariat@dol.gov _____________________________________________________ Carl Solomon Vice President Entegra Systems 2342 Ballard Way Ellicott City , MD 21042 Phone: (none) Fax: (none) Email: carl@entegrasystems.com _____________________________________________________ Linda K Solomon Principal Deloitte Consulting Earlease Jackson 1001 G Street, NW Suite 900W Washington , DC 20001 Phone: (none) Fax: (202) 661-1670 Email: lsolomon@deloitte.com _____________________________________________________ LCDR Timothy C Sommella Program Reviewer U.S. Coast Guard COMDT (CG-82) U.S. Coast Guard 2100 2nd Street SW STOP 7245 Washington , DC 20593 Phone: (none) Fax: (none) Email: timothy.c.sommella@uscg.mil _____________________________________________________ Mark Sommer 1266 Teaneck Road #10A Teaneck , NJ 7666 Phone: (none) Fax: (none) Email: brocean@aol.com _____________________________________________________ Mr. Stephen Songy 716 Earl of Chesterfield Lane Virginia Beach , VA 23454 Phone: (none) Fax: (none) Email: stevesongy@mjww.net _____________________________________________________ Dr. Allan Sonsteby Assoicate Director, Communicatio Pennsylvania State University - App. Research Labo P.O. Box 30 State College , PA 16804 Phone: (none) Fax: (none) Email: ags108@only.arl.psu.edu _____________________________________________________ Marcus Soriano B.A. Psy. Contract Assistant Booz Allen Hamilton 8283 Greensboro Dr. Mclean , VA 22204 Phone: (none) Fax: (none) Email: marcus.l.soriano@gmail.com _____________________________________________________ Eric Sosnitsky Director, Government Sales Core180, Inc. 2751 Prosperity Drive Suite 200 Vienna , VA 22031 Phone: (none) Fax: (none) _____________________________________________________ Pamela Sotnick TITLE TBD Composite Software Inc. 11921 Freedom Drive Suite 550 Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Pamela Sotnick Account Manager Composite Software Inc. 11921 Freedom Drive Suite 550 Reston , VA 20190 Phone: (none) Fax: (none) Email: pam@compositesw.com _____________________________________________________ Mr. Hal Smith Vice President, Intelligence & L Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: hsmith30@csc.com _____________________________________________________ Mr. Jeffrey Smith none Arnold & Porter 555 Twelfth Street, NW Washington , DC 20004 Phone: (none) Fax: (none) Email: Jeffrey_Smith@aporter.com _____________________________________________________ Jeffrey E Smith VP BD DoD Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Mr. Jeffrey E Smith VP Serco Jeffrey Smith 1818 Library St Suite 1000 Reston , VA 20190 Phone: (none) Fax: (none) Email: JESmith@serco-na.com _____________________________________________________ Mr. Joel Smith TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jrsmith@nsa.gov _____________________________________________________ Mr. John Smith TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) _____________________________________________________ Mr. John T Smith 12508 Ridgegate Drive Herndon , VA 20170 Phone: (none) Fax: (none) Email: jsmith611@cox.net _____________________________________________________ Mr. Joseph Smith 4822 Union Cypress Place West Melbourne , FL 32904 Phone: (none) Fax: (none) Email: jcsmithjr@cfl.rr.com _____________________________________________________ Judy Smith TITLE TBD ITT 12975 Worldgate Dr. Building M1 Herdon , VA 20170 Phone: (none) Fax: (none) Email: judy.smith@itt.com _____________________________________________________ Kevin Smith 2122 Massachusetts Ave NW Apt 209 Washington , DC 20008 Phone: (none) Fax: (none) Email: kws.international@gmail.com _____________________________________________________ Mr. Michael Smith 3782 Plum Meadow Drive Ellicott City , MD 21042 Phone: (none) Fax: (none) Email: michaelmasmth@aol.com _____________________________________________________ Michael Smith 3620 Beacon Point St Las Vegas , NV 89133 Phone: (none) Fax: (none) Email: msi@co.clark.nv.us _____________________________________________________ Michael Smith 3620 Beacon Point Street Las Vegas , NV 89129 Phone: (none) Fax: (none) Email: msi@co.clark.nv.us _____________________________________________________ Mr. Neal A Smith TITLE TBD NSA 9800 Savage Road I, Suite 6577 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: nasmith@nsa.gov _____________________________________________________ Mr. Paul Smith Assistant Vice President, Specia Intec Billing, Inc. 301 North Perimeter Center Suite 200 Atlanta , GA 30346 Phone: (none) Fax: (none) Email: paul.smith@intecbilling.com _____________________________________________________ Ray Smith Program Manager National Counterterrorism Center 8531 Welsh Pony Ct Gainesville , VA 20155 Phone: (none) Fax: (none) Email: ray.smith@ugov.gov _____________________________________________________ Ray Smith Project Manager NCTC 8531 Welsh Pony Ct Gainesville , VA 20155 Phone: (none) Fax: (none) Email: ray.c.smith@gmail.com _____________________________________________________ Mr. Raymond Smith 8531 Welsh Pony Ct. Gainsville , VA 20155 Phone: (none) Fax: (none) Email: ray.smith@ugov.gov _____________________________________________________ Richard Smith (aka Smith Balentine, Rod Jimmy) PO Box 1650 Soquel , CA 95073 Phone: (none) Fax: (none) Email: california.globalist@yahoo.com _____________________________________________________ Rod Smith Abraxas Corp 12801 Worldgate Dr Herndon , VA 20170 Phone: (none) Fax: (none) _____________________________________________________ Mr. Rodney Smith Abraxas Corporation 12801 Worldgate Drive, Suite 800 Herndon , VA 20170 Phone: (none) Fax: (none) Email: rsmith@abraxascorp.com _____________________________________________________ Rodney Smith President Abraxas Corporation 12801 Worldgate Dr Suite 800 Herndon , VA 20170 Phone: (301) 881-0126 Fax: (703) 821-8511 Email: rsmith@abraxascorp.com _____________________________________________________ Mr. Ronald Smith 236 West Sixth St. Suite 206 Reno , NV 89503 Phone: (none) Fax: (none) Email: ron.smith@chw.edu _____________________________________________________ Zannie Smith TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Zannie.smith@gd-ais.com _____________________________________________________ Mr. Gregory Smithberg TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Max Poma 3801 Nebraska Avenue Washington , DC 20016 Phone: (none) Fax: (none) Email: max.poma@dhs.gov _____________________________________________________ David Pomerantz Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: david.pomerantz@mail.house.gov _____________________________________________________ Ms. Sabrina Porcelli 4 University Road #409 Cambridge , MA 2138 Phone: (none) Fax: (none) Email: sabrinaporcelli@yahoo.com _____________________________________________________ Elizabeth M Porter Director, Energy Initiatives Lockheed Martin, Corporate Engineering & Technolog 6801 Rockledge Drive #352 Bethesda , MD 20817 Phone: (none) Fax: (301) 897-6822 Email: liz.porter@lmco.com _____________________________________________________ Pamela L Porter Director, NSA Office of Small Bu NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: plporte@nsa.gov _____________________________________________________ Scott Porter VP, NGES Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Terry Porter Director, Intelligence Programs Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: terrybev@aol.com _____________________________________________________ Terry Porter Director, Intelligence Programs Harris Corporation P.O. Box 37 MS: 2-21D Melbourne , FL 32902 Phone: (none) Fax: (none) Email: terry_porter@raytheon.com _____________________________________________________ Terry Porter Director Intelligence Programs Raytheon Company 6225 Brandon Avenue Suite 320 Springfield , VA 22150 Phone: (none) Fax: (none) Email: tporte03@harris.com _____________________________________________________ Mr. Norman Portner 18221 Cypress Point Terrace Leesburg , VA 20176 Phone: (none) Fax: (none) Email: nportner@npci.com _____________________________________________________ Michael H Posner Asst Sec Democracy, Human rights State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: posnermh@state.gov _____________________________________________________ Gregg Potter Vice J2 DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: gregg.potter@js.pentagon.mil _____________________________________________________ Mr. Jack Potter General Manager, Ops & Sustainme BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: jack.potter@esi.baesystems.com _____________________________________________________ Brian Potts TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Brian_Potts@appro.senate.gov _____________________________________________________ Mr. Richard E Pound 205 Van Buren Street, Suite 300 Herndon , VA 20170 Phone: (none) Fax: (none) Email: Richard.E.Pound@raytheon.com _____________________________________________________ Mr. Carl Powe 5614 Alta Dena St. Huntsville , AL 35802 Phone: (none) Fax: (none) Email: cpowe@aol.com _____________________________________________________ Benjamin Powell Partner Wilmer Hale 803 Beverley Drive Alexandria , VA 22302 Phone: (none) Fax: (none) Email: ben.powell@wilmerhale.com _____________________________________________________ Hannah Powell Special Assistant, Undersecretar DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Hannah.Powell@osd.mil _____________________________________________________ Ms. Hannah R Powell 1255 New Hampshire Ave, NW Apt 214 Washington , DC 20036 Phone: (none) Fax: (none) _____________________________________________________ Nancy J Powell HR State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: powellnj@state.gov _____________________________________________________ Mr. Henry Power TITLE TBD Lockheed Martin Corporation 6029 Hortons Mill Court Haymarket , VA 20169 Phone: (none) Fax: (none) Email: henry.power@lmco.com _____________________________________________________ Ms. Mary Predenkoski TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Mr. Keith M Preising BA & MS Specialist Master Deloitte Consulting Keith M. Preising 1919 North Lynn Street Arlington , VA 22209 Phone: (703) 793-9811 Fax: (none) Email: kpreising@deloitte.com _____________________________________________________ Mr. Ray Prescott Regional Vice President, INTEL Oracle Corporation 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: raymond.prescott@oracle.com _____________________________________________________ Mary C Presnell Cathy Presnell 1676 International Drive McLean , VA 22102 Phone: (none) Fax: (202) 318-2274 Email: mpresnell@kpmg.com _____________________________________________________ Salvatore Presti Vice President Eti Engineering Inc. 4219 Lafayette Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: sal.presti@eti-eng.com _____________________________________________________ Salvatore Presti Vice President ETI Engineering, Inc. 4219 Lafayette Center Drive Chantilly , VA 20151 Phone: (none) Fax: (703) 318-7102 Email: sal.presti@gmail.com _____________________________________________________ Mrs. Bernadette Preston TITLE TBD NSA 9800 Savage Road R3, Suite 6883 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) _____________________________________________________ Stephen Preston General Counsel CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: christyt@ucia.gov _____________________________________________________ Doug Price Operations Manager Cobham Analytic Solutions 5875 Trinity Parkway Suite 300 Centreville , VA 20120 Phone: (none) Fax: (none) _____________________________________________________ Laura Price 1676 International Drive McLean , VA 22102 Phone: (none) Fax: (none) Email: lprice@kpmg.com _____________________________________________________ Laura Price Partner KPMG LLP Laura Price 1676 International Drive McLean , VA 22102 Phone: (none) Fax: (none) Email: lprice@kpmg.com _____________________________________________________ Mr. Michael Price 1934 Old Gallows Road #350 Vienna , VA 22182 Phone: (none) Fax: (none) Email: mprice@jamitek.com _____________________________________________________ Ms. Dana Priest Staff Writer The Washington Post 1150 15th St. NW Washington , DC 20071 Phone: (none) Fax: (none) Email: priestd@washpost.com _____________________________________________________ Jayne P Prin Dir of Leadership NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jayne.p.prin@ugov.gov _____________________________________________________ Tim Prince TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Tim.Prince@mail.house.gov _____________________________________________________ Mr. Larry Prior TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) Email: lawrence.prior@baesystems.com _____________________________________________________ Todd Probert TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. James Prohaska 7403 Gateway Court Manassas , VA 20109 Phone: (none) Fax: (none) Email: jprohaska@fulcrumco.com _____________________________________________________ William Prosser Client Business Manager AT&T Government Solutions-NIS 7125 Columbia Gateway Drive Suite 100 Columbia , MD 21046 Phone: (none) Fax: (none) Email: wp5243@att.com _____________________________________________________ Mr. Gary Pulliam Vice President, Civil & Commerci The Aerospace Corporation Attn: Linda Nicoll, M1-447 2310 E. El Segundo Blvd. El Segundo , CA 90245 Phone: (none) Fax: (none) Email: gary.p.pulliam@aero.org _____________________________________________________ Andy Purdy Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ SPC Roman Pyatetsky Specialist Army - State Guard of the State of New York 2520 Batchelder St. Suite 8J Brooklyn , NY 11235 Phone: (none) Fax: (none) Email: Roman.pyatetsky@newyorkguard.us _____________________________________________________ Martijn Rasser TITLE TBD CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (703) 482-1739 Email: MARTIJR@ucia.gov _____________________________________________________ Martijn Rasser Military Analyst CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: MARTIJR@ucia.gov _____________________________________________________ Mina Rath TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) _____________________________________________________ Greg Rattray Principal Delta Risk LLC 2804 N. Seminary Chicago , IL 60657 Phone: (none) Fax: (none) Email: grattray@delta-risk.net _____________________________________________________ Mr. Justin A Rauschuber Intelligence Analyst USN 5312 Mt. Olive Rd Adkins , TX 78101 Phone: (none) Fax: (none) Email: justinrauschuber06@yahoo.com _____________________________________________________ Erik Raven TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Erik_Raven@appro.senate.gov _____________________________________________________ Abbas Ravjani Professional Staff Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: abbas.ravjani@aya.yale.edu _____________________________________________________ Rodger Rawls TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Rodger.Rawls@gd-ais.com _____________________________________________________ Bill Ray VP-Sales/Business Development Basis Technology One Alewife Center Cambridge , MA 02140-2323 Phone: (none) Fax: (none) _____________________________________________________ Katie Ray Foundation Coordinator & Sales S GeoEye 2325 Dulles Corner Blvd. Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ Paul Reagan Chief of Staff, Sen. Webb Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: paul_reagan@webb.senate.gov _____________________________________________________ Ms. Suzanne Reardon Research Fellow LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) Email: sreardon@lmi.org _____________________________________________________ Timothy Reardon INSA OCI Task Force Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) _____________________________________________________ Mr. J R Reddig Senior Director, Technical CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: jreddig@caci.com _____________________________________________________ Mr. James Reddig 4502 Arlington Boulevard #405 Arlington , VA 22203 Phone: (none) Fax: (none) Email: jayare303@aol.com _____________________________________________________ Alissa Redding Systems Engineering Mgr the SI 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: helen.d.demes@lmco.com _____________________________________________________ Mr. Michael Redgraves IA Senior IA Architect, Suite 64 NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mrredgr@nsa.gov _____________________________________________________ Ms. Gloria Redman 22548 Glenn Drive Suite 105 Sterling , VA 20164-4447 Phone: (none) Fax: (none) Email: gredman@triumph-tech.com _____________________________________________________ Melinda Redman 5887 Kara Place Burke , VA 22015 Phone: (none) Fax: (none) Email: mredman@totalintel.com _____________________________________________________ Ms. Melinda Redman 901 N. Glebe Road, Suite 901 Arlington , VA 22203 Phone: (none) Fax: (none) Email: mredman@totalintel.com _____________________________________________________ Mrs. Annette Redmond 1906 Ames Ct Woodbridge , VA 22191 Phone: (none) Fax: (none) Email: ffrenchie15@hotmail.com _____________________________________________________ Frank Redner Manager Government Program Devel Software Engineering Institute, CMU NRECA Building Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Jack Reed Sen. Committee Member Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rosanne_haroian@reed.senate.gov _____________________________________________________ Mr. Jon Reed Director Special Programs Harris Corporation P.O. Box 37 MS: 2-21D Melbourne , FL 32902 Phone: (none) Fax: (none) Email: jreed@harris.com _____________________________________________________ Ann Reese TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Ann.Reese@mail.house.gov _____________________________________________________ Gary Reese Professional Staff Member Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Gary_Reese@appro.senate.gov _____________________________________________________ Garry Reid Deputy Assistant Secretary, Spec DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: garry.reid@osd.mil _____________________________________________________ Ms. Kim S Reid 4853 Tobacco Way Woodbridge , VA 22193 Phone: (none) Fax: (none) Email: Kim.reid@fas.usda.gov _____________________________________________________ Peter R Reif 42920 Nashua Street Ashburn , VA 20147 Phone: (none) Fax: (none) Email: prreif@msn.com _____________________________________________________ Laurinda Reifsteck BS, MS Special Agent Air Force Office of Special Investigations 1535 Command Drive Andrews AFB , MD 20762 Phone: (none) Fax: (none) Email: laurinda.reifsteck@us.af.mil _____________________________________________________ Mr. Thomas Reinhardt N.American Public Sector, Sr Bus Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: treinhardt@csc.com _____________________________________________________ Tracy A Reinhold National Security Branch, Direct FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: tracy.reinhold@ic.fbi.gov _____________________________________________________ Mr. David Reist TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: dreist@potomacinstitute.org _____________________________________________________ Mr. Ernest Reith Deputy Director, InnoVision Dire NGA 4600 Sangamore Road Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: ernest.reith@nga.mil _____________________________________________________ Mr. Ernest Reith Dep Dir - S&T Branch FBI Ernest Reith/A-EAD STB 935 Pennsylvania Ave, NW Room 7270 Washington , DC 20535 Phone: (none) Fax: (202) 324-0705 Email: ernest.reith@ic.fbi.gov _____________________________________________________ Mr. Michael Reith 9800 Rod Road Alpharetta , GA 30022 Phone: (none) Fax: (none) Email: intelrisk@earthlink.net _____________________________________________________ Phil Reitinger Deputy Undersecretary, NPPD DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Philip.Reitinger@Dhs.gov _____________________________________________________ Scott Renda Policy Analyst, Platform Manager U.S. Office of Management and Budget 1511 Park Rd NW #33 Washington , DC 20010 Phone: (none) Fax: (none) Email: renda@runbox.com _____________________________________________________ Mark Resnik Manager Deloitte Consulting, LLP 39659 Rosebay Court Indian Land , SC 29707 Phone: (none) Fax: (none) Email: mresnik@deloitte.com _____________________________________________________ Dr. John Retelle TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: jretelle@potomacinstitute.org _____________________________________________________ Mr. Thomas Revay 9105 Murdock Road Fairfax , VA 22032 Phone: (none) Fax: (none) Email: thom0573@yahoo.com _____________________________________________________ Mr. William Reybold TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Silvestre Reyes Rep. Chair Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (202) 225-2016 Email: liza.lynch@mail.house.gov _____________________________________________________ Mr. Michael K Reynolds 21101 Carthagena Ct Ashburn , VA 20147 Phone: (none) Fax: (none) Email: Michael.Reynolds@Marklogic.com _____________________________________________________ Michael K Reynolds Sr. Director Business Developmen Marklogic Michael Reynolds 1600 Tysons Blvd Suite 800 Mclean , VA 22102 Phone: (none) Fax: (none) Email: Michael.Reynolds@Marklogic.COM _____________________________________________________ Michael K Reynolds Sr. Director Business Developmen Marklogic Michael Reynolds 1600 Tysons Blvd Suite 800 Mclean , VA 22102 Phone: (none) Fax: (none) Email: Michael.Reynolds@Marklogic.COM _____________________________________________________ Mr. Barry Rhine Sector Vice President and Genera Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: barry.rhine@ngc.com _____________________________________________________ Rob Rhode Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Charles Rhodes BS/MBA ODNI ODNI Charles Rhodes 3223 Walbridge Place NW Washington , DC 20010 Phone: (none) Fax: (none) Email: Rhodesiii3@gmail.com _____________________________________________________ Mr. George Rhodes Vice President/General Manager S General Dynamics - Information Technology 7902 Oak Hollow Lane Fairfax Station , VA 22039 Phone: (none) Fax: (none) Email: george.rhodes@gdit.com _____________________________________________________ Mr. James Rhodes 2823 Hitchcock Mill Run Marietta , GA 30068 Phone: (none) Fax: (none) Email: jrrhodes@gmail.com _____________________________________________________ Mr. James R Rhodes III Lead Architect TRSS, LLC 1410 Spring Hill Rd Suite 140 McLean , VA 22102 Phone: (none) Fax: (none) Email: bob.rhodes@trssllc.com _____________________________________________________ Jill D Rhodes TITLE TBD ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jill.d.rhodes@ugov.gov _____________________________________________________ Mr. Matthew Rhodes 18862 Bent Willow Circle #1032 Germantown , MD 20874 Phone: (none) Fax: (none) Email: mrhodes3@umd.edu _____________________________________________________ Stephen Riccitelli 2955 Madison Avenue Unit 40 Bridgeport , CT 06606-2071 Phone: (none) Fax: (none) Email: sasd127@gmail.com _____________________________________________________ Dan Rice VP, IS&GS-Security, Spatial Solu Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) _____________________________________________________ Mr. Gregory Rice Director of BD Boeing 3370 E. Miraloma Avenue Anaheim , CA 92806 Phone: (none) Fax: (none) Email: sean.rice@boeing.com _____________________________________________________ Mr. Mark Richard Director, Business Development Sypris Electronics 10901 N. McKinley Drive Tampa , FL 33612 Phone: (none) Fax: (none) Email: mark.richard@sypris.com _____________________________________________________ John Richardson 1912 N. 13th St. #102 Arlington , VA 22201 Phone: (none) Fax: (none) Email: jlr94@georgetown.edu _____________________________________________________ Melissa M Richardson TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Aaron Richman PO Box 56555 Phila , PA 19111 Phone: (none) Fax: (none) Email: ARICHMAN3@GMAIL.COM _____________________________________________________ Michelle Richman Application Design Manager SRA 1252 Harbor Island Walk Baltimore , MD 21230 Phone: (none) Fax: (none) Email: mrichman411@yahoo.com _____________________________________________________ Kathleen Rick TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: K_rick@ssci.senate.gov _____________________________________________________ Mr. Scott Rickard SVP Business Development Telesecret Inc. 545 Lanternback Island Dr Satellite Beach , FL 32937 Phone: (none) Fax: (none) Email: scott@telesecret.com _____________________________________________________ Mr. Wayne Riegel TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Robert Riegle Senior Executive Service DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: robert.riegle@dhs.gov _____________________________________________________ Mr. Robert C Riegle JD COO Mission Concepts, Inc. 902A Prince St. Alexandria , VA 22314 Phone: (none) Fax: (none) Email: robert_riegle@missionconcepts.com _____________________________________________________ Ms. H. L Riley TITLE TBD NSA 9800 Savage Road M, Suite 6665 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: hlriley@nsa.gov _____________________________________________________ Mr. Edward Rinkavage TITLE TBD CentralPoint 901 N. Stuart Street Ste 810 Arlington , VA 22203 Phone: (none) Fax: (none) Email: erinkavage@i-centralpoint.com _____________________________________________________ Mr Albert J Rio Jr consultant IBM Corporation 12533 Ridgemoor Lake Court St. Louis , MO 63131 Phone: +34-670-02-8556 Fax: (none) Email: albert.rio@es.ibm.com _____________________________________________________ Mr. Steven Ritchey 4400 Fair Lakes Court Fairfax , VA 22033 Phone: (none) Fax: (none) Email: sritchey@afcea.org _____________________________________________________ Debbie L Rivera Manager, Marketing and Communica General Dynamics IT Debbie Rivera 13857 McLearen Road Herndon , VA 20171 Phone: (none) Fax: (703) 268-7885 Email: debbie.rivera@gdit.com _____________________________________________________ Ms. Debra Rivera Marketing Coordinator General Dynamics IT, NDIS 15000 Conference Center Drive Chantilly , VA 20121 Phone: (none) Fax: (none) Email: debbie.rivera@gdit.com _____________________________________________________ Debra L Rivera TITLE TBD General Dynamics IT, NDIS 15000 Conference Center Drive Chantilly , VA 20121 Phone: (none) Fax: (none) Email: debbie.rivera@gdit.com _____________________________________________________ Mr. John Rixse 750 N. Tamiami Trail #619 Sarasota , FL 34236 Phone: (none) Fax: (none) Email: jrixse@earthlink.net _____________________________________________________ Doug Roach TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: doug.roach@mail.house.gov _____________________________________________________ Mr. Andrew Robbert Practice Director, Consulting NS Oracle Corporation 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: drew.robbert@oracle.com _____________________________________________________ Mr. David W Robbins BSEE, MEEE VP for Operations SAIC, Applied CBRNE & DE Operation David W Robbins SAIC 10260 Campus Point Drive San Diego , CA 92121 Phone: (none) Fax: (858) 826-2225 Email: robbinsd@saic.com _____________________________________________________ Ms. Donna M Roberson Roberson Group 101 Constitutution Avenue NW Suite L110 Washington , DC 20001 Phone: (none) Fax: (202) 204-5606 Email: donnaroberson@robersongroup.com _____________________________________________________ Charles Robert Member of Technical Staff Sandia National Laboratories P.O. Box 5800 Albuquerque , NM 87185 Phone: (none) Fax: (none) Email: cjrober@sandia.com _____________________________________________________ Mr. Bruce Roberts TITLE TBD Cubic Defense Applications, Inc. 9333 Balboa Ave San Diego , CA 92123 Phone: (none) Fax: (none) Email: bruce.roberts@cubic.com _____________________________________________________ Bruce Roberts TITLE TBD Cubic Defense Applications, Inc. 9333 Balboa Ave San Diego , CA 92123 Phone: (none) Fax: (none) Email: bruce.roberts@cubic.com _____________________________________________________ Daniel D Roberts Criminal Justice Information Ser FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: daniel.roberts@ic.fbi.gov _____________________________________________________ Mr. Gregory Roberts President, Communications System L-3 Communications/Com.Sys.East 1 Federal Street A&E-2C Camden , NJ 8103 Phone: (none) Fax: (none) Email: greg.roberts@l-3com.com _____________________________________________________ Mr. Phil Roberts Chief of Staff DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Phillip.Roberts@dia.mil _____________________________________________________ Terry Roberts TITLE TBD Software Engineering Institute, CMU No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: twroberts@sei.cmu.edu _____________________________________________________ Terry Roberts Executive Director Software Engineering Institute 4301 Wilson Blvd Arlington , VA 22203 Phone: (none) Fax: (703) 908-9235 Email: twroberts@sei.cmu.edu _____________________________________________________ Richard Robey BSME, MBA Director Business Development Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Deborah Robinson Director, National Programs SAIC 14668 Lee road Chantilly , VA 20151 Phone: (none) Fax: (none) Email: deborah.a.robinson@saic.com _____________________________________________________ Deborah Robinson Business Development Raytheon Company 22260 Pacific Blvd Sterling , VA 20166 Phone: (none) Fax: (none) Email: deborah.a.robinson@raytheon.com _____________________________________________________ Deborah Robinson Business Development Raytheon 22270 Pacific Blvd Sterling , VA 20166 Phone: (none) Fax: (none) Email: deborah.a.robinson@raytheon.com _____________________________________________________ Dwayne Robinson President/CEO of VSTI, A SAS Com SAS Institute 1530 Wilson Blvd Suite 800 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr Ross R Robinson BBA President Icentric Marketing, Inc 25671 Tremaine Terrace South Riding , VA 20152 Phone: (none) Fax: (703) 327-7440 Email: rrobinson@icentric-marketing.com _____________________________________________________ Ms. Cheryl Roby DoD Chief Information Officer, O DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: cheryl.roby@osd.mil _____________________________________________________ Dr. Richard Roca Director Emeritus Johns Hopkins University, APL 11100 Johns Hopkins Road Room 17-S344 Laurel , MD 20723 Phone: (none) Fax: (none) Email: richard.roca@jhuapl.edu _____________________________________________________ Edward M Roche, Ph.D.,J.D. Director of Scientific Intellige Barraclough Ltd. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: eroche@barracloughltd.com _____________________________________________________ Chris Rocheleau Deputy Director of Intelligence FAA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Chris.Rocheleau@faa.gov _____________________________________________________ Mr. Christopher Rocheleau TITLE TBD Federal Aviation Administration 2903 Valley Dr Alexandria , VA 22302 Phone: (none) Fax: (none) Email: chris.rocheleau@faa.gov _____________________________________________________ Mr. Michael T Rochford Sr. Counterintelligence Officer Oak Ridge National Lab Michael T. Rochford P O Box 2008 Building 5300, MS 6076 Oak Ridge , TN 37831 Phone: (none) Fax: (865) 241-0240 Email: rochfordmt@ornl.gov _____________________________________________________ Michael A Rodrigue Director, New Campus East PMO NGA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: michael.rodrigue@nga.mil _____________________________________________________ Carrie Rodriguez 1919 N. Lynn St. Arlington , VA 22209 Phone: (none) Fax: (none) Email: cwrodriguez@deloitte.com _____________________________________________________ Michelle Shader TITLE TBD Qwest Communications 4250 N. Fairfax Dr. 5th Floor Arlington , VA 22203 Phone: (none) Fax: (none) Email: michelle.shader@qwest.com _____________________________________________________ Michelle Shader Marketing Director Qwest Government Services, Inc. 4250 N. Fairfax Dr 5th Fl Arlington , VA 22203 Phone: (none) Fax: (none) Email: michelle.shader@qwest.com _____________________________________________________ Mr. Curt Shaffer Executive Director Global Tech Ops 2 Davenport Drive Downingtown , PA 19335 Phone: (none) Fax: (none) Email: cshaffer@globaltechops.com _____________________________________________________ Mr. Glen Shaffer President & COO Kforce Government Solutions 2750 Prosperity Ave. Suite 300 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: gshaffer@dnovus.com _____________________________________________________ Glen Shaffer Executive Vice President KGS 1355 Central Parkway S. Ste 100 San Antonio , TX 78232 Phone: (none) Fax: (none) Email: gshaffer@kgsgov.com _____________________________________________________ Glen Shaffer Executive Vice President KGS 1355 Central Parkway S Ste 100 San Antonio , TX 78232 Phone: (none) Fax: (none) Email: gshaffer@kforcegov.com _____________________________________________________ Tiffany Shaffery Intelligence Analyst CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: tshaffery@caci.com _____________________________________________________ Mr. Paul Shahady 4390 Powder Horn Drive Beavercreek , OH 45432 Phone: (none) Fax: (none) Email: pashahady@aol.com _____________________________________________________ Mr. Mark Shaheen 8509 Hempstead Avenue Bethesda , MD 20817 Phone: (none) Fax: (none) Email: mshaheen@civitasgroup.com _____________________________________________________ Mr. John A Shakespeare 9417 Goldfield Lane Burke , VA 22015-4213 Phone: (none) Fax: (none) _____________________________________________________ Zani Drizan Shala YES Coordinator off AKC Association of Kosovo Criminallist -Justice Prishtina Prishtina 11000 Yugoslavia Phone: (none) Fax: (none) Email: drizan.shala@gmail.com _____________________________________________________ Stanley Shanfield PhD Technical Program Director Draper Laboratory 555 Technology Square Cambridge , MA 02465 Phone: (none) Fax: (none) Email: sshanfield@draper.com _____________________________________________________ Michael Shank TITLE TBD General Dynamics AIS 2727 Technology Drive Annapolis Junction , MD 20701 Phone: (none) Fax: (none) _____________________________________________________ Ms. Susan Shapero Director, Advd Tech PGeneral Man Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: susan.shapero@hp.com _____________________________________________________ Andrew J Shapiro Political-Military Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: shapiroaj@state.gov _____________________________________________________ Tammi Shapiro Public Sector Operations Manager Quest Software - Public Sector Group 700 King Farm Boulevard Suite 250 Rockville , MD 20850 Phone: (none) Fax: (none) Email: tammi.shapiro@quest.com _____________________________________________________ Mark B Shappee 674 County Square Drive, Suite 1 Ventura , CA 93003 Phone: (none) Fax: (none) Email: mark@venturemanagement.com _____________________________________________________ Theodore Sharp Business Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: sharptd@saic.com _____________________________________________________ mr nigel l sharpe Nigel Sharpe 410X, Ridgeway, Lusaka 100100 Zambia Phone: (none) Fax: (none) Email: nigelsharpe07@gmail.com _____________________________________________________ Pleaman F Shaver 4048 Higley Rd Bldg 1452 Dahlgren , VA 22448 Phone: (540) 775-0477 Fax: (none) Email: pshaver@jwac.mil _____________________________________________________ Mr. K. Shea 14668 Lee Road Chantilly , VA 20151 Phone: (none) Fax: (none) Email: k.stuart.shea@saic.com _____________________________________________________ K. S Shea President, Intelligence, Securit SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: k.stuart.shea@saic.com _____________________________________________________ Mr. Philip Shea Director, Intelligence, DHS QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: phil.shea@qinetiq-na.com _____________________________________________________ Stu Shea Group President SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: sheaks@saic.com _____________________________________________________ Jon Ross Executive Director CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: 703-679-6465 Fax: (none) _____________________________________________________ Mary Stone Ross TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mary.ross@mail.house.gov _____________________________________________________ Deb Rossi Global Enterprise Manager NetApp 1921 Gallows Road Suite 600 Vienna , VA 22182 Phone: (none) Fax: (none) Email: Deb.Rossi@netapp.com _____________________________________________________ Administrator Gale Rossides TSA Acting Administrator DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: gale.rossides@tsa.dhs.gov _____________________________________________________ Mr. Richard Rossmark 10173 Goodin Circle Columbia , MD 21046 Phone: (none) Fax: (none) Email: rrossmark@yahoo.com _____________________________________________________ Ms. Susan Roth TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Jenni Rothenberg TITLE TBD Deloitte Consulting, LLP No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Andrew Rothman Intelligence Resources Int. 111 Hillcrest Road Watchung , NJ 07069 Phone: (none) Fax: (none) Email: Arothman _____________________________________________________ Andrew Rothman Intelligence Resources Internati 111 Hillcrest Road Watchung , NJ 07069 Phone: (none) Fax: (none) Email: arothman@me.com _____________________________________________________ Mr. Bradley Rotter 850 Corbett Ave suite 6 San Francisco , CA 94131 Phone: (none) Fax: (none) Email: brad@rotter.com _____________________________________________________ Mr. John P Rowan McGuireWoods LLP 1050 Connecticut Avenue, N.W., Washington , DC 20036 Phone: (none) Fax: (none) Email: prowan@mcguirewoods.com _____________________________________________________ MR. Christopher R Rowe Director of Special Projects DHS 9956 worman Drive King George , VA 22485 Phone: (540) 775-6756 Fax: (none) Email: Christopher.rowe@HQ.dhs.gov _____________________________________________________ Mr. Lloyd B Rowland Deputy Director NGA 4600 Sangamore Road, D-100 Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: lloyd.b.rowland@nga.mil _____________________________________________________ Mr. Joe Rozek Executive Director-Homeland Secu Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: jrozek@microsoft.com _____________________________________________________ Mr. Timothy Ruane 1612 Kenwood Avenue Alexandria , VA 22302 Phone: (none) Fax: (none) Email: ta_ruane@yahoo.com _____________________________________________________ Michelle A Rubie-Smith Vice President GRS 1001 North Fairfax Street Suite 420 Alexandria , VA 22314 Phone: (none) Fax: (none) _____________________________________________________ Mr. David S Rubin Vice President Booz Allen Hamilton Booz Allen Hamilton 8283 Greensboro Drive McLean, , VA 22102 Phone: (none) Fax: (none) Email: rubin_d-Asst@bah.com _____________________________________________________ Mr. Stephen Rubley President/CEO TRSS, LLC 1410 Spring Hill Rd Suite 140 McLean , VA 22102 Phone: (none) Fax: (none) Email: stephen.rubley@trssllc.com _____________________________________________________ Ronald C Ruecker Office of Law Enforcement Coordi FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: ronald.ruecker@ic.fbi.gov _____________________________________________________ Ashley Rush Project Engineer Lockheed Martin 13530 Dulles Technology Dr Herndon , VA 20171 Phone: (none) Fax: (none) Email: ashley.rush@lmco.com _____________________________________________________ Nate Rushfinn Enterprise Architect Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Melvern R Rushing TITLE TBD Eti Engineering Inc. 4219 Lafayette Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: Melvern.Rushing@eti-eng.com _____________________________________________________ MR Rushing TITLE TBD Eti Engineering Inc. 4219 Lafayette Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: Melvern.Rushing@eti-eng.com _____________________________________________________ John Russack Dir, NGIS Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Ms. E.G. Russell 1399 Olde Towne Rd Alexandria , VA 22307 Phone: (703) 765-1183 Fax: (none) Email: polecat28@cox.net _____________________________________________________ Jacqueline Russell TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: j_russell@ssci.senate.gov _____________________________________________________ John Russell TITLE TBD SR Technologies, Inc. 4101 SW 47 Ave Suite 102 Fort Lauderdale , FL 33314 Phone: (none) Fax: (none) _____________________________________________________ Mr. John G Russell TITLE TBD NSA 9800 Savage Road DA3, Suite 6623 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: jgrusse@nsa.gov _____________________________________________________ Maureen K Russell MA-IR, BA Associate Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (419) 308-1916 Fax: (none) Email: russell_maureen@bah.com _____________________________________________________ Trish Russell 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) _____________________________________________________ Dr. Pete Rustan TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: peter.rustan@nro.mil _____________________________________________________ Mr. Scott Rutz 2978 Millbridge Drive San Ramon , CA 94583 Phone: (none) Fax: (none) Email: scott.rutz@ic.fbi.gov _____________________________________________________ Amy E Ryan Liberty Crossing 1 Washington , DC 20505 Phone: (none) Fax: (none) Email: aeryan09@gmail.com _____________________________________________________ Ms. Cynthia R Ryan General Counsel NGA 4600 Sangamore Road, D-107 Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: cynthia.r.ryan@nga.mil _____________________________________________________ Daniel J Ryan Professor National Defense University Marshall Hall Ft. Lesley J. McNair Washington , DC 20319 Phone: (443) 994-3612 Fax: (202) 685-2986 Email: danryan@danjryan.com _____________________________________________________ David L Ryan VP, NGIS Northrop Grumman Information Systems 12900 Federal Systems Park Drive Fairfax , VA 22033 Phone: (none) Fax: (none) Email: David.L.Ryan@ngc.com _____________________________________________________ Lucy Ryan 1421 Jefferson Davis Highway Suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) Email: lucy.ryan@gd-ais.com _____________________________________________________ Mr. Stephen J Ryan 1391 Pennsylvania Ave SE Unit 416 Washington , DC 20003 Phone: (none) Fax: (none) Email: stephen.jm.ryan@gmail.com _____________________________________________________ Dr. Patricia Taylor Chief of the Intelligence Commun ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: patricia.t.taylor@ugov.gov _____________________________________________________ Mrs. Teresa Taylor CEO Proteus Technologies 133 National Business Parkway Suite 150 Annapolis Junction , MD 20701 Phone: (none) Fax: (443) 539-3370 Email: tmtaylor@proteuseng.com _____________________________________________________ Teresa Taylor President Proteus Technologies 133 National Business Parkway Suite 150 Annapolis Junction , MD 20701 Phone: (none) Fax: (none) _____________________________________________________ Tina Taylor TITLE TBD QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: Tina.Taylor@QinetiQ-NA.com _____________________________________________________ Robert Teague TITLE TBD Applied Signal Technology 460 West California Avenue Sunnyvale , CA 94086 Phone: (none) Fax: (none) Email: ROBERT_TEAGUE@appsig.com _____________________________________________________ Berico Technologies Directors at Berico Technologies Berico Technologies 1501 Lee Highway, Suite 303 Arlington , VA 22209 Phone: (none) Fax: (none) Email: directors@bericotechnologies.com _____________________________________________________ Mr. Jody Tedesco President & General Manager NJVC, LLC 8614 Westwood Center Drive Suite 300 Vienna , VA 22182 Phone: (none) Fax: (none) Email: jody.tedesco@njvc.com _____________________________________________________ Mr. Jody J Tedesco President NJVC, LLC 8614 Westwood Center Drive Suite 300 Vienna , VA 22182 Phone: (none) Fax: (703) 288-3068 Email: jody.tedesco@njvc.com _____________________________________________________ Stephen S Teel TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Theodore Tempel 1324 Grant Street Herndon , VA 20170 Phone: (none) Fax: (none) Email: ted.tempel@itt.com _____________________________________________________ Steven J Temple TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Ms. Pamela Tennyson TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: pamela.tennyson@nro.mil _____________________________________________________ Kevin Tepley 22777 Portico Place Ashburn , VA 20148 Phone: (none) Fax: (none) Email: kdtepley@yahoo.com _____________________________________________________ Jack Terrell Sr Purchasing Mgr. Abraxas Corp 12801 Worldgate Dr Suite # 800 Herndon , VA 20170 Phone: (none) Fax: (none) Email: JACK.TERRELL@cubic.com _____________________________________________________ Paul Terry TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Paul.Terry@mail.house.gov _____________________________________________________ Stacey Terry Manager PRTM Management Consultants, LLC 1750 Pennsylvania Avenue NW Suite 1000 Washington , DC 20006 Phone: (none) Fax: (none) Email: sterry@prtm.com _____________________________________________________ Caroline Tess TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: c_tess@ssci.senate.gov _____________________________________________________ rachel test test test , VA 22203 Phone: (none) Fax: (none) Email: rphillips@insaonline.org _____________________________________________________ Gary M Testut Director of Defense & Intelligen Ball Corporation Ball Aerospace & Technologies 2111 Wilson Blvd, Suite 1120 Arlington , VA 22201 Phone: (none) Fax: (none) Email: cbarber@ball.com _____________________________________________________ Dr. Anthony Tether 6400 Lyric Lane Falls Church , VA 22044 Phone: (none) Fax: (none) Email: ttether@darpa.mil _____________________________________________________ Mr. Kris Teutsch Director Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: kteutsch@microsoft.com _____________________________________________________ Mr. Scott Thayer TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: swt1@yahoo.com _____________________________________________________ Mr. Mark Theby 3015 Shoreline Blvd Laurel , MD 20724 Phone: (none) Fax: (none) Email: mtheby@gmail.com _____________________________________________________ Mr. William R Theuer 4321 Gannett Circle Anchorage , AK 99504 Phone: (none) Fax: (none) Email: wrtheuer@gci.net _____________________________________________________ Mr. Will Thierbach Director, Special Projects Camber Corporation 5860 Trinity Parkway Suite 400 Centerville , VA 20120 Phone: (none) Fax: (none) Email: wthierbach@i2spros.com _____________________________________________________ Mr Craig Tait 10b Clinton Way Kingston Wellington 6020 New Zealand Phone: (none) Fax: (none) Email: craig.tait@gmail.com _____________________________________________________ Mike Talbott VP Intel Plans and Concepts NEK 110 S. Sierra Madre St Colorado Springs , CO 80903 Phone: (none) Fax: (none) Email: airtalbo@gmail.com _____________________________________________________ Mr. Joseph P Talieri TITLE TBD NSA 9800 Savage Road S2J2, Suite 6130 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: Stacey Porter-slport3@missi.ncsc.mil _____________________________________________________ Mr. Ronnie Tallent TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Bascom D TALLEY Faculty Coordinator, Intel Prog. JHU/SOE/Div. Public Safety Leadership Bascom D. Talley 6740 Alexander Bell Drive Suite 350 Columbia , MD 21046 Phone: (none) Fax: (410) 290-1061 Email: dittalley@jhu.edu _____________________________________________________ Bascom D TALLEY Faculty Coordinator, Intel Prog. JHU/SOE/Div. Public Safety Leadership Bascom D. Talley 6740 Alexander Bell Drive Suite 350 Columbia , MD 21046 Phone: (202) 363-4243 Fax: (410) 290-1061 Email: dittalley@jhu.edu _____________________________________________________ Jacqueline S Tame MPAff Intelligence Officer DIA Defense Intelligence Agency DIAC/JITF-CT, 200 MacDill Blvd Washington , DC 20340 Phone: (703) 829-7370 Fax: (none) Email: jacqueline.s.tame@gmail.com _____________________________________________________ Jim Taneyhill President-CEO BT Federal Inc. 11440 Commerce Park Dr Reston , VA 20191 Phone: (none) Fax: (none) _____________________________________________________ Mr. Joseph Taraba 7 Creek Parkway Boothwyn , PA 19061 Phone: (none) Fax: (none) Email: joseph.taraba@ttemi.com _____________________________________________________ Barbara Tarad TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) Email: barbara.tarad@mantech.com _____________________________________________________ Barbara Tarad TITLE TBD ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) Email: barbara.tarad@mantech.com _____________________________________________________ Ms. Vicki Tarallo CEO & President Sensa Solutions 11180 Sunrise Valley Drive Suite 100 Reston , VA 20191 Phone: (none) Fax: (none) Email: vicki@sensasolutions.com _____________________________________________________ Vicki M Tarallo TITLE TBD Sensa Solutions 11180 Sunrise Valley Drive Suite 100 Reston , VA 20191 Phone: (none) Fax: (none) Email: vicki@sensasolutions.com _____________________________________________________ Leah F Tarbell Vice President, Intel Group STG Inc 11710 Plaza America Drive Suite 1200 Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Ms. Sue Tardif Program Director, Organizational LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) Email: stardif@lmi.org _____________________________________________________ Mr. Don Tarkenton Manager, DoD Sales Quest Software - Public Sector Group 700 King Farm Boulevard Suite 250 Rockville , MD 20850 Phone: (none) Fax: (none) Email: don.tarkenton@quest.com _____________________________________________________ Mr. William Tarry 2100 2nd St, SW Washington , DC 20593 Phone: (none) Fax: (none) Email: william.e.tarry@uscg.mil _____________________________________________________ Mr. Mark Tatum VP Business Development INTEL Oracle Corporation 1910 Oracle Way Reston , VA 20190 Phone: (none) Fax: (none) Email: mark.tatum@oracle.com _____________________________________________________ Ellen Tauscher Under Secretary Arms Control & I State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: TauscherE@state.gov _____________________________________________________ Christopher Taylor Executive Vice President BlueStone Capital Partners 1600 Tysons Boulevard 8th Floor McLean , VA 22102 Phone: (none) Fax: (703) 852-4496 _____________________________________________________ Chuck Taylor Executive Vice President Proteus Technologies 133 National Business Parkway Suite 150 Annapolis Junction , MD 20701 Phone: (none) Fax: (none) _____________________________________________________ Damian R Taylor Cyber Federal Executive Fellow Potomac Institute for Policy Studies 904 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: dtaylor@potomacinstitute.org _____________________________________________________ Dr. David W Taylor Director, Technology Development Ensco, Inc. 5400 Port Royal Road Springfield , VA 22151 Phone: (none) Fax: (none) Email: taylor.david@ensco.com _____________________________________________________ James D Taylor TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Dr. Patricia Taylor 5602 Phelps Luck Drive Columbia , MD 21045 Phone: (none) Fax: (none) Email: pttaylor@comcast.net _____________________________________________________ Dr. Patricia Taylor Chief of the Intelligence Commun ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: patricia.t.taylor@ugov.gov _____________________________________________________ Mrs. Teresa Taylor CEO Proteus Technologies 133 National Business Parkway Suite 150 Annapolis Junction , MD 20701 Phone: (none) Fax: (443) 539-3370 Email: tmtaylor@proteuseng.com _____________________________________________________ Teresa Taylor President Proteus Technologies 133 National Business Parkway Suite 150 Annapolis Junction , MD 20701 Phone: (none) Fax: (none) _____________________________________________________ Tina Taylor TITLE TBD QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: Tina.Taylor@QinetiQ-NA.com _____________________________________________________ Robert Teague TITLE TBD Applied Signal Technology 460 West California Avenue Sunnyvale , CA 94086 Phone: (none) Fax: (none) Email: ROBERT_TEAGUE@appsig.com _____________________________________________________ Berico Technologies Directors at Berico Technologies Berico Technologies 1501 Lee Highway, Suite 303 Arlington , VA 22209 Phone: (none) Fax: (none) Email: directors@bericotechnologies.com _____________________________________________________ Mr. Jody Tedesco President & General Manager NJVC, LLC 8614 Westwood Center Drive Suite 300 Vienna , VA 22182 Phone: (none) Fax: (none) Email: jody.tedesco@njvc.com _____________________________________________________ Mr. Jody J Tedesco President NJVC, LLC 8614 Westwood Center Drive Suite 300 Vienna , VA 22182 Phone: (none) Fax: (703) 288-3068 Email: jody.tedesco@njvc.com _____________________________________________________ Stephen S Teel TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Theodore Tempel 1324 Grant Street Herndon , VA 20170 Phone: (none) Fax: (none) Email: ted.tempel@itt.com _____________________________________________________ Steven J Temple TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Ms. Pamela Tennyson TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: pamela.tennyson@nro.mil _____________________________________________________ Kevin Tepley 22777 Portico Place Ashburn , VA 20148 Phone: (none) Fax: (none) Email: kdtepley@yahoo.com _____________________________________________________ Jack Terrell Sr Purchasing Mgr. Abraxas Corp 12801 Worldgate Dr Suite # 800 Herndon , VA 20170 Phone: (none) Fax: (none) Email: JACK.TERRELL@cubic.com _____________________________________________________ Paul Terry TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Paul.Terry@mail.house.gov _____________________________________________________ Stacey Terry Manager PRTM Management Consultants, LLC 1750 Pennsylvania Avenue NW Suite 1000 Washington , DC 20006 Phone: (none) Fax: (none) Email: sterry@prtm.com _____________________________________________________ Caroline Tess TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: c_tess@ssci.senate.gov _____________________________________________________ rachel test test test , VA 22203 Phone: (none) Fax: (none) Email: rphillips@insaonline.org _____________________________________________________ Gary M Testut Director of Defense & Intelligen Ball Corporation Ball Aerospace & Technologies 2111 Wilson Blvd, Suite 1120 Arlington , VA 22201 Phone: (none) Fax: (none) Email: cbarber@ball.com _____________________________________________________ Dr. Anthony Tether 6400 Lyric Lane Falls Church , VA 22044 Phone: (none) Fax: (none) Email: ttether@darpa.mil _____________________________________________________ Mr. Kris Teutsch Director Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: kteutsch@microsoft.com _____________________________________________________ Mr. Scott Thayer TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: swt1@yahoo.com _____________________________________________________ Mr. Mark Theby 3015 Shoreline Blvd Laurel , MD 20724 Phone: (none) Fax: (none) Email: mtheby@gmail.com _____________________________________________________ Mr. William R Theuer 4321 Gannett Circle Anchorage , AK 99504 Phone: (none) Fax: (none) Email: wrtheuer@gci.net _____________________________________________________ Mr. Will Thierbach Director, Special Projects Camber Corporation 5860 Trinity Parkway Suite 400 Centerville , VA 20120 Phone: (none) Fax: (none) Email: wthierbach@i2spros.com _____________________________________________________ Donald Thomas Executive Director Ernst & Young 8484 Westpark Drive McLean , VA 22102 Phone: (none) Fax: (none) Email: donald.thomas@ey.com _____________________________________________________ Donna Thomas Principal Astrachan, Gunst & Thomas, P.C. 217 East Redwood Street 21st Floor Baltimore , MD 21202 Phone: (none) Fax: (none) Email: dthomas@agtlawyers.com _____________________________________________________ Donna Thomas TITLE TBD Astrachan, Gunst & Thomas, P.C. 217 East Redwood Street 21st Floor Baltimore , MD 21202 Phone: (none) Fax: (none) Email: dthomas@agtlawyers.com _____________________________________________________ Mr. Jason Thomas Senior Analyst TRSS, LLC 1410 Spring Hill Rd Suite 140 McLean , VA 22102 Phone: (none) Fax: (none) Email: jason.thomas@trssllc.com _____________________________________________________ Mr. John Thomas Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Thomas_John@bah.com _____________________________________________________ John Thomas SVP, General Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: john.d.thomas@saic.com _____________________________________________________ Marcus C Thomas Operational Technology Division FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: marcus.thomas@ic.fbi.gov _____________________________________________________ Mike Thomas TITLE TBD Booz Allen Hamilton 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: Thomas_Mike@bah.com _____________________________________________________ Mr. Paul Thomas VP - Defense Operations Wyle Information Systems 1600 Intenational Dr Suite 800 McLean , VA 22102 Phone: (none) Fax: (none) Email: paul.thomas@wyle.com _____________________________________________________ Ms. Ria Thomas 6903 K Victoria Dr. Alexandria , VA 22310 Phone: (none) Fax: (none) Email: rthomas@fabiani-co.com _____________________________________________________ Ria Thomas Defense/Security Fabiani & Company 1101 Pennsylvania Ave., NW Washington , DC 20004 Phone: (none) Fax: (none) Email: rthomas@fabiani-co.com _____________________________________________________ Kevin Thompkins Vice President of Bus. Ops. Engineering Systems Consultants, Inc. 8201 Corporate Drive Suite 1105 Landover , MD 20785-2230 Phone: (none) Fax: (none) _____________________________________________________ Bennie G Thompson Chair, Committee on Homeland Sec Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: andrea.lee@mail.house.gov _____________________________________________________ Gregory Thompson 950 25th St. NW Washington , DC 20037 Phone: (none) Fax: (none) Email: thompson.g@gmail.com _____________________________________________________ Jennifer Thompson Sr. Marketing Communications Spe L-3 Communications, Inc. 11955 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Kimberly A Thompson Director, Office of Corporate Co NGA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: kimberly.thompson@nga.mil _____________________________________________________ Ms. Leigh Thompson TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Leigh.Thompson@gd-ais.com _____________________________________________________ Ms. Monica Thompson 3011 Colonial Springs Court Alexandria , VA 22306 Phone: (none) Fax: (none) Email: monica@prointelservices.net _____________________________________________________ Robert D Thompson Jr. State / Division of Levee Distri 505 District Dr. Monroe , LA 71202 Phone: (none) Fax: (none) Email: ldpolice1@bellsouth.net _____________________________________________________ Mr. William Thompson 8329 North Mopac Expressway Austin , TX 78759 Phone: (none) Fax: (none) Email: wmthompson@signaturescience.com _____________________________________________________ Mr. William M Thompson TITLE TBD NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: wmthomp@nsa.gov _____________________________________________________ Mr. Robert Thomson 460 Spring Park Place Suite 1000 Herndon , VA 20170 Phone: (none) Fax: (none) Email: rthomson@terremark.com _____________________________________________________ Mr. John Tierney Vice President, Business Develop L-3 Communications/Com.Sys.East 1 Federal Street A&E-2C Camden , NJ 8103 Phone: (none) Fax: (none) Email: John.Tierney@L-3Com.com _____________________________________________________ Mr. Chris Tillery TITLE TBD USIS 7799 Leesburg Pike Suite 400 S Falls Church , VA 22043 Phone: (none) Fax: (none) Email: chris.tillery@usis.com _____________________________________________________ Mr. Michael Tillison Security Director Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: michael.tillison@hp.com _____________________________________________________ Edward A Timmes SVP, Deputy General Manager SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: edward.a.timmes.jr@saic.com _____________________________________________________ Nils G Tolling TITLE TBD CTSS - Corporate and Transport Security Solutions 9007 West Shorewood Suite 529 Mercer Island , WA 98040 Phone: (none) Fax: (none) Email: nils@ctssgroup.com _____________________________________________________ Dr. David Tolliver 4648 Star Flower Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: DETolliver@verizon.net _____________________________________________________ Judy Tolliver 4648 Star Flower Dr Chantilly , VA 20151 Phone: (none) Fax: (none) Email: jetolliver@verizon.net _____________________________________________________ Mr. Jack Tomarchio RETIRED DHS 4103 Meadow Lane Newtown Square , PA 19073 Phone: (none) Fax: (none) Email: john.Tomarchio@dhs.gov _____________________________________________________ Jack T Tomarchio Agoge Group, LLC 200 Eagle Road, Suite 308 Wayne , PA 19087 Phone: (none) Fax: (none) Email: jtt@agogegroup.com _____________________________________________________ Adm. Chris Tomney USCG Intelligence Coordinating Center DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: chris.tomney@dhs.gov _____________________________________________________ Kurt Tong Asst Sec Asia-Pacific State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: tongk@state.gov _____________________________________________________ Deputy Asst. Se John Torres Deputy Assistant Secretary, US I DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.torres@dhs.gov _____________________________________________________ Fran Townsend INSA Chairwoman of the Board MacAndrews & Forbes Holdings, Inc. 35 E. 62nd St. New York , NY 10065 Phone: (none) Fax: (none) _____________________________________________________ Ms. Stacy Trammell 11400 Glen Dale Ridge Road Glenn Dale , MD 20769 Phone: (none) Fax: (none) Email: stacy.trammell@zavda.com _____________________________________________________ Stacy Trammell President Zavda Technologies, LLC 9250 Bendix Road Suite 540 Columbia , MD 21045 Phone: (none) Fax: (240) 266-0597 Email: stacy.trammell@zavda.com _____________________________________________________ Stacy D Trammell Stacy D. Trammell 11400 Glen Dale Ridge Road Glenn Dale , MD 20769 Phone: (unlisted) Fax: (240) 266-0597 Email: stacy.trammell@zavda.com _____________________________________________________ Christopher T Trapp TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Jeffrey Trauberman Vice President The Boeing Company-Network & Space Systems 1200 Wilson Blvd. Arlington , VA 22209 Phone: (none) Fax: (none) Email: jeff.trauberman@boeing.com _____________________________________________________ Mr. Jeffrey Trauberman VP, Space, Intel & MDS The Boeing Company Jeffrey Trauberman The Boeing Company 1200 Wilson Blvd. Arlington , VA 22209 Phone: (none) Fax: (none) Email: jeff.trauberman@boeing.com _____________________________________________________ Mr. Jeffrey Trauberman Vice President The Boeing Company 1200 Wilson Blvd. Arlington , VA 22209 Phone: (none) Fax: (none) Email: jeff.traubeman@boeing.com _____________________________________________________ Jeffrey Trauberman Vice President The Boeing Company 1200 Wilson Blvd. Arlington , VA 22209 Phone: (none) Fax: (none) Email: jeff.trauberman@boeing.com _____________________________________________________ Stephen Traver 1007 Longworth House Office Buil Washington , DC 20515 Phone: (none) Fax: (none) _____________________________________________________ Mr. Paul Tremont Executive Vice President, Operat SRC, Inc 7502 Round Pond Road North Syracuse , NY 13212 Phone: (none) Fax: (none) Email: tremont@srcinc.com _____________________________________________________ Mr. Ronald J Trerotola Director RF Systems Engineering Cubic Defense Applications, Inc. 9333 Balboa Ave San Diego , CA 92123 Phone: (unlisted) Fax: (none) Email: ron.trerotola@cubic.com _____________________________________________________ Mr. Steven A Trevino 19192 Greystone Square Leesburg , VA 20176 Phone: (none) Fax: (none) Email: Steven.Trevino@Keane.com _____________________________________________________ Joseph Trindal Managing Director KeyPoint Government Solutions, Inc. 1750 Foxtrail Drive Loveland , CO 80538 Phone: (none) Fax: (none) Email: joseph.trindal@keypoint.us.com _____________________________________________________ Mr. Bruce Triner 6112 Nightshade Court Rockville , MD 20852 Phone: (none) Fax: (none) _____________________________________________________ Kate Troendle Vice President BlueStone Capital Partners 1600 Tysons Boulevard 8th Floor McLean , VA 22102 Phone: (none) Fax: (703) 852-4496 _____________________________________________________ Ms. Lisa Trombley Program Management Senior Manage Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: lisa.m.trombley@lmco.com _____________________________________________________ Jesse Trout Account Manager TechUSA Government Solutions, LLC 8334 Veterans Highway Millersville , MD 21108 Phone: (none) Fax: (none) Email: jtrout@techusa.net _____________________________________________________ David Trulio Director, Federal/Civil Programs Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: david.trulio@gmail.com _____________________________________________________ Sandy Trumbull Account Manager Computer Associates No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Louis Tucker Minority Staff Director Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: L_Tucker@ssci.senate.gov _____________________________________________________ Louis Tucker CEO Mission Sync LLC 1835 Tilden Place McLean , VA 22101 Phone: (703) 760-0643 Fax: (none) Email: louis.tucker@missionsyncllc.com _____________________________________________________ mr Mel Tuckfield Deputy Director, Hewlett Packard Federal APG Strategic Program Mel Tuckfield 6600 Rockledge Drive Bethesda , MD 20817 Phone: (none) Fax: (none) Email: mel.tuckfield _____________________________________________________ Mr. Melvyn Tuckfield Deputy Director, Advanced Progra Hewlett-Packard Company 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: mel.tuckfield@hp.com _____________________________________________________ Chris Tully Sr. VP of Sales GeoEye 2325 Dulles Corner Blvd. Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ Mr. Damian Turchan TITLE TBD PhotoTelesis 47181 Timberland Place Sterling , VA 20165 Phone: (none) Fax: (none) Email: dturchan@photot.com _____________________________________________________ J Stephen (Steve) Turett Director, Strategy and Business Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: jturett@csc.com _____________________________________________________ Ms. Viv Turnbull Vice Deputy Director for Informa DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Vivian.Turnbull@dia.mil _____________________________________________________ Ms. Kathleen Turner 6448 Spring Terrace Falls Church , VA 22042 Phone: (none) Fax: (none) Email: Kathleen.Turner@misc.pentagon.mil _____________________________________________________ Ms. Kathleen Turner TITLE TBD ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Kathleen.turner@ugov.gov _____________________________________________________ Lamar Turner PO Box 3565 Hobbs , NM 88241 Phone: (none) Fax: (none) Email: LamarTurner2@aol.com _____________________________________________________ Mr. Mike Turner TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: fturner@potomacinstitute.org _____________________________________________________ MS RONDI TURNER SR. EXECUTIVE ASST BALL AEROSPACE 2111 WILSON BLVD #1120 ARLINGTON , VA 22201 Phone: (none) Fax: (none) Email: rbturner@ball.com _____________________________________________________ Scott Turner Federal Engagement Director Global Crossing 12010 Sunset Hills Road Suite 420 Reston , VA 20190 Phone: (none) Fax: (none) _____________________________________________________ Stansfield Turner Former CIA Director CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: sturner@umd.edu _____________________________________________________ John Turnicky No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: john.turnicky@ngc.com _____________________________________________________ Lauren Twenhafel Unknown Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ James Tyson JR. BSIT, MSIS Telecommunications Tech Advisor HQ INSCOM / G6 Networks 8825 Beulah Street Fort Belvoir , VA 22060 Phone: (703) 580-6350 Fax: (none) Email: jtyson.3@verizon.net _____________________________________________________ Mr. Clinton Ung TITLE TBD Northrop Grumman 2288 Ballard Way Ellicott City , MD 21042 Phone: (none) Fax: (none) Email: clinton.ung@ngc.com _____________________________________________________ William Usher 11410 Hollow Timber Court Reston , VA 20194-1980 Phone: (none) Fax: (none) Email: billusher77@comcast.net _____________________________________________________ Ms. Marilyn Vacca Acting Chief Financial Officer ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: marilyn.a.vacca@ugov.gov _____________________________________________________ Mike Vahle TITLE TBD Sandia National Laboratories P.O. Box 5800 Albuquerque , NM 87185 Phone: (none) Fax: (none) _____________________________________________________ Andrew Vail Executive Assistant to the ODNI/ ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ George Valdez TITLE TBD General Dynamics AIS 2305 Mission College Boulevard Santa Clara , CA 95054 Phone: (none) Fax: (none) _____________________________________________________ Ms. Michelle Valdez Senior Advisor, Cyber Security S Software Engineering Institute, CMU NRECA Building Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: mavaldez@cert.org _____________________________________________________ Mr. Victor Valdez 1117 17th Street South Arlington , VA 22202 Phone: (none) Fax: (none) Email: vjv6504@gmail.com _____________________________________________________ Mr. Victor Valdez 1117 17th Street South Arlington , VA 22202 Phone: (none) Fax: (none) Email: vjv6504@gmail.com _____________________________________________________ Arturo Valenzuela Western Hemisphere Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: valenzuelaa@state.gov _____________________________________________________ John Valle TITLE TBD General Dynamics AIS 1200 Joe Hall Drive Ypsilanti , MI 48197 Phone: (none) Fax: (none) _____________________________________________________ John Van Dyke TITLE TBD General Dynamics AIS 8800 Queen Ave South Bloomington , MN 55431 Phone: (none) Fax: (none) _____________________________________________________ William Van Vleet President and CEO Applied Signal Technology 460 West California Avenue Sunnyvale , CA 94086 Phone: (none) Fax: (none) Email: BILL_VANVLEET@appsig.com _____________________________________________________ Daniel VanBelleghem Jr. VP, Information Assurance NCI Information Systems 11730 Plaza America Dr Reston , VA 20190 Phone: (none) Fax: (none) Email: dvanbelleghem@nciinc.com _____________________________________________________ Mr. Tony Vanchieri TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Tony.Vanchieri@gd-ais.com _____________________________________________________ Lesa Vandagriff TITLE TBD General Dynamics AIS 14700 Lee Road Chantilly , VA 20151 Phone: (703) 251-7484 Fax: (none) _____________________________________________________ Matthew Vandermast Vice President Sotera Assured IT 2300 Corporate Park Drive Herndon , VA 20171 Phone: (none) Fax: (none) Email: matthew.vandermast@soteradefense.com _____________________________________________________ Mr. Dirk Vandervaart TITLE TBD American Systems 13990 Parkeast Circle Chantilly , VA 20151 Phone: (none) Fax: (none) Email: dirk.vandervaart@americansystems.com _____________________________________________________ Christina Vanecek Marketing PRTM Management Consultants, LLC 1750 Pennsylvania Avenue NW Suite 1000 Washington , DC 20006 Phone: (none) Fax: (none) Email: cvanecek@prtm.com _____________________________________________________ Ms Donna J VanHoose Director, Business Development The Boeing Company 7700 Boston Boulevard Springfield , VA 22153 Phone: (none) Fax: (none) Email: donna.vanhoose@boeing.com _____________________________________________________ Mr. Jhan Vannatta 200 Regency Forest Drive Suite 150 Cary , NC 27518-8695 Phone: (none) Fax: (none) Email: jhanv@signalscape.com _____________________________________________________ Mr. Michael Varchetta BA 2608 Elderdale Dr Hampton Cove , AL 35763 Phone: (256) 509-6676 Fax: (none) Email: mvarchetta@comcast.net _____________________________________________________ Neftali Vargas SIGINT Analyst USN 21533 Willis Wharf CT Lexington Park , MD 20653 Phone: (unlisted) Fax: (none) Email: vargas.nef@gmail.com _____________________________________________________ Mr. Wray Varley Sales Director Qwest Communications 4250 N. Fairfax Dr. 5th Floor Arlington , VA 22203 Phone: (none) Fax: (none) Email: wray.varley@qwest.com _____________________________________________________ Mr. Bill Varner INSA Board of Directors ManTech International Corporation 2500 Corporate Park Drive Herndon , VA Phone: (none) Fax: (none) Email: Bill.Varner@ManTech.com _____________________________________________________ Mr. Bill Varner President & COO ManTech Mission Cyber & Technology Solutions 2250 Corporate Park Dr. #500 Herndon , VA 20171 Phone: (none) Fax: (none) Email: bill.varner@mantech.com _____________________________________________________ L. William Varner 2250 Corporate Park Drive Suite 500 Herndon , VA 20171 Phone: (none) Fax: (none) Email: Bill.Varner@mantech.com _____________________________________________________ Miron Varouhakis School of Journalism & Mass Comm University of South Carolina Columbia , SC 29208 Phone: (none) Fax: (none) Email: varouhakis@sc.edu _____________________________________________________ Ms. Debra Vecchio Assistant Director for Program D Pennsylvania State University - App. Research Labo P.O. Box 30 State College , PA 16804 Phone: (none) Fax: (none) Email: dsd13@only.arl.psu.edu _____________________________________________________ Veronica Venture Office of EEO FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: veronica.venture@ic.fbi.gov _____________________________________________________ Kendra Verbanic Government Relations the SI 15052 Conference Center Drive Chantilly , VA 20151 Phone: (none) Fax: (none) Email: kendra.verbanic@lmco.com _____________________________________________________ Mr. Kenneth Verbrugge Program Area Manager Johns Hopkins University, APL 11100 Johns Hopkins Road Room 17-S344 Laurel , MD 20723 Phone: (none) Fax: (none) Email: ken.verbrugge@jhuapl.edu _____________________________________________________ Alexander S Verhulst Staffing/Sourcing Specialist SAIC 11251 Roger Bacon Drive Reston , VA 20190 Phone: (703) 585-4371 Fax: (703) 318-4595 Email: alexander.s.verhulst@saic.com _____________________________________________________ Richard R Verma Legislative Affairs State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: vermarr@state.gov _____________________________________________________ Mr. Stephen Vermillion 11600 Sunrise Valley Drive Suite 290 Reston , VA 20191 Phone: (none) Fax: (none) Email: svermillion@objectvideo.com _____________________________________________________ Mr. Michael Veronis 6867 Elm Street Suite 207 McLean , VA 22101 Phone: (none) Fax: (none) Email: mveronis@socratiq.com _____________________________________________________ Laura M Verouden TITLE TBD The Aerospace Corporation Attn: Linda Nicoll, M1-447 2310 E. El Segundo Blvd. El Segundo , CA 90245 Phone: (none) Fax: (none) _____________________________________________________ Melanne Verveer Global Women's Issues State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: verveerm@state.gov _____________________________________________________ Michael Via BA, MS Cyber Intelligence Analyst Home 10049 Cairn Mountain Way 10049 Cairn Mountain Way Bristow , VA 20136 Phone: (none) Fax: (none) Email: viacissp@gmail.com _____________________________________________________ Sean Vieira VP, Government Markets Core180, Inc. 2751 Prosperity Drive Suite 200 Vienna , VA 22031 Phone: (none) Fax: (none) _____________________________________________________ Phyllis Villani Director, Talent Acquisition Northrop Grumman Corporation 12900 Federal Systems Park Drive FP1/7121 Fairfax , VA 22033 Phone: (none) Fax: (703) 968-2565 Email: phyllis.c.villani@ngc.com _____________________________________________________ Thomas J Vilsack Secretary Agriculture Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Scheduling@osec.usda.gov (Attn: Sally Cluthe) _____________________________________________________ Mr. Adam Vincent BS, MS CEO Cyber Squared Inc. http://www.cybersquared.com 1100 N. Glebe Rd. Suite 1010 Arlington , VA 22204 Phone: (none) Fax: (none) Email: avincent@cybersquared.com _____________________________________________________ David Vincent TITLE TBD FBI PO Box 230343 Centreville , VA 20120 Phone: (none) Fax: (none) Email: david.vincent@ic.fbi.gov _____________________________________________________ Richard G Violette BA, MBA Business Development Exceptional Software Strategies Inc 849 International Drive Suite 310 Linthicum , MD 21090 Phone: (none) Fax: (410) 694-0245 Email: richard.violette@exceptionalsoftware.com _____________________________________________________ Ms. Laura Virella 9159 Ciri Lake Lane Fort Belvoir , VA 22060 Phone: (none) Fax: (none) Email: lvirellal@netscape.net _____________________________________________________ Mr. Vince Virga 100 Corporate Drive Suite 280 Fort Lauderdale , FL 33334 Phone: (none) Fax: (none) Email: vince@sgis.com _____________________________________________________ Mr. Virgil Virga 8618 Westwood Center Drive #315 Vienna , VA 22182 Phone: (none) Fax: (none) Email: virgil@sgis.com _____________________________________________________ Ms. Faye Virostek Director, Government Relations General Dynamics Corporation 2941 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: fvirostek@gd.com _____________________________________________________ Mr. Samuel S Visner Vice President for Strategy and Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: svisner@csc.com _____________________________________________________ Ms. Laura Voelker Director, HUMINT DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: laura.voelker@osd.mil _____________________________________________________ Ms. Kathleen Voelkner 6226 West Haleh Avenue Las Vegas , NV 89141 Phone: (none) Fax: (none) Email: kvoelkner@securityconsultants.us _____________________________________________________ Mr. Tom Vollmer Executive Director CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: tvollmer@caci.com _____________________________________________________ Lisa von dem Hagen 1655 North Fort Meyer Drive Suite 1000 Arlington , VA 22209 Phone: (none) Fax: (none) Email: insightstrategyresults@acqsolinc.com _____________________________________________________ Lou Von Thaer President General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) _____________________________________________________ Christopher Voorhees Federal Programs CA Technologies 2317 N. Monroe Street Arlington , VA 22207 Phone: (none) Fax: (none) Email: voorhees2317@yahoo.com _____________________________________________________ Laura Voyatzis Legislative Liaison SAF/LL (AFOSI) Laura Voyatzis 1160 AF Pengaton 4B852 Washington , DC 20330 Phone: (none) Fax: (none) Email: laura.voyatzis@pentagon.af.mil _____________________________________________________ Michael D Vozzo J.D., M.A. Associate Deputy General Counsel United States Department of Defense 2521 S. Clark Street Suite 2000 Arlington , VA 22202 Phone: (none) Fax: (none) Email: michael.vozzo@osd.mil _____________________________________________________ Steve Wallach Sr. VP of Product Integration GeoEye 2325 Dulles Corner Blvd. Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ Mr. Steven P Wallach Technical Executive NGA 4600 Sangamore Road, D-100 Bethesda , MD 20816-5003 Phone: (none) Fax: (301) 227-3696 Email: steven.p.wallach@nga.mil _____________________________________________________ Mr. Dave Wallen General Manager, Mission Program BAE Systems Information Technology 8201 Greensboro Drive Suite 1200 McLean , VA 22102 Phone: (none) Fax: (none) Email: david.wallen@baesystems.com _____________________________________________________ Mr. Tommy Walls 8618 Westwood Center Drive Ste 100 Vienna , VA 22182 Phone: (none) Fax: (none) Email: twalls@sgis.com _____________________________________________________ Mr. John Walsh President Sypris Electronics 10901 N. McKinley Drive Tampa , FL 33612 Phone: (none) Fax: (none) Email: john.walsh@sypris.com _____________________________________________________ Mr. Michael J Walsh Sr. Director Intelligent Decisions 21445 Beaumeade Circle Ashburn , VA 20147 Phone: (none) Fax: (none) Email: mwalsh@intelligent.com _____________________________________________________ Thomas Walsh V.P. Falken Industries 9510 technology drive manassas , VA 20110 Phone: (none) Fax: (none) Email: trwalsh@falken.us _____________________________________________________ Ms. Jennifer Walsmith TITLE TBD NSA 9800 Savage Road Suite 6148 -Senior Acquisition E Fort George G. Meade , MD 20755 Phone: (none) Fax: (443) 479-0367 Email: jswalsm@nsa.gov _____________________________________________________ Drew Walter Policy/Oversight Investigations Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Drew.Walter@mail.house.gov _____________________________________________________ Jack Walters VP Verizon Business, Federal 22001 Loudoun County Parkway Ashburn , VA 20147 Phone: (none) Fax: (none) Email: jack.walters@verizon.com _____________________________________________________ John J Walters VP Verizon Business, Federal 22001 Loudoun County Parkway Ashburn , VA 20147 Phone: (none) Fax: (none) Email: jack.walters@one.verizon.com _____________________________________________________ Mr. Chris Walton President and CEO Visual Intelligence Group LLC 17979 Sands Road Hamilton , VA 20158 Phone: (none) Fax: (none) Email: chris.walton@visualintelgroup.com _____________________________________________________ Mr. Scott Walton 6935 Bugledrum Way Columbia , MD 21045 Phone: (none) Fax: (none) Email: swalton@google.com _____________________________________________________ Mr. Timothy Walton 13800 Coppermine Rd. 2nd Floor Herndon , VA 20171 Phone: (none) Fax: (none) Email: twalton@fundintel.net _____________________________________________________ Mr. Joshua Wander 5719 Hobart Street Pittsburgh , PA 15217 Phone: (none) Fax: (none) Email: jwander@verizon.net _____________________________________________________ Tyler Z Wang BA Contract Specialist GSA APT# 715 1300 S Arlington Ridge Rd Arlington , VA 22202 Phone: (none) Fax: (none) Email: tribaljumbal@gmail.com _____________________________________________________ James Wangler Senior Executive Accenture No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: james.wangler@accenture.com _____________________________________________________ Mr. William Wansley Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: wansley_bill@bah.com _____________________________________________________ Ms. Ann Ward 8865 Stanford Blvd. Columbia , MD 21666 Phone: (none) Fax: (none) Email: annward@cisco.com _____________________________________________________ Ann Ward TITLE TBD Cisco Systems, Inc. 13635 Dulles Technology Drive Herndon , VA 20171 Phone: (none) Fax: (none) Email: annward@cisco.com _____________________________________________________ Mr. Anthony Ward President & CEO Ward Solutions 6760 Alexander Bell Drive Suite 180 Columbia , MD 21046 Phone: (none) Fax: (none) Email: award@ward-solutions.com _____________________________________________________ Colonel James Ward USAF TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: james.ward@nro.mil _____________________________________________________ Mark Ward 3138 Creswell Drive Falls Church , VA 22044 Phone: (none) Fax: (none) Email: mark.k.ward@saic.com _____________________________________________________ Mr. Peter Ward Managing Partner SAGE 1344 Ashton Road Suite 105 Hanover , MD 21076 Phone: (none) Fax: (none) Email: pete.ward@sage-mgt.net _____________________________________________________ Peter Ward TITLE TBD SAGE 1344 Ashton Road Suite 105 Hanover , MD 21076 Phone: (none) Fax: (none) Email: pete.ward@sage-mgt.net _____________________________________________________ Mr. Rick Ward Director Raytheon Company 1200 S. Jupiter Road MS AA-75000 Garland , TX 75042 Phone: (none) Fax: (none) Email: rdward1@raytheon.com _____________________________________________________ Mr. Charles E Warden Senior Executive Accenture 11951 Freedom Drive Reston , VA 20190 Phone: (none) Fax: (none) Email: charles.e.warden@accenture.com _____________________________________________________ Mr. Charles E Warden TITLE TBD Accenture 11951 Freedom Drive Reston , VA 20882 Phone: (none) Fax: (none) Email: charles.e.warden@accenture.com _____________________________________________________ Eric Warden 25116 Vista Ridge Road Laytonsville , MD 20882 Phone: (none) Fax: (none) Email: charles.e.warden@accenture.com _____________________________________________________ Ms. Kathy Warden TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: kathy.warden@gd-ais.com _____________________________________________________ Kathy Warden VP, NGIS Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Bryan Ware BS Science CEO Digital Sandbox 8260 Greensboro Drive Suite 450 McLean , VA 22102 Phone: (none) Fax: (none) Email: bware@dsbox.com _____________________________________________________ Jamal Ware Minority Public Affairs POC Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jamal.ware@mail.house.gov _____________________________________________________ Ms. Cheryl Warner Director, Business Development Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) Email: cheryl.warner@ngc.com _____________________________________________________ John Warner Required unless Parent Washington , DC 20005 Phone: (none) Fax: (none) _____________________________________________________ Ms. Susan Warner Vice President TECH USA, Inc 8334 Veterans Highway 2nd Floor Millersville , MD 21108 Phone: (none) Fax: (none) Email: swarner@techusa.net _____________________________________________________ Pearl Warren TITLE TBD Quest Software - Public Sector Group 700 King Farm Boulevard Suite 250 Rockville , MD 20850 Phone: (none) Fax: (none) Email: pearl.warren@quest.com _____________________________________________________ Ms. Kristen Waschull Director of Human Resources DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Kristi.Waschull@osd.mil _____________________________________________________ Mr. Jonathan Washburn 831 Carroll Street Brooklyn , NY 11215 Phone: (none) Fax: (none) _____________________________________________________ Thomas Washburne Partner Venable LLP 750 East Pratt Street Baltimore , MD 21202 Phone: (none) Fax: (none) Email: twashburne@venable.com _____________________________________________________ Doug Waters Director, Special Programs LGS Innovations Accounts Payable 5440 Millstream Road Suite E210 McLeansville , NC 27301 Phone: (none) Fax: (none) _____________________________________________________ Jason Wathen 646 Steamboat Rd Greenwich , CT 6830 Phone: (none) Fax: (none) Email: jwathen@bhgrp.com _____________________________________________________ Charles Watson SVP Marketing i2 1430 Spring Hill Road McLean , VA 22102 Phone: (none) Fax: (none) Email: Charles.Watson@i2group.com _____________________________________________________ Ms. Kathleen Watson J.D. Director AECOM Kathleen Watson 6564 Loisdale Court Suite 500 Springfield , VA 22150 Phone: (none) Fax: (none) Email: Kathleen.Watson@aecom.com _____________________________________________________ Ms. Kathleen M Watson VP, Global Missions Center Aecom 6564 Loisdale Court Suite 500 Springfield , VA 22315 Phone: (none) Fax: (none) Email: Kathleen.Watson@aecom.com _____________________________________________________ Robert B Watts Chief, Contingency Exercises U.S. Coast Guard 5209 Claridge Ct Fairfax , VA 22032 Phone: (703) 272-8974 Fax: (none) Email: rbwatts27@hotmail.com _____________________________________________________ Mary Webb Executive Assistant Analytic Services Inc. 2900 South Quincy Street Suite 800 Arlington , VA 22206 Phone: (none) Fax: (703) 416-3270 Email: mary.webb@anser.org _____________________________________________________ Mr. Matthew Webb Attorney-Advisor (Intelligence) Transportation Security Administration 601 South 12th Street Arlington , VA 20598 Phone: (none) Fax: (none) Email: matthew.webb@dhs.gov _____________________________________________________ Mr. Mark Webber Managing Member Westway Development 14325 Willard Road Chantilly , VA 20151 Phone: (none) Fax: (none) Email: mwebber@westwaydevelopment.com _____________________________________________________ Ms. Pamela Weber 8281 Greensboro Drive McLean , VA 22102 Phone: (none) Fax: (none) Email: weber_pam@bah.com _____________________________________________________ Jason Webster INSA OCI Task Force Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ William Webster Required unless Parent Washington , DC 20005 Phone: (none) Fax: (none) _____________________________________________________ David Wehrly 1007 8th St. Anacortes , WA 98221 Phone: (none) Fax: (none) _____________________________________________________ John Weiler 904 Clifton Drive Alexandria , VA 22308 Phone: (none) Fax: (none) Email: john@ICHnet.org _____________________________________________________ mr John A Weiler 98.6 Executive Director IT Acquisition Advisory Council, a division of ICH 904 Clifton Drive Alexandria , VA 22397 Phone: (none) Fax: (none) Email: John.Weiler@Ichnet.org _____________________________________________________ LtCol Anne Weinberg TITLE TBD USD(I) Required unless Parent Washington , DC 20005 Phone: (none) Fax: (none) _____________________________________________________ Mr. Paul R Weise Director, Office of Geospatial I NGA 4600 Sangamore Road, D-111 Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: paul.r.weise@nga.mil _____________________________________________________ Dr. Nancy K Welker TITLE TBD NSA 9800 Savage Road DE, Suite 6274 Fort George G. Meade , MD 20755 Phone: (none) Fax: (none) Email: mawirt@nsa.gov _____________________________________________________ Mr. Jack Welsh 13200 Woodland Park Road Herndon , VA 20171 Phone: (none) Fax: (none) Email: welsh_j-admin@bah.com _____________________________________________________ Gen Mark Welsh III Associate Director for Military CIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: christyt@ucia.gov _____________________________________________________ Ms. Rosemary Wenchel Director, Information Assurance DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: rosemary.wenchel@osd.mil _____________________________________________________ Former Baker Preston Werntz Senior Strategist, Office of Cyb DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: preston.werntz@dhs.gov _____________________________________________________ Dr. Michael Wertheimer Technical Director, SID NSA 9800 Savage Road , DC 20511 Phone: (none) Fax: (none) Email: wertheimer@comcast.net _____________________________________________________ Ms. Michele Weslander Quaid 4175 Lower Park Drive Fairfax , VA 22030-8543 Phone: (none) Fax: (none) Email: weslandm@nga.mil _____________________________________________________ Ms. Michele Weslander Quaid DNI Senior Representative to ISR DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: michele.weslanderquaid@osd.mil _____________________________________________________ Michele R Weslander Quaid Chief Technology Officer (Fed) Google, Inc. 1101 New York Avenue, N.W Second Floor Washington , DC 20005 Phone: (none) Fax: (none) _____________________________________________________ Mr John Westcott BA BD Director The Boeing Company 7700 Boston Blvd Springfiled , VA 22153 Phone: (none) Fax: (703) 270-6608 Email: john.g.westcott@boeing.com _____________________________________________________ Vince Westmark 16800 E. CentreTech Parkway Aurora , CO 80011 Phone: (none) Fax: (none) Email: vcwestmark@raytheon.com _____________________________________________________ Vincent C Westmark TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Vanessa Weyland Prog Mgr, Career Developm AF ISR Agency 12906 Green Cedar Helotes , TX 78023 Phone: (none) Fax: (none) Email: vanessa.weyland@gmail.com _____________________________________________________ Kris Wheaton 501 East 38th Street Erie , PA 16546 Phone: (none) Fax: (none) Email: kwheaton@mercyhurst.edu _____________________________________________________ Ms. Judith Whitaker TITLE TBD Boyden 217 E Redwood St Suite 1500 Baltimore , MD 21202 Phone: (none) Fax: (none) Email: jwhitaker@boyden.com _____________________________________________________ Chris White TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: chris.white@mail.house.gov _____________________________________________________ Dana White Strat Forces Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: dana_white@armed-services.senate.gov _____________________________________________________ Mr. David B White Deputy Chief Operating Officer NGA 4600 Sangamore Road, D-100 Bethesda , MD 20816-5003 Phone: (none) Fax: (none) Email: david.b.white@nga.mil _____________________________________________________ Colonel John D White BA, MSC Deputy Director OUSD(I)/PP&R/ISRP Pentagon, 3C915 Arlington , VA 22202 Phone: (none) Fax: (none) Email: john.white@osd.mil _____________________________________________________ Ms. Patricia White 901 N. Nelson St Apt 1514 Arlington , VA 22203 Phone: (none) Fax: (none) Email: plwhite@paragondynamics.com _____________________________________________________ Mr. Richard White VP, Washington Operations Harris Corporation P.O. Box 37 MS: 2-21D Melbourne , FL 32902 Phone: (none) Fax: (none) Email: rwhite01@harris.com _____________________________________________________ Scott White VP, NGC Northrop Grumman Corporation 1000 Wilson Boulevard Suite 2300 MS 141/NGWO Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Mr. Sean White 343 E 74th St Apartment 8E New York , NY 10021 Phone: (none) Fax: (none) Email: seanjwhite@yahoo.com _____________________________________________________ Ms. Suzanne White Chief Financial Officer DIA 7400 Defense Pentagon Rm. 3E-258 Washington , DC 20301-7400 Phone: (none) Fax: (none) Email: Suzanne.White@dia.mil _____________________________________________________ Mr. John Whiteford Director for Intel Pgms NSA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jewhite@nsa.gov _____________________________________________________ Mr. Damian Whitham Director Terremark Worldwide 460 Spring Park Place Suite 1000 Herndon , VA 20170 Phone: (none) Fax: (none) Email: dwhitham@terremark.com _____________________________________________________ Alphonse Whitmore TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Alphonse.Whitmore@gd-ais.com _____________________________________________________ Mr. Scott C Whitney 14901 Bogle Dr. Suite 302 Chantilly , VA 20151 Phone: (none) Fax: (none) Email: scott.whitney@missionep.com _____________________________________________________ RADM H. Whiton USN (Ret) 12337 Galesville Drive Gaithersburg , MD 20878 Phone: (none) Fax: (none) Email: hwwhiton@msn.com _____________________________________________________ Windsor Whitton Required unless Parent Required unless Parent , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Ms. Maria Whitworth Senior Vice President CACI International Inc. 1100 North Glebe Road Arlington , VA 22201 Phone: (none) Fax: (none) Email: mwhitworth@caci.com _____________________________________________________ Ms. Maria F Whitworth 4114 Legato Road Fairfax , VA 22033 Phone: (none) Fax: (none) Email: mwhitworth@caci.com _____________________________________________________ Jonathan Wick TITLE TBD General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) _____________________________________________________ McDaniel Wicker TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mcdaniel.wicker@mail.house.gov _____________________________________________________ Jerome Wieber Sr. Staff Acquisitions Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: jerome.wieber@lmco.com _____________________________________________________ Mr. Joshua S Wiener MA 2662 Ocean Avenue Apt E2 Brooklyn , NY 11229 Phone: (none) Fax: (none) Email: Jwiener31@gmail.com _____________________________________________________ Jerome Wiever 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: jerome.wieber@lmco.com _____________________________________________________ Miss Molly Wike Analyst Department of the Navy 4251 Suitland Road Washington DC , DC 20395 Phone: (none) Fax: (none) Email: mollywike@gmail.com _____________________________________________________ Molly Wike 4251 Suitland Road Washington DC , DC 20395 Phone: (none) Fax: (none) Email: mollywike@gmail.com _____________________________________________________ Daniel C Wilbricht Director, IC Federal Programs Red Hat 8260 Greensboro Drive ste. 300 McLean , VA 22102 Phone: (none) Fax: (none) Email: dwilbric@redhat.com _____________________________________________________ Steven A Wilburn Sr. Principal SRA International Inc. 13873 Park Center Road Suite 150 Herndon , VA 20171 Phone: (none) Fax: (none) Email: steven_wilburn@sra.com _____________________________________________________ Mr. Richard Wilhelm Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Wilhelm_Richard@bah.com _____________________________________________________ Mr. Wayne Wilkinson President White Oak Technologies 1300 Spring Street Suite 320 Silver Spring , MD 20910 Phone: (703) 759-9296 Fax: (none) Email: wwilkinson@woti.com _____________________________________________________ Candice M Will Office of Professional Responsib FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: candice.will@ic.fbi.gov _____________________________________________________ Mr. Butch Willard Deputy Director, Legislative Aff DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: butch.willard@osd.mil _____________________________________________________ Ms. Amanda Williams TITLE TBD Ciena Corporation 1185 Sanctuary Parkway Suite 300 Alpharetta , GA 30004 Phone: (none) Fax: (none) Email: amwillia@ciena.com _____________________________________________________ Amanda Williams TITLE TBD Ciena Corporation 1185 Sanctuary Parkway Suite 300 Alpharetta , GA 30004 Phone: (none) Fax: (none) Email: amwillia@ciena.com _____________________________________________________ Anthony Williams CEO GRS 260 Lee Street, SW Tumwater , WA 98501 Phone: (none) Fax: (none) _____________________________________________________ Mr. David Williams Senior Associate Booz Allen Hamilton 13200 Woodland Park Road Suite 5066 Herndon , VA 20171 Phone: (none) Fax: (none) Email: williams_david@bah.com _____________________________________________________ LTG James Williams USA (Ret) 8928 Maurice Lane Annandale , VA 22003 Phone: (none) Fax: (none) Email: diac1@earthlink.net _____________________________________________________ Mr. Jud Williams SVP, Asset Management/Leasing COPT 6711 Columbia Gateway Dr Suite 300 Columbia , MD 21046 Phone: (none) Fax: (443) 285-7650 Email: jud.williams@copt.com _____________________________________________________ Senior Vice Pre Judd Williams Senior Vice President Corporate Office Properties Trust 6711 Columbia Gateway Drive Columbia , MD 21046-2104 Phone: (none) Fax: (none) Email: jud.williams@copt.com _____________________________________________________ Laura Williams 1501 Farm Credit Dr Suite 2300 McLean , VA 22102 Phone: (none) Fax: (none) Email: laura.williams@soteradefense.com _____________________________________________________ Mr. Markeith Williams 102 Bermuda Green Drive Durham , NC 27703 Phone: (none) Fax: (none) Email: markeith_williams@hotmail.com _____________________________________________________ Clint Williamson War Crimes Issues (Ambassador at State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: williamsonc@state.gov _____________________________________________________ Thomas Willoughby 5229 42nd Place Hyattsville , MD 20781-1902 Phone: (none) Fax: (none) Email: thomas.willoughby@hq.dhs.gov _____________________________________________________ Brian Wilson TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: brian_wilson@appro.senate.gov _____________________________________________________ Mr Brian Wilson Asst Transit Mngmt Analyst MTA/New York City Transit 130 Livingston Street Brooklyn , NY 11201 Phone: (none) Fax: (none) Email: Brian.Wilson@nyct.com _____________________________________________________ Heather Wilson 9220 Guadalupe Trail NW Albuquerque , NM 87114 Phone: (none) Fax: (none) Email: hawilson@aol.com _____________________________________________________ Sam Wilson Required unless Parent Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Tina Wilson VP Business Development GRS 1001 North Fairfax Street Suite 420 Alexandria , VA 22314 Phone: (none) Fax: (none) _____________________________________________________ Ms. Suzanne Wilson-Houck bogus bogus , VA 22302 Phone: (none) Fax: (none) Email: sthouck@comcast.net _____________________________________________________ suzanne wilson-houck Whatever Ripple 604 Fort Williams Parkway alexandria , VA 22304 Phone: (none) Fax: (none) Email: sthouck@comcast.net _____________________________________________________ Suzanne Wilson-Houck Membership Ripple Communications 1110 Vermont Ave, NW Suite 1000 Washington , DC 20005 Phone: (none) Fax: (none) Email: swhouck@insaonline.org _____________________________________________________ Bill Wilt VP of North American Sales GeoEye 2325 Dulles Corner Blvd. Herndon , VA 20171 Phone: (none) Fax: (none) _____________________________________________________ LCDR Terry Wilton USN (Ret) 1120-C Heritage Place Waldorf , MD 20602-1821 Phone: (none) Fax: (none) Email: marathont@aol.com _____________________________________________________ Mr. Joseph Wiltshire 500 Thompson Dairy Way Rockville , MD 20850 Phone: (none) Fax: (none) Email: joewiltshire@gmail.com _____________________________________________________ Mr. Roland Wiltz 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: roland.j.wiltz@lmco.com _____________________________________________________ Andreas Wimmer MSc., CTS Director Integritas LLC 96 Robinson Road SIF Building #13-04 Singapore 068899 Indonesia Phone: (none) Fax: (none) Email: andrew.wimmer@pacific.net.sg _____________________________________________________ Mr. Joseph Windham IV 3307 Wyndham Circle Unit 2170 Alexandria , VA 22302 Phone: (none) Fax: (none) Email: jcwindham4@yahoo.com _____________________________________________________ JC Windham Financial Manager, Navy DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: jcwindham4@yahoo.com _____________________________________________________ Mr. Steven Winebrenner 6406 Ivy Lane COP 4/4 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: steven.jos.winebrenner@hp.com _____________________________________________________ Ms. Maureen Wingfield Senior Manager Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) Email: maureen_v_wingfield@raytheon.com _____________________________________________________ Mr. Scott Winn 8840 Stanford Boulevard Suite 2100 Columbia , MD 21045 Phone: (none) Fax: (none) Email: swinn@tresys.com _____________________________________________________ Mr. Scott Winn 960 Western Run Rd Hunt Valley , MD 21030 Phone: (none) Fax: (none) Email: swinn@scottwinn.com _____________________________________________________ Craig Winter 19842 Leadwell St. Winnetka , CA 91306 Phone: (none) Fax: (none) _____________________________________________________ Dr. Prescott Winter RETIRED Associate Deputy Director of Nat ODNI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: prescott.b.winter@ugov.gov _____________________________________________________ DuWayne L Wirta President Wirta Consulting LLC DuWayne Wirta 13602 Hampstead Ct. Chantilly , VA 20151 Phone: (703) 904-7949 Fax: (none) Email: dlwirta@cox.net _____________________________________________________ Kate Wisniewski TITLE TBD PRTM Management Consultants, LLC 1750 Pennsylvania Avenue NW Suite 1000 Washington , DC 20006 Phone: (none) Fax: (none) Email: kwisniewski@prtm.com _____________________________________________________ Ayonnda Witcher 1610 Tulip Avenue District Heights , MD 20747 Phone: (none) Fax: (none) Email: ayonndawitcher@gmail.com _____________________________________________________ Mr. Michael Witt 2000 E. El Segundo Blvd. B-E07,MS S102 El Segundo , CA 90245 Phone: (none) Fax: (none) Email: mhwitt@raytheon.com _____________________________________________________ Ms. Jennifer Wohlander 2200 Wilson Blvd Suite 102-139 Arlington , VA 22201 Phone: (none) Fax: (none) Email: jennifer.wohlander@cust-matters.com _____________________________________________________ Scott Wohlander 2200 Wilson Blvd. Suite 102-139 Arlington , VA 22201 Phone: (none) Fax: (none) Email: scott.wohlander@cust-matters.com _____________________________________________________ Bradford F Wolf Senior Advanced Systems Manager Ball Aerospace & Technologies Corp. 10 Longs Peak Drive Broomfield , CO 80021 Phone: (none) Fax: (303) 533-5179 Email: bfwolf@ball.com _____________________________________________________ Bradford F Wolf Sr. Advanced Systems Manager Ball Aerospace & Technologies Corp. 10 Longs Peak Drive Broomfield , CO 80021 Phone: (none) Fax: (303) 533-5179 Email: bfwolf@ball.com _____________________________________________________ Jim Wolfe TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: j_wolfe@ssci.senate.gov _____________________________________________________ Mr. Steven Wolter Sr. Special Programs Manager LGS Innovations Accounts Payable 5440 Millstream Road Suite E210 McLeansville , NC 27301 Phone: (none) Fax: (none) Email: swolter@lgsinnovations.com _____________________________________________________ Mr. Steven Wolter Sr. Special Programs Manager LGS Innovations 13665 Dulles Technology Drive Suite 301 Herndon , VA 20171 Phone: (none) Fax: (none) Email: swolter@lgsinnovations.com _____________________________________________________ Mr. Wesley Wong 350 Greensboro Dr. McLean , VA 22102 Phone: (none) Fax: (none) Email: wwong@htgcorp.com _____________________________________________________ Brian R Wood Director, Business Development Lockheed Martin Corporation-Washington Ops 2121 Crystal Drive Suite 100 Arlington , VA 22202 Phone: (none) Fax: (none) Email: brian.wood@lmco.com _____________________________________________________ Ms. Margaret Wood 7474 Greenway Center Drive Suite 800 Greenbelt , MD 20770 Phone: (none) Fax: (none) Email: mwwood@woodcons.com _____________________________________________________ Dr. Roy L Wood Dean, Def Sys Mgmt College DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: roy.woods@dau.mil _____________________________________________________ Sheryl Wood TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: s_wood@ssci.senate.gov _____________________________________________________ Asst. Admin. Stephen N Wood TSA Federal Security Director DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: stephen.wood@dhs.gov _____________________________________________________ Meredith Woodruff 1441 McLean Mews Court McLean , VA 22101 Phone: (none) Fax: (none) Email: meredith_woodruff@yahoo.com _____________________________________________________ Glen Woods 10395 Democracy Lane Suite B Fairfax , VA 22030 Phone: (none) Fax: (none) _____________________________________________________ Mr. James Woolsey Vice President Booz Allen Hamilton 8283 Greensboro Dr. Booz Building McLean , VA 22102 Phone: (none) Fax: (none) Email: Woolsey_Jim@bah.com _____________________________________________________ Megan Woolsey Required unless Parent Arlington , VA 22203 Phone: (none) Fax: (none) _____________________________________________________ Megan Woolsey Consultant Deloitte 1919 N. Lynn Street Arlington , VA 22209 Phone: (none) Fax: (none) Email: mwoolsey3@comcast.net _____________________________________________________ Megan Woolsey Consultant Deloitte 1919 N. Lynn Street Arlington , VA 22209 Phone: (none) Fax: (none) Email: mwoolsey3@comcast.net _____________________________________________________ Steve Woolwine Vice President, Intelligence Ope Berico Technologies 1501 Lee Highway Suite 303 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Michael H Wooster 211 N. Union Street Alexandria , VA 22314 Phone: (none) Fax: (none) Email: mwooster@sanborn.com _____________________________________________________ Jeff Wootton Forward Deployed Engineer Palantir Technologies 1660 International Drive 8th Floor McLean , VA 22102 Phone: (none) Fax: (none) Email: jwootton@palantir.com _____________________________________________________ Mr. Patrick Worcester TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: PWorcester@potomacinstitute.org _____________________________________________________ Ms. Christine Wormuth PDASD, Homeland Defense and Amer DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: christine.wormuth@osd.mil _____________________________________________________ Saskia Wrausmann 14 Seaton Place NW Washington , DC 20007 Phone: (none) Fax: (none) _____________________________________________________ B.G. Wright TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: bg.wright@mail.house.gov _____________________________________________________ Gary Wright BS EE President/CEO Futures, Inc. 1225 Crows Foot Road Marriottsville , MD 21104 Phone: (none) Fax: (none) Email: gwright1@futures-inc.com _____________________________________________________ Lynn Wright Director, JTTF DIA No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: wrightonmaple@comcast.net _____________________________________________________ Mr. Wayne A Wright 42725 Ridgeway Dr. Ashburn , VA 20148 Phone: (none) Fax: (none) Email: wayne.wright@msn.com _____________________________________________________ Mark Wrigley SVP Business Development Serco 1818 Library Street Suite 1000 Reston , VA 20190 Phone: (none) Fax: (703) 939-6001 _____________________________________________________ Don Wurzel VP for National Security Studies Arete Associates 1550 Crystal Drive Suite 703 Arlington , VA 22202 Phone: (none) Fax: (none) Email: dwurzel@arete.com _____________________________________________________ Robert J Wysocki MA MS Senior Fellow LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) Email: rwysocki@lmi.org _____________________________________________________ Robert J Wysocki MA, MS 3210 Wessynton Way Alexandria , VA 223092227 Phone: (703) 619-1456 Fax: (none) Email: rj.wysocki@live.com _____________________________________________________ Mr. Alan Wade 8601 Ordinary Way Annandale , VA 22003 Phone: (none) Fax: (none) Email: awade2@cox.net _____________________________________________________ Ralph Wade 1421 Jefferson Davis Highway Suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) Email: Ralph.Wade@gd-ais.com _____________________________________________________ Mr. Ralph Wade Vice President, National Capital Spectrum 1401 Wilson Blvd Suite 1007 Arlington , VA 22209 Phone: (none) Fax: (757) 224-7501 Email: ralph.wade@sptrm.com _____________________________________________________ Roger Waesche Executive Vice President & Chief Corporate Office Properties Trust 6711 Columbia Gateway Drive Columbia , MD 21046-2104 Phone: (none) Fax: (none) Email: roger.waesche@copt.com _____________________________________________________ Mr. Ryan Wagener Executive Vice President, Busine Six3 Systems 1430 Spring Hill Road Suite 525 McLean , VA 22102 Phone: (none) Fax: (none) Email: ryan.wagener@six3systems.com _____________________________________________________ Caryn Wagner Under Secretary for Intelligence DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: carynanne@verizon.net _____________________________________________________ Ms. Caryn A Wagner No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: carynanne@verizon.net _____________________________________________________ Jennifer Wagner TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: j_wagner@ssci.senate.gov _____________________________________________________ Jennifer Wagner Senior Manager Gov't Relations Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Rick Wagner TITLE TBD TASC 4805 Stonecroft Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) Email: richard.wagner@tasc.com _____________________________________________________ Mr. Mark Walch Dep Dir, US CERT for Ops Tech DHS No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mark.walch@dhs.gov _____________________________________________________ Pete Waldorf No Address Available No Address Available No City , VA 22203 Phone: (703) 981-1683 Fax: (703) 621-1133 Email: pete.waldorf@fts-intl.com _____________________________________________________ Chip Walgren TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: chip_walgren@appro.senate.gov _____________________________________________________ Ash Walker 1902 Forsyth Street Suite C Macon , GA 31201 Phone: (none) Fax: (none) Email: ashwalker10@gmail.com _____________________________________________________ Bruce Walker TITLE TBD Sandia National Laboratories P.O. Box 5800 Albuquerque , NM 87185 Phone: (none) Fax: (none) _____________________________________________________ Cindy Walker CDO KGS 2750 Prosperity Ave Ste 300 Fairfax , VA 22031 Phone: (none) Fax: (none) Email: cwalker@kforcegov.com _____________________________________________________ Torian Walker VP, Business Development Directo SAIC 1710 SAIC Drive M/S 1-4-1 McLean , VA 22102 Phone: (none) Fax: (none) Email: torian.c.walker@saic.com _____________________________________________________ William J Walker PO Box 25022 Arlington , VA 22202 Phone: (none) Fax: (none) Email: williamj.walker@yahoo.com _____________________________________________________ William J Walker Deputy Director DEA Intelligence Justice Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: william.j.walker@usdoj.gov _____________________________________________________ James Walkinshaw Chief of Staff, Congressman Conn Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: James.Walkinshaw@mail.house.gov _____________________________________________________ Bill Wall Director of Strategic Program Pu EMC Intel 653 MacBeth Drive Pittsburgh , PA 15235 Phone: (none) Fax: (none) _____________________________________________________ William Wall Business development EMC Corporation 8444 Westpark Drive McLean , VA 22102 Phone: (none) Fax: (none) Email: William.wall@emc.com _____________________________________________________ William T Wall Director of BD, IC EMC Corporation 8444 Westpark Drive Suite 700 McLean , VA 22102 Phone: (none) Fax: (none) Email: william.wall@emc.com _____________________________________________________ Mr. Brett A Wallace 532 20th Street NW #604 Washington , DC 20006 Phone: (none) Fax: (none) Email: brettawallace@gmail.com _____________________________________________________ Mr. Michael Wallace District Manager NetApp 1921 Gallows Road Suite 600 Vienna , VA 22182 Phone: (none) Fax: (none) Email: Michael.Wallace@netapp.com _____________________________________________________ Mr. Ramy Yaacoub 1425 Euclide st nw #5 Washingtn , DC 20009 Phone: (none) Fax: (none) Email: ramy.yaacoub@gmail.com _____________________________________________________ Mr. Ron Yaggi Director, Defense Intelligence O Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: ryaggi@csc.com _____________________________________________________ Mr. Austin K Yamada ME Vice President QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: austin.yamada@vt-arc.org _____________________________________________________ Mr. Austin K Yamada BS, ME Vice President Virginia Tech Applied Research Corporation 900 North Glebe Road Arlington , VA 22203 Phone: (301) 564-0685 Fax: (none) Email: austin.yamada@vt-arc.org _____________________________________________________ Lauren M Yamada Program Analyst Transportation Security Administration (TSA) 601 S. 12th St Mail Drop 6104 Arlington , VA 20598 Phone: (none) Fax: (none) Email: Lauren.Yamada@dhs.gov _____________________________________________________ Charles R Yanjanin Region Manager Cisco Systems, Inc 13635 Dulles Technology Drive Herndon , VA 20171 Phone: (none) Fax: (703) 738-7914 Email: cyanjani@cisco.com _____________________________________________________ Mr. Homayun Yaqub 9435 Lorton Market Street Suite 749 Lorton , VA 22079 Phone: (none) Fax: (none) Email: hy@masygroup.com _____________________________________________________ Ms. Christina N Yarnold Project Engineering Staff Lockheed Martin - IS&GS Security 2245 Monroe Street Floor 4, 442C Herndon , VA 20171 Phone: (none) Fax: (none) Email: christina.n.yarnold@lmco.com _____________________________________________________ Mr. William Yates 1600 S. Bayshore Lane Miami , FL 33133 Phone: (none) Fax: (none) Email: byates5043@aol.com _____________________________________________________ Mr. Michael S Yeagley GM, Global Public Secotr NovoDynamics, Inc 9819 Fosbak dr Vienna , VA 22182 Phone: (none) Fax: (703) 242-0019 Email: m_yeagley2002@yahoo.com _____________________________________________________ John Yim VP Operations BCMC 2745 Hartland Rd. Falls Church , VA 22043 Phone: (none) Fax: (none) Email: jyim@bcmcgroup.com _____________________________________________________ Ed Yost Director, Business Development Computer Sciences Corporation 3170 Fairview Park Drive Falls Church , VA 22042 Phone: (none) Fax: (none) Email: eyost@csc.com _____________________________________________________ Ed Yost Vice President Apptis 4800 Westfields Blvd Chantilly , VA 20151 Phone: (none) Fax: (none) Email: ed.yost@apptis.com _____________________________________________________ Mr. Greg Young President-CEO Ensco, Inc. 3110 Fairview Park Dr Falls Church , VA 22042 Phone: (none) Fax: (none) Email: young.greg@ensco.com _____________________________________________________ Mr. Greg Young President and CEO ENSCO Inc. Gregory B. Young 3110 Fairview Park Dr. Suite 300 Falls Church , VA 22042 Phone: (none) Fax: (none) Email: gbyoung@mac.com _____________________________________________________ Mr. Gregory B Young President and CEO ENSCO, Inc. 3110 Fairview Park Drive Suite 300 Falls Church , VA 22042 Phone: (none) Fax: (703) 321-4687 Email: young.greg@ensco.com _____________________________________________________ Mark Young TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: mark.young@mail.house.gov _____________________________________________________ Sarah Young TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: Sarah.Young@mail.house.gov _____________________________________________________ Mr Keith M Younger BS Director EMC Global Alliances 8444 Westpark Dr suite 900 McLean , VA 22102 Phone: (703) 560-6636 Fax: (703) 893-2562 Email: keith.younger@emc.com _____________________________________________________ Mr. Richard Youngs 12156 Wedgeway Ct Fairfax , VA 22033 Phone: (none) Fax: (none) Email: richard.youngs@gmail.com _____________________________________________________ Shahin Yousefi 1004 Walters Mill Road Forest Hill , MD 21050 Phone: (none) Fax: (none) Email: syousefi@netstarconsulting.com _____________________________________________________ Thomas W Yun Medical Services State Dept. No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: yuntw@state.gov _____________________________________________________ Richard R Yuse TITLE TBD Raytheon Company - IIS 1100 Wilson Boulevard Suite 1900 Arlington , VA 22209 Phone: (none) Fax: (none) _____________________________________________________ Lt. Gen. Richard P Zahner Deputy Chief of Staff û G-2 DoD No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: richard.zahner@mi.army.mil _____________________________________________________ Carla Zamudio-Dolan TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: carla.zamudio-dolan@mail.house.gov _____________________________________________________ Bridget Zarate TITLE TBD Congress No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: bridget_zarate@appro.senate.gov _____________________________________________________ Mr. Paul Zasada 25 Merriman Lane Watertown , CT 6795 Phone: (none) Fax: (none) Email: pz@gov.com _____________________________________________________ Aaron M Zebley Deputy Chief of Staff FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: aaron.zebley@ic.fbi.gov _____________________________________________________ Ms. Linda Zecher Vice President, US Public Sector Microsoft Corporation 5335 Wisconsin Avenue, NW Suite 600 Washington , DC 20015 Phone: (none) Fax: (none) Email: lzecher@microsoft.com _____________________________________________________ Dr. Jacqueline Zee Intelligence Analyst Drug Enforcement Administration 700 Army Navy Drive Arlington , VA 22202 Phone: (none) Fax: (none) Email: jacqueline.w.zee@usdoj.gov _____________________________________________________ Sarah Zeigler Office of Ombudsmen FBI No Address Available No Address Available No City , VA 22203 Phone: (none) Fax: (none) Email: sarah.zeigler@ic.fbi.gov _____________________________________________________ Mr. Andy Zembower Vice President, Sensors Group General Dynamics AIS 12450 Fair Lakes Circle Fairfax , VA 22033 Phone: (none) Fax: (none) Email: Andy.Zembower@gd-ais.com _____________________________________________________ Mr. Michael Zembrzuski Executive Vice President Six3 Systems 1430 Spring Hill Road Suite 525 McLean , VA 22102 Phone: (none) Fax: (none) Email: mzembrzuski@harding-security.com _____________________________________________________ Mr. Michael Zembrzuski Vice President, Operations Six3 Systems 1430 Spring Hill Road Suite 525 McLean , VA 22102 Phone: (none) Fax: (none) Email: mzembrzuski@harding-security.com _____________________________________________________ Ms. Michelle Zewin TITLE TBD Potomac Institute for Policy Studies 901 North Stuart Street Suite 200 Arlington , VA 22203 Phone: (none) Fax: (none) Email: jzewin@potomacinstitute.org _____________________________________________________ Thomas Zidow 2051 Seneca Meadows Pkwy Suite 300 Germantown , MD 20876 Phone: (none) Fax: (none) Email: tom.zidow@wgint.com _____________________________________________________ Frank Ziegler Senior VP - New Business and Dev Corporate Office Properties Trust 6711 Columbia Gateway Drive Suite 300 Columbia , MD 21046 Phone: (none) Fax: (none) Email: frank.ziegler@copt.com _____________________________________________________ Frank Ziegler Senior VP - New Business and Dev Corporate Office Properties Trust 6711 Columbia Gateway Drive Suite 300 Columbia , MD 21046 Phone: (none) Fax: (none) Email: frank.ziegler@copt.com _____________________________________________________ Frank W Ziegler TITLE TBD Corporate Office Properties Trust 6711 Columbia Gateway Drive Columbia , MD 21046-2104 Phone: (none) Fax: (none) Email: frank.ziegler@copt.com _____________________________________________________ Colonel Stephen Ziehmn USAF TITLE TBD NRO 14675 Lee Road Chantilly , VA 20151-1715 Phone: (none) Fax: (none) Email: stephen.ziehmn@nro.mil _____________________________________________________ Suzan Zimmerman Sr VP Corporate Development QinetiQ North America 7918 Jones Branch Drive Suite 350 McLean , VA 22102 Phone: (none) Fax: (none) Email: suzan.zimmerman@qinetiq-na.com _____________________________________________________ Mr. Charles Zingler Executive Director CACI 6326 Sanctuary Woods Ct Burke , VA 22015 Phone: (none) Fax: (none) Email: czingler@caci.com _____________________________________________________ Mr. Phil Zion TITLE TBD General Dynamics C4 Systems 2231 Crystal Drive Suite 600 Arlington , VA 22202 Phone: (none) Fax: (none) Email: Phil.Zion@gdc4s.com _____________________________________________________ Mr. David Ziskie Research Fellow LMI 2000 Corporate Ridge McLean , VA 22102 Phone: (none) Fax: (none) Email: dziskie@lmi.org _____________________________________________________ Mr. Edward Zoiss VP National Business Development Harris Corporation P.O. Box 37 MS: 2-21D Melbourne , FL 32902 Phone: (none) Fax: (none) Email: ezoiss@harris.com _____________________________________________________ David Zolet President, Strategic Bus. Dev. Computer Sciences Corporation 3170 Fairview Park Dr Falls Church , VA 22042 Phone: (none) Fax: (none) _____________________________________________________ Mr. Arthur Zuehlke Former deputy director for measu DIA Building 6000 Washington , DC 20340-5100 Phone: (none) Fax: (none) Email: Arthur.zuehlke@dia.mil _____________________________________________________ Ms. Anna Zukowski B.A Deputy Director, IC CIO Governan Office of the Director of National Intelligence DeeAnn Zukowski ODNI, ICCIO, ITGPO LX2 Room 6B331 Washington , DC 20511 Phone: (none) Fax: (none) Email: deeann.zukowski@dni.gov _____________________________________________________

TOP-SECRET- Presidential Documents – Strategic Counterterrorism Commuications Initiative

Federal Register Volume 76, Number 179 (Thursday, September 15, 2011)]
[Presidential Documents]
[Pages 56945-56947]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-23891]

Presidential Documents

Federal Register / Vol. 76 , No. 179 / Thursday, September 15, 2011 /
Presidential Documents

___________________________________________________________________

Title 3–
The President

[[Page 56945]]

Executive Order 13584 of September 9, 2011

Developing an Integrated Strategic
Counterterrorism Communications Initiative and
Establishing a Temporary Organization to Support
Certain Government-wide Communications Activities
Directed Abroad

By the authority vested in me as President by the
Constitution and the laws of the United States of
America, including section 2656 of title 22, United
States Code, and section 3161 of title 5, United States
Code, it is hereby ordered as follows:

Section 1. Policy. The United States is committed to
actively countering the actions and ideologies of al-
Qa’ida, its affiliates and adherents, other terrorist
organizations, and violent extremists overseas that
threaten the interests and national security of the
United States. These efforts take many forms, but all
contain a communications element and some use of
communications strategies directed to audiences outside
the United States to counter the ideology and
activities of such organizations. These communications
strategies focus not only on the violent actions and
human costs of terrorism, but also on narratives that
can positively influence those who may be susceptible
to radicalization and recruitment by terrorist
organizations.

The purpose of this Executive Order is to reinforce,
integrate, and complement public communications efforts
across the executive branch that are (1) focused on
countering the actions and ideology of al-Qa’ida, its
affiliates and adherents, and other international
terrorist organizations and violent extremists
overseas, and (2) directed to audiences outside the
United States. This collaborative work among executive
departments and agencies (agencies) brings together
expertise, capabilities, and resources to realize
efficiencies and better coordination of U.S. Government
communications investments to combat terrorism and
extremism.

Sec. 2. Assigned Responsibilities to the Center for
Strategic Counterterrorism Communications.

(a) Under the direction of the Secretary of State
(Secretary), the Center for Strategic Counterterrorism
Communications (Center) that has been established in
the Department of State by the Secretary shall
coordinate, orient, and inform Government-wide public
communications activities directed at audiences abroad
and targeted against violent extremists and terrorist
organizations, especially al-Qa’ida and its affiliates
and adherents, with the goal of using communication
tools to reduce radicalization by terrorists and
extremist violence and terrorism that threaten the
interests and national security of the United States.
Consistent with section 404o of title 50, United States
Code, the Center shall coordinate its analysis,
evaluation, and planning functions with the National
Counterterrorism Center. The Center shall also
coordinate these functions with other agencies, as
appropriate.

Executive branch efforts undertaken through the Center
shall draw on all agencies with relevant information or
capabilities, to prepare, plan for, and conduct these
communications efforts.

(b) To achieve these objectives, the Center’s
functions shall include:

(i) monitoring and evaluating narratives (overarching communication themes
that reflect a community’s identity, experiences, aspirations, and
concerns) and events abroad that are relevant to the development of a

[[Page 56946]]

U.S. strategic counterterrorism narrative designed to counter violent
extremism and terrorism that threaten the interests and national security
of the United States;

(ii) developing and promulgating for use throughout the executive branch
the U.S. strategic counterterrorism narratives and public communications
strategies to counter the messaging of violent extremists and terrorist
organizations, especially al-Qa’ida and its affiliates and adherents;

(iii) identifying current and emerging trends in extremist communications
and communications by al-Qa’ida and its affiliates and adherents in order
to coordinate and provide thematic guidance to U.S. Government
communicators on how best to proactively promote the U.S. strategic
counterterrorism narrative and policies and to respond to and rebut
extremist messaging and narratives when communicating to audiences outside
the United States, as informed by a wide variety of Government and non-
government sources, including nongovernmental organizations, academic
sources, and finished intelligence created by the intelligence community;

(iv) facilitating the use of a wide range of communications technologies,
including digital tools, by sharing expertise among agencies, seeking
expertise from external sources, and extending best practices;

(v) identifying and requesting relevant information from agencies,
including intelligence reporting, data, and analysis; and

(vi) identifying shortfalls in U.S. capabilities in any areas relevant to
the Center’s mission and recommending necessary enhancements or changes.

(c) The Secretary shall establish a Steering
Committee composed of senior representatives of
agencies relevant to the Center’s mission to provide
advice to the Secretary on the operations and strategic
orientation of the Center and to ensure adequate
support for the Center. The Steering Committee shall
meet not less than every 6 months. The Steering
Committee shall be chaired by the Under Secretary of
State for Public Diplomacy. The Coordinator for
Counterterrorism of the Department of State shall serve
as Vice Chair. The Coordinator of the Center shall
serve as Executive Secretary. The Steering Committee
shall include one senior representative designated by
the head of each of the following agencies: the
Department of Defense, the Department of Justice, the
Department of Homeland Security, the Department of the
Treasury, the National Counterterrorism Center, the
Joint Chiefs of Staff, the Counterterrorism Center of
the Central Intelligence Agency, the Broadcast Board of
Governors, and the Agency for International
Development. Other agencies may be invited to
participate in the Steering Committee at the discretion
of the Chair.

Sec. 3. Establishment of a Temporary Organization.

(a) There is established within the Department of
State, in accordance with section 3161 of title 5,
United States Code, a temporary organization to be
known as the Counterterrorism Communications Support
Office (CCSO).
(b) The purpose of the CCSO shall be to perform the
specific project of supporting agencies in Government-
wide public communications activities targeted against
violent extremism and terrorist organizations,
especially al-Qa’ida and its affiliates and adherents,
to audiences abroad by using communication tools
designed to counter violent extremism and terrorism
that threaten the interests and national security of
the United States.
(c) In carrying out its purpose set forth in
subsection (b) of this section, the CCSO shall:

(i) support agencies in their implementation of whole-of-government public
communications activities directed at audiences abroad, including by
providing baseline research on characteristics of these audiences, by
developing expertise and studies on aspirations, narratives, information
strategies and tactics of violent extremists and terrorist organizations
overseas, by designing and developing sustained campaigns on specific areas
of

[[Page 56947]]

interest to audiences abroad, and by developing expertise on implementing
highly focused social media campaigns; and

(ii) perform such other functions related to the specific project set forth
in subsection (b) of this section as the Secretary may assign.

(d) The CCSO shall be headed by a Director selected
by the Secretary, with the advice of the Steering
Committee. Its staff may include, as determined by the
Secretary: (1) personnel with relevant expertise
detailed on a non-reimbursable basis from other
agencies; (2) senior and other technical advisers; and
(3) such other personnel as the Secretary may direct to
support the CCSO. To accomplish this mission, the heads
of agencies participating on the Steering Committee
shall provide to the CCSO, on a non-reimbursable basis,
assistance, services, and other support including but
not limited to logistical and administrative support
and details of personnel. Non-reimbursable details
shall be based on reasonable requests from the
Secretary in light of the need for specific expertise,
and after consultation with the relevant agency, to the
extent permitted by law.
(e) The CCSO shall terminate at the end of the
maximum period permitted by section 3161(a)(1) of title
5, United States Code, unless sooner terminated by the
Secretary consistent with section 3161(a)(2) of such
title.

Sec. 4. General Provisions.

(a) Nothing in this order shall be construed to
impair or otherwise affect:

(i) authority granted by law to an agency, or the head thereof; or

(ii) functions of the Director of the Office of Management and Budget
relating to budgetary, administrative, or legislative proposals.

(b) This order shall be implemented consistent with
applicable law and subject to the availability of
appropriations.
(c) This order is not intended to, and does not,
create any right or benefit, substantive or procedural,
enforceable at law or in equity by any party against
the United States, its departments, agencies, or
entities, its officers, employees, or agents, or any
other person.

(Presidential Sig.)

THE WHITE HOUSE,

September 9, 2011.

[FR Doc. 2011-23891
Filed 9-14-11; 8:45 am]
Billing code 3195-W1-P

“DIE WELT” ÜBER DIE DIFFAMIERUNGSMETHODEN DER STASI – VORBILD FÜR “GoMoPa”

http://www.welt.de/print-wams/article145822/Wie_die_Stasi_Strauss_diffamierte.html

Studie zum Tatort Internet :Jeder Dritte wurde schon gemobbt wie von “GoMoPa”

http://www.bild.de/digital/internet/mobbing/jeder-dritte-jugendliche-wird-gemobbt-18298774.bild.html

TOP-SECRET-Secret U.S. Message to Mullah Omar: “Every Pillar of the Taliban Regime Will Be Destroyed”

U.S. Secretary of Defense Donald Rumsfeld (center) and U.S. Ambassador to Afghanistan, Robert Finn are given a tour of the U.S. Embassy compound in Kabul, Afghanistan on April 27, 2002. OSD Package No. A07D-00238 (DOD Photo by Robert D. Ward)

Washington, DC, September 14, 2011 – In October 2001 the U.S. sent a private message to Taliban leader Mullah Omar warning that “every pillar of the Taliban regime will be destroyed,” [Document 16] according to previously secret U.S. documents posted today by the National Security Archive at www.nsarchive.org. The document collection includes high-level strategic planning memos that shed light on the U.S. response to the attacks and the Bush administration’s reluctance to become involved in post-Taliban reconstruction in Afghanistan. As an October 2001 National Security Council strategy paper noted, “The U.S. should not commit to any post-Taliban military involvement since the U.S. will be heavily engaged in the anti-terrorism effort worldwide.” [Document 18]

Deputy Defense Secretary Paul Wolfowitz, Defense Secretary Donald Rumsfeld, and President George W. Bush.  (Source: Department of Defense)

Materials posted today also include memos from officials lamenting the American strategy of destroying al-Qaeda and the Taliban without substantially investing in Afghan infrastructure and economic well-being. In 2006, U.S. Ambassador to Afghanistan Ronald R. Neumann asserted that recommendations to “minimize economic assistance and leave out infrastructure plays into the Taliban strategy, not to ours.” [Document 25] The Ambassador was concerned that U.S. inattention to Afghan reconstruction was causing the U.S. and its Afghan allies to lose support. The Taliban believed they were winning, he said, a perception that “scares the hell out of Afghans.” [Document 26] Taliban leaders were capitalizing on America’s commitment, he said, and had sent a concise, but ominous, message to U.S. forces: “You have all the clocks but we have all the time.” [Document 25]

The documents published here describe multiple important post-9/11 strategic decisions. One relates to the dominant operational role played by the CIA in U.S. activities in Afghanistan. [Document 19] Another is the Bush administration’s expansive post-9/11 strategic focus, as expressed in Donald Rumsfeld’s remark to the president: “If the war does not significantly change the world’s political map, the U.S. will not achieve its aim/ There is value in being clear on the order of magnitude of the necessary change.” [Document 13] Yet another takes the form of U.S. communications with Pakistani intelligence officials insisting that Islamabad choose between the United States or the Taliban: “this was a black-and-white choice, with no grey.” [Document 3 (Version 1)]

Highlights include:

  • A memo from Secretary Rumsfeld to General Franks expressing the Secretary’s frustration that the CIA had become the lead government agency for U.S. operations in Afghanistan, “Given the nature of our world, isn’t it conceivable that the Department [of Defense] ought not to be in a position of near total dependence on CIA in situations such as this?” [Document 19]
  • A detailed timeline of the activities of Vice President Richard Cheney and his family from September 11-27, 2001 [Document 22]
  • The National Security Council’s October 16, 2001 strategic outline of White House objectives to destroy the Taliban and al-Qaeda while avoiding excessive nation-building or reconstruction efforts. “The U.S. should not commit to any post-Taliban military involvement since the U.S. will be heavily engaged in the anti-terrorism effort worldwide.” The document also notes the importance of “CIA teams and special forces in country operational detachments (A teams)” for anti-Taliban operations. [Document 18]
  • U.S. Ambassador Neumann expresses concern in 2006 that the American failure to fully embrace reconstruction activities has harmed the American mission. “The supplemental decision recommendation to minimize economic assistance and leave out infrastructure plays into the Taliban strategy, not to ours.” A resurgent Taliban leadership summarized the emerging strategic match-up by saying, “You have all the clocks but we have all the time.” [Document 25]
  • A memo on U.S. strategy from Donald Rumsfeld to President Bush dated September 30, 2001, saying, “If the war does not significantly change the world’s political map, the U.S. will not achieve its aim/ There is value in being clear on the order of magnitude of the necessary change. The USG [U.S. Government] should envision a goal along these lines: New regimes in Afghanistan and another key State (or two) that supports terrorism.” [Document 13]
  • A transcript of Washington’s October 7, 2001 direct message to the Taliban: “Every pillar of the Taliban regime will be destroyed.” [Document 16]
  • The day after 9/11, Deputy Secretary Armitage presents a “stark choice” to Pakistani Intelligence (ISI) Chief Mahmoud Ahmed, “Pakistan must either stand with the United States in its fight against terrorism or stand against us. There was no maneuvering room.” [Document 3 (Version 1)]
  • In talking points prepared for a September 14, 2001 National Security Council meeting. Secretary of State Colin Powell notes, “My sense is that moderate Arabs are starting to see terrorism in a whole new light. This is the key to the coalition, we are working them hard.” [Document 7]

Read the Documents

Document 1 – Action Plan
U.S. Department of State, Memorandum,” Action Plan as of 9/13/2001 7:55:51am,” September 13, 2001, Secret, 3 pp. [Excised]

Two days after the 9/11 attacks, the Department of State creates an action plan to document U.S. government activities taken so far and to create an immediate list of things to do. Included in the list are high-level meetings with Pakistani officials, including ISI intelligence Director Mahmoud Ahmed. [Note that Ahmed’s September 13 meeting with Deputy Secretary of State Richard Armitage is detailed in Document 3 and Document 5.] The action plan details efforts to get international support, including specific U.S. diplomatic approaches to Russia, Saudi Arabia, Uzbekistan, Tajikistan, Azerbaijan, Kyrgyzstan, Kazakhstan, Georgia, Sudan, China and Indonesia.

Document 2 – Islamabad 05087
U.S. Embassy (Islamabad), Cable, “Musharraf: We Are With You in Your Action Plan in Afghanistan” September 13, 2001, Secret – Noforn, 7 pp. [Excised]

Newly appointed U.S. Ambassador Wendy Chamberlin “bluntly” tells Pakistani President Musharraf “that the September 11 attacks had changed the fundamentals of the [Afghanistan – Pakistan] debate. There was absolutely no inclination in Washington to enter into a dialogue with the Taliban. The time for dialog was finished as of September 11.” Effectively declaring the Taliban a U.S. enemy (along with al-Qaeda), Ambassador Chamberlin informs President Musharraf “that the Taliban are harboring the terrorists responsible for the September 11 attacks. President Bush was, in fact, referring to the Taliban in his speech promising to go after those who harbored terrorists.”  [Note: A less complete version of this document was previously released and posted on September 13, 2010. This copy has less information withheld.]  

Document 3 – State 157813 [Version 1]
Document 3 – State 157813 [Version 2]

U.S. Department of State, Cable, “Deputy Secretary Armitage’s Meeting with Pakistan Intel Chief Mahmud: You’re Either With Us or You’re Not,” September 13, 2001, Secret, 9 pp. [Excised]

The day after the 9/11 attacks, Deputy Secretary Armitage meets with Pakistani Intelligence (ISI) Chief Mahmoud Ahmed (which can also be spelled Mehmood Ahmad, Mahmud or Mahmoud). Armitage presents a “stark choice” in the 15-minute meeting. “Pakistan must either stand with the United States in its fight against terrorism or stand against us. There was no maneuvering room.” Mahmud assures Armitage that the U.S. “could count on Pakistan’s ‘unqualified support,’ that Islamabad would do whatever was required of it by the U.S.” Deputy Secretary Armitage adamantly denies Pakistan has the option of a middle road between supporting the Taliban and the U.S., “this was a black-and-white choice, with no grey.” Mahmoud responds by commenting “that Pakistan has always seen such matters in black-and-white. It has in the past been accused of ‘being-in-bed’ with those threatening U.S. interests. He wanted to dispel that misconception.” Mahmoud’s denial of longstanding historical Pakistani support for extremists in Afghanistan directly conflicts with U.S. intelligence on the issue, which has documented extensive Pakistani support for the Taliban and multiple other militant organizations.

Two versions of this document have been reviewed with different sections released. Version 1 in general contains more information; however Version 2 contains a few small sections not available in Version 1. These sections include paragraph 10, “Mr. Armitage indicated it was still not clear what might be asked of Pakistan by the U.S. but he suspected it would cause ‘deep introspection.’ Mahmud’s colleagues in the CIA would likely be talking more with him in the near future on this. Mahmud confirmed that he had been in touch with Langley after yesterday’s attacks and expected to continue these contacts.” It is unclear why this was withheld in Version 1. It is not surprising that Mahmoud, Chief of Pakistani intelligence, would be in regular contact with equally high-level intelligence officials from the CIA.

It is interesting to read this document ten years after it was initially written, as it is largely assumed that Islamabad over the past decade has taken the “grey” approach Armitage steadfastly denies as a potential position. Pakistan has served as a safe haven for the Taliban insurgency, while Islamabad simultaneously assists the U.S. in its war against al-Qaeda and the Taliban.

Document 4 – Talking Points
U.S. Department of State, “Talking Points,” September 13, 2001, Secret, 4 pp. [Excised]

Talking points for Secretary Colin Powell drafted two days after the 9/11 attacks. Objectives of the U.S. response to the attack include, “eliminating Usama bin-Laden’s al-Qaida.” The Secretary focuses on regional support from Pakistan, India and Bangladesh, as well as cooperation with Saudi Arabia and Egypt. Interestingly the Secretary notes that the U.S. “will also probe Iranian ability to work with us against the Taliban and Usama bin-Laden, and we’ll look for Arafat’s support.”

Document 5 – State 159711
U.S. Department of State, Cable, “Deputy Secretary Armitage’s Meeting with General Mahmud: Actions and Support Expected of Pakistan in Fight Against Terrorism,” September 14, 2001, Secret, 5 pp. [Excised]

On September 13, 2001 Deputy Secretary of State Richard Armitage again meets with Pakistani Intelligence (ISI) Chief Mahmoud Ahmed in one of a series of well-known communications between Armitage and the ISI Chief in the immediate aftermath of 9/11. Secretary Armitage tells General Mahmoud the U.S. is looking for full cooperation and partnership from Pakistan, understanding that the decision whether or not to fully comply with U.S. demands would be “a difficult choice for Pakistan.” Armitage carefully presents General Mahmoud with the following specific requests for immediate action and asks that he present them to President Musharraf for approval:

  • “Stop al-Qaida operatives at your border, intercept arms shipments through Pakistan and end all logistical support for bin Ladin;”
  • “Provide the U.S. with blanket overflight and landing rights to conduct all necessary military and intelligence operations;”
  • “Provide as needed territorial access to U.S. and allied military intelligence, and other personnel to conduct all necessary operations against the perpetrators of terrorism or those that harbor them, including use of Pakistan’s naval ports, airbases and strategic locations on borders;”
  • “Provide the U.S. immediately with intelligence, [EXCISED] information, to help prevent and respond to terrorist acts perpetuated against the U.S., its friends and allies;”
  • “Continue to publicly condemn the terrorist acts of September11 and any other terrorist acts against the U.S. or its friends and allies [EXCISED]”
  • “Cut off all shipments of fuel to the Taliban and any other items and recruits, including volunteers en route to Afghanistan that can be used in a military offensive capacity or to abet the terrorist threat;”
  • “Should the evidence strongly implicate Usama bin Ladin and the al-Qaida network in Afghanistan and should Afghanistan and the Taliban continue to harbor him and this network, Pakistan will break diplomatic relations with the Taliban government, end support for the Taliban and assist us in the formentioned ways to destroy Usama bin Ladin.”

[Note: A less complete version of this document was previously released and posted on September 13, 2010. This copy has less information withheld. ]

Document 6 – Memo
U.S. Department of State, Gameplan for Polmil Strategy for Pakistan and Afghanistan,” September 14, 2001, Secret/NODIS, 4 pp. [Excised]

Since “Tuesday’s attacks clearly demonstrate that UBL [Usama bin Ladin] is capable of conducting terrorism while under Taliban control,” U.S. officials are faced with the question of what to do with the Taliban. The Department of State issues a set of demands to the Taliban including: surrendering all known al-Qaeda associates in Afghanistan, providing intelligence on bin Laden and affiliates, and expelling all terrorists from Afghanistan. Reflecting U.S. policies in the years to come, the memo notes that the U.S. “should also find subtle ways to encourage splits within the [Taliban] leadership if that could facilitate changes in their policy toward terrorism.” The memo concludes that if “the Taliban fail to meet our deadline, within three days we begin planning for Option three, the use of force. The Department of State notes the importance of coordination with Pakistan, the Central Asian states, Russia, and “possibly Iran.” “Pakistan is unwilling to send its troops into Afghanistan, but will provide all other operational and logistical support we ask of her.”

Document 7 – Talking Points
U.S. Department of State, “Talking Points for PC 0930 on 14 September 2001,” September 14, 2001, [Unspecified Classification], 3 pp. [Excised]

Secretary of State Colin Powell’s September 14, 2001 talking points for a National Security Council Principal’s Committee meeting discuss the administration’s immediate response to the 9/11 attacks and future plans for retaliation. Objectives include, “setting the stage for a forceful response,” “eradicating Usama bin Laden’s al-Qaida” and “eliminating safehaven and support for terrorisms whether from states or other actors.” Secretary Powell notes, “My sense is that moderate Arabs are starting to see terrorism in a whole new light. This is the key to the coalition, we are working them hard.”

Document 8 –  Islamabad 05123

U.S. Embassy (Islamabad), Cable, “Musharraf Accepts The Seven Points” September 14, 2001, Secret, 4 pp. [Excised]

After extensive meetings with ranking Pakistani military commanders, on September 14, 2001 President Pervez Musharraf accepts the seven actions requested by the U.S. for immediate action in response to 9/11.  President Musharraf “said he accepted the points without conditions and that his military leadership concurred,” but there would be “a variety of security and technical issues that need to be addressed.” He emphasized that “these were not conditions … but points that required clarification.” Musharraf also asks the U.S. to clarify if its mission is to “strike UBL and his supporters or the Taliban as well,” and advises that the U.S. should be prepared for what comes next. “Following any military action, there should be a prompt economic recovery effort. “You are there to kill terrorists, not make enemies” he said. “Islamabad wants a friendly government in Kabul.”

[Note: A copy of this document was previously released and posted on September 13, 2010.]

Document 9 – State 161279

U.S. Department of State, Cable, “Deputy Secretary Armitage-Mamoud Phone Call – September 18, 2001,” September 18, 2001, Confidential, 2 pp.

Traveling aboard a U.S. government aircraft, Pakistani Intelligence ISI Director Mahmoud Ahmed arrives in Afghanistan on September 17, 2001 to meet Taliban leader Mullah Mohammad Omar and discuss 9/11, U.S. demands and the future of al-Qaeda. Mahmoud informs Mullah Omar and other Taliban officials that the U.S. has three conditions:

  • “They must hand over UBL [Usama bin Ladin] to the International Court of Justice, or extradite him,”
  • “They must hand over or extradite the 13 top lieutenants/associates of UBL…”
  • “They must close all terrorist training camps.”

According to Mahmoud, the Taliban’s response “was not negative on all these points.” “The Islamic leaders of Afghanistan are now engaged in ‘deep Introspection’ about their decisions.”

[Note: A copy of this document was previously released and posted on September 13, 2010.]

Document 10 – State 161371
U.S. Department of State, Cable, “Secretary’s 13 September 2001 Conversation with Pakistani President Musharraf,” September 19, 2001, Secret, 3 pp.

Secretary of State Colin Powell and Pakistani President Pervez Musharraf have a telephone conversation on September 13, to discuss U.S.-Pakistan relations and U.S. retaliation for the events of 9/11. The Secretary informs President Musharraf that “because Pakistan has a unique relationship with the Taliban, Pakistan has a vital role to play.” The Secretary tells Musharraf, “‘as one general to another, we need someone on our flank fighting with us. And speaking candidly, the American people would not understand if Pakistan was not in the fight with the U.S.'”

Document 11 – Islamabad 05337
U.S. Embassy (Islamabad), Cable, “Mahmud Plans 2nd Mission to Afghanistan” September 24, 2001, Secret, 3 pp.

ISI Director Mahmoud Ahmed returns to Afghanistan to make a last-minute plea to the Taliban. General Mahmoud tells U.S. Ambassador Wendy Chamberlin “his mission was taking place in parallel with U.S. Pakistani military planning” and that in his estimation, “a negotiated solution would be preferable to military action.” “‘I implore you,’ Mahmud told the Ambassador, ‘not to act in anger. Real victory will come in negotiations.’ ‘Omar himself,’ he said, ‘is frightened. That much was clear in his last meeting.'”  The ISI Director tells the Ambassador America’s strategic objectives of getting Osama bin Laden and al-Qaeda would best be accomplished by coercing the Taliban to do it themselves. “It is better for the Afghans to do it. We could avoid the fallout. If the Taliban are eliminated … Afghanistan will revert to warlordism.” Nevertheless General Mahmoud promises full Pakistani support for U.S. activities, including military action. “We will not flinch from a military effort.” “Pakistan,” he said, “stands behind you.” Ambassador Chamberlin insists that while Washington “appreciated his objectives,” to negotiate to get bin Laden, Mullah Omar “had so far refused to meet even one U.S. demand.”  She tells Mahmoud his trip “could not delay military planning.”

[Note: A copy of this document was previously released and posted on September 13, 2010.]

Document 12 – Islamabad 05452
U.S. Embassy (Islamabad), Cable, “Mahmud on Failed Kandahar Trip” September 29, 2001, Confidential, 3 pp.

An additional trip by ISI Director Mahmoud Ahmed to Afghanistan to negotiate with the Taliban is unsuccessful. Mahmoud’s September 28, 2001 “two-hour meeting with Taliban Deputy Foreign Minister Jalil concluded with no progress.” Mahmoud is ostensibly seeking to get the Taliban to cooperate “so that ‘the barrel of the gun would shift away from Afghanistan,’ only in this way would Pakistan avoid ‘the fall out’ from a military attack on its neighbor.”Yet despite Mahmoud’s efforts the Taliban remained uncooperative. “The mission failed as Mullah Omar agreed only to ‘think about’ proposals.” U.S. officials are similarly unenthusiastic about the idea of compromise. “Ambassador confirmed that the United States would not negotiate with the Taliban and that we were on a ‘fast track to bringing terrorists to justice.'” Mahmoud acknowledged that “President [Bush] had been quite clear in asserting there would be no negotiations.”

Document 13 – Memorandum for the President
The Office of the Secretary of Defense, Memorandum for the President, “Strategic Thoughts,” September 30, 2001, Top Secret/Close Hold, 2 pp. [Excised]

Instead of focusing exclusively on al-Qaeda in Afghanistan, Secretary of Defense Rumsfeld advises President Bush that the U.S. should think more broadly. “It would instead be surprising and impressive if we built our forces up patiently, took some early action outside of Afghanistan, perhaps in multiple locations, and began not exclusively or primarily with military strikes but with equip-and-train activities with local opposition forces coupled with humanitarian aid and intense information operations.”

With a strategic vision emphasizing support for local opposition groups rather than direct U.S. strikes, the Secretary is wary of excessive or imprecise U.S. aerial attacks which risk “creating images of Americans killing Moslems.” The memo argues that the U.S. should “capitalize on our strong suit, which is not finding a few hundred terrorists in the caves of Afghanistan,” and instead using “the vastness of our military and humanitarian resources, which can strengthen enormously the opposition forces in terrorist-supporting states.” The approach to the war should not focus “too heavily on direct, aerial attacks on things and people.”

“If the war does not significantly change the world’s political map, the U.S. will not achieve its aim/ There is value in being clear on the order of magnitude of the necessary change. The USG [U.S. Government] should envision a goal along these lines: New regimes in Afghanistan and another key State (or two) that supports terrorism (To strengthen political and military efforts to change policies elsewhere).”

Document 14 – Working Paper
The Office of the Secretary of Defense, Working Paper, “Thoughts on the ‘Campaign’ Against Terrorism” October 2, 2001, Secret, 1 p.

Arguing that Afghanistan is “part of the much broader problem of terrorist networks and nations that harbor terrorists across the globe,” this paper discusses multiple aspects of emerging U.S. operations in the war on terror, including developing greater intelligence capabilities, the use of direct action, military capabilities, humanitarian aid and “working with Muslims worldwide to demonstrate the truth that the problem is terrorism – not a religion or group of people.”

Document 15 – Memorandum
The Office of the Secretary of Defense, Memorandum, “Strategic Guidance for the Campaign Against Terrorism, October 3, 2001, Top Secret, 16 pp.

A expansive document designed to “provide strategic guidance to the Department of Defense for the development of campaign plans,” this memo specifies the perceived threats, objectives, means, strategic concepts and campaign elements guiding the nascent war on terror. Threats identified include terrorist organizations, states harboring such organizations (including the “Taliban [and] Iraq Baathist Party”), non-state actors that support terrorist organizations and the capacity of “terrorist organizations or their state supporters to acquire, manufacture or use chemical, biological, radiological or nuclear weapons or the means to deliver them.”

Strategic objectives include preventing further attacks against the U.S. and deterring aggression, as well as the somewhat contradictory goals of “encouraging populations dominated by terrorist organizations or their supporters to overthrow that domination,” and “prevent[ing] or control[ing] the spreading or escalation of conflict.” 

Document 16 – State 175415
U.S. Department of State, Cable, “Message to Taliban,” October 7, 2001, Secret/Nodis/Eyes Only, 2 pp.

The U.S. requests that either Pakistani Intelligence ISI Chief Mahmoud Ahmed or Pakistani President Pervez Musharraf deliver a message to Taliban leaders directly from Washington informing the Taliban that “if any person or group connected in any way to Afghanistan conducts a terrorist attack against our country, our forces or those of our friends or allies, our response will be devastating. It is in your interest and in the interest of your survival to hand over all al-Qaida leaders.” The U.S. warns that it will hold leaders of the Taliban “personally responsible” for terrorist activities directed against U.S. interests, and that American intelligence has “information that al-Qaida is planning additional attacks.” The short message concludes by informing Mullah Omar that “every pillar of the Taliban regime will be destroyed.”

Document 17 – Information Paper
Defense Intelligence Agency, Information Paper, “Prospects for Northern Alliance Forces to Seize Kabul,” October 15, 2001, Secret/Norforn/X1, 2 pp. [Excised]

Comparing the current military strength of the Taliban and the Northern Alliance, this paper concludes that a difficult battle for Kabul may lay ahead for the Northern Alliance. “Taliban strength in the Kabul Central Corps is approximately 130 tanks, 85 armored personnel carriers, 85 pieces of artillery and approximately 7,000 soldiers. Northern Alliance forces, under the command of General Fahim Khan, number about 10,000 troops, with approximately 40 tanks and a roughly equal number of APCs [armored personnel carriers], and a few artillery pieces.” “If the Northern Alliance’s present combat power relative to defending Taliban forces in and around Kabul remains unchanged, the Northern Alliance will not be in a position to successfully conduct a large scale offensive to seize and hold Kabul. The Northern Alliance is more likely to occupy key terrain around the city and use allied air strikes/artillery to strengthen its position and encourage defections of Taliban leaders in the city. Only under these favorable circumstances would Northern Alliance forces then be able to take control of Kabul.”

However the document asserts that this military balance may change rapidly due to the provision of assistance to the Northern Alliance and the isolation of the Taliban. “Russia is reportedly delivering approximately forty to fifty T-55 tanks, sixty APCs, plus additional artillery, rocket systems, attack helicopters and a large quantity of ammunition to the Northern Alliance via the Parkhar supply base in southern Tajikistan.”

On November 13, 2001 the Northern Alliance took control of Kabul as the Taliban rapidly retreated to Kandahar.

Document 18 – Memorandum and Attached Paper
Office of the Secretary of Defense, Donald Rumsfeld to Douglas Feith, “Strategy,” Attachment, “U.S. Strategy in Afghanistan,” National Security Council, October 16, 2001, 7:42am, Secret/Close Hold/ Draft for Discussion, 7 pp. [Excised]

Five weeks after the 9/11 attacks, the National Security Council outlines the U.S. retaliatory strategy. Emphasizing the destruction of al-Qaeda and the Taliban, it is careful not to commit the U.S. to extensive rebuilding activities in post-Taliban Afghanistan. “The USG [U.S. Government] should not agonize over post-Taliban arrangements to the point that it delays success over Al Qaida and the Taliban.” “The U.S. should not commit to any post-Taliban military involvement since the U.S. will be heavily engaged in the anti-terrorism effort worldwide.” There is a handwritten note from Secretary of Defense Rumsfeld adding “The U.S. needs to be involved in this effort to assure that our coalition partners are not disaffected.”

Operationally the U.S. will “use any and all Afghan tribes and factions to eliminate Al-Qaida and Taliban personnel,” while inserting “CIA teams and special forces in country operational detachments (A teams) by any means, both in the North and the South.” Secretary Rumsfeld further notes: “Third country special forces UK [excised] Australia, New Zealand, etc) should be inserted as soon as possible.”

Diplomacy is important “bilaterally, particularly with Pakistan, but also with Iran and Russia,” however “engaging UN diplomacy… beyond intent and general outline could interfere with U.S. military operations and inhibit coalition freedom of action.”

Document 19 – Working Paper
Office of the Secretary of Defense, Donald Rumsfeld to General Myers, Working Paper, “Afghanistan,” October 17, 2001, 11:25am, Secret, 1 p.

A memo from Secretary of Defense Rumsfeld to Chairman of the Joint Chiefs General Myers reflects the critical role played by the Central Intelligence Agency in initial U.S. operations in Afghanistan. Secretary Rumsfeld expresses his frustration that U.S. intelligence officials, instead of military personnel, are the dominant actors on the ground in Afghanistan. “Given the nature of our world, isn’t it conceivable that the Department ought not to be in a position of near total dependence on CIA in situations such as this?” “Does the fact that the Defense Department can’t do anything on the ground in Afghanistan until CIA people go in first to prepare the way suggest that the Defense Department is lacking a capability we need?”

Document 20 – Working Paper
Office of the Secretary of Defense, Working Paper, “Discussions w/CENTCOM re: Sy Hersh Article,” October 22, 2001, 1:19pm, Secret, 2 pp.

Secretary of Defense Rumsfeld is concerned about information reported by Seymour Hersh in The New Yorker that U.S. Central Command failed to fire on a convoy thought to contain Taliban personnel including Taliban leader Mullah Mohammad Omar. Rumsfeld informs Commander-in-Chief of U.S. Central Command Thomas “Tommy” Franks that he had been instructed “immediately to hit [this target] if anyone wiggled and that [the Secretary] was going to call the President. But in the meantime, he had [the Secretary’s] authority to hit it.” Secretary Rumsfeld discussed the failure to fire with General Myers, writing that he has “the feeling he [Franks] may not have given me the full story.”

The paper also contradicts previous instructions that aerial attacks should be precise and limited in Afghanistan. Instead, Secretary Rumsfeld states, “I have a high tolerance level for possible error. That is to say, if he [Franks] thinks he has a valid target and he can’t get me or he can’t get Wolfowitz in time, he should hit it. I added that there will not be any time where he cannot reach me or, if not me, Wolfowitz. I expect him to be leaning far forward on this.”

Document 21 – Memorandum for the President
U.S. Department of State, Memorandum, From Secretary of State Colin Powell to U.S. President George W. Bush, “Your Meeting with Pakistani President Musharraf,” November 5, 2001, Secret, 2 pp. [Excised]

Signed by Secretary of State Colin Powell to President Bush, this memo highlights critical changes in U.S.-Pakistan relations since 9/11, including higher levels of cooperation not only on counterterrorism policy, but also on nuclear non-proliferation, the protection of Pakistani nuclear assets, and economic development. Powell notes that President Musharraf’s decision to ally with the U.S. comes “at considerable political risk,” as he has “abandoned the Taliban, frozen terrorist assets [and] quelled anti-Western protests without unwarranted force, [Excised].” Regarding Afghanistan, the Secretary tells the President that Pakistan will want to protect its interests and maintain influence in Kabul. “Musharraf is pressing for a future government supportive of its interests and is concerned that the Northern Alliance will occupy Kabul.”

[Note: A copy of this document was previously released and posted on September 13, 2010.]

Document 22 – Timeline
U.S. Secret Service, Paper, “9/11/01 Timeline,” November 17, 2001, Secret, 32 pp. [Excised]

A detailed timeline of the activities of Vice President Richard Cheney and his family from September 11-27, 2001, this document was compiled at the request of the Vice President, whose well-known Secret Service codename is “Angler.” The document extensively uses other Secret Service code words, such as “Crown” (White House), “Author” (Lynne Cheney, the Vice President’s wife), “Advocate” (Elizabeth Cheney, the Vice President’s daughter) and “Ace” (Philip J. Perry, the Vice President’s son-in-law).

Document 23 – Snowflake
Office of the Secretary of Defense, Snowflake Memorandum, From Donald Rumsfeld to Doug Feith, “Afghanistan,” April 17, 2002, 9:15AM, Secret, 1 p. [Excised]

Secretary of Defense Donald Rumsfeld is concerned the U.S. does not yet have comprehensive plans for U.S. activities in Afghanistan. “I may be impatient. In fact I know I’m a bit impatient. But the fact that Iran and Russia have plans for Afghanistan and we don’t concerns me.” The Secretary laments the state of interagency coordination and is alarmed that bureaucratic delay may harm the war effort. “We are never going to get the U.S. military out of Afghanistan unless we take care to see that there is something going on that will provide the stability that will be necessary for us to leave.”

Document 24 – Memorandum
Office of the Secretary of Defense, Memorandum, From Deputy Secretary of Defense Paul Wolfowitz to Secretary of Defense Donald Rumsfeld, “Al Qaeda Ops Sec,” July 19, 2002, Secret, 1 p. [Excised]

U.S. officials are unsure whether or not Osama bin Laden is alive, with the intelligence community assessing that he must be because “his death would be too important a fact for [members of al-Qaeda] to be able to keep it a secret.” Paul Wolfowitz rejects this assertion, arguing that bin Laden’s survival is equally important news for al-Qaeda to communicate, leading him to conclude that the terrorists are “able to communicate quite effectively on important subjects without our detecting anything.” Although specifics remain classified, the memo expresses concern over America’s overreliance on a specific capability allowing the U.S. to track terrorist organizations. Wolfowitz questions whether or not this technique is providing a false sense of security to intelligence officials and that the U.S. may even be being manipulated by terrorists who may know about U.S. capabilities. “We are a bit like the drunk looking for our keys under the lamppost because that is the only place where there is light.” Critical information may be in places the U.S. is not looking.

Document 25 – Kabul 000509
U.S. Embassy (Kabul), Cable, “Afghan Supplemental” February 6, 2006, Secret, 3 pp. [Excised]

In a message to the Secretary of State, U.S. Ambassador Ronald R. Neumann expresses his concern that the American failure to fully fund and support activities designed to bolster the Afghan economy, infrastructure and reconstruction effort is harming the American mission. His letter is a plea for additional money and a shift in priorities. “We have dared so greatly, and spent so much in blood and money that to try to skimp on what is needed for victory seems to me too risky.”

The Ambassador notes, “the supplemental decision recommendation to minimize economic assistance and leave out infrastructure plays into the Taliban strategy, not to ours.” Taliban leaders were issuing statements that the U.S. would grow increasingly weary, while they gained momentum. A resurgent Taliban leadership ominously summarizes the emerging strategic match-up with the United States by saying, “You have all the clocks but we have all the time.”

Document 26 – Kabul 003863
U.S. Embassy (Kabul), Cable, “Afghanistan: Where We Stand and What We Need” August 29, 2006, Secret, 8 pp. [Excised]

According to U.S. Ambassador to Afghanistan Ronald R. Neumann “we are not winning in Afghanistan; although we are far from losing.” The primary problem is a lack of political will to provide additional resources to bolster current strategy and to match increasing Taliban offensives. “At the present level of resources we can make incremental progress in some parts of the country, cannot be certain of victory, and could face serious slippage if the desperate popular quest for security continues to generate Afghan support for the Taliban…. Our margin for victory in a complex environment is shrinking, and we need to act now.” The Taliban believe they are winning. That perception “scares the hell out of Afghans.” “We are too slow.”

Rapidly increasing certain strategic initiatives such as equipping Afghan forces, taking out the Taliban leadership in Pakistan and investing heavily in infrastructure can help the Americans regain the upper hand, Neumann declares. “We can still win. We are pursuing the right general policies on governance, security and development. But because we have not adjusted resources to the pace of the increased Taliban offensive and loss of internal Afghan support we face escalating risks today.”

SCHEI**HAUS-FLIEGEN “GoMOPA”-Peter Ehlers und Gerd Bennewirtz- SCHEI**-HAUS-Nomen est STASI-Omen !

Der Beweis: Organisierte Verbrecher der GoMoPa:”Lug, Trug; Betrug, Cybermord, Rufmord, Mord”

Liebe Leser,

trotz serienmässiger Vorstrafen wegen Betruges und der zahlreicher anderer Kripo-,FBI-Ermiottlungen werden die organisierten GoMoPa-STASI-Gangster Ihre unwahren Lügen gegen mich nicht löschen und stellen diese immer wieder neu ins Netz: Kein Wunder, denn ich habe die Verbrechen dieser organisierten Kriminellen aufgedeckt und werde dies weiter tun – im Interesse aller anständigen Mitglieder der menschlichen Gesellschaft !

Wie dumm diese STASI-Verbrecher zeigt sich in deren eigenen  Texten: “Wie kann ein Magister eine Diplomarbeit schreiben” ? – wie in deren “Shithouse Fly Blog auf mich falsch dargelegt und natürlich haben die STASI-Kriminellen nicht den Hauch eines Beweises für irgendeine Behauptung – wir dagegen jede Menge und auch jede Menge Aktenzeichen gegen sie:

Zum Beispiel:

Klaus Maurischat ( Aktenzeichen Krefeld vom 24. April 2006; AZ: 28 Ls 85/05 – Am 24. April 2006 war die Verhandlung am Amtsgericht Krefeld in der Betrugssache: Mark Vornkahl / Klaus Maurischat ./. Dehnfeld. Aktenzeichen: 28 Ls 85/05, Klaus Maurischat, Lange Straße 38, 27313 Dörverden)

FAKT IST: Klaus Maurischat ist vorbestraft

Aktenzeichen Krefeld vom 24. April 2006; AZ: 28 Ls 85/05 – Am 24. April 2006 war die Verhandlung am Amtsgericht Krefeld in der Betrugssache: Mark Vornkahl / Klaus Maurischat ./. Dehnfeld. Aktenzeichen: 28 Ls 85/05, Klaus Maurischat, Lange Straße 38, 27313 Dörverden)

Sie wollen mich zwingen, mit ihren Lügen meine Berichterstattung gegen sie einzustellen – wie hier ersichtlich:

So wollte der Serienbetrüger Klaus Maurischat uns zwingen, die Berichterstattung über “GoMoPa” zu stoppen

Unser Bildtext: Klaus Maurischat: There is no Place like home

So wollte der Serienbetrüger Klaus Maurischat uns zwingen die Berichterstattung über den “NACHRICHTENDIENST” “GoMoPa” einzustellen

Meine Anmerkung:  Sie lesen

den Original-Text mit den Original-Rechtschreibfehlern von Maurischat  in chronologischer Reihenfolge von unten nach oben. “Unter den Linden” ist die Regus-Tarnadresse für den untergetauchten Serienbetrüger und Stasi-Ganoven. “SUMA” steht im Sprach-Jargon des “GoMoPa”-”NACHRICHTENDIENSTLERS” für Suchmaschine.

Zitat:

HAHAHAHAHAHAHAHAHAHAHAHAHAHAHA (MEINE ANTWORT)

> Was anderes fällt einem Hilfsschüler auch nicht ein! Wenn ich dich
> schnappe, dann haue ich dir die Fresse ein – mein Lieber! Merk dir
> das gut, du Kinderficker!
>
> Was sagt denn dein Freund Dr. XXX  zu deinem handeln, Schwuchtel?
>
> > HAHAHAHAHAHAHAHAHAHAHAHAHAHAHA (MEINE ANTWORT)
> >
> > > Geiles Google Suchergebniss hast du mittlerweile. Das ist sowas von
> > > geil. Am besten ist dieser Beitrag zu Deiner Magisterarbeit, du
> > > Spinner:
> > >
> > > http://scheisshausfliege.wordpress.com/2011/01/29/die-diplomarbeit-des-magisters-bernd-pulch-ein-haufen-scheisse/
> > >
> > > Wenn du nicht aufhörst, wird niemand mehr ein Stück Brot von dir
> > > nehmen. Dein Name ist dan absolut durch. Glaub mir, wir verstehen da
> > > mehr von als du Schwachkopf!
> > >
> > > Im Übrigen kannst du mich stets gern persönlich treffen. Unter den
> > > Linden 21, Berlin –  habe immer für dich Feigling Zeit! (TARN-ADRESSE)
> > >
> > > So – und nun überle wann du die Artikel über uns löschen willst,
> > > sonst mache ich die erste Seite der SUMA Ergebnisse mit deinen
> > > Einträgen voll.

Weitere Info zu den Verbrechen der organisierten Kriminellen der STASI  “GoMoPa” auf http://www.victims-opfer.com

TOP-SECRET-NEW KISSINGER ‘TELCONS’ REVEAL CHILE PLOTTING AT HIGHEST LEVELS OF U.S. GOVERNMENT

NEW KISSINGER ‘TELCONS’ REVEAL CHILE PLOTTING
AT HIGHEST LEVELS OF U.S. GOVERNMENT

Nixon Vetoed Proposed Coexistence with an Allende Government
Kissinger to the CIA: “We will not let Chile go down the drain.”

National Security Archive Electronic Briefing Book No. 255

m

Washington D.C., September 13, 2001- On the eve of the thirty-fifth anniversary of the military coup in Chile, the National Security Archive today published for the first time formerly secret transcripts of Henry Kissinger’s telephone conversations that set in motion a massive U.S. effort to overthrow the newly-elected socialist government of Salvador Allende. “We will not let Chile go down the drain,” Kissinger told CIA director Richard Helms in one phone call. “I am with you,” the September 12, 1970 transcript records Helms responding.

The telephone call transcripts—known as ‘telcons’—include previously-unreported conversations between Kissinger and President Richard Nixon and Secretary of State William Rogers.  Just eight days after Allende’s election, Kissinger informed the president that the State Department had recommended an approach to “see what we can work out [with Allende].”   Nixon responded by instructing Kissinger: “Don’t let them do it.

After Nixon spoke directly to Rogers, Kissinger recorded a conversation in which the Secretary of State agreed that “we ought, as you say, to cold-bloodedly decide what to do and then do it,” but warned it should be done “discreetly so that it doesn’t backfire.” Secretary Rogers predicted that “after all we have said about elections, if the first time a Communist wins the U.S. tries to prevent the constitutional process from coming into play we will look very bad.”

The telcons also reveal that just nine weeks before the Chilean military, led by Gen. Augusto Pinochet and supported by the CIA, overthrew the Allende government on September 11, 1973, Nixon called Kissinger on July 4 to say “I think that Chilean guy might have some problems.” “Yes, I think he’s definitely in difficulties,” Kissinger responded. Nixon then blamed CIA director Helms and former U.S. Ambassador Edward Korry for failing to block Allende’s inauguration three years earlier. “They screwed it up,” the President declared.

Although Kissinger never intended the public to know about these conversations, observed Peter Kornbluh, who directs the National Security Archive’s Chile Documentation Project, he “bestowed on history a gift that keeps on giving by secretly taping and transcribing his phone calls.”  The transcripts, Kornbluh noted, provide historians with the ability to “eavesdrop on the most candid conversations of the highest and most powerful U.S. officials as they plotted covert intervention against a democratically-elected government.”

Kissinger began secretly taping all his incoming and outgoing phone conversations when he became national security advisor in 1969; his secretaries transcribed the calls from audio tapes that were later destroyed.  When Kissinger left office in January 1977, he took more than 30,000 pages of the transcripts, claiming they were “personal papers,” and used them, selectively, to write his memoirs.  In 1999, the National Security Archive initiated legal proceedings to force Kissinger to return these records to the U.S. government so they could be subject to the freedom of information act and declassification.  At the request of Archive senior analyst William Burr, telcons on foreign policy crises from the early 1970s, including these four previously-unknown conversations on Chile, were recently declassified by the Nixon Presidential library.

On November 30, 2008 the National Security Archive will publish a comprehensive collection of Kissinger telcons in the Digital National Security Archive (DNSA). Comprising 15,502 telcons, this collection documents Kissinger’s conversations with top officials in the Nixon and Ford administrations, including President Richard Nixon; Defense Secretaries Melvin Laird, Elliot Richardson, and James Schlesinger; Secretary of State William P. Rogers; Ambassador to the U.N. George H.W. Bush; and White House Counselor Donald Rumsfeld; along with noted journalists, ambassadors, and business leaders with close White House ties.  Wide-ranging topics discussed in the telcons include détente with Moscow, military actions during the Vietnam War and the negotiations that led to its end, Middle East peace talks, the 1970 crisis in Jordan, U.S. relations with Europe, Japan, and Chile, rapprochement with China, the Cyprus crisis (1974- ), and the unfolding Watergate affair.  When combined with the Archive’s previous electronic publication of Kissinger’s memoranda of conversation — The Kissinger Transcripts: A Verbatim Record of U.S. Diplomacy, 1969-1977 — users of the DNSA will have access to comprehensive records of Kissinger’s talks with myriad U.S. officials and world leaders.  Like the Archive’s earlier publication, the Kissinger telcons will be comprehensively and expertly indexed, providing users with have easy access to the information they seek.  The collection also includes 158 White House tapes, some of which dovetail with transcripts of Kissinger’s telephone conversations with Nixon and others.  Users of the set will thus be able to read the “telcon” and listen to the tape simultaneously.

READ THE DOCUMENTS

l. Helms/Kissinger, September 12, 1970, 12:00 noon.

Eight days after Salvador Allende’s narrow election, Kissinger tells CIA director Richard Helms that he is calling a meeting of the 40 committee—the committee that determines covert operations abroad.  “We will not let Chile go down the drain,” Kissinger declares.  Helms reports he has sent a CIA emissary to Chile to obtain a first-hand assessment of the situation.

2. President/Kissinger, September 12, 1970, 12:32 p.m.

In the middle of a Kissinger report to Nixon on the status of a terrorist hostage crisis in Amman, Jordan, he tells the president that “the big problem today is Chile.”  Former CIA director and ITT board member John McCone has called to press for action against Allende; Nixon’s friend Pepsi CEO Donald Kendall has brought Chilean media mogul Augustine Edwards to Washington.  Nixon blasts a State Department proposal to “see what we can work out [with Allende], and orders Kissinger “don’t let them do that.” The president demands to see all State Department cable traffic on Chile and to get an appraisal of “what the options are.”

3. Secretary Rogers, September 14, 1970, 12:15pm (page 2)

After Nixon speaks to Secretary of State William Rogers about Chile, Kissinger speaks to him on September 14. Rogers reluctantly agrees that the CIA should “encourage a different result” in Chile, but warns it should be done discreetly lest U.S. intervention against a democratically-elected government be exposed.  Kissinger firmly tells Secretary Rogers that “the president’s view is to do the maximum possible to prevent an Allende takeover, but through Chilean sources and with a low posture.”

4) President/Kissinger, July 4, 1973, 11:00 a.m.

Vacationing in San Clemente, Nixon calls Kissinger and discusses the deteriorating situation in Chile.  Two weeks earlier, a coup attempt against Allende failed, but Nixon and Kissinger predict further turmoil.  “I think that Chilean guy may have some problems,” Nixon states.  “Oh, he has massive problems.  He has massive problems…he’s definitely in difficulties,” Kissinger responds.  The two share recollections of three years earlier when they had covertly attempted to block Allende’s inauguration.  Nixon blames CIA director Richard Helms and former U.S. ambassador Edward Korry for failing to stop Allende; “they screwed it up,” he states.  The conversation then turns to Kissinger’s evaluation of the Los Angeles premiere of the play “Gigi.”

5) President/Kissinger, September 16, 1973, 11:50 a.m. (previously posted May 26, 2004)

In their first substantive conversation following the military coup in Chile, Kissinger and Nixon discuss the U.S. role in the overthrow of Allende, and the adverse reaction in the new media. When Nixon asks if the U.S. “hand” will show in the coup, Kissinger admits “we helped them” and that “[deleted reference] created conditions as great as possible.”  The two commiserate over what Kissinger calls the “bleating” liberal press. In the Eisenhower period, he states, “we would be heroes.” Nixon assures him that the people will appreciate what they did: “let me say they aren’t going to buy this crap from the liberals on this one.”

TOP-SECRET – Meyer Lansky – THE FBI FILES PART 1

Meyer Lansky (1902-1983) was involved in a wide-range of organized criminal activity and was associated with many other well known criminal figures from the 1920s to the 1970s. Lansky was especially active in gambling ventures, including the rise of Las Vegas and efforts to build casinos in Cuba before the communist revolution there. In 1972, he was indicted on charges that he and others had skimmed millions of dollars from a Vegas casino that they owned; the indictment on Lansky was later dismissed since he was considered too ill to face trial. The files in this release range from 1950 to 1978.

By clicking on the links below you can download the files a pdf documents

62-97928 -83

71-4082 -9

92-2831 section 1 -97

92-2831 section 2 -68

92-2831 section 3 -133

92-2831 section 4 -266- pages 1-249

92-2831 section 4 -266- pages 250-304

92-2831 section 5 -85

92-2831 section 6 -166

92-2831 section 7 -166

166-3701 -10

Miscellaneous -3

 

 

Meyer Lansky

Meyer Lansky in 1958
Born Meyer Suchowljansky
July 4, 1902(1902-07-04)
Grodno, Russian Empire
Died January 15, 1983(1983-01-15) (aged 80)
Miami Beach, Florida
Cause of death lung cancer
Nationality United States
Known for Mob activity

Meyer Lansky (born Meyer Suchowljansky[1]; July 4, 1902 – January 15, 1983), known as the “Mob’s Accountant”, was a Russian Empire-born American organized crime figure who, along with his associate Charles “Lucky” Luciano, was instrumental in the development of the “National Crime Syndicate” in the United States. For decades he was thought to be one of the most powerful people in the country.

Lansky developed a gambling empire which stretched from Saratoga, New York to Miami to Council Bluffs and Las Vegas; it is also said that he oversaw gambling concessions in Cuba. Although a member of the Jewish Mafia, Lansky undoubtedly had strong influence with the Italian Mafia and played a large role in the consolidation of the criminal underworld (although the full extent of this role has been the subject of some debate).

Lansky was born Meyer Suchowljansky in Grodno (then in the Russian Empire, now in Belarus), to a Jewish family who experienced pogroms at the hands of the local Christian Polish and Russian population.[2] In 1911, he emigrated to the United States through the port of Odessa[3] with his mother and brother and joined his father, who had previously emigrated to the United States in 1909, and settled on the Lower East Side of Manhattan, New York.[4]

Lansky met Bugsy Siegel when he was a teenager. They became lifelong friends, as well as partners in the bootlegging trade, and together with Lucky Luciano, formed a lasting partnership. Lansky was instrumental in Luciano’s rise to power by organizing the 1931 murder of Mafia powerhouse Salvatore Maranzano. As a youngster, Siegel saved Lansky’s life several times, a fact which Lansky always appreciated. The two adroitly managed the Bug and Meyer Mob despite its reputation as one of the most violent Prohibition gangs.

Lansky was the brother of Jacob “Jake” Lansky, who in 1959 was the manager of the Nacional Hotel in Havana, Cuba.

 Gambling operations

By 1936, Lansky had established gambling operations in Florida, New Orleans, and Cuba. These gambling operations were very successful as they were founded upon two innovations. First, in Lansky and his connections there existed the technical expertise to effectively manage them based upon Lansky’s knowledge of the true mathematical odds of most popular wagering games. Second, mob connections were used to ensure legal and physical security of their establishments from other crime figures, and law enforcement (through payoffs).

But there was also an absolute rule of integrity concerning the games and wagers made within their establishments. Lansky’s “carpet joints” in Florida and elsewhere were never “clip-joints”; where gamblers were unsure of whether or not the games were rigged against them. Lansky ensured that the staff (the croupiers and their management) actually consisted of men of high integrity. And it was widely known what would happen to a croupier or a table manager who attempted to cheat or steal from a customer or the house.[clarification needed]

In 1936, Lansky’s partner Luciano was sent to prison. As Alfred McCoy records:

“During the 1930s, Meyer Lansky ‘discovered’ the Caribbean for Northeastern United States syndicate bosses and invested their illegal profits in an assortment of lucrative gambling ventures…. He was also reportedly responsible for organized crime’s decision to declare Miami a ‘free city’ (i.e., not subject to the usual rules of territorial monopoly).”

[citation needed]

Lansky later convinced the Mafia to place Bugsy Siegel in charge of Las Vegas, and became a major investor in Siegel’s Flamingo Hotel.

After Al Capone‘s 1931 conviction for tax evasion and prostitution, Lansky saw that he too was vulnerable to a similar prosecution. To protect himself, he transferred the illegal earnings from his growing casino empire to a Swiss numbered bank account, whose anonymity was assured by the 1934 Swiss Banking Act. Lansky eventually even bought an offshore bank in Switzerland, which he used to launder money through a network of shell and holding companies.[5]

War work

In the 1930s, Meyer Lansky and his gang claimed to have stepped outside their usual criminal activities to break up rallies held by Nazi sympathizers. Lansky recalled a particular rally in Yorkville, a German neighborhood in Manhattan, that he claimed he and 14 other associates disrupted:

The stage was decorated with a swastika and a picture of Adolf Hitler. The speakers started ranting. There were only fifteen of us, but we went into action. We threw some of them out the windows. Most of the Nazis panicked and ran out. We chased them and beat them up. We wanted to show them that Jews would not always sit back and accept insults.[6]

During World War II, Lansky was also instrumental in helping the Office of Naval Intelligence‘s Operation Underworld, in which the US government recruited criminals to watch out for German infiltrators and submarine-borne saboteurs.

According to Lucky Luciano’s authorized biography, during this time, Lansky helped arrange a deal with the US Government via a high-ranking U.S. Navy official. This deal would secure the release of Lucky Luciano from prison; in exchange the Italian Mafia would provide security for the war ships that were being built along the docks in New York Harbor. German submarines were sinking allied shipping outside the coast on a daily basis and there was great fear of attack or sabotage by Nazi sympathizers.

The Flamingo

During the 1940s, Lansky’s associate Benjamin “Bugsy” Siegel persuaded the crime bosses to invest in a lavish new casino hotel project in Las Vegas, the Flamingo. After long delays and large cost overruns, the Flamingo Hotel was still not open for business. To discuss the Flamingo problem, the Mafia investors attended a secret meeting in Havana, Cuba in 1946. While the other bosses wanted to kill Siegel, Lansky begged them to give his friend a second chance. Despite this reprieve, Siegel continued to lose Mafia money on the Flamingo Hotel. A second family meeting was then called. However, by the time this meeting took place, the casino turned a small profit. Lansky again, with Luciano’s support, convinced the family to give Siegel some more time.

The Flamingo was soon losing money again. At a third meeting, the family decided that Siegel was finished. He had humiliated the organized crime bosses and never had a chance. It is widely believed that Lansky himself was compelled to give the final okay on eliminating Siegel due to his long relationship with Siegel and his stature in the family.

On June 20, 1947, Siegel was shot and killed in Beverly Hills, California. Twenty minutes after the Siegel hit, Lansky’s associates, including Gus Greenbaum and Moe Sedway, walked into the Flamingo Hotel and took control of the property. According to the Federal Bureau of Investigation, Lansky retained a substantial financial interest in the Flamingo for the next twenty years. Lansky said in several interviews later in his life that if it had been up to him, Ben Siegel would be alive today.

This also marked a power transfer in Vegas from the New York crime families to the Chicago Outfit. Although his role was considerably more restrained than in previous years, Lansky is believed to have both advised and aided Chicago boss Tony Accardo in initially establishing his hold.

Lansky in Cuba

After World War II, Lansky associate Lucky Luciano was paroled from prison on the condition that he permanently return to Sicily. However, Luciano secretly moved to Cuba, where he worked to resume control over American Mafia operations. Luciano also ran a number of casinos in Cuba with the sanction of Cuban president General Fulgencio Batista, though the American government succeeded in pressuring the Batista regime to deport Luciano.

Batista’s closest friend in the Mafia was Lansky. They formed a renowned friendship and business relationship that lasted for three decades. During a stay at the Waldorf-Astoria in New York in the late 1940s, it was mutually agreed upon that, in exchange for kickbacks, Batista would offer Lansky and the Mafia control of Havana’s racetracks and casinos. Batista would open Havana to large scale gambling, and his government would match, dollar for dollar, any hotel investment over $1 million, which would include a casino license. Lansky, of course, would place himself at the center of Cuba’s gambling operations. He immediately called on his “associates” to hold a summit in Havana.

The Havana Conference was held on December 22, 1946 at the Hotel Nacional. This was the first full-scale meeting of American underworld leaders since the Chicago meeting in 1932. Present were such notable figures as Joe Adonis and Albert “The Mad Hatter” Anastasia, Frank Costello, Joseph “Joe Bananas” Bonanno, Vito Genovese, Moe Dalitz, Thomas Luchese, from New York, Santo Trafficante Jr. from Tampa, Carlos “The Little Man” Marcello from New Orleans, and Stefano Magaddino, Joe Bonanno’s cousin from Buffalo. From Chicago there was Anthony Accardo and the Fischetti brothers, “Trigger-Happy” Charlie and his brother Rocco, and, representing the Jewish interest, Lansky and “Dandy” Phil Kastel from Florida. The first to arrive was Salvatore Charles Lucky Luciano, who had been deported to Italy, and had to travel to Havana with a false passport. Lansky shared with them his vision of a new Havana, profitable for those willing to invest the right sum of money. A city that could be their “Latin Las Vegas,” where they would feel right at home since it was a place where drugs, prostitution, labor racketeering, and extortion were already commonplace. According to Luciano’s evidence, and he is the only one who ever recounted details of the events in any detail, he confirmed that he was appointed as kingpin for the mob, to rule from Cuba until such time as he could find a legitimate way back into the U.S. Entertainment at the conference was provided by, among others, Frank Sinatra who flew down to Cuba with their friends, the Fischetti brothers.

In 1952, Lansky even offered then President Carlos Prío Socarrás a bribe of U.S. $250,000 to step down so Batista could return to power. Once Batista retook control of the government he quickly put gambling back on track. The dictator contacted Lansky and offered him an annual salary of U.S. $25,000 to serve as an unofficial gambling minister. By 1955, Batista had changed the gambling laws once again, granting a gaming license to anyone who invested $1 million in a hotel or U.S. $200,000 in a new nightclub. Unlike the procedure for acquiring gaming licenses in Vegas, this provision exempted venture capitalists from background checks. As long as they made the required investment, they were provided with public matching funds for construction, a 10-year tax exemption and duty-free importation of equipment and furnishings. The government would get U.S. $250,000 for the license plus a percentage of the profits from each casino. Cuba’s 10,000 slot machines, even the ones which dispensed small prizes for children at country fairs, were to be the province of Batista’s brother-in-law, Roberto Fernandez y Miranda. An Army general and government sports director, Fernandez was also given the parking meters in Havana as a little something extra. Import duties were waived on materials for hotel construction and Cuban contractors with the right “in” made windfalls by importing much more than was needed and selling the surplus to others for hefty profits. It was rumored that besides the U.S. $250,000 to get a license, sometimes more was required under the table. Periodic payoffs were requested and received by corrupt politicians.

Lansky set about reforming the Montmartre Club, which soon became the in place in Havana. He also long expressed an interest in putting a casino in the elegant Hotel Nacional, which overlooked El Morro, the ancient fortress guarding Havana harbor. Lansky planned to take a wing of the 10-storey hotel and create luxury suites for high stakes players. Batista endorsed Lansky’s idea over the objections of American expatriates such as Ernest Hemingway and the elegant hotel opened for business in 1955 with a show by Eartha Kitt. The casino was an immediate success.[7]

Once all the new hotels, nightclubs and casinos had been built Batista wasted no time collecting his share of the profits. Nightly, the “bagman” for his wife collected 10 percent of the profits at Trafficante’s interests; the Sans Souci cabaret, and the casinos in the hotels Sevilla-Biltmore, Commodoro, Deauville and Capri (part-owned by the actor George Raft). His take from the Lansky casinos, his prized Habana Riviera, the Nacional, the Montmartre Club and others, was said to be 30 percent. What exactly Batista and his cronies actually received in total in the way of bribes, payoffs and profiteering has never been certified. The slot machines alone contributed approximately U.S. $1 million to the regime’s bank account.

Revolution

The fast times soon rolled to a stop. The 1959 Cuban revolution and the rise of Fidel Castro changed the climate for mob investment in Cuba. On that New Year’s Eve of 1958, while Batista was preparing to flee to the Dominican Republic and then on to Spain (where he died in exile in 1973), Lansky was celebrating the $3 million he made in the first year of operations at his 440-room, $18 million palace, the Habana Riviera. Many of the casinos, including several of Lansky’s, were looted and destroyed that night.

On January 8, 1959, Castro marched into Havana and took over, setting up shop in the Hilton. Lansky had fled the day before for the Bahamas and other Caribbean destinations. The new Cuban president, Manuel Urrutia Lleó, took steps to close the casinos.

In October 1960, Castro nationalized the island’s hotel-casinos and outlawed gambling. This action essentially wiped out Lansky’s asset base and revenue streams. He lost an estimated $7 million. With the additional crackdown on casinos in Miami, Lansky was forced to depend on his Las Vegas revenues.

Later years

In his later years, Lansky lived a low-profile, routine existence in Miami Beach, making life difficult for the Federal Bureau of Investigation (FBI). He dressed like the average grandfather, walked his dog every morning, and portrayed himself as a harmless retiree. Lansky’s associates usually met him in malls and other crowded locations. Lansky would change drivers, who chauffeured him around town to look for new pay phones almost every day. Lansky was so elusive that the FBI essentially gave up monitoring him by the mid-1970s.

Attempted escape to Israel and trial

In 1970, Lansky fled to Herzliya Pituah, Israel, to escape federal tax evasion charges. Although the Israeli Law of Return allows any Jew to settle in the State of Israel, it excludes those with criminal pasts. Two years after Lansky fled to Israel, Israeli authorities deported him back to the U.S. However, the government’s best shot at convicting Lansky was with the testimony of loan shark Vincent “Fat Vinnie” Teresa, an informant with little or no credibility. The jury was unreceptive and Lansky was acquitted in 1974.

Death

Lansky’s last years were spent quietly at his home in Miami Beach. He died of lung cancer on January 15, 1983, age 80, leaving behind a widow and three children.[8] On paper, Lansky was worth almost nothing. At the time, the FBI believed he left behind over $300 million in hidden bank accounts, but they never found any money.

However, his biographer Robert Lacey describes Lansky’s financially strained circumstances in the last two decades of his life and his inability to pay for health care for his relatives. For Lacey, there was no evidence “to sustain the notion of Lansky as king of all evil, the brains, the secret mover, the inspirer and controller of American organized crime.”[9] He concludes from evidence including interviews with the surviving members of the family that Lansky’s wealth and influence had been grossly exaggerated, and that it would be more accurate to think of him as an accountant for gangsters rather than a gangster himself. His granddaughter told author T.J. English that at his death in 1983, Lansky left only $37,000 in cash.[10] When asked in his later years what went wrong in Cuba, the gangster offered no excuses. “I crapped out,” he said. He would also tell people he had lost every single penny in Cuba. In all likelihood, it was only an excuse to keep the IRS off his back. According to Lansky’s daughter Sandra, he had transferred at least $15 million to his brother Jake due to his problems with the IRS. Lansky was known to keep money in other people’s names, but how much will likely never be known. Meyer Lansky was and continues to be a mystery.

In September 1982, Forbes listed him as one of the 400 wealthiest people in America. His net worth was estimated at $100 million.

 In popular culture

 In film

  • The character Hyman Roth, portrayed by Lee Strasberg, and certain aspects of the main character Michael Corleone from the film The Godfather Part II (1974), are based on Lansky. In fact, shortly after the premiere in 1974, Lansky phoned Strasberg and congratulated him on a good performance (Strasberg was nominated for an Oscar for his role), but added “You could’ve made me more sympathetic.” Roth’s statement to Michael Corleone that “We’re bigger than U.S. Steel” was actually a direct quote from Lansky, who said the same thing to his wife while watching a news story on the Cosa Nostra. The character Johnny Ola is similar to Lansky’s associate Vincent Alo. Additionally, the character Moe Greene, who was a friend of Roth’s, is modeled upon Bugsy Siegel.[11][12] The film reflects real life in that Lansky was denied the Right of Return to Israel and returned to the U.S. to face criminal charges, but fabricated details regarding Roth’s attempts to bribe Latin American dictators for entry to their countries, as well as Roth’s ultimate fate.
  • Maximilian “Max” Bercovicz, the gangster played by James Woods in Sergio Leone‘s opus Once Upon A Time In America was inspired by Meyer Lansky.[13]
  • Mark Rydell plays Lansky in the 1990 Sydney Pollack film Havana, starring Robert Redford.
  • The film Bugsy (1991), a biography of Bugsy Siegel, included Lansky as a major character, played by Ben Kingsley.
  • In the 1991 film Mobsters, he is played by the actor Patrick Dempsey.
  • In a 1999 movie biopic entitled Lansky, the dramatized role of Lansky is portrayed by Richard Dreyfuss.
  • Meyer Lansky is portrayed by Dustin Hoffman in the 2005 film The Lost City.

 In television

  • In the current (2010) series on HBO, Boardwalk Empire, Meyer Lansky is played by Anatol Yusef.
  • The 1981 NBC mini series, The Gangster Chronicles, the character of Michael Lasker, played by Brian Benben, was based on Lansky. Because Lansky was still living at the time, the producers derived the “Michael Lasker” name for the character to avoid legal complications.
  • A 1999 made-for-TV movie called Lansky was released starring Richard Dreyfuss as Lansky, Eric Roberts as Bugsy Siegel, and Anthony LaPaglia as Lucky Luciano.
  • Manny Wiesbord, the mob chieftain played by Joseph Wiseman on Crime Story, was based on Lansky.
  • Lansky’s grandson, Meyer Lansky II, appeared in the “Jesse James vs. Al Capone” episode of Spike‘s Deadliest Warrior as a Capone expert, credited as “Mafioso Descendant.” The senior Lansky was briefly referenced during the episode.

 In literature

  • In the 2010 book of photographs “New York City Gangland”,[14] Meyer Lansky is seen “loitering” on Little Italy’s famed “Whiskey Curb” with partners Benjamin “Bugsy” Siegel, Vincent “Jimmy Blue Eyes” Alo, and waterfront racketeer Eddie McGrath.
  • In the 1996 novel The Plan, by Stephen J. Cannell, Lansky and fellow mobster Joseph Alo are involved in putting an anti-Racketeer Influenced and Corrupt Organizations Act presidential candidate into office.
  • In the 2009 theatrical adaption by Joseph Bologna “Lansky” is portrayed by Mike Burstyn in a one act play.
  • In the book Havana by Stephen Hunter, Lansky and Fidel Castro are both included as main characters.
  • In the 2009 novel If The Dead Rise Not by Philip Kerr the hero, Bernie Gunther, meets Lansky in Havana.
  • In the 2009 novel Ride of the Valkyries by Stuart Slade, Meyer Lansky is the President of Mafia run Cuba.
  • In the 2011 historical novel, “The Devil Himself” by Eric Dezenhall, Meyer Lansky coordinates counterespionage operations with the U.S. Navy to prevent Nazi sabotage in New York and help plan the invasion of Sicily.
  • He portrays himself in Harold Robbins 1995 follow-up to The Carpetbaggers, The Raiders.

In music

  • In his 2007 song “Party Life,” Jay-Z raps, “So tall and Lanky / My suit, it should thank me / I make it look good to be this hood Meyer Lansky.”
  • Raekwon, a member of the Wu-tang Clan referred to himself as “rap’s Meyer Lansky” in his song “Glaciers of Ice,” a single on his classic 1995 release “Only Built 4 Cuban Linx…
  • A member of the rap group Wu-Syndicate uses Myalansky as his stage name, referring to Meyer Lansky.
  • In the 2010 mixtape “Albert Anastasia” by Rick Ross refers to Meyer Lansky in his song White Sand Pt.II: “I put the team together like I’m Meyer Lansky.”
  • On Obie Trice’s “Outro” off the Cheers album Proof raps, ” Know much about Meyer Lansky? / Don’t tustle with my hand speed / Clutch your burner, bust it and watch your man bleed.”
  • In 2011 50 Cent’s Run Up On Me Freestyle raps, “Got a fetish for the guns Calico drums / Rap Meyer Lansky steady counting my ones”

TOP-SECRET-CUBA and the U.S ROAD MAP

Washington, D.C., September, 2011– In March 1975, a top aide to Secretary of State Henry Kissinger drafted a secret/nodis report titled “Normalizing Relations with Cuba” that recommended moving quickly to restore diplomatic ties with Havana. “Our interest is in getting the Cuba issue behind us, not in prolonging it indefinitely,” states the memorandum, which was written as the Ford administration engaged in secret diplomacy with Castro officials to lessen hostilities. “If there is a benefit to us in an end to the state of ‘perpetual antagonism,'” the report to Kissinger noted, “it lies in getting Cuba off the domestic and inter-American agendas—in extracting the symbolism from an intrinsically trivial issue.”The Kissinger document is one of several declassified records posted today and cited in a new article, “Talking to Fidel,” published in the February issue of Cigar Aficionado now available in newsstands. Written by Archive Cuba analyst Peter Kornbluh and William LeoGrande, Dean of the School of Public Affairs at American University, the article traces the secret, back-channel efforts by Kennedy, Kissinger, Carter and Clinton to improve and even attempt to normalize relations with the Castro regime. “The historical record,” the authors write, “contains important lessons [for President Obama] on how an effective effort at direct diplomacy might end, once and for all, the perpetual hostility in U.S.-Cuban relations.”

The article also quotes former President Jimmy Carter as stating that he should have followed through on his initial efforts to normalize relations with Cuba. “I think in retrospect, knowing what I know since I left the White House,” Carter told the authors in an interview, “I should have gone ahead and been more flexible in dealing with Cuba and establishing full diplomatic relations.”

The Kissinger documents, posted for the first time on the Web, along with other documentation from the Kennedy and Carter administrations, were obtained by the Archive’s Cuba documentation project as part of a major research project on secret dialogue and negotiations between Havana and Washington over the past fifty years.  The article in Cigar Aficionado is adapted from a forthcoming book by Kornbluh and LeoGrande, Talking with Fidel: The Untold History of Dialogue between the United States and Cuba.

“History shows that presidents from Kennedy to Clinton considered dialogue both possible and preferable to continued hostility and aggression in U.S. policy toward Cuba,” Kornbluh noted. “This rich declassified record of the past provides a road map for the new administration to follow in the future.”


Read the Dialogue Documents

Document l: White House memorandum, Secret, “Conversation with Commandante Ernesto Guevara of Cuba”, August 22, 1961.

In a secret memo to President Kennedy, Richard Goodwin recounts his impromptu meeting with Ernesto “Che” Guevara that took place on August 17, 1961 in Montevideo, Uruguay. Their conversation covered several key points: First, Guevara expressed Cuba’s hope to establish a “modus vivendi” with the United States. Second, although Castro was willing\ to make a number of concessions toward that goal, the nature of Cuba’s political system was nonnegotiable. “He said they could discuss no formula that would mean giving up the type of society to which they were dedicated,” Goodwin reported. Finally Guevara raised the issue of how the two countries would find “a practical formula” to advance toward accommodation. He made a pragmatic suggestion, according to Goodwin: “He knew it was difficult to negotiate these things but we could open up some of these issues by beginning to discuss secondary issues … as a cover for more serious conversation.” The meeting marked the first high-level talks between officials from the United States and Cuba since the break in diplomatic relations on January 3, 1961.

Document 2: White House memorandum, Top Secret, “Mr. Donovan’s Trip to Cuba,” March 4, 1963.

This document records President Kennedy’s interest in negotiations with Castro and his instructions to his staff to “start thinking along more flexible lines” about negotiations with Cuba toward better relations.  At issue were talks between James Donovan, who had negotiated the release of the Bay of Pigs prisoners, and Fidel Castro, who had expressed an interest in using the prisoner negotiations as a springboard to discuss more normal relations.  The memo recording Kennedy’s views makes clear he expressed a concrete interest in exploring and pursuing an effective dialogue with Castro.

Document 3: Central Intelligence Agency memorandum, Secret, “Interview of the U.S. Newswoman with Fidel Castro Indicating Possible Interest in Rapprochement with the United States”, May 1, 1963.

After ABC News correspondent Lisa Howard returned from interviewing Castro in April 1963, she provided a debriefing to CIA deputy director Richard Helms. Helms’s memorandum of conversation notes her opinion that Castro is “ready to discuss rapprochement.” Howard also offered to become an intermediary between Havana and Washington. The document contains a notation, “Psaw,” meaning President Kennedy read the report on Howard and Castro. 

Document 4: Oval Office audio tape, Kennedy and Bundy, November 5, 1963. (.mp3 audio clip – 6 MB)

This audio document, recorded by a secret taping system in President Kennedy’s office, records a discussion between the President and his National Security Advisor, McGeorge Bundy, regarding Castro’s invitation to William Attwood, a deputy to U.N. Ambassador Adlai Stevenson, to come to Cuba for secret talks. “How can Attwood get in and out of there very privately,” Kennedy is heard to ask. The President suggests that Attwood should be taken off the U.S. payroll prior to such a meeting so that the White House could plausibly deny that any official talks had taken place if the meeting leaks to the press.

Document 5: National Security Council, memorandum for Secretary Kissinger, Confidential, “Cuba Policy,” August 30, 1974.

This memorandum for Kissinger lays out the growing multinational pressures on the U.S. to change its sanctions policy toward Cuba.  A number of Latin countries are pushing for licenses for U.S. subsidiaries to export goods to Cuba, and the OAS nations are threatening to lift the ban on trade and diplomatic ties with Havana that the U.S. imposed in 1964.  Stephen Low, an NSC staffer on Latin America, recommends an options paper for changing U.S. policy and negotiating with the Cubans that “should be held very closely.” Kissinger authorizes the project. Unbeknownst to all but his two top aides, he also initiates contact with the Cubans through intermediaries to begin exploring talks. (Newly posted)

Document 6: Kissinger Aide-Memoire to Cuba, January 11, 1975

In an effort to renew a dialogue between Cuba and the United States, Kissinger’s aides and Cuban representatives meet for the first time in a public cafeteria in La Guardia airport in New York on January 11, 1975. During this secret meeting, the Assistant Secretary of State for Latin America, William Rogers, provides an aide-mémoire, approved by Kissinger, to Castro’s representative, Ramon Sanchez-Parodi.   “We are meeting here to explore the possibilities for a more normal relationship between our two countries,” the untitled and unsigned U.S. document reads.  The message takes a very positive tone in suggesting that the “U.S. is able and willing to make progress on such issues even with socialist nations with whom we are in fundamental ideological disagreement.” (Newly posted) 

Document 7: Department of State, Secret, “Normalizing relations with Cuba”, March 27, 1975.

As the OAS prepared to lift multilateral sanctions against Cuba, and the U.S. Congress pushed for lifting the embargo, deputy assistant secretary for Latin America Harry Shlaudeman drafted a secret/nodis memo for Kissinger on “Normalizing Relations with Cuba.” His report suggests that the U.S. should move quickly to negotiate with Cuba through a scenario that will result in normal diplomatic relations. “Our interest is in getting the Cuba issue behind us, not in prolonging it indefinitely,” the memo states. Shlaudeman warns that the conventional scenario of talks will become mired in disagreements over compensation for expropriated property and suggests setting that issue aside. The document lays out a series of steps that would be taken to normalize relations and finally get the “intrinsically trivial issue” of Cuba “off the domestic and inter-American agendas.” (Newly posted)

Document 8: Presidential Directive / NSC-6, Secret, “Cuba”, March 15, 1977.

This directive, issued shortly after Carter took office, represents the only time a President has ordered normalization of U.S. relations with Castro’s Cuba. “I have concluded that we should attempt to achieve normalization of our relations with Cuba,” the directive states. Carter instructed his foreign policy team to “set in motion a process which will lead to the reestablishment of diplomatic relations between the United States and Cuba.” Although negotiations led quickly to re-opening diplomatic ties through the establishment of interest sections in Havana and Washington, secret talks, including with Fidel Castro, broke down over the U.S. insistence that Cuba withdraw its troops from Africa before the Carter Administration would consider lifting the embargo.

CUBA and the U.S

ROAD MAP ON EFFORTS TO IMPROVE
RELATIONS REVEALED IN DECLASSIFIED DOCUMENTS

Archive Posts Documents used in new Cigar Aficionado Article: “Talking To Fidel”

Secret Kissinger Era reports on Ending “Perpetual Antagonism” may hold Lessons for Obama Administration

National Security Archive Electronic Briefing Book No. 269

TOP-SECRET-Historical Archives Lead to Arrest of Police Officers in Guatemalan Disappearance

Demonstration by the GAM on April 13, 1985 following the deaths of GAM leaders, Héctor Gómez and Rosario Godoy de Cuevas. Photo from; “Guatemala: Eternal Spring, Eternal Tyrany.” [Courtesy of Jean-Marie Simon]

Historical Archives Lead to Arrest of Police
Officers in Guatemalan Disappearance

Declassified documents show U.S. Embassy knew
that Guatemalan security forces were behind
wave of abductions of students and labor leaders

National Security Archive calls for release of military files
and investigation into intellectual authors of the 1984
abduction of Fernando García and other disappearances

National Security Archive Electronic Briefing Book No. 273

By Kate Doyle and Jesse Franzblau

Washington, DC, September 14, – Following a stunning breakthrough in a 25-year-old case of political terror in Guatemala, the National Security Archive today is posting declassified U.S. documents about the disappearance of Edgar Fernando García, a student leader and trade union activist captured by Guatemalan security forces in 1984.The documents show that García’s capture was an organized political abduction orchestrated at the highest levels of the Guatemalan government.

Guatemalan authorities made the first arrest ever in the long-dormant kidnapping case when they detained Héctor Roderico Ramírez Ríos, a senior police officer in Quezaltenango, on March 5th and retired policeman Abraham Lancerio Gómez on March 6th as a result of an investigation into García’s abduction by Guatemala’s Human Rights Prosecutor (Procurador de Derechos Humanos—PDH). Arrest warrants have been issued for two more suspects, Hugo Rolando Gómez Osorio and Alfonso Guillermo de León Marroquín. The two are former officers with the notorious Special Operations Brigade (BROE) of the National Police, a unit linked to death squad activities during the 1980s by human rights groups.

According to the prosecutor Sergio Morales, the suspects were identified using evidence found in the vast archives of the former National Police. The massive, moldering cache of documents was discovered accidentally by the PDH in 2005, and has since been cleaned, organized and reviewed by dozens of investigators. The National Security Archive provided expert advice in the rescue of the archive and posted photographs and analysis on its Web site. Last week, Morales turned over hundreds of additional records to the Public Ministry containing evidence of state security force involvement in the disappearance of other student leaders between 1978 and 1980. As the Historical Archive of the National Police prepares to issue its first major report on March 24, more evidence of human rights crimes can be expected to be made public.

Government Campaign of Terror

The abduction of Fernando García was part of a government campaign of terror designed to destroy Guatemala’s urban and rural social movements during the 1980s. On February 18, 1984, the young student leader was captured on the outskirts of a market near his home in Guatemala City. He was never seen again. Although witnesses pointed to police involvement, the government under then-Chief of State Gen. Oscar Humberto Mejía Víctores always denied any role in his kidnapping. According to the Historical Clarification Commission’s report released in 1999, García was one of an estimated 40,000 civilians disappeared by state agents during Guatemala’s 36-year civil conflict.

In the wake of García’s capture, his wife, Nineth Montenegro – now a member of Congress – launched the Mutual Support Group (Grupo de Apoyo Mutuo—GAM), a new human rights organization that pressed the government for information about missing relatives. Co-founded with other families of the disappeared , GAM took shape in June of 1984, holding demonstrations, meeting with government officials and leading a domestic and international advocacy campaign over the years to find the truth behind the thousands of Guatemala’s disappeared. The organization was quickly joined by hundreds more family members of victims of government-sponsored violence, including Mayan Indians affected by a brutal army counterinsurgency campaign that decimated indigenous communities in the country’s rural highlands during the early 1980s.

Declassified U.S. records obtained by the National Security Archive under the Freedom of Information Act indicate that the United States was well-aware of the government campaign to kidnap, torture and kill Guatemalan labor leaders at the time of García’s abduction. “Government security services have employed assassination to eliminate persons suspected of involvement with the guerrillas or who are otherwise left-wing in orientation,” wrote the State Department’s Bureau of Intelligence and Research four days after García disappeared, pointing in particular to the Army’s “notorious presidential intelligence service (archivos)” and the National Police, “who have traditionally considered labor activists to be communists.”

The U.S. Embassy in Guatemala considered the wave of state-sponsored kidnappings part of an effort to gather information on “Marxist-Leninist” trade unions. “The government is obviously rounding up people connected with the extreme left-wing labor movement for interrogation,” wrote U.S. Ambassador Frederic Chapin in a cable naming six labor leaders recently captured by security forces, including García. Despite reports that García was already dead, the ambassador was “optimistic” that he and other detainees would be released after questioning.

Many of the kidnapping victims noted in U.S. records included in this briefing book also appear in the “Death Squad Dossier,” an army intelligence logbook listing 183 people disappeared by security forces in the mid-1980s. In 1999, the National Security Archive obtained the original logbook and released a public copy. The logbook indicates that García was among dozens of students, professors, doctors, journalists, labor leaders and others subjected to intensive army and police surveillance in the weeks leading up to their capture, disappearance and – in about half of the cases – execution. The logbook entry listing Fernando García includes his alleged subversive alias names and affiliation to the Guatemalan Communist Party, as well as detailed personal information taken from official documents such as his national identification card and his passport. Other victims listed in the Death Squad Dossier who are named in the U.S. documents posted today include Amancio Samuel Villatoro, Alfonso Alvarado Palencia, José Luis Villagrán Díaz and Santiago López Aguilar. U.S. records describe their disappearances in the context of the government campaign to systematically dismantle Guatemala’s labor movement.

The U.S. records posted today contain illuminating information on how the use of illegal kidnapping as a counterinsurgency strategy reached a peak during the government of Oscar Mejía Víctores. U.S. figures estimated that there was an average of 137 abductions a month under the Mejía Víctores regime during 1984. According to one extensive State Department report written in 1986, part of the modus operandi of government kidnapping involved interrogating victims at military bases, police stations, or government safe houses, where information about alleged connections with insurgents was “extracted through torture.” The security forces used the information to conduct joint military/police raids on houses throughout the city, secretly capturing hundreds of individuals who were never seen again, or whose discarded bodies were later discovered showing signs of torture. The National Police, subservient to the Army hierarchy, created special units to assist the military in the urban counter-guerrilla operations.

The records also demonstrate military efforts to cover up their role in the extra-legal activities. In 1985, for example, as Guatemala prepared to transition to a civilian government for the first time in a quarter of a century, the Army ordered the Archivos – which the State Department called “a secret group in the President’s office that collected information on insurgents and operated against them” – to move its files out of presidential control and into the Intelligence Directorate (D-2) section of the military.

U.S. documents also chronicled developments as members of GAM became targets of government violence themselves. GAM members suffered the worst period of violence during Easter “holy week” in 1985, beginning with the kidnapping of senior member Héctor Gómez Calito, whose tortured and mutilated body was found on March 30, 1985. According to one U.S. Embassy source, agents from the Detectives Corps of the National Police had been gathering information on Gómez in the days leading to his abduction. Two weeks before his disappearance, Chief of State Oscar Mejía Víctores publicly charged that GAM members were being manipulated by guerrillas and questioned the sources of their funding. Following his murder, GAM co-founder and widow of missing student leader Carlos Ernesto Cuevas Molina, Rosario Godoy de Cuevas, who had delivered the eulogy at Gómez Calito’s funeral, was found dead at the bottom of a ditch two miles outside Guatemala City, along with her 2-year-old son and 21-year-old brother. While the government claimed their deaths was an accident, Embassy sources discounted the official version of the events, and claimed that Godoy was targeted and her death a premeditated homicide. Human rights monitors who had seen the bodies reported that the infant’s fingernails had been torn out.

Future Investigations

The arrest of the police officers in Guatemala is an unprecedented step in the struggle against impunity, and a testament to the investigative efforts being carried out in the historical National Police archive. The declassified records, however, demonstrate that Fernando García’s disappearance was not an ordinary police arrest, but rather an organized political abduction orchestrated by the highest-levels of government. In addition to the police files that have already proven so crucial to breaking new ground in this case, the release of the relevant military files is critical to unraveling what role the Army High Command and Chief of State played in this crime. In addition to the material authors of the crime, those who planned and ordered García’s kidnapping must also be investigated. At the time of his disappearance, the key military and police personnel overseeing Guatemala’s urban counter-terror campaign were:

Head of the Army Intelligence Directorate (D-2): Byron Disrael Lima Estrada
Director of the Presidential General Staff (EMP): Juan José Marroquín Siliezar
Directors of the Archivos: Marco Antonio González Taracena and Pablo Nuila Hub
Chief of the National Police: Héctor Rafael Bol de la Cruz

Oscar Mejía Víctores, Guatemala’s former chief of state, is currently named as one of eight defendants charged with genocide and other crimes in an international criminal case that is being investigated by Judge Santiago Pedraz in the Audiencia Nacional (National Court) of Spain.

The García case is also important in the context of Guatemala’s current struggle against organized crime. The same week authorities arrested the police officers involved in Fernando García’s kidnapping 25 years ago, the PDH announced that retired and active duty police are involved in today’s organized kidnapping gangs. Government prosecutors have announced they are currently investigating at least 10 members of the police’s elite anti-kidnapping unit for involvement in contemporary abductions. The struggle for justice and accountability for Guatemala’s past crimes has a direct relationship to the current efforts to dismantle illegal armed networks. Last week’s arrests marked an important initial step in the right direction towards ending blanket impunity in Guatemala.


U.S. documents on government death squad operations, the disappearance of Edgar Fernando García, and attacks on Guatemala’s Mutual Support Group – GAM

Document 1
February 23, 1984
Trade-Union Leaders Abducted
U.S. Embassy in Guatemala, Classified Cable

The U.S. Embassy in Guatemala informs Washington about the abduction of Fernando García and other trade-union officials in the recent weeks. According to press accounts on his disappearance, armed men kidnapped him while he was walking in Guatemala City on February 18, 1984. The cable provides information on related incidents of abductions of labor activists in the weeks leading up to Fernando García’s capture, describing the disappearances in the context of the widespread government targeting of Guatemala’s labor leaders. The document provides information on the political and organizational affiliation of the recently disappeared labor activists. According to the cable, Fernando García was part of CAVISA, the industrial glass union, which is an “affiliate of the communist trade-union confederation FASGUA,” Guatemala’s autonomous federal trade-union.

It also mentions that the disappeared victims were associated with the CNT (Confederacion Nacional de Trabajadores), and makes reference to the case of the 28 CNT labor leaders, who “disappeared in 1980 in one fell swoop. It is believed that GOG security forces murdered all of them.” The other group mentioned is the National Council for Trade Union Unity – CNUS, which asserted that Fernando García was already dead. Despite those claims, the U.S. Embassy remained “optimistic that Fernando García of CAVISA will be released.” Edgar Fernando García was never seen or heard from again.

Document 2
February 23, 1984

Guatemala: Political Violence Up
U.S. Department of State, secret intelligence analysis

The same day that Embassy officials inform Washington of Fernando García’s disappearance, the State Department produces an intelligence report on the recent spike in political assassinations and disappearances. The intelligence report describes several notable cases of victims in the “new wave of violence,” over the past several weeks, and provides key information on police coordination with military intelligence in government kidnappings. It mentions the recent abduction and release of a labor leader and confirms that “he had been kidnapped by the National Police, who have traditionally considered labor activists to be communists.” It states that the detective corps (the DIT) of the National Police has traditionally been involved in “extra-legal” activities, working alongside the Army’s presidential intelligence unit, the Archivos. 

(Document previously posted: http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB15/index.html)

Document 3
March 19, 1984
Guatemala: Democratic Trade Union Confederation CUSG Protests Abductions of Trade-Union Leaders
U.S. Embassy in Guatemala, confidential cable

Less than a month after Fernando García’s disappearance, the U.S. Deputy Chief of Mission in Guatemala, Paul D. Taylor reports on the growing protests from the Confederation of Syndicalist Unity (CUSG) over the recent disappearance of trade-union leaders, “especially the disappearance of STICAVISA trade-union official Edgar Fernando García.” The CUSG blames the disappearances on the “government attempts to destabilize the Guatemalan labor movement,” a charge which the government denies. The cable goes on to describe the individual cases of the disappeared, including the case of the escaped prisoner Álvaro René Sosa Ramos, who “fled to asylum in the Belgian Ambassador’s residence after being shot in an attempt to escape his captors. Once recovered from gunshot wounds, he will be going into exile.” Sosa Ramos is mentioned in the Death Squad Dossier as entry number 87.

The document offers further background as to why the labor leaders are disappearing. According to the U.S. Deputy Chief of Mission Paul D. Taylor, “By picking up leftist trade-union leaders connected with the CNT and the FASGUA, the government of Guatemala – advertently or inadvertently – is destabilizing the Marxist-Leninist wing of the Guatemalan labor movement.” His analysis concludes that the individuals were most likely targeted due to government suspicion that they were connected to armed insurgent groups, and that “security forces are after them for that reason.”

Document 4
April 3, 1984

Guatemala: March 25-29 Visit of U.S. Trade-Union Delegation
U.S. Embassy in Guatemala, classified cable

International pressure continues to mount for investigations into the disappearances of Fernando García and other labor leaders. The cable reports on a trade-union delegation visit to Guatemala, led by former U.S. Assistant Secretary of State for Human Rights Pat Derian. The delegation presses Embassy officials for information on the missing trade-union leaders. The Embassy continues to make the point that “all of these abducted union leaders are from the leftist CNT,” emphasizing the political orientation of the disappeared victims.

The delegation maintains that Fernando García was being held by the army, and asked the Embassy to look into his disappearance, as well as that of Jose Luis Villagrán, “disappeared February 11, 1984 in zone 11.” U.S. officials promise they will “make inquiries to the government about all these people.” Ms. Derian presses further, asking them to make “representations,” not just “inquiries” into the disappearances. Deputy Chief of Mission Paul D. Taylor still maintains, however, that it has yet to be demonstrated “whether government forces seized all these trade-unionists” and further comments “If the GOG has picked them up, it is almost certainly for matters other than their trade-union activities.”

Document 5
April 1, 1985

Murder of Member of Mutual Support Group (GAM)
U.S. Embassy in Guatemala, limited officials use cable

The cable reports on the death of Héctor Orlando Gómez Galito, a member of the activist Mutual Support Group (GAM). The Embassy reports that he was “abducted and assassinated the weekend of March 30-31.” Gómez was kidnapped by unidentified men after leaving a weekly GAM meeting in Zone 11 of Guatemala City, and his body was discovered near the Pacific highway 15 miles from the city. “His assassination follows in the wake of reports that members of the groups had been the subject of unspecified threats.”

The cable lists the co-directors of GAM as Beatriz Velasquez de Estrada, Aura Farfán, Maria Rosario Godoy de Cuevas, Maria Choxom de Castañón, Nineth Montenegro de García, and another Mrs. García, the mother of Edgar Fernando. The cable examines Héctor Gómez Calito’s involvement in the organization, concluding that he may have acted as a spokesperson unofficially because of security concerns. Gómez was one of the group’s planner for a march to be held on April 12 or 13, and, “According to reports, the GAM claims that Gómez was killed because of his involvement with the organization.”

Document 6
April 3, 1985

Background on Case of Héctor Orlando Gómez Calito, Murdered “Mutual Support Group” (GAM) Member: Embassy Discussions with Two Sources
U.S. Embassy in Guatemala, confidential cable

GAM director, Nineth Montonegro de García, and Father Alain Richard, member of Peace Brigades International (PBI), meet with U.S. officials to provide the Embassy with background information on the death of Héctor Gómez. They explain that Gómez had joined GAM following the disappearance of his brother, and had acted as a publicist for the group. Richard tells officials that the police detective corps (DIT) had asked the mayor of the town of Amatitlan, where Gómez was from, for information about his activities, and that his house was reportedly under surveillance by “men in automobiles.”

The Embassy also states “Richard had no doubts that the GOG [the Government of Guatemala] was directly responsible for Gomez’s murder.” Richard added that regardless of the belief that the entire group was being watched, GAM would continue their advocacy efforts. The cable ends by noting “Embassy officers will meet GAM directors on Monday, April 8.”

Document 7
April 4, 1985

Background and Recent Developments of the Mutual Support Group (GAM)
U.S. Embassy in Guatemala, Confidential Cable

The Embassy provides a summary of GAM organizing in March, “with some emphasis on its activist activities (blocking traffic, occupation of government offices, etc.) and the GOG reaction to those activities.” It gives background on the creation of the group, dating its first public appearance in early July 1984, when GAM members began publicly campaigning for an investigation into the disappearances of their relatives and calling upon others to join. They approached the Embassy shortly thereafter, “asking for our assistance on behalf of 67 missing persons.”

A few days after a GAM event in November 1984, they were received by Chief of State General Mejía, where “they repeated their demands” to investigate the disappeared. They met with Mejía a second time, which led to the formation of a government commission ostensibly to look into the GAM charges. In March 1985, they occupied the offices of the Guatemalan Attorney General, “protesting the lack of action by the GOG Tripartite Commission.” Beginning in mid March, the government began to express disapproval of the tactics chosen by GAM to pursue their objectives. Press reports carried warnings issued by Mejía Víctores in which he “charged that the GAM was being manipulated by the insurgents and questioned the source of the group’s funds.”

According to the cable, the Embassy had informed Washington on March 25 that four members of GAM had allegedly received various threats. One of the names on their list was Héctor Gómez, even though he was “not then known to the Embassy in any capacity related to GAM. Additional information regarding the specifics of Gómez’s murder have been provided.”

Document 8
April 6, 1985

Death of Maria Rosario Godoy de Cuevas, a Director of the “Mutual Support Group” (GAM)
U.S. Embassy in Guatemala, Confidential Cable

Before Embassy officials had the chance to meet with GAM members again, another one of their members was killed. “At about 8:00 pm April 4, Maria del Rosario Godoy Aldana de Cuevas, a founder and member of the board of directors of GAM was found dead in her automobile.” Three days after Rosario Godoy de Cuevas delivered the eulogy at Héctor Gómez’ funeral, she was found dead along with her 2-year-old son and 21-year-old brother. U.S. Embassy provides the official story given by the Guatemalan government, that she was “the victim of an apparent vehicular accident.” Embassy sources, however, believe the death was premeditated, and note several contradictory facts in the official version of events. Rosario de Cuevas helped found GAM following the disappearance of her husband, Carlos Ernesto Cuevas Molina, another labor leader who was kidnapped on May 15, 1984.

Document 9
April 9, 1985
Mutual Support Group (GAM) Update
U.S. Embassy in Guatemala, Confidential Cable

Provides further information on the death of Maria Godoy de Cuevas, and describes the “sense of threats felt by GAM members.” In press broadcasts Archbishop Prospero Penados referred to the recent events, including the Cuevas deaths, as the “holy week of shame and fear” in Guatemala, and called the deaths a “bloody act.”

Embassy comments on the matter of the autopsy, noting that it is unclear what examination was completed by “police forensic specialists.” An Embassy source also said “he had heard that the victims had died of asphyxiation and that a ‘bogus autopsy’ had been performed … another rumor circulating said that the victims had died from gunfire. But again, no details or proof have been offered.” The Guatemalan Interior Minister said he had the “official report that showed the Cuevas case to have been an accident.”

The cable reiterates that “GAM members had recently began to receive anonymous threats by letter and telephone,” and that other press reports spoke of anonymous threats against the organization. Threats notwithstanding, the group announced plans for another public protest later that month.

Document 10
April 9, 1985

Conversation with the Chief of State on Human Rights
U.S. Embassy in Guatemala, Confidential Cable

Five days after the death of Rosario Godoy de Cuevas, U.S. Ambassador-at-large for Central America Harry Shlaudeman visits Guatemala and meets with Mejía Víctores and Foreign Minister Fernando Andrade. During the meeting, U.S. Ambassador to Guatemala Alberto M. Piedra takes Mejía Víctores aside to express U.S. concern over the recent events, “especially the death of Maria Rosario Godoy de Cuevas.” He indicates that “even if the government had nothing to do with the matter, public opinion abroad would definitely blame the military.” The Ambassador explains that the high profile violence was making it difficult to defend Guatemala’s position, especially in Congress, and this could endanger their efforts to increase aid to the government.

Piedra also takes aside the Foreign Minister, who tells the Ambassador that he was against the “continuance of these types of crime.” He added that the U.S. Embassy should continue opposing such violations to all sectors of Guatemalan society, “and in a very special way to the military.”

Document 11
March 28, 1986

Guatemala’s Disappeared: 1977-86
Department of State, Bureau of Inter-American Affairs, secret report

This Department of State report from 1986 provides details on the evolution of the use of forced disappearance by security forces over the decade prior, and how this tactic became institutionalized under the Mejía Víctores regime. “In the cities, out of frustration from the judiciary’s unwillingness to convict and sentence insurgents, and convinced that the kidnapping of suspected insurgents and their relatives would lead to a quick destruction of the guerilla urban networks, the security forces began to systematically kidnap anyone suspected of insurgent connections.” The documents estimates there were 183 reported cases of government kidnapping the first month of the Mejía government, and an average of 137 abductions a month through the end of 1984. Part of the modus operandi of government kidnapping involved interrogating victims at military bases, police stations, or government safe houses, where information about alleged connections with insurgents was “extracted through torture.”

The document concludes that the U.S. embassy and the State Department have failed in the past to adequately grasp the magnitude of Guatemala’s problem of government kidnapping.

(Document previously posted: http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB15/index.html)

Former police official Héctor Roderico Ramírez Ríos, accused of participating in the abduction of Fernando García, taken in to custody for charges of illegal detention and forced disappearance. [Courtesy of Prensa Libre]
Family snapshot of Nineth de García, daughter Alejandra and husband Fernando before his abduction on February 18, 1984. Photo from “Guatemala, The Group for Mutual Support,” An Americas Watch Report. [Courtesy of Jean-Marie Simon]
Nineth Montenegro removed by police officials after occupying a government building with other GAM members during the administration of Vinicio Cerezo. [Courtesy of Prensa Libre]
Plainclothes National Police agent standing with a U.S.-made carbine outside the judicial headquarters in Zone 1 of Guatemala City. [Courtesy of Jean-Marie Simon]
Fernando García’s entry in the military intelligence document, the diario militar
Rosario Godoy de Cuevas addressing a GAM rally two months before she was assassinated. [Photo Courtesy of Jean-Marie Simon]
Caption: Óscar Humberto Mejía Víctores, Head of State at the time of Fernando García’s abduction. Mejía Víctores is wanted in international courts for crimes against humanity, such as forced disappearances, carried out under his command. [Photo Courtesy of Prensa L

TOP-SECRET – MCI Lawful Spying Guide

mci-spy

TOP-SECRET – INSA Nest of Official and Corporate Spies

insa-spies

TOP-SECRET – FUJIMORI FOUND GUILTY OF HUMAN RIGHTS CRIMES

UJIMORI FOUND GUILTY OF HUMAN RIGHTS CRIMES

National Security Archive Posts Declassified Evidence Used in Trial
U.S. Documents Implicated Fujimori in Repression, Cover-up

National Security Archive Electronic Briefing Book No. 274

Washington, DC, September 13 – As a special tribunal in Peru pronounced former president Alberto Fujimori guilty of human rights atrocities, the National Security Archive today posted key declassified U.S. documents that were submitted as evidence in the court proceedings. The declassified records contain intelligence gathered by U.S. officials from Peruvian sources on the secret creation of “assassination teams” as part of Fujimori’s counterterrorism operations, the role of the Peruvian security forces in human rights atrocities and Fujimori’s participation in protecting the military from investigation.

Fujimori was tried for two major massacres: the execution of fourteen adults and an eight-year old boy in the Barrios Altos neighborhood of Lima on November 3, 1991; and the kidnapping, disappearance and assassination of nine students and a professor from La Cantuta University on July 18, 1992. Both atrocities were committed by a military death squad known as La Colina, believed to be supervised by Fujimori’s closest advisor, Vladimiro Montesinos. Fujimori, who was Peru’s president from 1990 to 2000 when he was forced to resign in a major corruption scandal, was also convicted for the abduction of a well known journalist, Gustavo Gorriti, in April 1992, and a prominent businessman, Samuel Dyer on July 27, 1992.

The trial began on December 10, 2007. Since then dozens of witnesses have testified on Fujimori’s responsibility as commander-in-chief for the operations of his security forces.

In September 2008, Archive Senior Analyst Kate Doyle gave expert testimony in the trial on the nature of the 21 U.S. documents that were submitted to the court as evidence by the prosecution team. During her testimony she noted that the documents reflected the conclusions of the U.S. Embassy that Fujimori had engaged in a “covert strategy to aggressively fight against subversion through terror operations, disregarding human rights, and legal norms.”

Among the key documents used during the trial is a U.S. embassy report, classified secret, from August 1990, just after Fujimori’s election. Based on a debriefing of a former intelligence agent in Peru, the Embassy reported that Fujimori planned a “two tiered anti-subversion plan”—a public policy that adhered to human rights, and a covert set of operations that would “include army special operations units trained in extra-judicial assassinations.”

The prosecution of Fujimori comes ten years after the ground-breaking arrest of Gen. Augusto Pinochet, and is part of an accelerated movement in Latin America to hold human rights violators accountable. “The exercise of justice in the Fujimori case,” noted Peter Kornbluh, a senior analyst at the Archive who attended the trial last fall, “sends a signal through Latin America, and onto the United States, that those who authorize human rights abuses in the name of fighting terrorism are not immune from prosecution.”

Fujimori faces up to 30 years in prison.


Read the Documents

Note: These documents were among 21 declassified U.S. records provided by the National Security Archive to the special tribunal conducting the Fujimori trial. They were originally obtained through the Freedom of Information Act by Peru analyst Tamara Feinstein, and FOIA specialist Jeremy Bigwood.

Document 1: U.S. Embassy, Cable, Secret, Reported Secret Annex to National Pacification/Human Rights Plan, Aug. 23, 1990, 5 pp.

Only weeks after Fujimori’s election, an intelligence officer working with the SIN (the National Intelligence Service) reported to U.S. embassy officials on a covert plan, purportedly “the brainchild of presidential advisor Vladimiro Montesinos,” to conduct extra-judicial assassinations of suspected terrorists. “The training of these new ‘assassination teams’ is already underway,” the source reported. He also stated that the plan had “the tacit approval of President Fujimori.”

Document 2: U.S. Embassy Cable, Secret, Barrios Altos Massacre: One Month Later, December 4, 1991, Secret, 2 pp.

The Fujimori government has showed little “political will” to investigate the Barrios Altos massacre and find the perpetrators of the crime, the embassy reported. At this early stage, the Embassy has concluded that the security forces were involved in the killing. “There is no high level political pressure to root out the culprits in this case,” according to the cable. “President Fujimori has not made a public issue of it.”

Document 3: U.S. Embassy, Cable, Secret, Barrios Altos Massacre, December 13, 1991, 2 pp.

Ambassador Quainton reports on meeting with Fujimori, and other government officials, at graduation ceremonies at the Peruvian Military Academy.  Quainton makes it clear that the U.S. embassy is concerned about military involvement in the Barrios Altos massacre and the lack of any investigation. “”I told him,” as Quainton cabled, that “the very institution—the Army—which he had been praising at the graduation ceremonies was being discredited by allegations of paramilitary involvement in the Barrios Altos killing.” According to Gloria Cano, the lead lawyer for the Peruvian human rights group, APRODEH, this document provided critical evidence that Fujimori was cognizant of the involvement of his security forces almost a year before he admitted it publicly.

Document 4: U.S. Embassy Cable, [Excised] Comments on Fujimori, Montesinos, but not on Barrios Altos, January 22, 1993, Secret, 10 pp.

An undisclosed source describes the close and complicated relationship between President Fujimori and his top intelligence aide, Vladimiro Montesinos. The source notes that while Fujimori understands the importance of human rights, in practice he “is prepared to sacrifice principles to achieve a quick victory over terrorism.” He is “absolutely committed to destroying Sendero Luminoso and the MRTA within his five year term and is prepared to countenance any methods that achieve that goal.”

Document 5: U.S. Embassy, Cable, Secret, Army Officers on ‘Show of Force;’ Barrios Altos and Death Squads, April 27, 1993, 4 pp.

The Embassy reports on how the military is justifying its public show of force—tanks in the street—to repel any type of Congressional investigation into official complicity in the Barrios Altos massacre. The Embassy source, described as an “Army field grade officer,” admits that the military was responsible for both the Barrios Altos and La Cantuta atrocities, which he describes as “stupidly planned and executed.”

Document 6: U.S. State Department, Cable, Secret, La Cantuta Demarche, June 8, 1993, 3 pp.

Peter Tarnoff, a high-ranking State Department official, instructs the embassy to issue a demarche to Fujimori on the La Cantuta atrocity and to demand that the allegations of Peruvian government involvement be “thoroughly and impartially investigated.” Among the talking points sent by Washington are: “recent allegations suggest that a unit organized within the armed forces carried out a series of disappearances at La Cantuta and was responsible for the Barrios Altos incident.” The embassy is ordered to tell Fujimori: “If it is indeed true that the armed forces have organized such units, this is a very serious affair.”

TOP-SECRET – ROBERT F. KENNEDY URGED LIFTING TRAVEL BAN TO CUBA IN ’63

Source: Lyndon Baines Johnson Library

ROBERT F. KENNEDY URGED LIFTING
TRAVEL BAN TO CUBA IN ’63

Attorney General cited inconsistency with “our views as a free society”
State Department overruled RFK proposal to withdraw prohibitions on travel

Documents Record First Internal Debate to Lift Ban

National Security Archive Electronic Briefing Book No. 158

Washington D.C. September 13, 2011 – Attorney General Robert F. Kennedy sought to lift the ban on U.S. citizens traveling to Cuba in December 1963, according to declassified records re-posted today by the National Security Archive. In a December 12, 1963, memorandum to Secretary of State Dean Rusk, Kennedy urged a quick decision “to withdraw the existing regulation prohibiting such trips.”

Kennedy’s memo, written less than a month after his brother’s assassination in Dallas, argues that the travel ban imposed at the end of the Eisenhower administration was a violation of American freedoms and impractical in terms of law enforcement. Among his “principal arguments” for removing the restrictions on travel to Cuba was that freedom to travel “is more consistent with our views as a free society and would contrast with such things as the Berlin Wall and Communist controls on such travel.”

This document, and others relating to the first internal debate over lifting the Cuba travel ban, are quoted in an opinion piece in the Washington Post today, written by Robert Kennedy’s daughter, Kathleen Kennedy Townsend. Her article argued that President Obama should consider her father’s position and support the Free Travel To Cuba Act that has been introduced in the U.S. Congress.

Robert Kennedy’s memo prompted what senior National Security Council officials described as “an in-house fight to permit non-subversive Americans to travel to Cuba.” Several State Department officials supported Kennedy’s position that “the present travel restrictions are inconsistent with traditional American liberties,” and that “it would be extremely difficult to enforce the present prohibitions on travel to Cuba without resorting to mass indictments.” But in a December 13, 1963 meeting at the State Department, with no representatives present from the Attorney General’s office, Undersecretary of State George Ball ruled out any relaxation of regulations on travel to Cuba.

A principal argument, as national security advisor McGeorge Bundy informed President Johnson in a subsequent memorandum on “Student Travel to Cuba” was that “a relaxation of U.S. restrictions would make it very difficult for us to urge Latin American governments to prevent their nationals from going to Cuba-where many would receive subversive training.”

The ban on travel was maintained until President Jimmy Carter lifted it in 1977; but restrictions were re-imposed during the Reagan administration and were tightened further by the Bush administration in 2004. President Obama recently announced he was lifting all restrictions on Cuban-Americans who want to travel to the island. The vast majority of U.S. citizens, however, still face stiff penalties if they travel to Cuba.

According to Peter Kornbluh, who directs the Archive’s Cuba Documentation Project, the documents “shed significant light on the genesis of the travel ban to Cuba, and the first internal debate over ending it.” The original rationale for the ban “is no longer applicable,” he noted, “but RFK’s arguments remain relevant to the current debate over the wisdom of restricting the freedom to travel.”

The documents were found among the papers of State Department advisor Averill Harriman at the Library of Congress and in declassified NSC files at the John F. Kennedy Presidential Library in Boston. The Archive first posted them in April 2005.


Documents
Note: The following documents are in PDF format.
You will need to download and install the free Adobe Acrobat Reader to view. Document 1: Department of Justice, Office of the Attorney General, “Travel to Cuba,” December 12, 1963

In a comprehensive memorandum to Secretary of State Dean Rusk, Robert Kennedy presented the arguments for legalizing travel to Cuba before a number of student groups traveled there at Christmas time. There were two courses of action, he wrote: new efforts to block increased travel to Cuba, or “to withdraw the existing regulation prohibiting such trips. The first is unlikely to meet the problem and I favor the second,” Kennedy informed Rusk. In his memo he presented several arguments for lifting the travel ban: that it was a violation of American liberties to restrict free travel; that it was impractical to arrest, indict and engage in “distasteful prosecutions” of scores of U.S. citizens who sought to go to Cuba; and that lifting the travel ban was likely to diminish the attraction of leftists who were organizing protest trips to Havana. “For all these reasons I believe that it would be wise to remove restrictions on travel to Cuba before we are faced with problems which are likely to be created in the immediate future.”

Document 2: State Department, “Travel Regulations,” December 13, 1963

Two State Department officers, legal advisor Abram Chayes and Abba Schwartz summarize Kennedy’s arguments that “the ban on travel to Cuba be removed immediately,” including that “the present travel restrictions are inconsistent with traditional American liberties.” They note that lifting restrictions to Cuba is likely to be undertaken in the context of lifting most travel restrictions to other nations. They support Kennedy’s proposal but favor passport validation which would require those who travel to apply for permission from the Secretary of State to go to Cuba.

Document 3: NSC, “Travel Controls-Cuba,” December 18, 1963

This memo, written by the NSC’s Latin American specialist Gordon Chase to national security advisor McGeorge Bundy, reveals that the Attorney General’s proposal has been overruled at the State Department. At a meeting on December 13, to which Justice department officials were not invited, State Department officials from the Latin American division successfully argued that lifting the ban would compromise U.S. pressures on other nations in the hemisphere to isolate Cuba and block students from traveling there. In addition, according to Chase, Abba Schwartz believed that Lyndon Johnson could not politically afford to lift the ban because it would “make him look unacceptably soft.” The State Department’s attention turns to steps the government can take to prevent U.S. students from violating the ban and traveling to Cuba.

Document 4: NSC, “Student Travel to Cuba,” May 21, 1964

In an options memorandum for President Johnson, McGeorge Bundy informs him of the continuing debate over lifting restrictions on travel to Cuba. As summer begins, the administration expects about 100 students to try and travel to Cuba. Bundy lays out the “two distinct schools of thought” on the travel issue: Robert Kennedy’s effort to end controls on the basis of “our libertarian tradition and the difficulty of controlling travel” and current U.S. policy which is built on a tough line toward Cuba and efforts to enlist other Latin American nations to isolate Cuba politically and culturally, and to “prevent their nationals from going to Cuba.” Bundy correctly assumes that President Johnson does not want to relax controls on travel to Cuba and informs him that an interagency group is studying ways to further “reduce the interest in and to control student travel to Cuba this summer.”

TOP-SECRET: Fukushima Daiichi NPP 12 September 2011

Fukushima Daiichi Nuclear Power Station Dust Sampling at the Opening of Reactor Building of Unit 3, September 12, 2011. Released by Tokyo Electric Power Company 13 September 2011.[Image]

	

TOP-SECRET – Khodorkovsky ‘will not be free while Putin is in power’

Wednesday, 18 April 2007, 07:48
C O N F I D E N T I A L SECTION 01 OF 03 MOSCOW 001770
SIPDIS
SIPDIS
DOJ OF OPDAT/ALEXANDRE, LEHMANN AND NEWCOMBE, OCRS/OHR AND
SHASKY, OIA/BURKE AND DITTOE
STATE FOR EUR/RUS
EO 12958 DECL: 04/17/2017
TAGS ECON, KCRM, KJUS, PGOV, PREL, RS
SUBJECT: RUSSIA: MEETING WITH XXXXXXXXXXXX
REF: A. MOSCOW 774 B. MOSCOW 697
Classified By: Ambassador William J. Burns for reasons 1.5 (b, d)

1. (C) Summary: Emboffs met with XXXXXXXXXXXX. He described the new embezzlement and money laundering charges — that Khodorkovskiy engaged in transfer pricing that harmed unwitting minority shareholders in Yukos’ three production subsidiaries — as a re-packaging of the charges in the first case. He claimed the defense has substantial evidence these shareholders were fully informed of these activities. Further, XXXXXXXXXXXX maintained that the charges are without legal or factual support and questioned the prosecution’s claim that the loss to the subsidiaries was USD 30 billion, a figure he said was about equal to the value of the oil produced by the three units during the period in question. XXXXXXXXXXXX said he was surprised that a Moscow court had agreed to change the venue of the trial from Chita to Moscow. He described two cases pending before the European Court of Human Rights (ECHR). The first case claims that Khodorkovskiy was arrested and held in pre-trial detention in violation of the European Convention on Human Rights (the Convention), while the second alleges violations of Khodorkovskiy’s right to a fair trial. XXXXXXXXXXXX maintained that the case against XXXXXXXXXXXX is politically motivated and being run out of the Kremlin, and does not foresee any change of status for Khodorkovskiy while the Putin Administration remains in office. End Summary.

The New Charges

—————

2. (C) On February 16, the General Procuracy charged Khodorkovskiy and Platon Lebedev with embezzlement and money laundering (Ref B). According to the indictment, Khodorkovskiy and Lebedev acquired controlling interests in three oil companies (Samaraneftegaz, Yuganskneftegaz, and Tomskneftegaz) and then caused these companies to sell oil at below-market prices to other companies that they controlled without disclosing to other shareholders their role in these transactions. They then allegedly re-sold the oil at market prices, which were approximately 3-4 times greater than the original purchase price. The alleged victims were the other shareholders of Samaraneftegaz, Yuganskneftegaz, and Tomskneftegaz, who were entitled to the benefit of an arms-length sale at market prices, but instead received only the artificially deflated prices allegedly set by Khodorkovskiy and Lebedev (Ref B).

3. (C) As an initial matter, XXXXXXXXXXXX said that the new charges are simply a re-packaging of the charges in the first case. According to XXXXXXXXXXXX in the first case, prosecutors relied on the very same transactions to charge Khodorkovskiy with tax evasion. However, he said, they were unsatisfied with Khodorkovskiy’s eight-year sentence and decided to bring new charges carrying potentially heavier sentences. The money laundering charges carry a maximum sentence of 15 years and the embezzlement charges carry a maximum sentence of 10 years. He said the defense will challenge them on the grounds that they violate Russian and international norms prohibiting double jeopardy. XXXXXXXXXXXX also suggested that the new charges may have been brought to prevent Khodorkovskiy from being released on parole before upcoming Duma and Presidential elections. (Note: Russian law provides that a prisoner is eligible for early release after he has served half of his sentence. Because Khodorkovskiy was arrested in October 2003 and was sentenced to eight years, he might have been eligible for early release in October 2007. However, his prison violations, which XXXXXXXXXXXX claims were provoked by authorities, would likely have prevented his early release in any event. End Note.)

4. (C) XXXXXXXXXXXX also said that the new charges are without merit since this transfer pricing technique was not only legal but engaged in by “thousands of firms.” He noted that the business groups and industrial firms emerging from privatization during the 1990s were generally organized to take maximum advantage of benefits the GOR provided via “internal offshore” zones. The headquarters and some operating units of a group or firm were typically located in identified havens and conducted most of the transactions, thus allowing for tax optimization. According to XXXXXXXXXXXX this structure facilitated and encouraged the widespread practice of transfer pricing, whereby one part of a company

MOSCOW 00001770 002 OF 003

purchased the output made by another part of the company at below-market prices before selling the same output at a market price.

5. (C) XXXXXXXXXXXX defense would present substantial documentary evidence, including records of corporate meetings, proving that the minority shareholders of Samaraneftegaz, Yuganskneftegaz, and Tomskneftegaz were fully informed of all relevant aspects of the subject transactions. XXXXXXXXXXXX also claimed that if the minority shareholders had actually been defrauded, as prosecutors claim, they would have filed civil suits, which they did not do. Finally, XXXXXXXXXXXX said that the prosecution’s claim of a USD 30 billion loss to the shareholders is &absurd8 because the sum would represent the total value of all the oil produced by the subject companies during the relevant time period rather than the difference between what the minority shareholders actually received and what they would have received in arms-length transactions, which, he said, would have been much a more sensible way to measure the alleged loss.

The Trial: Where and When?

————————–

6. (C) The Procuracy filed the new charges in Chita, where Khodorkovskiy is presently incarcerated, and sought to conduct the preliminary investigation and trial there (Ref B). Shortly after the new charges were filed, the defense filed a motion seeking a change of venue to Moscow, claiming that the majority of witnesses and evidence are located there. On March 20, the Basmanny Court in Moscow granted the defense motion. The Procuracy appealed this decision and the appeal was heard on April 16 in the Moscow City Court. This Court upheld the Basmanny Court’s decision transferring the case to Moscow. XXXXXXXXXXXX Russian law provides that the preliminary investigation should be conducted in the place where the crime was allegedly committed, but may be conducted in the place where the defendant is located to ensure &completeness, objectivity and compliance with procedural norms.”

7. (C) XXXXXXXXXXXX claimed that the Procuracy chose Chita to make it difficult for the defense team to meet with their clients and prepare their defense. Specifically, he said, Chita is difficult to reach and lacks the copying machines and other office equipment the defense needs to prepare its case. XXXXXXXXXXXX said that although the Procuracy’s decision was clearly wrong as a matter of law, he was surprised by the Basmanny Court’s decision because the same court had consistently ruled against Khodorkovskiy in the first case. He claimed that the ruling was an indication of a general recognition that the Procuracy had “gone too far.”

8. (C) XXXXXXXXXXXX also said that he did not know when the trial on the new charges would take place. He said that the prosecution had sought to start the trial in June so that it would be completed before the elections, but noted that the case materials consist of 127 volumes and said that the XXXXXXXXXXXX said that the prosecutors will likely move to cut off the defense’s review of the case file in May, but said that the defense would challenge such a motion. Under Russian law, the prosecution can seek to limit the time that the defense has to review the case file if there are grounds to believe that the defense is engaging in unreasonable delay. XXXXXXXXXXXX also said that a trial date could not be set until the location of the trial had been determined. Therefore, because of ongoing litigation regarding the venue of the trial and the voluminous nature of the case file, it is not clear when the case will proceed to trial.

The European Court of Human Rights

———————————-

9. (C) XXXXXXXXXXXX also said that Khodorkovskiy has filed two complaints to the ECHR in Strasbourg alleging violations of his rights under the Convention in the first case. The ECHR in Strasbourg adjudicates claims brought under the Convention. As a result of Russia’s ratification of the Convention in 1998, Russia is bound by the Convention and any ECHR decisions interpreting it. The first complaint, he said,

MOSCOW 00001770 003 OF 003

alleges that Khodorkovskiy was arrested and held in pre-trial detention in violation of the Convention. XXXXXXXXXXXX said that the ECHR had agreed to hear this case on an accelerated timetable, but had not yet set a date.

10. (C) The second complaint, he said, alleges violations of Khodorkovskiy’s right to a fair trial. XXXXXXXXXXXX explained that before adjudicating a case, the ECHR typically sends a list of specific questions about the movant’s claims to the respondent government. According to XXXXXXXXXXXX the Russian government has not yet responded to the ECHR’s questions regarding the second complaint and it is therefore not clear when this case will be considered. XXXXXXXXXXXX also said that the second complaint is “more interesting” than the first because, if successful, it could result in a reversal of Khodorkovskiy’s conviction. By contrast, the first claim could only result in an award of monetary damages. XXXXXXXXXXXX also noted that the French Embassy in Moscow and German Bundestag have shown interest in this case.

No Changes Expected

——————-

11. (C) In his final remarks, XXXXXXXXXXXX claimed that the new charges against Khodorkovskiy are politically motivated and said that the case is being orchestrated entirely by the Kremlin. Although he stated confidently that the charges are without legal or evidentiary support, he concluded by saying that Khodorkovskiy would likely remain in prison as long as the Putin Administration is in power. BURNS

TOP-SECRET – China ‘would accept’ Korean reunification

Monday, 22 February 2010, 09:32
S E C R E T SEOUL 000272
SIPDIS
EO 12958 DECL: 02/22/2034
TAGS PREL, PGOV, KNNP, ECON, SOCI, KS, KN, <abbr title=”JA“><abbr title=”JA“>JA, CH
SUBJECT: VFM CHUN YOUNG-WOO ON SINO-NORTH KOREAN RELATIONS
Classified By: AMB D. Kathleen Stephens. Reasons 1.4 (b/d).

Summary
  1. South Korea’s vice Foreign Minister Chun Yung-woo tells the Americans that senior Chinese officials have told him that China is fed up with the North Korean regime’s behaviour and would not oppose Korean reunification. Chun says North Korea has already collapsed economically and will collapse politically when Kim Jong-il dies. Key passage highlighted in yellow.
  2. Read related article

Summary

——-

1. (S) Vice Foreign Minister Chun Yung-woo told the Ambassador February 17th that China would not be able to stop North Korea‘s collapse following the death of Kim Jong-il (KJI). The DPRK, Chun said, had already collapsed economically and would collapse politically two to three years after the death of Kim Jong-il. Chun dismissed ROK media reports that Chinese companies had agreed to pump 10 billion USD into the North’s economy. Beijing had “no will” to use its modest economic leverage to force a change in Pyongyang’s policies — and the DPRK characterized as “the most incompetent official in China” — had retained his position as chief of the PRC’s 6PT delegation. Describing a generational difference in Chinese attitudes toward North Korea, Chun claimed XXXXXXXXXXXX believed Korea should be unified under ROK control. Chun acknowledged the Ambassador’s point that a strong ROK-Japan relationship would help Tokyo accept a reunified Korean Peninsula. End summary.

VFM Chun on Sino-North Korean Relations…

——————————————

2. (S) During a February 17 lunch hosted by Ambassador Stephens that covered other topics (septel), ROK Vice Foreign Minister and former ROK Six-Party Talks (6PT) Head of Delegation Chun Yung-woo predicted that China would not be able to stop North Korea’s collapse following the death of Kim Jong-il (KJI). The DPRK, Chun said, had already collapsed economically; following the death of KJI, North Korea would collapse politically in “two to three years.” Chun dismissed ROK media reports that Chinese companies had agreed to pump 10 billion USD into the North’s economy; there was “no substance” to the reports, he said. The VFM also ridiculed the Chinese foreign ministry’s “briefing” to the ROK embassy in Beijing on Wang Jiarui’s visit to North Korea; the unidentified briefer had “basically read a Xinhua press release,” Chun groused, adding that the PRC interlocutor had been unwilling to answer simple questions like whether Wang had flown to Hamhung or taken a train there to meet KJI.

3. (S) The VFM commented that China had far less influence on North Korea “than most people believe.” Beijing had “no will” to use its economic leverage to force a change in Pyongyang’s policies and the DPRK leadership “knows it.” Chun acknowledged that the Chinese genuinely wanted a denuclearized North Korea, but the PRC was also content with the status quo. Unless China pushed North Korea to the “brink of collapse,” the DPRK would likely continue to refuse to take meaningful steps on denuclearization.

XXXXXXXXXXXX

—————————————–

4. (S) Turning to the Six Party Talks, Chun said it was “a very bad thing” that Wu Dawei had retained his position as chief of the PRC’s delegation. XXXXXXXXXXXX said it appeared that the DPRK “must have lobbied extremely hard” for the now-retired Wu to stay on as China’s 6PT chief. [NAME REMOVED] complained that Wu is the PRC’s XXXXXXXXXXXX an arrogant, Marx-spouting former Red Guard who “knows nothing about North Korea, nothing about nonproliferation and is hard to communicate with because he doesn’t speak English.” Wu was also a hardline nationalist, loudly proclaiming — to anyone willing to listen — that the PRC’s economic rise represented a “return to normalcy” with China as a great world power.

…China’s “New Generation” of Korea-Hands…

———————————————

5. (S) Sophisticated Chinese officials XXXXXXXXXXXX stood in sharp contrast to Wu, according to VFM Chun.XXXXXXXXXXXX Chun claimed XXXXXXXXXX believed Korea should be unified under ROK control.XXXXXXXXXXXX, Chun said, were ready to “face the new reality” that the DPRK now had little value to China as a buffer state — a view that since North Korea’s 2006 nuclear test had reportedly gained traction among senior PRC leaders.

…PRC Actions In A DPRK Collapse Scenario…

———————————————

6. (S) Chun argued that, in the event of a North Korean collapse, China would clearly “not welcome” any U.S. military presence north of the DMZ. XXXXXXXXXXXX Chun XXXXXXXXXXXX said the PRC would be comfortable with a reunified Korea controlled by Seoul and anchored to the United States in a “benign alliance” — as long as Korea was not hostile towards China. Tremendous trade and labor-export opportunities for Chinese companies, Chun said, would also help salve PRC concerns about living with a reunified Korea. Chundismissed the prospect of a possible PRC military intervention in the event of a DPRK collapse, noting that China’s strategic economic interests now lie with the United States, Japan, and South Korea — not North Korea. Moreover, Chun argued, bare-knuckle PRC military intervention in a DPRK internal crisis could “strengthen the centrifugal forces in China’s minority areas.”

…and Japan

————

7. (S) Chun acknowledged the Ambassador’s point that a strong ROK-Japan relationship would help Tokyo accept a reunified Korean Peninsula under Seoul’s control. Chun asserted that, even though “Japan’s preference” was to keep Korea divided, Tokyo lacked the leverage to stop reunification in the event the DPRK collapses. STEPHENS

TOP-SECRET – Sixteen Individuals Arrested in the United States for Alleged Roles in Cyber Attacks

WASHINGTON—Fourteen individuals were arrested today by FBI agents on charges related to their alleged involvement in a cyber attack on PayPal’s website as part of an action claimed by the group “Anonymous,” announced the Department of Justice and the FBI. Two additional defendants were arrested today on cyber-related charges.

The 14 individuals were arrested in Alabama, Arizona, California, Colorado, the District of Columbia, Florida, Massachusetts, Nevada, New Mexico, and Ohio on charges contained in an indictment unsealed today in the Northern District of California in San Jose. In addition, two individuals were arrested on similar charges in two separate complaints filed in the Middle District of Florida and the District of New Jersey. Also today, FBI agents executed more than 35 search warrants throughout the United States as part of an ongoing investigation into coordinated cyber attacks against major companies and organizations. Finally, the United Kingdom’s Metropolitan Police Service arrested one person and the Dutch National Police Agency arrested four individuals today for alleged related cyber crimes.

According to the San Jose indictment, in late November 2010, WikiLeaks released a large amount of classified U.S. State Department cables on its website. Citing violations of the PayPal terms of service, and in response to WikiLeaks’ release of the classified cables, PayPal suspended WikiLeaks’ accounts so that WikiLeaks could no longer receive donations via PayPal. WikiLeaks’ website declared that PayPal’s action “tried to economically strangle WikiLeaks.”

The San Jose indictment alleges that in retribution for PayPal’s termination of WikiLeaks’ donation account, a group calling itself Anonymous coordinated and executed distributed denial of service (DDoS) attacks against PayPal’s computer servers using an open source computer program the group makes available for free download on the Internet. DDoS attacks are attempts to render computers unavailable to users through a variety of means, including saturating the target computers or networks with external communications requests, thereby denying service to legitimate users. According to the indictment, Anonymous referred to the DDoS attacks on PayPal as “Operation Avenge Assange.”

The defendants charged in the San Jose indictment allegedly conspired with others to intentionally damage protected computers at PayPal from Dec. 6, 2010, to Dec. 10, 2010.

The individuals named in the San Jose indictment are: Christopher Wayne Cooper, 23, aka “Anthrophobic;” Joshua John Covelli, 26, aka “Absolem” and “Toxic;” Keith Wilson Downey, 26; Mercedes Renee Haefer, 20, aka “No” and “MMMM;” Donald Husband, 29, aka “Ananon;” Vincent Charles Kershaw, 27, aka “Trivette,” “Triv” and “Reaper;” Ethan Miles, 33; James C. Murphy, 36; Drew Alan Phillips, 26, aka “Drew010;” Jeffrey Puglisi, 28, aka “Jeffer,” “Jefferp” and “Ji;” Daniel Sullivan, 22; Tracy Ann Valenzuela, 42; and Christopher Quang Vo, 22. One individual’s name has been withheld by the court.

The defendants are charged with various counts of conspiracy and intentional damage to a protected computer. They will make initial appearances throughout the day in the districts in which they were arrested.

In addition to the activities in San Jose, Scott Matthew Arciszewski, 21, was arrested today by FBI agents on charges of intentional damage to a protected computer. Arciszewski is charged in a complaint filed in the Middle District of Florida and made his initial appearance this afternoon in federal court in Orlando, Fla.

According to the complaint, on June 21, 2011, Arciszewski allegedly accessed without authorization the Tampa Bay InfraGard website and uploaded three files. The complaint alleges that Arciszewski then tweeted about the intrusion and directed visitors to a separate website containing links with instructions on how to exploit the Tampa InfraGard website. InfraGard is a public-private partnership for critical infrastructure protection sponsored by the FBI with chapters in all 50 states.

Also today, a related complaint unsealed in the District of New Jersey charges Lance Moore, 21, of Las Cruces, N.M., with allegedly stealing confidential business information stored on AT&T’s servers and posting it on a public file sharing site. Moore was arrested this morning at his residence by FBI agents and is expected to make an initial appearance this afternoon in Las Cruces federal court. Moore is charged in with one count of accessing a protected computer without authorization.

According to the New Jersey complaint, Moore, a customer support contractor, exceeded his authorized access to AT&T’s servers and downloaded thousands of documents, applications and other files that, on the same day, he allegedly posted on a public file-hosting site that promises user anonymity. According to the complaint, on June 25, 2011, the computer hacking group LulzSec publicized that they had obtained confidential AT&T documents and made them publicly available on the Internet. The documents were the ones Moore had previously uploaded.

The charge of intentional damage to a protected computer carries a maximum penalty of 10 years in prison and a $250,000 fine. Each count of conspiracy carries a maximum penalty of five years in prison and a $250,000 fine.

An indictment and a complaint merely contain allegations. Defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

To date, more than 75 searches have taken place in the United States as part of the ongoing investigations into these attacks.

These cases are being prosecuted by Assistant U.S. Attorneys in the U.S. Attorneys’ Offices for the Northern District of California, Middle District of Florida, and the District of New Jersey. The Criminal Division’s Computer Crime and Intellectual Property Section also has provided assistance.

Today’s operational activities were done in coordination with the Metropolitan Police Service in the United Kingdom and the Dutch National Police Agency. The FBI thanks the multiple international, federal, and domestic law enforcement agencies who continue to support these operations.

TOP-SECRET- How The FBI fights Cybercrime – Statement before the House Judiciary Subcommittee

  • Gordon M. Snow
  • Assistant Director
  • Federal Bureau of Investigation
  • Statement before the House Judiciary Subcommittee on Crime, Terrorism, and Homeland Security
  • Washington, D.C.

Good morning, Chairman Scott, Ranking Member Gohmert, and members of the subcommittee. I appreciate the opportunity to testify before you today regarding the FBI’s efforts to combat cyber crime as it relates to social networking sites.

Let me begin by acknowledging that the rapid expansion of the Internet has allowed us to learn, to communicate, and to conduct business in ways that were unimaginable 20 years ago. Still, the same technology, to include the surge in the use of social networking sites over the past two years, has given cyber thieves and child predators new, highly effective avenues to take advantage of unsuspecting users. These cyber criminals are using a variety of schemes to defraud or victimize innocent social networking site users, some of which I would like to highlight today.

Social Engineering

Regardless of the social networking site, users continue to be fooled online by persons claiming to be somebody else. Unlike the physical world, individuals can misrepresent everything about themselves while they communicate online, ranging not only from their names and business affiliations (something that is fairly easy to do in-person as well), but extending as well to their gender, age, and location (identifiers that are far more difficult to fake in-person). Years ago, we called these types of people confidence or “con” men. Perhaps as a result of today’s high-tech times, con artists are now referred to as being engaged in social engineering. It should come as no surprise to learn that the FBI is investigating classic investment fraud schemes, such as Ponzi schemes, that are now being carried out in virtual worlds. Other con artists are able to conduct identity theft crimes by misidentifying themselves on social networking sites and then tricking their victims into giving them their account names and passwords as well as other personally identifiable information.

In addition to identity theft crimes, child predators routinely use social networking sites to locate and communicate with future victims and other pedophiles. In at least one publicized case from last year, an individual attempted to extort nude photos of teenage girls after he gained control of their e-mail and social networking accounts. That particular FBI investigation led to an 18-year federal sentence for the offender, reflecting that these crimes are serious and will not be tolerated.

Fraud Schemes

There are a variety of Internet fraud schemes being used by cyber criminals at any given time. By way of example, a recent fraud scheme involves a cyber criminal gaining access to an unsuspecting user’s e-mail account or social networking site. The fraudster, who claims to be the account holder, then sends messages to the user’s friends. In the message, the fraudster states that he is on travel and has been robbed of his credit cards, passport, money, and cell phone; and is in need of money immediately. Without realizing that the message is from a criminal, the friends wire money to an overseas account without validating the claim.

Phishing Scams

Phishing schemes attempt to make Internet users believe that they are receiving e-mail from a trusted source when that is not the case. Phishing attacks on social networking site users come in various formats, including: messages within the social networking site either from strangers or compromised friend accounts; links or videos within a social networking site profile claiming to lead to something harmless that turns out to be harmful; or e-mails sent to users claiming to be from the social networking site itself. Social networking site users fall victim to the schemes due to the higher level of trust typically displayed while using social networking sites. Users often accept into their private sites people that they do not actually know, or sometimes fail altogether to pproperly set privacy settings on their profile. This gives cyber thieves an advantage when trying to trick their victims through various phishing schemes.

Social networking sites, as well as corporate websites in general, provide criminals with enormous amounts of information to send official looking documents and send them to individual targets who have shown interest in specific subjects. The personal and detailed nature of the information erodes the victim’s sense of caution, leading them to open the malicious e-mail. Such e-mail contains an attachment that contains malicious software designed to provide the e-mail’s sender with control over the victim’s entire computer. Once the malware infection is discovered, it is often too late to protect the data from compromise.

Cyber criminals design advanced malware to act with precision to infect, conceal access, steal or modify data without detection. Coders of advanced malware are patient and have been known to test a network and its users to evaluate defensive responses. Advanced malware may use a “layered” approach to infect and gain elevated privileges on a system. Usually, these types of attacks are bundled with an additional cyber crime tactic, such as social engineering or zero day exploits. In the first phase of a malware infection, a user might receive a spear phishing e-mail that obtains access to the user’s information or gains entry into the system under the user’s credentials. Once the cyber criminal initiates a connection to the user or system, they can further exploit it using other vectors that may give them deeper access to system resources. In the second phase, the hacker might install a backdoor to establish a persistent presence on the network that can no longer be discovered through the use of anti-virus software or firewalls.

Data Mining

Cyber thieves use data mining on social networking sites as a way to extract sensitive information about their victims. This can be done by criminal actors on either a large or small scale. For example, in a large-scale data mining scheme, a cyber criminal may send out a “getting to know you quiz” to a large list of social networking site users. While the answers to these questions do not appear to be malicious on the surface, they often mimic the same questions that are asked by financial institutions or e-mail account providers when an individual has forgotten their password. Thus, an e-mail address and the answers to the quiz questions can provide the cyber criminal with the tools to enter your bank account, e-mail account, or credit card in order to transfer money or siphon your account. Small-scale data mining may also be easy for cyber criminals if social networking site users have not properly guarded their profile or access to sensitive information. Indeed, some networking applications encourage users to post whether or not they are on vacation, simultaneously letting burglars know when nobody is home.

The Cyber Underground

The impact of cyber crime on individuals and commerce can be substantial, with the consequences ranging from a mere inconvenience to financial ruin. The potential for considerable profits is enticing to young criminals, and has resulted in the creation of a large underground economy known as the cyber underground. The cyber underground is a pervasive market governed by rules and logic that closely mimic those of the legitimate business world, including a unique language, a set of expectations about its members’ conduct, and a system of stratification based on knowledge and skill, activities, and reputation.
One of the ways that cyber criminals communicate within the cyber underground is on website forums. It is on these forums that cyber criminals buy and sell login credentials (such as those for e-mail, social networking sites, or financial accounts); where they buy and sell phishing kits, malicious software, access to botnets; and victim social security numbers, credit cards, and other sensitive information. These criminals are increasingly professionalized, organized, and have unique or specialized skills.

In addition, cyber crime is increasingly transnational in nature, with individuals living in different countries around the world working together on the same schemes. In late 2008, an international hacking ring carried out one of the most complicated and organized computer fraud attacks ever conducted. The crime group used sophisticated hacking techniques to compromise the encryption used to protect data on 44 payroll debit cards, and then provided a network of “cashers” to withdraw more than $9 million from over 2,100 ATMs in at least 280 cities worldwide, including cities in the United States, Russia, Ukraine, Estonia, Italy, Hong Kong, Japan and Canada. The $9 million loss occurred within a span of less than 12 hours. The cyber underground facilitates the exchange of cyber crime services, tools, expertise, and resources, which enables this sort of transnational criminal operation to take place across multiple countries.

Beyond Cyber Crime

Apart from the cyber crime consequences associated with social networking sites, valuable information can be inadvertently exposed by military or government personnel via their social networking site profile. In a recently publicized case, an individual created a fake profile on multiple social networking sites posing as an attractive female intelligence analyst and extended friend requests to government contractors, military, and other government personnel. Many of the friend requests were accepted, even though the profile was of a fictitious person. According to press accounts, the deception provided its creator with access to a fair amount of sensitive data, including a picture from a soldier taken on patrol in Afghanistan that contained embedded data identifying his exact location. The person who created the fake social networking sites, when asked what he was trying to prove, responded: “The first thing was the issue of trust and how easily it is given. The second thing was to show how much different information gets leaked out through various networks.” He also noted that although some individuals recognized the sites as fake, they had no central place to warn others about the perceived fraud, helping to ensure 300 connections in a month.

This last point is worth expanding upon. Some social networking sites have taken it upon themselves to be model corporate citizens by voluntarily providing functions for users to report acts of abuse. A number of sites have easy to use buttons or links that, with a single click, will send a message to the system administrator alerting them of potentially illegal or abusive content. Unfortunately though, many sites have not followed the lead. Some sites provide users with no ability to report abuse, while others either intentionally or unintentionally discourage reporting by requiring users to complete a series of onerous steps every time they want to report abuse.

FBI Cyber Mission and Strategic Partnerships

The Department of Justice leads the national effort to prosecute cyber crime, and the FBI, in collaboration with other federal law enforcement agencies, investigates cyber crime. The FBI’s cyber crime mission is four-fold: first and foremost, to stop those behind the most serious computer intrusions and the spread of malicious code; second, to identify and thwart online sexual predators who use the Internet to meet and exploit children and to produce, possess, or share child pornography; third, to counteract operations that target U.S. intellectual property, endangering our national security and competitiveness; and fourth, to dismantle national and transnational organized criminal enterprises engaging in Internet fraud. To this end, we have established cyber squads in each of our 56 field offices around the country, with more than 1,000 specially trained agents, analysts, and digital forensic examiners. Still, we can not combat this threat alone.

Some of the best tools in the FBI’s arsenal for combating any crime problem are its long-standing partnerships with federal, state, local, and international law enforcement agencies, as well as with the private sector and academia. At the federal level, and by presidential mandate, the FBI leads the National Cyber Investigative Joint Task Force (NCIJTF) as a multi-agency national focal point for coordinating, integrating, and sharing pertinent information related to cyber threat investigations in order to determine the identity, location, intent, motivation, capabilities, alliances, funding, and methodologies of cyber threat groups and individuals. In doing so, the partners of the NCIJTF support the U.S. government’s full range of options across all elements of national power.

The FBI also partners closely with not-for-profit organizations, including extensive partnerships with the National White Collar Crime Center (NW3C), in establishing the Internet Crime Complaint Center (IC3), the National Cyber-Forensic and Training Alliance (NCFTA), the InfraGard National Members Alliance in establishing InfraGard, the Financial Services Information Sharing & Analysis Center (FS-ISAC), and the National Center for Missing and Exploited Children (NCMEC).

Just one recent example of coordination highlights how effective we are when working within these closely established partnerships. Earlier this year, Romanian police and prosecutors conducted one of Romania’s largest police actions ever—an investigation of an organized crime group engaged in Internet fraud. The investigation deployed over 700 law enforcement officers who conducted searches at 103 locations, which led to the arrest of 34 people. Over 600 victims of this Romanian crime ring were U.S. citizens. The success in bringing down this group was based in large part on the strength of our partnership with Romanian law enforcement and our domestic federal, state and local partners. Through extensive coordination by the FBI’s legal attaché (legat) in Bucharest, the Internet Crime Complaint Center provided the Romanians with over 600 complaints it had compiled from submissions to the http://www.IC3.gov reporting portal. In addition, and again in close coordination with the FBI’s legat, over 45 FBI field offices assisted in the investigation by conducting interviews to obtain victim statements on Romanian complaint forms, and by obtaining police reports and covering other investigative leads within their divisions.

Working closely with others, sharing information, and leveraging all available resources and expertise, the FBI and its partners have made significant strides in combating cyber crime. Clearly, there is more work to be done, but through a coordinated approach we have become more nimble and responsive in our efforts to bring justice to the most egregious offenders.

Conclusion

Chairman Scott, Ranking Member Gohmert, and members of the subcommittee, I appreciate the opportunity to come before you today and share the work that the FBI is doing to address the threat posed by cyber criminals in this country and around the globe. I am happy to answer any questions.

TOP-SECRET – Biological Weapons Export Controls Revised

Biological Weapons Export Controls Revised


[Federal Register Volume 76, Number 176 (Monday, September 12, 2011)]
[Rules and Regulations]
[Pages 56099-56103]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-22677]

=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

Bureau of Industry and Security

15 CFR Parts 740, 742 and 774

[Docket No. 110222155-1110-01]
RIN 0694-AF14

Implementation of a Decision Adopted Under the Australia Group
(AG) Intersessional Silent Approval Procedures in 2010 and Related
Editorial Amendments

AGENCY: Bureau of Industry and Security, Commerce.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: The Bureau of Industry and Security (BIS) publishes this final
rule to amend the Export Administration Regulations (EAR) to implement
a decision based on a proposal that was discussed at the 2010 Australia
Group (AG) Plenary and adopted under the AG intersessional silent
approval procedures in November 2010. Specifically, this rule amends
the Commerce Control List (CCL) entry in the EAR that controls human
and zoonotic pathogens and ``toxins,'' consistent with the
intersessional changes to the AG's ``List of Biological Agents for
Export Control.'' First, this rule clarifies the scope of the AG-
related controls in the EAR that apply to ``South American haemorrhagic
fever (Sabia, Flexal, Guanarito)'' and ``Pulmonary and renal syndrome-
haemorrhagic fever viruses (Seoul, Dobrava, Puumala, Sin Nombre)'' by
revising the list of viruses in this CCL entry to remove these two
fevers and replace them with ten viral causative agents for the fevers.
These changes are intended to more clearly identify the causative
agents that are of concern for purposes of the controls maintained by
the AG. Second, this rule alphabetizes and renumbers the list of
viruses in this CCL entry, consistent with the 2010 intersessional
changes to the AG control list. Finally, this rule makes an editorial
change to the CCL entry that controls human and zoonotic pathogens and
``toxins.'' To assist exporters to more easily identify the bacteria
and ``toxins'' that are controlled under this CCL entry, this rule
alphabetizes and renumbers the lists of bacteria and ``toxins'' in the
entry.

DATES: This rule is effective September 12, 2011.

ADDRESSES: Send comments regarding this collection of information,
including suggestions for reducing the burden, to Jasmeet Seehra,
Office of Management and Budget (OMB), by e-mail to Jasmeet_K._ Seehra@omb.eop.gov, or by fax to (202) 395-7285; and to the Regulatory
Policy Division, Bureau of Industry and Security, Department of
Commerce, 14th Street & Pennsylvania Avenue, NW., Room 2705,
Washington, DC 20230.

FOR FURTHER INFORMATION CONTACT: Elizabeth Sangine, Director, Chemical
and Biological Controls Division, Office of Nonproliferation and Treaty
Compliance, Bureau of Industry and Security, Telephone: (202) 482-3343.

SUPPLEMENTARY INFORMATION:

Background

    The Bureau of Industry and Security (BIS) is amending the Export
Administration Regulations (EAR) to implement a decision that was
adopted under the Australia Group (AG) intersessional silent approval
procedures in November 2010. The AG is a multilateral forum consisting
of 40 participating countries that maintain

[[Page 56100]]

export controls on a list of chemicals, biological agents, and related
equipment and technology that could be used in a chemical or biological
weapons program. The AG periodically reviews items on its control list
to enhance the effectiveness of participating governments' national
controls and to achieve greater harmonization among these controls.
    The November 2010 intersessional decision revised the AG ``List of
Biological Agents for Export Control'' to clarify the scope of the AG
controls that apply to certain viruses connected with the phenotypes or
medical conditions known as ``South American haemorrhagic fever'' and
``Pulmonary and renal syndrome-haemorrhagic fever viruses.'' The
purpose of these changes was to address a concern by the AG that the
listings for ``South American haemorrhagic fever (Sabia, Flexal,
Guanarito)'' and ``Pulmonary and renal syndrome-haemorrhagic fever
viruses (Seoul, Dobrova, Puumala, Sin Nombre)'' could be misinterpreted
(e.g., by assuming that the causative agents identified in the
parentheses represented an exhaustive listing of such viruses). In
addition, both of these AG listings referred to phenotypes or medical
conditions known to be caused by several distinct species of viruses,
some (but not all) of which were identified in parentheses for each
listing.
    To address this concern, the November 2010 AG intersessional
decision removed ``South American haemorrhagic fever'' and ``Pulmonary
and renal syndrome-haemorrhagic fever viruses'' from the List of
Biological Agents and replaced them with ten viral causative agents for
the fevers. Five of these causative agents (i.e., ``Dobrava-Belgrade
virus,'' ``Guanarito virus,'' ``Sabia virus,'' ``Seoul virus,'' and
``Sin nombre virus'') were previously identified in parentheses under
the listings for the two fevers, while the other five causative agents
(i.e., ``Andes virus,'' ``Chapare virus,'' ``Choclo virus,'' ``Laguna
Negra virus,'' and ``Lujo virus'') were not previously identified on
the AG List. Two other causative agents (i.e., ``Flexal virus'' and
``Puumala virus'') that were previously identified in parentheses under
the listings for the two fevers were removed from the AG List. This
rule amends Export Control Classification Number (ECCN) 1C351 on the
Commerce Control List (CCL) (Supplement No. 1 to part 774 of the EAR)
by revising the list of viruses contained in 1C351.a to reflect these
changes to the AG List of Biological Agents.
    Consistent with the changes to ECCN 1C351 described above, this
rule alphabetizes and renumbers the list of viruses in ECCN 1C351.a to
conform with the format in the AG List of Biological Agents. In
addition, for the convenience of exporters attempting to determine the
control status of certain pathogens and toxins, this rule alphabetizes
and renumbers the lists of bacteria and toxins contained in ECCN
1C351.c and .d, respectively. Consistent with this reordering, this
rule revises references to certain agents identified in the ``CW
Controls'' paragraph of this ECCN, in the ``License Requirements
Notes'' under the License Requirements section of this ECCN, and/or in
the ``Related Controls'' paragraph under the List of Items Controlled
section of this ECCN.
    Although this rule removes ``Flexal virus'' from ECCN 1C351,
consistent with the AG intersessional changes to the AG List of
Biological Agents as described above, this virus continues to be listed
on the CCL. Specifically, this rule adds ``Flexal virus'' to ECCN 1C360
(Select agents not controlled under ECCN 1C351, 1C352, or 1C354),
because the virus is included in the list of select agents and toxins
maintained by the Centers for Disease Control and Prevention (CDC),
U.S. Department of Health and Human Services, in 42 CFR 73.3(b).
    This rule also amends ECCNs 1C351 and 1C352 by revising the
``Related Controls'' paragraph under the List of Items Controlled for
each ECCN to correct the references to the regulations maintained by
CDC and the Animal and Plant Health Inspection Service (APHIS), U.S.
Department of Agriculture, that apply to certain select agents and
toxins.
    Finally, this rule amends Section 740.20 (License Exception STA),
Section 742.18 (license requirements and policies related to the
Chemical Weapons Convention), and the List of Items Controlled section
in ECCN 1C991 (Vaccines, immunotoxins, medical products, and diagnostic
and food testing kits) to update the references to certain items
controlled under ECCN 1C351 that were alphabetized and renumbered, as
described above. Section 740.20 also is amended to include in paragraph
(b)(2)(vi) certain toxins controlled by ECCN 1C351.d that were
inadvertently omitted by the License Exception STA rule that BIS
published on June 16, 2011 (76 FR 35276). The toxins identified in
Section 740.20(b)(2)(vi) may be exported under License Exception STA to
countries listed in Section 740.20(c)(1), provided that such exports
conform with the limits specified in Section 740.20(b)(2)(vi)(A) and
(b)(2)(vi)(B).
    None of the changes made by this rule increase the scope of the
controls in ECCNs 1C351 and 1C991 (i.e., the items that are controlled
under these ECCNs remain the same, although certain items are now
specifically identified under separate listings in 1C351.a). As noted
above, ``Flexal virus,'' which was previously controlled under ECCN
1C351.a, is now controlled as a ``select agent'' under ECCN 1C360.a;
however, the license requirements for this virus remain unchanged.
    Although the Export Administration Act expired on August 20, 2001,
the President, through Executive Order 13222 of August 17, 2001, 3 CFR,
2001 Comp., p. 783 (2002), as extended by the Notice of August 12,
2010, 75 FR 50681 (August 16, 2010), has continued the EAR in effect
under the International Emergency Economic Powers Act.

Saving Clause

    Shipments of items removed from eligibility for export or reexport
under a license exception or without a license (i.e., under the
designator ``NLR'') as a result of this regulatory action that were on
dock for loading, on lighter, laden aboard an exporting carrier, or en
route aboard a carrier to a port of export, on October 12, 2011,
pursuant to actual orders for export or reexport to a foreign
destination, may proceed to that destination under the previously
applicable license exception or without a license (NLR) so long as they
are exported or reexported before October 27, 2011. Any such items not
actually exported or reexported before midnight, on October 27, 2011,
require a license in accordance with this regulation.
    ``Deemed'' exports of ``technology'' and ``source code'' removed
from eligibility for export under a license exception or without a
license (under the designator ``NLR'') as a result of this regulatory
action may continue to be made under the previously available license
exception or without a license (NLR) before October 27, 2011. Beginning
at midnight on October 27, 2011, such ``technology'' and ``source
code'' may no longer be released, without a license, to a foreign
national subject to the ``deemed'' export controls in the EAR when a
license would be required to the home country of the foreign national
in accordance with this regulation.

Rulemaking Requirements

    1. Executive Orders 13563 and 12866 direct agencies to assess all
costs and benefits of available regulatory alternatives and, if
regulation is

[[Page 56101]]

necessary, to select regulatory approaches that maximize net benefits
(including potential economic, environmental, public health and safety
effects, distributive impacts, and equity). Executive Order 13563
emphasizes the importance of quantifying both costs and benefits, of
reducing costs, of harmonizing rules, and of promoting flexibility.
This rule has been determined to be not significant for purposes of
Executive Order 12866.
    2. Notwithstanding any other provision of law, no person is
required to respond to, nor shall any person be subject to a penalty
for failure to comply with, a collection of information subject to the
requirements of the Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et
seq.) (PRA), unless that collection of information displays a currently
valid Office of Management and Budget (OMB) Control Number. This rule
contains a collection of information subject to the requirements of the
PRA. This collection has been approved by OMB under Control Number
0694-0088 (Multi-Purpose Application), which carries a burden hour
estimate of 58 minutes to prepare and submit form BIS-748. Send
comments regarding this burden estimate or any other aspect of this
collection of information, including suggestions for reducing the
burden, to Jasmeet Seehra, Office of Management and Budget (OMB), and
to the Regulatory Policy Division, Bureau of Industry and Security,
Department of Commerce, as indicated in the ADDRESSES section of this
rule.
    3. This rule does not contain policies with Federalism implications
as that term is defined in Executive Order 13132.
    4. The provisions of the Administrative Procedure Act (5 U.S.C.
553) requiring notice of proposed rulemaking, the opportunity for
public participation, and a delay in effective date, are inapplicable
because this regulation involves a military and foreign affairs
function of the United States (See 5 U.S.C. 553(a)(1)). Immediate
implementation of these amendments is non-discretionary and fulfills
the United States' international obligation to the Australia Group
(AG). The AG contributes to international security and regional
stability through the harmonization of export controls and seeks to
ensure that exports do not contribute to the development of chemical
and biological weapons. The AG consists of 40 member countries that act
on a consensus basis and the amendments set forth in this rule
implement a decision adopted under the AG intersessional silent
approval procedures in November 2010 and other changes that are
necessary to ensure consistency with the controls maintained by the AG.
Since the United States is a significant exporter of the items in this
rule, immediate implementation of this provision is necessary for the
AG to achieve its purpose. Any delay in implementation will create a
disruption in the movement of affected items globally because of
disharmony between export control measures implemented by AG members,
resulting in tension between member countries. Export controls work
best when all countries implement the same export controls in a timely
and coordinated manner.
    Further, no other law requires that a notice of proposed rulemaking
and an opportunity for public comment be given for this final rule.
Because a notice of proposed rulemaking and an opportunity for public
comment are not required to be given for this rule under the
Administrative Procedure Act or by any other law, the analytical
requirements of the Regulatory Flexibility Act (5 U.S.C. 601 et seq.)
are not applicable. Therefore, this regulation is issued in final form.

List of Subjects

15 CFR Part 740

    Administrative practice and procedure, Exports, Reporting and
recordkeeping requirements.

15 CFR Part 742

    Exports, Foreign trade.

15 CFR Part 774

    Exports, Foreign trade, Reporting and recordkeeping requirements.

    Accordingly, parts 740, 742 and 774 of the Export Administration
Regulations (15 CFR parts 730-774) are amended as follows:

PART 740--[AMENDED]

0
1. The authority citation for 15 CFR part 740 continues to read as
follows:

    Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.;
22 U.S.C. 7201 et seq.; E.O. 13026, 61 FR 58767, 3 CFR, 1996 Comp.,
p. 228; E.O. 13222, 66 FR 44025, 3 CFR, 2001 Comp., p. 783; Notice
of August 12, 2010, 75 FR 50681 (August 16, 2010).

0
2. Section 740.20 is amended by revising paragraph (b)(2)(v) and
paragraph (b)(2)(vi) introductory text, as follows:

Sec.  740.20  License Exception Strategic Trade Authorization (STA).

* * * * *
    (b) * * *
    (2) * * *
    (v) License Exception STA may not be used for any item controlled
by ECCN 1C351.a, .b, .c, d.11, .d.12 or .e, ECCNs 1C352, 1C353, 1C354,
1C360, 1E001 (i.e., for technology, as specified in ECCN 1E001, for
items controlled by ECCN 1C351.a, .b, .c, .d.11, .d.12 or .e or ECCNs
1C352, 1C353, 1C354 or 1C360) or ECCN 1E351.
    (vi) Toxins controlled by ECCN 1C351.d.1 through 1C351.d.10 and
1C351.d.13 through 1C351.d.19 are authorized under License Exception
STA to destinations indicated in paragraph (c)(1) of this section,
subject to the following limits. For purposes of this paragraph, all
such toxins that are sent from one exporter, reexporter or transferor
to a single end-user, on the same day, constitute one shipment.
* * * * *

PART 742--[AMENDED]

0
3. The authority citation for 15 CFR part 742 continues to read as
follows:

    Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.;
22 U.S.C. 3201 et seq.; 42 U.S.C. 2139a; 22 U.S.C. 7201 et seq.; 22
U.S.C. 7210; Sec 1503, Pub. L. 108-11, 117 Stat. 559; E.O. 12058, 43
FR 20947, 3 CFR, 1978 Comp., p. 179; E.O. 12851, 58 FR 33181, 3 CFR,
1993 Comp., p. 608; E.O. 12938, 59 FR 59099, 3 CFR, 1994 Comp., p.
950; E.O. 13026, 61 FR 58767, 3 CFR, 1996 Comp., p. 228; E.O. 13222,
66 FR 44025, 3 CFR, 2001 Comp., p. 783; Presidential Determination
2003-23 of May 7, 2003, 68 FR 26459, May 16, 2003; Notice of August
12, 2010, 75 FR 50681 (August 16, 2010); Notice of November 4, 2010,
75 FR 68673 (November 8, 2010).

0
4. Section 742.18 is amended by revising paragraph (a)(1), paragraph
(b)(1)(i) introductory text, and paragraphs (b)(1)(ii) and (b)(1)(iii),
as follows:

Sec.  742.18  Chemical Weapons Convention (CWC or Convention).

* * * * *
    (a) * * *
    (1) Schedule 1 chemicals and mixtures controlled under ECCN 1C351.
A license is required for CW reasons to export or reexport Schedule 1
chemicals controlled under ECCN 1C351.d.11 or d.12 to all destinations
including Canada. CW applies to 1C351.d.11 for ricin in the form of
Ricinus Communis AgglutininII (RCAII), which is
also known as ricin D or Ricinus Communis LectinIII
(RCLIII), and Ricinus Communis LectinIV
(RCLIV), which is also known as ricin E. CW applies to
1C351.d.12 for saxitoxin identified by C.A.S. 35523-89-8.
(Note that the advance notification procedures and annual reporting
requirements described in

[[Page 56102]]

Sec.  745.1 of the EAR also apply to exports of Schedule 1 chemicals.)
* * * * *
    (b) * * *
    (1) * * *
    (i) Exports to States Parties to the CWC. Applications to export
Schedule 1 Chemicals controlled under ECCN 1C351.d.11 or .d.12 to
States Parties to the CWC (destinations listed in Supplement No. 2 to
part 745 of the EAR) generally will be denied, unless all of the
following conditions are met:
* * * * *
    (ii) Exports to States not party to the CWC. Applications to export
Schedule 1 chemicals controlled under ECCN 1C351.d.11 or .d.12 to
States not Party to the CWC (destinations not listed in Supplement No.
2 to part 745 of the EAR) generally will be denied, consistent with
U.S. obligations under the CWC to prohibit exports of these chemicals
to States not Party to the CWC.
    (iii) Reexports. Applications to reexport Schedule 1 chemicals
controlled under ECCN 1C351.d.11 or .d.12 generally will be denied to
all destinations (including both States Parties to the CWC and States
not Party to the CWC).
* * * * *

PART 774--[AMENDED]

0
5. The authority citation for 15 CFR part 774 continues to read as
follows:

    Authority: 50 U.S.C. app. 2401 et seq.; 50 U.S.C. 1701 et seq.;
10 U.S.C. 7420; 10 U.S.C. 7430(e); 22 U.S.C. 287c, 22 U.S.C. 3201 et
seq., 22 U.S.C. 6004; 30 U.S.C. 185(s), 185(u); 42 U.S.C. 2139a; 42
U.S.C. 6212; 43 U.S.C. 1354; 15 U.S.C. 1824a; 50 U.S.C. app. 5; 22
U.S.C. 7201 et seq.; 22 U.S.C. 7210; E.O. 13026, 61 FR 58767, 3 CFR,
1996 Comp., p. 228; E.O. 13222, 66 FR 44025, 3 CFR, 2001 Comp., p.
783; Notice of August 12, 2010, 75 FR 50681 (August 16, 2010).

0
6. In Supplement No. 1 to Part 774 (the Commerce Control List),
Category 1--Special Materials and Related Equipment, Chemicals,
``Microorganisms'' and ``Toxins,'' ECCN 1C351 is amended by revising
the License Requirements section and the ``Related Controls'' and
``Items'' paragraphs in the List of Items Controlled section, to read
as follows:

Supplement No. 1 to Part 774--The Commerce Control List

* * * * *
1C351 Human and zoonotic pathogens and ``toxins'', as follows (see
List of Items Controlled).

License Requirements

Reason for Control: CB, CW, AT

               Control(s)                         Country chart

CB applies to entire entry.............  CB Column 1.

CW applies to 1C351.d.11 and d.12 and a license is required for CW
reasons for all destinations, including Canada, as follows: CW
applies to 1C351.d.11 for ricin in the form of (1) Ricinus Communis
AgglutininII (RCAII), also known as ricin D or
Ricinus Communis LectinIII (RCLIII) and (2)
Ricinus Communis LectinIV (RCLIV), also known
as ricin E. CW applies to 1C351.d.12 for saxitoxin identified by
C.A.S. 35523-89-8. See Sec.  742.18 of the EAR for
licensing information pertaining to chemicals subject to restriction
pursuant to the Chemical Weapons Convention (CWC). The Commerce
Country Chart is not designed to determine licensing requirements
for items controlled for CW reasons.

               Control(s)                         Country chart

AT applies to entire entry.............  AT Column 1.

License Requirement Notes

    1. All vaccines and ``immunotoxins'' are excluded from the scope
of this entry. Certain medical products and diagnostic and food
testing kits that contain biological toxins controlled under
paragraph (d) of this entry, with the exception of toxins controlled
for CW reasons under d.11 and d.12, are excluded from the scope of
this entry. Vaccines, ``immunotoxins'', certain medical products,
and diagnostic and food testing kits excluded from the scope of this
entry are controlled under ECCN 1C991.
    2. For the purposes of this entry, only saxitoxin is controlled
under paragraph d.12; other members of the paralytic shellfish
poison family (e.g. neosaxitoxin) are designated EAR99.
    3. Clostridium perfringens strains, other than the epsilon
toxin-producing strains of Clostridium perfringens described in c.9,
are excluded from the scope of this entry, since they may be used as
positive control cultures for food testing and quality control.

License Exceptions

* * * * *

List of Items Controlled

Unit: * * *
Related Controls: (1) Certain forms of ricin and saxitoxin in
1C351.d.11. and d.12 are CWC Schedule 1 chemicals (see Sec.  742.18
of the EAR). The U.S. Government must provide advance notification
and annual reports to the OPCW of all exports of Schedule 1
chemicals. See Sec.  745.1 of the EAR for notification procedures.
See 22 CFR part 121, Category XIV and Sec.  121.7 for additional CWC
Schedule 1 chemicals controlled by the Department of State. (2) The
Animal and Plant Health Inspection Service (APHIS), U.S. Department
of Agriculture, and the Centers for Disease Control and Prevention
(CDC), U.S. Department of Health and Human Services, maintain
controls on the possession, use, and transfer within the United
States of certain items controlled by this ECCN (for APHIS, see 7
CFR 331.3(b), 9 CFR 121.3(b), and 9 CFR 121.4(b); for CDC, see 42
CFR 73.3(b) and 42 CFR 73.4(b)).
Related Definitions: * * *
Items:
    a. Viruses, as follows:
    a.1. Andes virus;
    a.2. Chapare virus;
    a.3. Chikungunya virus;
    a.4. Choclo virus;
    a.5. Congo-Crimean haemorrhagic fever virus (a.k.a. Crimean-
Congo haemorrhagic fever virus);
    a.6. Dengue fever virus;
    a.7. Dobrava-Belgrade virus;
    a.8. Eastern equine encephalitis virus;
    a.9. Ebola virus;
    a.10. Guanarito virus;
    a.11. Hantaan virus;
    a.12. Hendra virus (Equine morbillivirus);
    a.13. Japanese encephalitis virus;
    a.14. Junin virus;
    a.15. Kyasanur Forest virus;
    a.16. Laguna Negra virus;
    a.17. Lassa fever virus;
    a.18. Louping ill virus;
    a.19. Lujo virus;
    a.20. Lymphocytic choriomeningitis virus;
    a.21. Machupo virus;
    a.22. Marburg virus;
    a.23. Monkey pox virus;
    a.24. Murray Valley encephalitis virus;
    a.25. Nipah virus;
    a.26. Omsk haemorrhagic fever virus;
    a.27. Oropouche virus;
    a.28. Powassan virus;
    a.29. Rift Valley fever virus;
    a.30. Rocio virus;
    a.31. Sabia virus;
    a.32. Seoul virus;
    a.33. Sin nombre virus;
    a.34. St. Louis encephalitis virus;
    a.35. Tick-borne encephalitis virus (Russian Spring-Summer
encephalitis virus);
    a.36. Variola virus;
    a.37. Venezuelan equine encephalitis virus;
    a.38. Western equine encephalitis virus; or
    a.39. Yellow fever virus.
    b. Rickettsiae, as follows:
    b.1. Bartonella quintana (Rochalimea quintana, Rickettsia
quintana);
    b.2. Coxiella burnetii;
    b.3. Rickettsia prowasecki (a.k.a. Rickettsia prowazekii); or
    b.4. Rickettsia rickettsii.
    c. Bacteria, as follows:
    c.1. Bacillus anthracis;
    c.2. Brucella abortus;
    c.3. Brucella melitensis;
    c.4. Brucella suis;
    c.5. Burkholderia mallei (Pseudomonas mallei);
    c.6. Burkholderia pseudomallei (Pseudomonas pseudomallei);
    c.7. Chlamydophila psittaci (formerly known as Chlamydia
psittaci);
    c.8. Clostridium botulinum;
    c.9. Clostridium perfringens, epsilon toxin producing types;
    c.10. Enterohaemorrhagic Escherichia coli, serotype O157 and
other verotoxin producing serotypes;
    c.11. Francisella tularensis;
    c.12. Salmonella typhi;
    c.13. Shigella dysenteriae;
    c.14. Vibrio cholerae; or
    c.15. Yersinia pestis.
    d. ``Toxins'', as follows, and ``subunits'' thereof:

[[Page 56103]]

    d.1. Abrin;
    d.2. Aflatoxins;
    d.3. Botulinum toxins;
    d.4. Cholera toxin;
    d.5. Clostridium perfringens toxins;
    d.6. Conotoxin;
    d.7. Diacetoxyscirpenol toxin;
    d.8. HT-2 toxin;
    d.9. Microcystin (Cyanginosin);
    d.10. Modeccin toxin;
    d.11. Ricin;
    d.12. Saxitoxin;
    d.13. Shiga toxin;
    d.14. Staphylococcus aureus toxins;
    d.15. T-2 toxin;
    d.16. Tetrodotoxin;
    d.17. Verotoxin and other Shiga-like ribosome inactivating
proteins;
    d.18. Viscum Album Lectin 1 (Viscumin); or
    d.19. Volkensin toxin.
    e. ``Fungi'', as follows:
    e.1. Coccidioides immitis; or
    e.2. Coccidioides posadasii.

0
7. In Supplement No. 1 to Part 774 (the Commerce Control List),
Category 1-- Special Materials and Related Equipment, Chemicals,
``Microorganisms'' and ``Toxins,'' ECCN 1C352 is amended by revising
the ``Related Controls'' paragraph in the List of Items Controlled
section, to read as follows:

1C352 Animal pathogens, as follows (see List of Items Controlled).
* * * * *

List of Items Controlled

Unit: * * *
Related Controls: The Animal and Plant Health Inspection Service
(APHIS), U.S. Department of Agriculture, and the Centers for Disease
Control and Prevention (CDC), U.S. Department of Health and Human
Services, maintain controls on the possession, use, and transfer
within the United States of certain items controlled by this ECCN
(for APHIS, see 7 CFR 331.3(b), 9 CFR 121.3(b), and 9 CFR 121.4(b);
for CDC, see 42 CFR 73.3(b) and 42 CFR 73.4(b)).
Related Definitions: * * *
Items:
* * * * *

0
8. In Supplement No. 1 to Part 774 (the Commerce Control List),
Category 1--Special Materials and Related Equipment, Chemicals,
``Microorganisms'' and ``Toxins,'' ECCN 1C360 is amended by revising
paragraph (a) in the ``Items'' paragraph in the List of Items
Controlled to read as follows:

1C360 Select agents not controlled under ECCN 1C351, 1C352, or
1C354.
* * * * *

List of Items Controlled

Unit: * * *
Related Controls: * * *
Related Definitions: * * *
Items:
Note: * * *
    a. Human and zoonotic pathogens, as follows:
    a.1. Viruses, as follows:
    a.1.a. Central European tick-borne encephalitis viruses, as
follows:
    a.1.a.1. Absettarov;
    a.1.a.2. Hanzalova;
    a.1.a.3. Hypr;
    a.1.a.4. Kumlinge;
    a.1.b. Cercopithecine herpesvirus 1 (Herpes B virus);
    a.1.c. Flexal virus;
    a.1.d. Reconstructed replication competent forms of the 1918
pandemic influenza virus containing any portion of the coding
regions of all eight gene segments;
a.2. [RESERVED];
* * * * *

0
9. In Supplement No. 1 to Part 774 (the Commerce Control List),
Category 1--Special Materials and Related Equipment, Chemicals,
``Microorganisms'' and ``Toxins,'' ECCN 1C991 is amended by revising
the ``Items'' paragraph in the List of Items Controlled to read as
follows:

1C991 Vaccines, immunotoxins, medical products, diagnostic and food
testing kits, as follows (see List of Items controlled).
* * * * *

List of Items Controlled

Unit: * * *
Related Controls: * * *
Related Definitions: * * *
Items:
    a. Vaccines against items controlled by ECCN 1C351, 1C352,
1C353, 1C354, or 1C360;
    b. Immunotoxins containing items controlled by 1C351.d;
    c. Medical products containing botulinum toxins controlled by
ECCN 1C351.d.3 or conotoxins controlled by ECCN 1C351.d.6;
    d. Medical products containing items controlled by ECCN 1C351.d
(except botulinum toxins controlled by ECCN 1C351.d.3, conotoxins
controlled by ECCN 1C351.d.6, and items controlled for CW reasons
under 1C351.d.11 or .d.12);
    e. Diagnostic and food testing kits containing items controlled
by ECCN 1C351.d (except items controlled for CW reasons under ECCN
1C351.d.11 or .d.12).

    Dated: August 26, 2011.
Kevin J. Wolf,
Assistant Secretary for Export Administration.
[FR Doc. 2011-22677 Filed 9-9-11; 8:45 am]
BILLING CODE 3510-33-P

TOP-SECRET – FBI Notice of Potential al-Qa’ida NYC DC Threat

UNCLASSIFIED//FOR OFFICIAL USE ONLY

(U//FOUO) Potential Al-Qa’ida Threat to New York City and Washington, DC During 9/11 Anniversary Period

8 September 2011

(U) Scope

(U//FOUO) This Joint Intelligence Bulletin (JIB) is intended to provide warning and perspective regarding potential attack plotting by al-Qa?ida against US interests. This product is intended to support the activities of FBI and DHS and to assist federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials and the private sector in effectively deterring, preventing, preempting, or responding to terrorist attacks against the United States.

IA-0???-11

(U) Warning: This joint FBI/DHS document is UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO). It is subject to release restrictions as detailed in the Homeland Security Act of 2002 (6 U.S.C. 482) and the Freedom of Information Acts (5 U.S.C. 552). It is to be controlled, stored, handled, transmitted, distributed, and disposed of in accordance with DHS and FBI policy for FOUO information and is not to be released to the public, media, or other personnel who do not have an authorized need-to-know without appropriate prior authorization.

(U) Warning: This product may contain US person information that has been deemed necessary for the intended recipient to understand, assess, or act on the information provided. US person information is highlighted with the label USPER and should be protected in accordance with constitutional requirements and all federal and state privacy and civil liberties laws.

UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY

(U) Key Findings

(U//FOUO) According to recently obtained information, al-Qa’ida may be planning attacks inside the United States, targeting either New York City or Washington, DC around the time of the 9/11 anniversary.

(U//FOUO) We remain concerned that terrorists and violent extremists may view the symbolism of the 10th anniversary of 9/11 as a potentially attractive date to conduct an attack—particularly in major US cities.

(U//FOUO) Al-Qa’ida Possibly Planning Homeland Attack around 9/11 Anniversary Timeframe

(U//FOUO) As of early September 2011, al-Qa’ida possibly planned to carry out attacks in either New York City or Washington, DC—including a possible car bomb attack— around the timeframe of the 9/11 anniversary; such attacks may involve operatives carrying US documentation.

  • (U//FOUO) The attacks would be intended to cause panic within the public and disarray among first responders.
  • (U//FOUO) We have no further information on the specific timing, targets, locations, or methods of any of the potential attacks.

(U//FOUO) We assess that al-Qa’ida has likely maintained an interest since at least February 2010 in conducting large attacks in the Homeland timed to coincide with symbolic dates, to include the 10-year anniversary of the 9/11 terrorist attacks. We also remain concerned that the May 2011 death of Usama bin Ladin (UBL), coupled with the subsequent removal of several key al-Qa’ida figures, could further contribute to al-Qa’ida’s desire to stage an attack on a symbolic date—such as the 10-year anniversary of 9/11—as a way to avenge UBL’s death and reassert the group’s relevance, although operational readiness likely remains the primary driving factor behind the timing of al-Qa’ida attacks.

(U) Possible Attack Methods and Targets

(U//FOUO) While this specific threat reporting indicates al-Qa’ida may be considering an attack using vehicle-borne improvised explosive devices (VBIEDs)—likely similar to the tactic used by Faisal Shahzad USPER in his attempted attack on Times Square on 1 May 2010—we assess that al-Qa’ida and its affiliates have also considered attacks with small-arms, homemade explosive devices, and poisons, and probably provide their operatives with enough autonomy to select the particular target and method of attack.

(U//FOUO) Although we have no specific information on targets other than these two cities for this particular threat stream, we assess that al-Qa’ida in general has traditionally viewed aviation, mass transit systems, and US Government and military sites as particularly attractive. We further assess that targets with large gatherings of people and that are of economic, symbolic, or political significance offer the opportunity for al-Qa’ida and its adherents to inflict mass casualties, with the added objectives of causing economic and psychological damage on the United States.

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 2 of 5

UNCLASSIFIED//FOR OFFICIAL USE ONLY

(U) Indicators of Pre-Operational Surveillance and Preparations for an Attack

(U//FOUO) We strongly encourage federal, state, local, tribal, and territorial counterterrorism officials and the private sector to remain alert and immediately report potential indicators of preoperational surveillance and planning activities at any commercial retail establishment, transportation venue, national monument or icon, or other public gathering place. Although a single indicator may constitute constitutionally protected activity, one or more might indicate pre-operational surveillance or preparation for an attack. Possible indicators include:

  • (U//FOUO) Unusual or prolonged interest in or attempts to gain sensitive information about security measures of personnel, entry points, peak days and hours of operation, and access controls such as alarms or locks;
  • (U//FOUO) Observation of security reaction drills or procedures; multiple false alarms or fictitious emergency calls to the same locations or similar venues;
  • (U//FOUO) Use of cameras or video recorders, sketching, or note-taking in a manner that would arouse suspicion;
  • (U//FOUO) Unusual interest in speaking with building maintenance personnel;
  • (U//FOUO) Observation of or questions about facility security measures, to include barriers, restricted areas, cameras, and intrusion detection systems;
  • (U//FOUO) Observations of or questions about facility air conditioning, heating, and ventilation systems;
  • (U//FOUO) Suspicious purchases of items that could be used to construct an explosive device, including hydrogen peroxide, acetone, gasoline, propane, or fertilizer;
  • (U//FOUO) Suspicious activities in storage facilities or other areas that could be used to construct an explosive device;
  • (U//FOUO) Attempted or unauthorized access to rooftops or other potentially sensitive areas.

(U) Recommended Protective Measures for VBIED Attacks

  • (U//FOUO) Update personnel on escalating threat;
  • (U//FOUO) Review and verify IED and VBIED tactics, techniques and procedures (TTPs) and reporting procedures;
  • (U//FOUO) Frequently test communications and notification procedures;
  • (U//FOUO) Be aware of and report unattended vehicles;
  • (U//FOUO) Identify security zones and establish standoff distances;

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 3 of 5

UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • (U//FOUO) Conduct refresher training for employees to understand basic procedures and associated hazards from blast and fragmentation;
  • (U//FOUO) Educate facility personnel on indicators of a VBIED attack TTPs and to be on the lookout for suspicious behavior;
  • (U//FOUO) Review and identify local use-of-force policies to challenge a potential vehicle suicide attack should it be encountered;
  • (U//FOUO) Review evacuation protocols for VBIED threats, and conduct evacuation drills establishing primary and secondary evacuation routes and assembly areas;
  • (U//FOUO) Establish security presence at strategic locations within at-risk venues, specifically at all entrances or vehicular choke points;
  • (U//FOUO) Establish vehicle search protocols and identify vehicle screening points or marshalling areas to check identification and manifests of approaching service vehicles;
  • (U//FOUO) Prohibit unauthorized vehicle access;
  • (U//FOUO) Record tag numbers for all vehicles entering site;
  • (U//FOUO) Establish protocols for executing serpentine vehicle access and choke points to impede approach of a VBIED toward a possible target. Conduct random vehicle explosive detection and canine searches;
  • (U//FOUO) Stagger search times and patterns to impede potential surveillance.

(U) Outlook

(U//FOUO) The FBI and DHS continue to work with our federal and non-federal partners to investigate this threat stream and will provide updates as appropriate. We continue to operate under the assumption that terrorists not yet identified by the Intelligence Community and law enforcement could seek to advance or execute attacks with little or no warning and urge federal, state, and local law enforcement and the private sector to maintain increased vigilance for indications of pre-operational and suspicious activity.

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 4 of 5

UNCLASSIFIED//FOR OFFICIAL USE ONLY

(U) Reporting Notice

(U) The FBI and DHS encourage recipients of this document to report information concerning suspicious or criminal activity to the local FBI Joint Terrorism Task Force and the State and Major Urban Area Fusion Center. The FBI’s 24/7 Strategic Information and Operations Center can be reached by telephone number 202-323-3300 or by email at SIOC[at]ic.fbi.gov. The DHS National Operations Center (NOC) can be reached by telephone at (202) 282-9685 or by email at NOC.Fusion[at]dhs.gov. FBI regional phone numbers can be found online at http://www.fbi.gov/contact/fo/fo.htm and Fusion Center information may be obtained at http://www.dhs.gov/files/resources/editorial_0306.shtm. For information affecting the private sector and critical infrastructure, contact the National Infrastructure Coordinating Center (NICC), a sub-element of the NOC. The NICC can be reached by telephone at (202) 282-9201 or by email at NICC[at]dhs.gov. When available, each report submitted should include the date, time, location, type of activity, number of people and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.

(U) Administrative Note: Law Enforcement Response

(U//FOUO) Information contained in this intelligence bulletin is for official use only. No portion of this bulletin should be released to the media, the general public, or over nonsecure Internet servers. Release of this material could adversely affect or jeopardize investigative activities.

(U) For comments or questions related to the content or dissemination of this document, please contact the FBI Counterterrorism Analysis Section at (202) 324-3000 or FBI_CTAS[at]ic.fbi.gov, or DHS/I&A Production Branch staff at IA.PM[at]hq.dhs.gov.

(U) I&A would like to invite you to participate in a brief customer feedback survey regarding this product. Your feedback is extremely important to our efforts to improve the quality and impact of our products on your mission. Please click below to access the form and then follow a few simple steps to complete and submit your response. Thank you.

(U) Tracked by: HSEC-8.1, HSEC-8.2, HSEC-8.3.4

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 5 of 5

TOP-SECRET -“FBI agents, fire fighters, rescue workers and engineers work at the Pentagon crash site,” 9/11/2001

“FBI agents, fire fighters, rescue workers and engineers work at the Pentagon crash site,” 9/11/2001; Photo number: 010914-F8006R-002; Photo Courtesy of the Department of Defense

On September 11, 2001, terrorists hijacked four passenger airliners, crashing them into the World Trade Center in New York City, and into the Pentagon in Arlington, Virginia, while the fourth plane crashed in a field in Pennsylvania. Shown here is the crash scene at the Pentagon following the attack.

TOP-SECRET – Nazi & Japanese War Crimes Final Report to the United States Congress

final-report-2007

TOP-SECRET – Brazil Conspired with U.S. to Overthrow Allende

Declassified U.S. Documents Show Richard Nixon and Brazilian President Emilio Médici Discussed Coordinated Intervention in Chile, Cuba, and other Latin American nations “to prevent new Allendes and Castros”

Washington, D.C., September 12, 2011 – In December 1971, President Richard Nixon and Brazilian President Emilio Garrastazú Médici discussed Brazil’s role in efforts to overthrow the elected government of Salvador Allende in Chile, formerly Top Secret records posted by the National Security Archive today reveal. According to a declassified memorandum of conversation, Nixon asked Médici whether the Chilean military was capable of overthrowing Allende. “He felt that they were…,” Médici replied, “and made clear that Brazil was working toward this end.”

The Top Secret “memcon” of the December 9, 1971, Oval Office meeting indicates that Nixon offered his approval and support for Brazil’s intervention in Chile. “The President said that it was very important that Brazil and the United States work closely in this field. We could not take direction but if the Brazilians felt that there was something we could do to be helpful in this area, he would like President Médici to let him know. If money were required or other discreet aid, we might be able to make it available.  This should be held in the greatest confidence.”

The U.S. and Brazil, Nixon told Médici, “must try and prevent new Allendes and Castros and try where possible to reverse these trends.”

During the same meeting, President Médici asked Nixon if “we” should be supporting Cuban exiles who “had forces and could overthrow Castro’s regime.” Nixon responded that “we should, as long as we did not push them into doing something that we could not support, and as long as our hand did not appear.”  The two also participated in a discussion of the potential to undermine the populist Peruvian President General Velasco Alvarado by publicizing the allegation that he had a lovechild with a mistress—she was a former “Miss Peru”—in Paris, according to General Vernon Walters who also attended the Médici/Nixon meeting.

The documents were declassified in July as part of the State Department’s Foreign Relations of the United States (FRUS) series.

The memcon records Nixon telling Médici that he “hoped we could cooperate closely, as there were many things that Brazil as a South American country could do that the U.S. could not.” Indeed, the documentation reveals that Nixon believed that a special relationship with Brazil was so important that he proposed a secret back-channel between the two presidents “as a means of communicating directly outside of normal diplomatic channels.” Médici named his private advisor and foreign minister Gibson Barbosa as his backchannel representative, but told Nixon that for “extremely private and delicate matters” Brazil would use Col. Manso Netto. Nixon named Kissinger as his representative for the special back channel.

Communications between Nixon and Medici using the special back-channel remain secret.

Peter Kornbluh, who directs the National Security Archive’s Chile and Brazil projects, noted that “a hidden chapter of collaborative intervention to overthrow the government of Chile” was now emmerging from the declassified documentation. “Brazil’s archives are the missing link,” he said, calling on President Ignacio Lula da Silva to open Brazil’s military archives on the past. “The full history of intervention in South America in the 1970s cannot be told without access to Brazilian documents.”

Drawing on Brazilian sources, a CIA intelligence memorandum noted that Médici had proposed that Brazil and the U.S. cooperate in countering the “trend of Marxist/leftist expansion” in Latin America and that Nixon promised to “assist Brazil when and wherever possible.”  The report noted that the substance of the secret talks had created concern among some officers in Brazil who believed that responsibility for these operations would fall to the Brazilian Armed forces. The memo quoted General Vicente Dale Coutinho as stating that “the United States obviously wants Brazil to ‘do the dirty work’” in South America.

A CIA National Intelligence Estimate done in 1972 predicted that Brazil would play an increasingly bigger role in hemispheric affairs, “seeking to fill whatever vacuum the US leaves behind. It is unlikely that Brazil will intervene openly in its neighbors internal affairs,” the intelligence assessment predicted, “but the regime will not be above using the threat of intervention or tools of diplomacy and covert action to oppose leftist regimes, or keep friendly governments in office, or to help place them there in countries such as Bolivia and Uruguay.”

In 2002, National Security Archive analyst Carlos Osorio posted a declassified Top Secret memorandum of conversation of Nixon’s meeting with British Prime Minister Edward Heath dated December 20, 1971, during which the two discussed Brazil’s role in South America. “Our position is supported by Brazil, which is after all the key to the future,” states Nixon, “The Brazilians helped rig the Uruguayan election… There are forces at work which we are not discouraging.”


Read the Documents

Document 1: White House Memorandum, Top Secret, “Meeting with President Emílio Garratazú Médici of Brazil on Thursday, December 9, 1971, at 10:00 a.m., in the President’s Office, the White House”, December 9, 1971.

During this meeting between President Nixon and President Médici, the two discuss the political and economic situations in several nations of mutual concern, among them Chile, Cuba, Peru, and Bolivia. Nixon asks Médici whether he feels the Chilean military could overthrow President Salvador Allende. Médici responds that he believes Allende will be overthrown “for very much the same reasons that Goulart had been overthrown in Brazil,” and “made it clear that Brazil was working towards this end.”  Nixon stressed “that it was very important that Brazil and the United States work closely in this field” and offered “discreet aid” and money for Brazilian operations against the Allende government. The two also discuss mutual operations against Castro supporting exile groups that had the forces to overthrow him, and how to block Peru’s efforts to bring Cuba back into the OAS.  During the meeting, Nixon raises an issue he clearly considers of major importance: establishing a highly secret back channel between the two presidents: because of the close relationship they have developed, he would like to have “a means of communicating directly outside of normal diplomatic channels when this might be necessary.” Médici agrees and names Brazilian Foreign Minister Gibson Barbosa as a representative for such communication while Nixon picks Kissinger. Médici also tells Nixon he will use Brazilian Colonel Manso Netto if the issue is particularly sensitive and discreet.  Nixon notes that the two countries “must try and prevent new Allendes and Castros and try where possible to reverse these trends.” At the end of the meeting, Nixon states that he “hoped that we could cooperate closely, as there were many things that Brazil as a South American country could do that the U.S. could not.”

Document 2: Memorandum from the Senior Department of Defense Attache in France (Gen. Walters) to the President’s Assistant for National Security Affairs (Henry Kissinger), undated.

In a memo to National Security Advisory Henry Kissinger, General Vernon Walters reports on the meeting between Médici and Nixon, and on the follow-up instructions that Nixon has given. First, Nixon wants Kissinger and Secretary Connolly to ensure priority support for the Inter-American Development Bank. Nixon also wants Kissinger to know that Nixon’s special channel to Médici and the Brazilians will be through Foreign Minister Gibson Barbosa, that Col. Arthur S. Moura who presently was the Army and Defense Attache in Brazil should be promoted to Brigadier General. The President also expects Médici to tell Kissinger of the visit of Argentine president Lanusse to Brazil and then Kissinger will relay the information to Nixon. Gen. Walters is also instructed to convey to Kissinger how much Nixon enjoyed meeting Médici and establishing a close relationship with the Brazilian president.

Document 3: CIA Memorandum, from CIA Deputy Director Robert Cushman to National Security Advisor Henry Kissinger, “Alleged Commitments Made by President Richard Nixon to Brazilian President Emílio Garrastazú Médici”, December 29, 1971.

After word of the discussion between Nixon and Médici leaks to the Brazilian military, the CIA transmits intelligence on the reaction among several officers. A memo from CIA Deputy Director Robert Cushman to National Security Advisor Henry Kissinger, asserts that the talks between Brazilian President Medici and President Nixon resulted in the two countries forming a pact to combat Latin American communism. Cushman also reports that General Vicente Dale Coutinho, commander of the fourth army, and other field grade officers in the Northeast, “have learned from a “Cabinet leak” that secret talks between the two Presidents were of great importance in the formulation of Brazilian foreign policy.” According to CIA intelligence, the military officers believe that the focus of the talks centered on hemisphere security, and Nixon reportedly asked support from Medici “in safeguarding the internal security and status quo in the hemisphere, including the governments of Bolivia and Uruguay.”  Medici agreed to the request and “personally believes the Brazilian government must assume a greater role in defending neighboring, friendly governments.” According to the report, General Coutinho takes offense to this notion and feels that the U.S. wants Brazil “to do the dirty work” and he believes the Brazilian military will be significantly disadvantaged because of it.

Document 4: National Intelligence Estimate 93-73, Secret, “The New Course in Brazil”, January 13, 1972.

This National Intelligence Estimate on Brazil predicts that the Brazilian military intends to “dominate Brazilian politics for years to come.” The assessment of the intelligence community is that there is no opposition capable of overthrowing the government, but if political division grows within the ranks of the military it could throw the country into chaos. The NIE says Brazil’s economy has a positive outlook for the next five years, and although the government will have recurring problems with the balance of payments over that time, it will “probably be able to deal with them.” The NIE reports that the reputation of the Brazilian military will reflect on the strength of its economy, and the growing social problems within in the country will grow even if the economy does. The NIE says that more Brazilians are becoming educated and realizing what their country lacks, which could affect the control of the military government. The report reasons that Brazil will continue to see itself as an ally of the U.S., but further nationalistic opinion within the country and trade issues will make the relationship rockier. The NIE concludes stating that Brazil will not hesitate to intervene in its neighbors’ affairs, using covert action “to oppose leftist regimes, to keep friendly governments in office, or help place them there in countries such as Bolivia and Uruguay.”

home | about | documents | news | publications | FOI

TOP-SECRET-Breaking the Silence The Mexican Army and the 1997 Acteal Massacre

Mexican troops training at a Military Camp in Chiapas.
(Photo courtesy of Adolfo Gutiérrez)

Breaking the Silence
The Mexican Army and the 1997 Acteal Massacre

National Security Archive Electronic Briefing Book No. 283

Washington, D.C., September, 2011 – As Mexicans debate last week’s Supreme Court ruling vacating the conviction of 20 men for the Acteal massacre, newly declassified documents from the U.S. Defense Intelligence Agency describe the Army’s role in backing paramilitary groups in Chiapas at the time of the killings. The secret cables confirm reporting about military support for indigenous armed groups carrying out attacks on pro-Zapatista communities in the region and add important new details. They also revive a question that has lingered for almost 12 years: when will the Army come clean about its role in Acteal?

Since the brutal attack of December 22, 1997, the Mexican government has offered multiple versions of the military’s involvement in the conflictive Chiapas zone around Acteal. The problem is the accounts have been incomplete or untrue. The most important of the DIA documents directly contradicts the official story told about the massacre by the government of then-President Ernesto Zedillo.

In the report issued by the nation’s Attorney General Jorge Madrazo in 1998, Libro Blanco Sobre Acteal, the government asserted that “The Attorney General’s office has documented the existence of groups of armed civilians in the municipality of Chenalhó, neither organized, created, trained, nor financed by the Mexican Army nor by any other government entity, but whose management and organization respond to an internal logic determined by the confrontation, between and within the communities, with the Zapatista bases of support.” (p. 32, emphasis added)

But in a telegram sent to DIA headquarters in Washington on May 4, 1999, the U.S. Defense Attaché Office in Mexico points to “direct support” by the Army to armed groups in the highland areas of Chiapas, where the killings took place. The document describes a clandestine network of “human intelligence teams,” created in mid-1994 with approval from then-President Carlos Salinas, working inside Indian communities to gather intelligence information on Zapatista “sympathizers.” In order to promote anti-Zapatista armed groups, the teams provided “training and protection from arrests by law enforcement agencies and military units patrolling the region.”

Although the cable was written in 1999, the attaché took care to point out that Army intelligence officers were overseeing the armed groups in December 1997. The document provides details never mentioned in the many declarations of the Mexican Army following the attack. The human intelligence teams, explains the Defense Attaché Office, “were composed primarily of young officers in the rank of second and first captain, as well as select sergeants who spoke the regional dialects. The HUMINT teams were composed of three to four persons, who were assigned to cover select communities for a period of three to four months. After three months the teams’ officer members were rotated to a different community in Chiapas. Concern over the teams’ safety and security were paramount reasons for the rotations every three months.”

The Defense Intelligence Agency released the excised documents to the National Security Archive in 2008 in response to a Freedom Information Act request. (An appeal for additional records is pending.) The information was compiled by the agency’s representatives in Mexico, defense attaché officers whose primary task is to gather intelligence on the Mexican armed forces and send it to headquarters in Washington for analysis. The analysis is then used by the government to assist in crafting national security policy in Mexico. The agency is the eyes and ears of the U.S. Secretary of Defense abroad: think of it as the Pentagon’s CIA.

So the “internal logic” turns out to be the military’s, in the form of a carefully planned counterinsurgency strategy that combined civic action programs – frequently trumpeted by the Defense Secretariat in statements to the press – with secret intelligence operations designed to strengthen the paramilitaries and provoke conflict against EZLN supporters.

In the almost twelve years since the massacre human rights groups, journalists and investigators have been able to unearth a smattering of true facts about the slaughter at Acteal, but without the help of official transparency. Requests for government information made through the Mexican freedom of information law–such as the ones filed by the National Security Archive last year–meet a resounding silence. The Attorney General’s office helpfully steers the requester to the library to find its 1998 report. The Interior Ministry responds with a copy of a public communiqué the agency issued five days after the massacre summarizing “Actions Taken” in the Acteal case. The nation’s intelligence center replies that it has no control over what should be military files, and therefore no documents. And the Army? “After a meticulous search in the archives of this Secretariat,” writes the institution to the National Security Archive, emphasis added, “the requested information was not located.”

Perhaps even more unsettling than the supposed non-existence of documents in the Defense Secretariat is the response of the Office of the President to requests about Acteal. The staff of President Felipe Calderón told this requester to look in the Presidential Archives of the General Archive of the Nation for files relevant to the massacre. We did. We found many. They are all located in the section “Unprocessed Files,” where letters, telegrams and other forms of complaints from Mexican citizens have languished for years without reply. The communications that poured in after December 22, 1997, from every state in Mexico as well as from international human rights groups and academic institutions contain expressions of anger, despair, and condemnation for the attack. They also include specific charges made by residents of Chiapas about instances of violence, energy blackouts, and land seizures: potential leads for further investigation by the government into the conflict destroying the region.

The cries for attention sent to the highest mandate in the land went unanswered. They were routinely tagged as unprocessed files and can be perused today by any researcher who cares to look in the national archives.

Until the current administration decides to honor its obligations to inform its citizens about the truth of the 1997 massacre, the people’s call for facts will remain lost in the unprocessed files.

And we will be left to rely on the United States for information about the Mexican Army and Acteal.


Read the Documents

Document 1
December 31, 1997
Mexican Military Presence Increases Following the Massacre in Chiapas
Defense Intelligence Agency, secret intelligence information report

In this heavily redacted cable sent to DIA headquarters in Washington on December 31, 1997, the U.S. Defense Attaché Office in Mexico describes the deployment of troops by the Mexican military to the conflict zones of Chiapas. Citing secret and open source accounts, the document indicates that President Ernesto Zedillo committed thousands of new troops to the region following the December 22 massacre of 45 Tzotzil Indian men, women and children, with other units “placed on alert to assist in the event of an uprising.”

Source: Released to National Security Archive under the Freedom of Information Act
FOIA Request No. 38,435, released February 2008
Under appeal

Document 2
May 4, 1999
Military Involvement with Chiapas Paramilitary Groups
Defense Intelligence Agency, secret intelligence information report

In a telegram sent to DIA headquarters in Washington on May 4, 1999, the U.S. Defense Attaché Office in Mexico points to “direct support” by the Army to armed groups in the highland areas of Chiapas, where the Acteal killings took place. The document describes a clandestine network of “human intelligence teams,” created in mid-1994 with approval from then-President Carlos Salinas, working inside Indian communities to gather intelligence information on Zapatista “sympathizers.”

Source: Released to National Security Archive under the Freedom of Information Act
FOIA Request No. 38,435, released February 2008
Under appeal

TOP-SECRET – May 02 – U-2 Cover Plan

Cover plan to be used for downed U-2 flight

Memo, cover plan to be used for downed U-2 flight; White House Office, Office of the Staff Seretary: Records, 1952-61 (Subject Series; Alphabetical Subseries), Box 15, Folder: Intelligence Matters (14); Dwight D. Eisenhower Presidential Library; National Archives

On May 1, 1960, an American U-2 spy plane piloted by Francis Gary Powers was shot down over Soviet air space. Dated May 2, this document details a cover story to be released regarding the flight.

TOP-SECRET-The National Commission on Terrorist Attacks Upon the United States – 9/11 Commission

FBI Report Apr 2004

FBI Report Chronology Part 01 of 02

FBI Report Chronology Part 02 of 02

Click on te links above to get the Original Documents of the 9/11 Commisssion

The National Commission on Terrorist Attacks Upon the United States, also known as the 9/11 Commission, was set up on November 27, 2002, “to prepare a full and complete account of the circumstances surrounding the September 11, 2001 attacks“, including preparedness for and the immediate response to the attacks.

The commission was also mandated to provide recommendations designed to guard against future attacks.

Chaired by former New Jersey Governor Thomas Kean, the commission consisted of five Democrats and five Republicans. The commission was created by Congressional legislation, with the bill signed into law by President George W. Bush.

The commission’s final report was lengthy and based on extensive interviews and testimony. Its primary conclusion was that the failures of the U.S. Central Intelligence Agency and Federal Bureau of Investigation permitted the terrorist attacks to occur and that had these agencies acted more wisely and more aggressively, the attacks could potentially have been prevented.

After the publication of its final report, the commission closed on August 21, 2004.[1] The commission was the last investigation by the federal government into the events of 9/11, with the exception of the NIST report on the collapse of Building 7.

The National Commission on Terrorist Attacks Upon the United States was established on November 27, 2002, by President George W. Bush and the United States Congress, with former Secretary of State Henry Kissinger initially appointed to head the commission.[2] However, Kissinger resigned only weeks after being appointed, because he would have been obliged to disclose the clients of his private consulting business.[3] Former U.S. Senator George Mitchell was originally appointed as the vice-chairman, but he stepped down on December 10, 2002, not wanting to sever ties to his law firm.[4] On December 15, 2002, Bush appointed former New Jersey governor Tom Kean to head the commission.[5]

By the spring of 2003, the commission was off to a slow start, needing additional funding to help it meet its target day for the final report, of May 27, 2004.[6] In late March, the Bush administration agreed to provide an additional $9 million for the commission, though this was $2 million short of what the commission requested.[7] The first hearings were held from March 31 to April 1, 2003, in New York City.[8]

Members

The members of the commission’s staff included:

Then government officials who were called to testify before the commission included:

Past government officials who were called to testify before the commission included:

President George W. Bush, Vice President Dick Cheney, former President Bill Clinton, and former Vice President Al Gore all gave private testimony. President Bush and Vice President Cheney insisted on testifying together and not under oath, while Clinton and Gore met with the panel separately. As National Security Advisor, Condoleezza Rice claimed that she was not required to testify under oath because the position of NSA is an advisory role, independent of authority over a bureaucracy and does not require confirmation by the Senate. Legal scholars disagree on the legitimacy of her claim. Eventually, Condoleezza Rice testified publicly and under oath.[12]

The commission issued its final report on July 22, 2004. After releasing the report, Commission Chair Thomas Kean declared that both Presidents Bill Clinton and George W. Bush had been “not well served” by the FBI and CIA.[13] The commission interviewed over 1,200 people in 10 countries and reviewed over two and a half million pages of documents, including some closely-guarded classified national security documents. Before it was released by the commission, the final public report was screened for any potentially classified information and edited as necessary.

Additionally, the commission has released several supplemental reports on the terrorists’ financing, travel, and other matters.

Parenthetic numbers refer to page numbers in the Commission Report

  1. The U.S. government must identify and prioritize actual or potential terrorist sanctuaries. For each, it should have a realistic strategy to keep possible terrorists insecure and on the run, using all elements of national power. (367)
  2. United States should support Pakistan’s government in its struggle against extremists with a comprehensive effort that extends from military aid to support for better education, so long as Pakistan’s leaders remain willing to make difficult choices of their own. (369)
  3. United States and the international community should make a long-term commitment to a secure and stable Afghanistan, in order to give the government a reasonable opportunity to improve the life of the Afghan people. Afghanistan must not again become a sanctuary for international crime and terrorism. The United States and the international community should help the Afghan government extend its authority over the country, with a strategy and nation-by-nation commitments to achieve their objectives. (370)
  4. The problems in the U.S.-Saudi relationship must be confronted, openly. The United States and Saudi Arabia must determine if they can build a relationship that political leaders on both sides are prepared to publicly defend—a relationship about more than oil. It should include a shared commitment to political and economic reform, as Saudis make common cause with the outside world. It should include a shared interest in greater tolerance and cultural respect, translating into a commitment to fight the violent extremists who foment hatred. (374)
  5. The U.S. government must define what the message is, what it stands for. We should offer an example of moral leadership in the world, committed to treat people humanely, abide by the rule of law, and be generous and caring to our neighbors. America and Muslim friends can agree on respect for human dignity and opportunity. (376)
  6. Where Muslim governments, even those who are friends, do not respect these principles, the United States must stand for a better future. One of the lessons of the long Cold War was that short-term gains in cooperating with the most repressive and brutal governments were too often outweighed by long-term setbacks for America’s stature and interests. (376)
  7. We need to defend our ideals abroad vigorously. America does stand up for its values. The United States defended, and still defends, Muslims against tyrants and criminals in Somalia, Bosnia, Kosovo, Afghanistan, and Iraq.
    • Recognizing that Arab and Muslim audiences rely on satellite television and radio, the government has begun some promising initiatives in television and radio broadcasting to the Arab world, Iran, and Afghanistan. These efforts are beginning to reach large audiences. The Broadcasting Board of Governors has asked for much larger resources. It should get them.
    • The United States should rebuild the scholarship, exchange, and library programs that reach out to young people and offer them knowledge and hope. Where such assistance is provided, it should be identified as coming from the citizens of the United States. (377)
  8. The U.S. government should offer to join with other nations in generously supporting a new International Youth Opportunity Fund. Funds will be spent directly for building and operating primary and secondary schools in those Muslim states that commit to sensibly investing their own money in public education. (378)
  9. A comprehensive U.S. strategy to counter terror-ism should include economic policies that encourage development, more open societies, and opportunities for people to improve the lives of their families and to enhance prospects for their children’s future. (379)
  10. The United States should engage other nations in developing a comprehensive coalition strategy against Islamist terror-ism. (379)
  11. The United States should engage its friends to develop a common coalition approach toward the detention and humane treatment of captured terrorists. (380)
  12. Pre-venting the proliferation of [weapons of mass destruction] warrants a maximum effort—by strengthening counterproliferation efforts, expanding the Proliferation Security Initiative, and supporting the Cooperative Threat Reduction program. (381)
  13. Vigorous efforts to track terrorist financing must remain front and center in U.S. counterterrorism efforts. The government has recognized that information about terrorist money helps us to understand their networks, search them out, and disrupt their operations. Intelligence and law enforcement have targeted the relatively small number of financial facilitators—individuals al Qaeda relied on for their ability to raise and deliver money—at the core of al Qaeda’s revenue stream. (382)
  14. The United States should combine terrorist travel intelligence, operations, and law enforcement in a strategy to intercept terrorists, find terrorist travel facilitators, and constrain terrorist mobility. (385)
  15. The U.S. border security system should be integrated into a larger network of screening points that includes our transportation system and access to vital facilities, such as nuclear reactors. The President should direct the Department of Homeland Security to lead the effort to design a comprehensive screening system, addressing common problems and setting common standards with systemwide goals in mind. (387)
  16. The Department of Homeland Security, properly supported by the Congress, should complete, as quickly as possible, a biometric entry-exit screening system, including a single system for speeding qualified travelers. It should be integrated with the system that provides benefits to foreigners seeking to stay in the United States. (389)
  17. We should do more to exchange terrorist information with trusted allies, and raise U.S. and global border security standards for travel and border crossing over the medium and long term through extensive inter-national cooperation. (390)
  18. Secure identification should begin in the United States. The federal government should set standards for the issuance of birth certificates and sources of identification, such as drivers licenses. (390)
  19. The U.S. government should identify and evaluate the transportation assets that need to be protected, set risk-based priorities for defending them, select the most practical and cost-effective ways of doing so, and then develop a plan, budget, and funding to implement the effort. The plan should assign roles and missions to the relevant authorities (federal, state, regional, and local) and to private stakeholders. In measuring effectiveness, perfection is unattainable. But terrorists should perceive that potential targets are defended. They may be deterred by a significant chance of failure. (391)
  20. Improved use of “no-fly” and “automatic selectee” lists should not be delayed while the argument about a successor to CAPPS continues. (393)
  21. The TSA and the Congress must give priority attention to improving the ability of screening checkpoints to detect explosives on passengers. (393)
  22. As the President determines the guidelines for information sharing among government agencies and by those agencies with the private sector, he should safeguard the privacy of individuals about whom information is shared. (394)
  23. The burden of proof for retaining a particular governmental power should be on the executive, to explain (a) that the power actually materially enhances security and (b) that there is adequate supervision of the executive’s use of the powers to ensure protection of civil liberties. If the power is granted, there must be adequate guidelines and oversight to properly confine its use. (394-5)
  24. There should be a board within the executive branch to oversee adherence to the guidelines we recommend and the commitment the government makes to defend our civil liberties. (395)
  25. Homeland security assistance should be based strictly on an assessment of risks and vulnerabilities. Now, in 2004, Washington, D.C.,and New York City are certainly at the top of any such list. We understand the contention that every state and city needs to have some minimum infrastructure for emergency response. But federal homeland security assistance should not remain a program for general revenue sharing. It should supplement state and local resources based on the risks or vulnerabilities that merit additional support. Congress should not use this money as a pork barrel. (396)
  26. Emergency response agencies nationwide should adopt the Incident Command System (ICS). When multiple agencies or multiple jurisdictions are involved, they should adopt a unified command. (397)
  27. Congress should support pending legislation which provides for the expedited and increased assignment of radio spectrum for public safety purposes. (397)
  28. We endorse the American National Standards Institute’s recommended standard for private preparedness…. We also encourage the insurance and credit-rating industries to look closely at a company’s compliance with the ANSI standard in assessing its insurability and creditworthiness. We believe that compliance with the standard should define the standard of care owed by a company to its employees and the public for legal purposes. (398)
  29. We recommend the establishment of a National Counterterrorism Center (NCTC), built on the foundation of the existing Terrorist Threat Integration Center (TTIC). Breaking the older mold of national government organization, this NCTC should be a center for joint operational planning and joint intelligence, staffed by personnel from the various agencies. (403)
  30. The current position of Director of Central Intelligence should be replaced by a National Intelligence Director with two main areas of responsibility: (1) to oversee national intelligence centers on specific subjects of interest across the U.S. government and (2) to manage the national intelligence program and oversee the agencies that contribute to it. (411)
  31. The CIA Director should emphasize (a) rebuilding the CIA’s analytic capabilities; (b) transforming the clandestine service by building its human intelligence capabilities; (c) developing a stronger language program, with high standards and sufficient financial incentives; (d) renewing emphasis on recruiting diversity among operations officers so they can blend more easily in foreign cities;(e) ensuring a seamless relationship between human source collection and signals collection at the operational level; and (f) stressing a better balance between unilateral and liaison operations. (415)
  32. Lead responsibility for directing and executing paramilitary operations, whether clandestine or covert, should shift to the Defense Department. There it should be consolidated with the capabilities for training, direction, and execution of such operations already being developed in the Special Operations Command. (415)
  33. Overall amounts of money being appropriated for national intelligence and to its component agencies should no longer be kept secret. Congress should pass a separate appropriations act for intelligence, defending the broad allocation of how these tens of billions of dollars have been assigned among the varieties of intelligence work. (416)
  34. Information procedures should provide incentives for sharing, to restore a better balance between security and shared knowledge. (417)
  35. The president should lead the government-wide effort to bring the major national security institutions into the information revolution. (418)
  36. Congress should address [the dysfunction system of intelligence oversight].We have considered various alternatives: A joint committee on the old model of the Joint Committee on Atomic Energy is one. A single committee in each house of Congress. (420)
  37. Congress should create a single, principal point of oversight and review for homeland security. Congressional leaders are best able to judge what committee should have jurisdiction over this department and its duties. But we believe that Congress does have the obligation to choose one in the House and one in the Senate, and that this committee should be a permanent standing committee with a nonpartisan staff. (421)
  38. We should minimize as much as possible the disruption of national security policymaking during the change of administrations by accelerating the process for national security appointments. (422)
  39. A specialized and integrated national security workforce should be established at the FBI consisting of agents, analysts, linguists, and surveillance specialists who are recruited, trained, rewarded, and retained to ensure the development of an institutional culture imbued with a deep expertise in intelligence and national security. (425-6)
  40. The Department of Defense and its oversight committees should regularly assess the adequacy of Northern Command’s strategies and planning to defend the United States against military threats to the homeland. (428)
  41. The Department of Homeland Security and its oversight committees should regularly assess the types of threats the country faces to determine (a) the adequacy of the government’s plans—and the progress against those plans—to protect America’s critical infrastructure and (b) the readiness of the government to respond to the threats that the United States might face. (428)

TOP-SECRET-Conspiracy of Silence? Colombia, the United States and the Massacre at El Salado

A Colombian girl in El Salado displays a copy of the Memoria Histórica report: La Masacre de El Salado: Esa Guerra No Era Nuestra (The El Salado Massacre: That Was Not Our War). [Photo: Michael Evans]

Conspiracy of Silence?

Colombia, the United States and the Massacre at El Salado

Declassified Documents Highlight U.S. Concerns Over Role of Colombian Security Forces in February 2000 Paramilitary Killings

National Security Archive Electronic Briefing Book No. 287

Washington, D.C., September 24, 2009 – The United States harbored serious concerns about the potential involvement of Colombian security forces in the February 2000 massacre at El Salado, an attack that occurred while the two countries were hammering out the final details of the massive military aid package known as Plan Colombia, according to declassified documents posted today on the National Security Archive Web site.

Orchestrated and carried out by paramilitaries from the United Self-Defense Forces of Colombia (AUC), an illegal paramilitary army, there have long been allegations that Colombian security forces, including those from the Colombian Navy’s 1st Marine Infantry Brigade, facilitated the massacre by vacating the town before the carnage began and constructing roadblocks to delay the arrival of humanitarian aid. U.S. assistance under Plan Colombia required the Colombian military to demonstrate progress in breaking ties with paramilitary forces.

Images of victims on display during the presentation of the Memoria Histórica report. Victims for whom a photo was not available were represented by blank faces.
[Michael Evans]

The documents described in the article below—and in Spanish on the Web site of Semana (Colombia’s leading news magazine)—show that U.S. officials had significant doubts about the credibility of their Colombian military counterparts and were well aware, even before El Salado, of the propensity of the Colombian military to act in concert with illegal paramilitary forces, whether through omission or commission.

These findings also complement those of Memoria Histórica, an independent group charged by Colombia’s National Commission on Reparations and Reconciliation with investigating the history of the country’s armed conflict. Its report on El Salado, La Masacre de El Salado: Esa Guerra No Era Nuestra (The El Salado Massacre: That Was Not Our War), was released this week before audiences in El Salado and Bogotá.

Highlights from the documents include:

  • The U.S. Embassy’s record of a January 1999 meeting in which Colombia’s deputy army commander said that the Army “had no business pursuing paramilitaries” as they were “apolitical common criminals” that “did not threaten constitutional order through subversive activities.”
  • Another 1999 report from U.S. military sources found that the Colombian armed forces had “not actively persecuted paramilitary group members because they see them as allies in the fight against the guerrillas, their common enemy.”
  • A U.S. military source who opined that evidence indicating some of the paramilitary members were wearing Colombian Army uniforms suggested “that many of the paramilitaries are ex-military members, or that they obtain the uniforms from military or ex-military members.”
  • State Department talking points that pointed to the capture of a mere 11 of the 450 perpetrators of the massacre as evidence that the military had actively pursued the perpetrators and was improving its record against paramilitaries.
  • A U.S. Embassy cable based on a conversation with a source apparently close to the investigation who strongly suggested that the Colombian military knew about the massacre ahead of time, cleared out of the town before the killing began and “had been lucky in capturing the eleven paramilitary members.”
  • A document casting doubt on the military’s explanation of its role in El Salado, including the U.S. Embassy’s view that it was “difficult to believe that the town of El Salado had not been subject to threats of an attack prior to the massacre, considering the town is situated in a high conflict area.”
  • A U.S. Embassy report on Admiral Rodrigo Quiñones, one of the military members alleged to have facilitated the massacre, noting that “an unmistakable pattern of similar allegations has followed him almost everywhere he has held field command.”

Conspiracy of Silence?
Colombia, the United States and the Massacre at El Salado
By Michael Evans

The question of the exact role played by Colombian security forces in the February 2000 El Salado massacre occupies a small but crucial part of the new report issued this week by Memoria Histórica (Historical Memory), the independent group charged by Colombia’s National Commission on Reparation and Reconciliation with writing the history of Colombia’s internal conflict. A long overdue account of one of the most horrific and indiscriminate paramilitary atrocities in Colombian history, the report is also a stinging indictment of the culture of impunity that has long shielded members of the Colombian security forces from justice.

Hundreds waited in line to receive a copy of the Memoria Histórica report on El Salado.
[Michael Evans]

The killings unfolded over five fateful days during which time hundreds of paramilitaries, mostly from the Bloque Norte (Northern Bloc), descended upon El Salado and other towns in the region, leaving behind a trail of torture, mayhem and murder that left 60 people dead and forced thousands from their homes, most of whom have never returned.

But while the paramilitary authors of the El Salado massacre were identified long ago, the exact role of the Colombian military has never been definitively established. Nevertheless, and despite very limited access to military records on the case, the report is adamant about the responsibility of the Colombian state.

The El Salado massacre raises not only the question of omission but also the action of the [Colombian] State. Omission in the development of the acts because it is not understandable how the security forces were neither able to prevent nor neutralize the paramilitary action. A massacre that lasted five days and that involved 450 paramilitaries, of which only 15 were captured a week after the massacre ended.*

For the United States, the potential involvement of the Colombian security forces in paramilitary crimes was the crux of the matter. The killings came as the development of Plan Colombia was in its final stages—a package that called for massive increases in aid for the Colombian military, but would also require the Colombian government to show that the military was severing longstanding ties with paramilitary forces.

Declassified records from the era show just how low the bar had been set for the Colombian military. In the view of the U.S. Embassy, the fact that Colombian security forces had captured a mere 11 of the 450 paramilitaries involved in what it characterized “an indiscriminate orgy of drunken violence” was actually reassuring. In its first report on El Salado, sent to Washington just days after the killings, the Embassy, under Ambassador Curtis Kamman, said it was “the first time Post can recall that the military, in this case the Marines, pursued paramilitaries in the wake of atrocities in the region with some vigor.” El Salado, it seemed, was a military success story, and the Embassy had little else to say about El Salado for nearly five months.

The United States should not have been too surprised by the allegations that security forces were involved at El Salado. During the previous year, U.S. officials had frequently expressed doubts about the willingness of the military to combat paramilitary forces.

  • During a January 1999 meeting with NGO representatives organized by the Colombian armed forces and attended by U.S. Embassy staff, Deputy Army Commander General Nestor Ramirez said that the Army “had no business pursuing paramilitaries” as they were “apolitical common criminals” that “did not threaten constitutional order through subversive activities.”
  • Another 1999 report from U.S. military sources found that the Colombian armed forces had “not actively persecuted paramilitary group members because they see them as allies in the fight against the guerrillas, their common enemy.”
  • The United States was also well aware of the “body count syndrome” that fueled human rights abuses in the Colombian security forces. Intelligence reports from throughout the 1990s described “death squad activity” among the armed forces. A Colombian Army colonel told the U.S. that the emphasis on body counts “tends to fuel human rights abuses by well-meaning soldiers trying to get their quota to impress superiors” and that it led to a “cavalier, or at least passive, approach when it comes to allowing the paramilitaries to serve as proxies … for the [Colombian Army] in contributing to the guerrilla body count.”
  • Evidence of military participation in the 1999 La Gabarra massacres left little doubt that there were military officers who viewed paramilitary forces as allies in the fight against guerrillas. Army Col. Victor Hugo Matamoros, with responsibility for the region around La Gabarra, told Embassy staff that he did not pursue paramilitaries in his area of operations. Separately, the Vice President’s office told the Embassy that Colombian Army troops had “donned AUC armbands” and participated in one of the massacres.

Eerily similar patterns emerged just a few weeks after El Salado. In March, U.S. military sources reported on the movements of Colombian security forces in the days around the killings. Buried beneath the details in one Intelligence Information Report is a short paragraph, based on an unidentified source, indicating that “many of the captured paramilitaries were wearing Colombian military uniforms.” This, the source said, suggested “that many of the paramilitaries are ex-military members, or that they obtain the uniforms from military or ex-military members.”

Even so, it was apparently not until July, when the New York Times published a detailed investigation of the alleged military complicity in the massacre, that the Embassy began to take the allegations seriously. Among other things, the Times article found that Colombian police and marine forces had vacated the town before the killings began, set up roadblocks to prevent humanitarian aid to reach the town, and otherwise did nothing to stop the paramilitary carnage. Still, State Department talking points drawn up to respond to press inquiries about the case again pointed to the capture of 11 of the paramilitaries as evidence that security forces had actively pursued the perpetrators.

Days after the New York Times story, the Embassy sent a cable to Washington summarizing what it knew about El Salado and the status of the investigation. Repeated requests by the National Security Archive have now produced two very different versions of this cable, telling two very different stories. A copy of the cable declassified in 2002 omits several paragraphs that were later declassified in a version released in December 2008. These portions of the document, based on a conversation with a source apparently close to the investigation, strongly suggest that the Colombian Army knew about the massacre ahead of time and cleared out of the town before the killing began.

 [Source] believes that the Army likely knew from intelligence reports that the paramilitaries were in the area, but left prior to the massacre. The paramilitaries then entered in trucks from Magdalena, went to Ovejas first and then onto El Salado…

The source also believed that the military “had been lucky in capturing the eleven paramilitary members,” adding that “the military was attacked at La Esmerelda ranch and then proceeded to detain eleven paramilitary members after successfully overtaking them.” The new information seemed to change the conversation. For the Embassy, the question now was not whether the military had been involved, but rather, to what “degree.”

U.S. Embassy suspicions about the military’s role in El Salado are also evident in an August 2000 cable on a briefing given the Embassy by Colonel Carlos Sánchez García of the Navy’s 1st Marine Infantry Brigade. Sánchez defended the actions of his unit, saying, among other things, that military resources were stretched thin and that they “did not receive any prior knowledge of an attack in or around the area of El Salado.”

A version of this cable declassified in 2001 lets Col. Sánchez’s explanation stand on its own, omitting any further analysis. However, a more complete version of this same document, declassified in 2008, includes portions of the document not previously released that question the credibility of Col. Sánchez.

Comment: Colonel Sanchez stated that his purpose was to present the Embassy with the Brigade’s version of events surrounding El Salado and dispute allegations made in the July 14 New York Times article. Because Colonel Sanchez was dispatched for this purpose, his report should be taken with a grain of salt.

The Embassy also doubted Sánchez’s assertion that his unit had no prior knowledge of the paramilitary incursion.

It is difficult to believe that the town of El Salado had not been subject to threats of an attack prior to the massacre, considering the town is situated in a high conflict area.

Ultimately, the question of military culpability in El Salado came to revolve around Sánchez’s commander, Admiral Rodrigo Quiñones Cárdenas, an officer dogged throughout his career by allegations of human rights abuses, assassinations, drug trafficking and complicity with paramilitaries.

In 1994, Quiñones was investigated for the murders of more than 50 unionists, journalists, politicians, human rights workers and other individuals in Barrancabermeja, then considered a guerrilla stronghold. His ultimate exoneration by a military tribunal did little to quell suspicions about his links to death squads and paramilitaries. Despite a reprimanded issued in October 1998 by the Colombian Attorney General’s office for the Barrancabermeja killings, Quiñones was promoted to the rank of rear admiral that same year.

Quiñones was certainly no stranger to the United States. As Director of Naval Intelligence in the early 1990s, he was in frequent contact with his U.S. counterparts, including a meeting with the U.S. Director of Naval Intelligence in 1993. A U.S. military biographic sketch of Quiñones from 1992 listed numerous details about his personal habits (“Enjoys reading,” “Teeth – Yes/Natural”) and noted that he participated in “unknown training” at the U.S. Marine Corps base at Quantico, Virginia.

With respect to El Salado, Quiñones has long maintained that he was in Bogotá during the killings, and thus not responsible for the actions of the brigade at that time. A strong alibi in place, Quiñones was also sanctioned for El Salado, leading Memoria Histórica to lament that certain lines of investigation were not followed. Why, the report asks, did the Procuraduría not look at the information available to the Brigade in the months before the attack?

If it is indeed certain that [Quiñones] was in Bogotá when the paramilitary incursion began, beginning on February 15, and in this sense the operational decisions on the ground were the responsibility of Colonel Sánchez García, it is also certain that as Commander of the First Brigade of the Marine Infantry, Rear Admiral Quiñones Cárdenas should have known of information that, according to the Inspector General of Colombia, the First Brigade received in the preceding months about the Self-Defense Forces and about the risk to the population living in the Montes de María. Information that, in accordance with the evaluation of the Inspector General, should have served to prevent the paramilitary incursion, and not only to counteract it when it was already happening.

Why too did the Procuraduría’s inquiry not scrutinize the actions of Quiñones after his return from Bogotá on February 18?

Then-Colonel Quiñones Cárdenas returned from Bogotá to his base on February 18, and for this reason it would have been reasonable to investigate not only his actions before and during the paramilitary incursion, but also his actions after the incursion.

In any case, Quiñones was promoted to the rank of rear admiral in the wake of El Salado, and it was not until 2001, after allegations that he was involved in yet another paramilitary attack, that the Embassy finally turned up the pressure on Quiñones. U.S. documents on the August 2001 Chengue massacre are few and highly excised, but the existing record leaves little doubt that by 2002 the Embassy had had enough of Quiñones and was ready to cut him loose. In April 2002, the Embassy requested the revocation of his visa, but not for his involvement in assassinations or paramilitary massacres. Rather, the State Department used the only evidence it was willing to bring to bear: “information indicating that he had received payments from narcotraffickers”—adding yet another serious crime to the increasingly long list of allegations against Quiñones.

The cancellation of his visa effectively ended the Quiñones’s career, a fact confirmed by Defense Minister Marta Lucia Ramirez during the announcement of his “voluntary” resignation. And while he has never truly faced justice for the killings in Barrancabermeja, or his supposed role in El Salado and Chengue, it seems clear that the sheer number of denunciations leveled against him throughout his career finally forced his removal. Reporting his resignation to Washington, the Embassy noted that although “establishing Quiñones’s guilt in any particular case is problematic, an unmistakable pattern of similar allegations has followed him almost everywhere he has held field command.”

The real debate about El Salado is not about its authors or its magnitude, but about the culture of impunity that has prevented an honest investigation of security force members tied to the killings. As important as the new report is to the preservation of historical memory, the story will remain incomplete as long as the military continues to deny the group meaningful access to its records on the case. So too has the U.S. been unwilling to declassify many of its key records on the El Salado case. Repeated requests for reports specifically cited in the documents described above have been stonewalled by the Pentagon and other agencies.

Without access to these records, we may never know exactly what the United States knew about military complicity in El Salado or whether the massacre had any impact at all on the development of the aid package then being prepared for Colombian security forces, nor will we know whether the U.S. government’s tepid response to the case was due to simple negligence, poor analysis, or an active effort to assist in the cover-up of the military’s role in El Salado.


Michael Evans is director of the Colombia Documentation Project at the National Security Archive in Washington, D.C. The Colombia Project would like to thank the Fund for Constitutional Government for its generous support of this investigation and the John Merck Fund for its continuing support of the Colombia Project.

* All translations by Michael Evans

TOP-SECRET-POSADA CARRILES BUILT BOMBS FOR, AND INFORMED ON, JORGE MAS CANOSA, CIA RECORDS REVEAL

A 1965 CIA cable summarizes intelligence on a demolition project proposed by Jorge Mas Canosa, head of a violent Cuban exile group. A source cited on page three had informed the CIA of a payment that Mas Canosa had made to Luis Posada to finance a sabotage operation against Soviet and Cuban ships in Mexico.

National Security Archive Electronic Briefing Book No. 288

Washington, D.C., September 11, 2011 – On the 33rd anniversary of the bombing of Cubana flight 455, the National Security Archive today posted recently obtained CIA records on Luis Posada Carriles, his ties to “the Company” and role as an informant on other violent exile groups. The documents provide extensive details on a collaboration between Cuban-American militant Jorge Mas Canosa, who rose to become the most powerful leader of the hardline exile community in Miami, and Posada—codenamed AMCLEVE 15—who volunteered to spy on violent exile operations for the CIA.

The documents include a July 1966 memo from Posada, using the name “Pete,” to his CIA handler Grover Lythcott requesting permission to join the coordinating junta for four violent exile groups, including RECE run by Mas Canosa. “I will give the Company all the intelligence that I can collect,” Posada wrote. “I will gain a more solid position between the exiles and, because of that, I will be in a better position in the future to perform a good job for the company.”

Posada, the documents show, had been reporting to the CIA on Mas Canosa’s activities since mid 1965. In July of that year, Posada reported that he had completed two ten-pound Limpet bombs for a Mas Canosa operation against Soviet and Cuban ships in the port of Veracruz, Mexico, using eight pounds of Pentolite explosives and a pencil detonator.

In a memo, Grover Lythcott described Posada as “not a typical ‘boom and bang’ type of individual” who was “acutely aware of the international implications of ill planned or over enthusiastic activities against Cuba.”  A CIA personnel record suggested that Posada would be “excellent for use in responsible civil position in PBRUMEN”—a codename for Cuba—”should the present government fall.”

Both CIA and FBI intelligence records identify Posada as a mastermind of the bombing of Cubana airline flight 455, also using a pencil detonator, that took the lives of all 73 passengers and crew on October 6, 1976. Posada has publicly admitted ties to a series of hotel bombings in Cuba in 1997; in November 2000 he was arrested in Panama City for plotting to blow up an auditorium where Fidel Castro would be speaking. He is currently living freely in Miami, awaiting trial in El Paso, Texas, early next year on charges of lying to immigration authorities about his role in the hotel bombings, and as to how he illegally entered the United States in the spring of 2005.

“The documents show Posada has a long history of trying to ingratiate himself with the CIA,” said Peter Kornbluh, who directs the Cuba documentation project at the National Security Archive, “perhaps attempting to buy himself a degree of protection as he engaged in a career of terrorism.” He called on the CIA “to release its entire operational file on Posada Carriles and his activities, to clarify the history of anti-Castro violence and advance the cause of justice for Posada’s many victims.”

The documents were obtained from the CIA pursuant to a FOIA request for records on Posada and his code-name, AMCLEVE 15. In recent years, the CIA has declassified the documents as part of the Kennedy Assassination Records Act.

 


Read the Documents

Document 1: CIA, July 21,1966, Memorandum, “AMCLEVE /15.”

This document includes two parts-a cover letter written by Grover T. Lythcott, Posada’s CIA handler, and an attached request written by Posada to accept a position on new coordinating Junta composed of several anti-Castro organizations. In the cover letter, Lythcbtt refers to Posada by his codename, AMCLEVE/I5, and discusses his previous involvement withthe Agency. He lionizes Posada, writing that his ”performance in all assigned tasks has been excellent,” and urges that he be permitted to work with the combined anti-Castro exile groups. According to the document, Lythcott suggests that Posada be taken off the CIA payroll to facilitate his joining the anti-Castro militant junta, which will be led by RECE. Lythcott insists that Posada will function as an effective moderating force considering he is “acutely aware of the international implications of ill planned or over enthusiastic activities against Cuba.” In an attached memo, Posada, using the name “Pete,” writes that if he is on the Junta, “they will never do anything to endanger the security of this Country (like blow up Russian ships)” and volunteers to “give the Company all the intelligence that I can collect.”

Document 2: CIA, August 29, 1966, “TYPIC/INTEL/AMCLEVE-15, Source Authentication for AMCLEVE-15.”

This document announces that Posada is officially “associated with the Cuban Representation in Exile (RECE) and the ‘Coordination of Forces’ which RECE is organizing.” Moreover, the document explains that Posada, codenamed AMCLEVE-15, “will be reporting on this alliance of activist organizations.”

Document 3: CIA, July 1, 1965, Cable, “Plan of the Cuban Representation in Exile (RECE) to Blow Up a Cuban or Soviet Vessel in Veracruz, Mexico.” (previously posted in May 2005)

This CIA cable summarizes intelligence on a demolition project proposed by Jorge Mas Canosa, then the head of RECE. On the third page, a source is quoted as having informed the CIA of a payment that Mas Canosa has made to Luis Posada in order to finance a sabotage operation against ships in Mexico. Posada reportedly has “100 pounds of C-4 explosives and some detonators” and limpet mines to use in the operation.

Document 4: CIA, July 24, 1965, Cable.

Based on reporting from Posada, referred to as AMCLEVE-15, the CIA learns details about the limpet-type bombs Posada is building for a demolition operation against ships in Mexico. “A-15 working directly with Jorge Mas Canosa,” the cable states. The CIA instructs Posada “to disengage from activities.”

Document 5: CIA, September 27, 1965, Memorandum, “AMCLEVEI15, 201300985.”

“PRQ Part II,” or the second part of Posada’s Personal Record Questionnaire, provides operational information. Within the text of the document, Posada is described as “strongly anti-Communist” as well as a sincere believer in democracy. The document describes Posada having a “good character,” not to mention the fact that he is “very reliable, and security conscious.” The CIA recommends that he be considered for a civil position in a post-Castro government in Cuba (codenamed PBRUMEN).

 

TOP-SECRET-Backgrounder: US Smart Power Counterterrorism

Background Briefing on Secretary Clinton’s Speech “A Smart Power Approach to Counterterrorism”

Special Briefing

Senior Administration Official

Conference Call

September 9, 2011

MR. TONER: Good morning, everyone, and thanks to all for joining us at such short notice. As you know, the Secretary is giving remarks this morning very shortly from now on smart power approach to counterterrorism. We thought it would be useful to have someone walk you through some of the highlights of that speech before she actually gives it. So without further ado, I d like to introduce [Senior Administration Official One], who will be known as Senior Administration Official Number One. And just a reminder, this is on background.

So without further ado, handing it over to [Senior Administration Official One].

SENIOR ADMINISTRATION OFFICIAL ONE: Good morning, everybody. Thank you for joining us. As you know, this speech was designed to be part of the commemoration of the 10-year anniversary since the September 11 attack. The Secretary thought it would be appropriate to stand back and talk about the Administration s approach to counterterrorism, but it obviously takes on new relevance given what we have heard about a heightened alert status.

Fundamentally, this speech, if you ve had a chance to look at it you should all have embargoed copies is designed to talk about using all the tools of American power, including our values and our strong democratic leadership around the world to fight counterterrorism and embedding the fight against terrorism in our larger approach to values-based global leadership.

So just walking you through it and you ll see that throughout this speech, she emphasizes that the fight against counter against terrorism has to be not just a fight about what we are against, but we have to fight for what we are for, namely our values of tolerance, equality, and opportunity for universal rights and the rule of law.

So, at the top of the speech, she makes clear that the military fight continues. We have unfinished business and we will do what we need to do to confront terrorists militarily where they live, but we will do so within international law standards and in keeping with our highest values. But we also have to work to cut the roots out from under terrorists, and that means attacking finances, attacking their ability to recruit, and attacking their ability to have safe havens.

So, in the section Taking the Fight to al-Qaida, she talks about the force piece here, but she also talks about the justice piece. Draw your attention to page five, where she makes clear that in doing we will we maintain the right to use force against groups such as al-Qaida that have attacked us and still threaten us with imminent violence, but in doing so we will stay true to our values and respect the rule of law, including international law principles. And then further down, she makes clear our intention to make full use of civilian courts and reformed military commissions, because this sends a message to the world about the importance of rule of law in confronting terrorism.

Further on, she talks about how the threat has changed. After the loss of [sic] the death of bin Ladin, the threat from the Afghan-Pakistan border remains, but the al-Qaida threat has become more diffuse.

On page six, you see that she talks about al-Qaida now as a syndicate of terror. It is not a monolith. It s becoming more geographically diverse and she specifically talks about al-Qaida in the Arabian Peninsula, with bases in Yemen trying to do attacks beyond its bases, and about al-Shabaab in Somalia, as two examples there.

Further on, she talks about how our larger goals, globally, of supporting democratic change, supporting prosperity, fighting poverty, fighting repression, supporting rule of law are also counterterrorism objectives. And in this regard, the work that we do to try to resolve conflicts, reduce poverty, improve governance also drain the swamp that terrorists try to live in and exploit.

Some specific areas of innovation noted on page seven, I would call your attention to new biometric screening tools to improve border security and visa processes electronic fingerprinting, facial recognition, iris scans. And then also in the category of making it harder for terrorists to operate, our work to combat terror finance, working with countries around the world to put new tough legislation in place, to disrupt illicit financial networks, but as a result of it becoming harder for terrorists to use official networks, having now to confront their alternative strategies where they fund their operation through criminal activity and kidnapping. So we also have to work with governments to ensure that we have a no-concessions policy, no paying ransom to kidnappers, et cetera.

In the category of trying to drain the swamp of new recruits, trying to slow recruitment, you see starting on page eight and nine she talks about a number of initiatives. First of all, trying to counter the extremist narrative, this speaks to the establishment at the State Department of the special representative to Muslim communities, to step up in our engagement in the most crucial spaces, putting our own people, speaking Arabic, Urdu, and Dari, on key television stations to counteract misinformation, and the development and launching now of a new center for strategic counterterrorism communications, which is focused on undermining terrorist propaganda, dissuading potential recruits. This is housed in the State Department, but it s a whole-of-government approach that includes Urdu and Arabic speakers who make up a special digital outreach team and are getting up online, contesting the narrative in terror on terrorist websites and forums, and getting in it and arguing their points with young people.

She also talks, starting on page nine, about what we ve learned about key recruiting hotspots, that terrorists have been more successful in hotspots where economic opportunity is in short supply, where education is biased in favor of an extremist narrative, and the importance of using a scalpel, not a sledgehammer, working with local leaders in particular places where recruiting has been most successful to try to empower a more progressive, democratic narrative and to provide alternative opportunities for young people, to deny recruiters the opportunity to turn kids extreme and there are some examples here working with the Kenyan Muslim Youth Association, working with the Sisters Against Violence, particularly focusing our efforts in Kenya, Somalia, Ethiopia, Pakistan, Yemen, and obviously Afghanistan.

And then the last piece here is the importance of strengthening the diplomatic offensive to build both to build partner capacity and to maintain a strong global community, a global coalition against terrorism. So here on page 10 and 11, talking about first elevating our own counterterrorism effort to the level of assistant secretary, then our efforts to expand our training programs to some 60 countries we ve now trained some 7,000 law enforcement and counterterrorism officials around the world strengthening capacity, building in frontline states Yemen and Pakistan.

Also, we discovered that in fact, there is no dedicated international venue to regularly convene counterterrorism policymakers and practitioners from around the world. So at the UNGA, working with Turkey, the United States will serve as a founding co-chair, along with 30 other nations, of a new global counterterrorism forum. This forum is designed to assist countries that are transitioning from authoritarian rule to democracy and rule of law. It s going to provide support, particularly in the civilian sector, best practices, writing of new legislation, training police, prosecutors, judges, but all within the context of upholding the strongest standards of universal human rights.

Finally, at the end of the speech, she talks about the essential element of defeating an extremist ideology with an ideology of hope, democracy, prosperity, universal values, tapping into the aspirations for change that we ve seen across North Africa and the broader Middle East, and rooted very much in American leadership, American confidence in our own values, in our own open democratic system which must not only be maintained, it has to be strengthened as a key element of serving as a beacon for others around the world and for defeating terror.

So with that, let me pause and take any questions.

MR. TONER: We can go ahead and take some questions now.

OPERATOR: Thank you. At this time, we re ready to begin the question-and-answer session. If you would like to ask a question, please press *1 and record your name and news organization clearly so I may introduce you into the call. Again, press *1 to ask a question. And one moment for our first question.

One moment, please. We do have a question from Kirit Radia with ABC News. You may ask your question.

SENIOR ADMINISTRATION OFFICIAL ONE: Hi, Kirit.

QUESTION: Hi, [Senior Administration Official One]. It s Kirit. Thanks for doing this. I do have a quick question about the terror plot that came out last night. I know it s not exactly about the speech, but there was some reporting that this was the result of a tip from a walk-in into a U.S. Embassy. I m curious if you could tell us anything about that, since we re on background.

SENIOR ADMINISTRATION OFFICIAL ONE: I cannot, Kirit. We are not prepared to talk at all about the intelligence surrounding this issue.

MR. TONER: Next question.

OPERATOR: At this time, I m showing no further questions. Again, if you d like to ask a question, please press *1. Again, press *1 to ask a question.

And one moment for our next question.

SENIOR ADMINISTRATION OFFICIAL ONE: Okay, good. Well, if we have no questions, we will look forward to the speech in about half an hour.

OPERATOR: We did have one question, if you d like to take it yet.

SENIOR ADMINISTRATION OFFICIAL ONE: Sure.

OPERATOR: And that s from Chris Hawley with Associated Press. You may ask your question.

QUESTION: Hi, there. Last week, we had a very large story kind of looking at terrorism arrests around the world, and we found that something like 35,000 people have been convicted of terrorism in the last 10 years and a lot of this stems from sort of U.S. pressure and aid toward other countries. But at the same time, a lot of groups are saying that many countries are using this as an excuse to crack down on political dissidents. Are there any protections or guidelines you guys are adopting as you go into this quote/unquote smart approach to protect political dissent?

SENIOR ADMINISTRATION OFFICIAL ONE: Thank you for that.

First and foremost, I think when you hear the speech, when you see the speech, you ll see that the Secretary makes clear that one of our strongest and most important U.S. weapons in the fight against terror is our own adherence to the highest standards of international law. So in the training programs that we are doing for other countries, in the best practices that we are trying to share, and in the example that we set and particularly, as I said, she cites the importance of being able to use both civilian courts and reformed military courts to try terrorists in a transparent manner which protects their rights we are trying to set an example for countries around the world in the way this has to be handled, and that this is about trying terrorists, this is not about using terrorism as an excuse to settle scores or handle other issues.

QUESTION: Got it. All right. Many thanks.

SENIOR ADMINISTRATION OFFICIAL ONE: Thank you.

OPERATOR: Thank you. At this time, I m showing no further questions.

SENIOR ADMINISTRATION OFFICIAL ONE: Thank you very much, everybody.

PRN: 2011/1450

Back to Top

The Office of Electronic Information, Bureau of Public Affairs, manages this site as a portal for information from the U.S. State Department.

External links to other Internet sites should not be construed as an endorsement of the views or privacy policies contained therein.

New! Sign up to receive invitations to events at the State Department, email updates about major policy announcements and initiatives, a bi-weekly newsletter, and/or to be notified when the State Department is participating in events in your city

Update your subscriptions, modify your password or e-mail address, or stop subscriptions at any time on your Subscriber Preferences Page. You will need to use your e-mail address to log in. If you have questions or problems with the subscription service, please contact support@govdelivery.com.

This service is provided to you at no charge by U.S. Department of State .

GovDelivery, Inc. sending on behalf of U.S. Department of State · 2210 C Street NW · Washington DC 20520 · 1-800-439-1420

9/11-How can we survive ? – Black Humor for War Time Debt Profligacy and Panic

Black Humor for War Time Debt Profligacy and Panic

Images by Cryptome.


We Meant Well: How I Helped Lose the Battle for the Hearts and Minds of the Iraqi People, Peter Van Buren, 2011. Peter Van Buren was a State Department officer in Iraq working with Provincial Reconstruction Teams (PRTs). He was based primarily at Forward Operating Base Hammer

Van Buren provides an informative, gorge-raising, black humorous, literal boots-on-the-ground, apology for “we have a war to fight, damn the cost, others will pay the bill” instigator of the current global panic about national debt ever bleaker humor. Rue with him being taken in by the natsec scam, laugh at each other and weep over your unpaid bills, service cutbacks, and tax duns for the cost of guiltless official malfeasance.

DoJ-celebrated task force prosecutions for terrorism, financial crime, health care fraud and child pornography are easy, small-time stuff compared to the great crimes in Iraq and Afghanistan forgiven by war-time exemptions, with very few cases for US official financial profligacy, negligence and wastage.

Excerpts:


Page 11:

My side of State was removed from the high-level Wikileaky things ambassadors did and changed very little between administrations.

[Van Buren was based primarily at FOB Hammer (as was Bradley Manning), a huge base 12 miles in circumference which was heavily compartmentalized to separate types of personnel: military, USG, OG (CIA), contractors, guards, servants.]

[Image]U.S. Army 210th Brigade Support Battalion, 2nd Brigade, 10th Mountain Division Soldiers compete in remote car derby in Forward Operating Base Hammer, Iraq, July 4, 2010. U.S. Soldiers celebrated Independence Day with a series of tournaments, a cookout, and an array of games.(U.S. Army photo by Spc. Frank Smith/Released)

Pages 46-49:

Money and Our Meth Habit

We lacked a lot of things in Iraq: flush toilets, fresh vegetables, the comfort of family members nearby, and of course adult supervision, strategic guidance, and common sense. Like Guns N’ Roses’ budget for meth after a new hit, the one thing we did not lack was money. There was money everywhere. A soldier recalled unloading pallets of new US hundred-dollar bills, millions of dollars flushing out of the belly of a C-130 cargo aircraft to be picked up off the runway by forklifts (operated by soldiers who would make less in their lifetimes than what was on their skids at that moment). You couldn’t walk around a corner without stumbling over bales of money; the place was lousy with it. In my twenty-three years working for the State Department, we never had enough money. We were always being told to “do more with less,” as if slogans were cash. Now there was literally more money than we could spend. It was weird.

We’d be watching the news from home about foreclosures, and I’d be reading e-mails from my sister about school cutbacks, while signing off on tens of thousands of dollars for stuff in Iraq. At one point we were tasked to give out microgrants, $5,000 in actual cash handed to an Iraqi to “open a business,” no strings attached. If he took the money and in front of us spent it on dope and pinball, it was no matter. We wondered among ourselves whether we shouldn’t be running a PRT in Detroit or New Orleans instead of Baghdad. In addition to the $63 billion Congress had handed us for Iraq’s reconstruction, we also had some $91 billion of captured Iraqi funds (that were mostly misplaced by the Coalition Provisional Authority), plus another $18 billion donated by countries such as Japan and South Korea. In 2009, we had another $387 million for aid to internal refugees that paid for many reconstruction-like projects. If that was not enough, over a billion additional US dollars were spent on operating costs for the Provincial Reconstruction Teams. By comparison, the reconstruction of Germany and Japan cost, in 2010 dollars, only $32 billion and $17 billion, respectively.

While a lot of the money was spent in big bites at high levels through the Embassy, or possibly just thrown into the river when no one could find a match to set it on fire, at the local level money was spent via two programs: CERP and QRF. CERP was Army money, the Commander’s Emergency Response Program. Though originally provided to address emergency humanitarian needs and short-term counterinsurgency costs, this nearly unlimited pool of cash came to be spent on reconstruction. The local US Army Commander could himself approve projects up to $200,000, with almost no technical or policy oversight. Accounting was fast and loose; a 2009 audit, for example, found the Army could not account for $8.7 billion in funds. It might have been stolen or just lost; no one will ever know. The Army shared its money with us at the ePRTs, partly out of generosity, partly out of pity, and partly because individual military units were graded on how much cash they spent — more money spent meant more reconstruction kudos in evaluation reports.


Pages 56-57:

Garbage

In our air-conditioned isolation, it took years to realize we needed to think about things like garbage and potable water. What had happened all around Iraq since the chaos of 2003 was a process of devolution, where populated areas lost their ability to sustain the facilities that had constituted civilization since the Romans — water, sewage, trash removal — things that made it possible for large numbers of people to live in close proximity to one another. Shock and awe had disrupted the networked infrastructure that allowed cities to function. What had been slow degradation through neglect under Saddam became irreversible decline by force under the United States.

The collapse of civil society left a void that the bad guys had rushed to fill. Stories circulated of neighborhood militiamen commandeering shuttered power plants and private generators for the public’s use, turning the militants into local heroes. In some poor areas, especially in the south, Iranian charities were a primary source of propane, food, and other services that people expected the government to provide, as Saddam had more or less done. It had finally dawned on us that providing reliable basic utilities was critical to a successful counterinsurgency. The Provincial Reconstruction Teams (PRTs) were put on the case after earlier efforts by megacontractors like Bechtel and then the Army Corps of Engineers had failed.

Almost daily my team and I would go out into the field. We’d strap on body armor and helmets and load into armored vehicles for the soldiers to drive us out of the FOB. We rode in either armored Humvees or large monster trucks called MRAPs, mine-resistant, ambush-protected carriers. These sat high off the ground and were covered with antennas and crazy electronics designed to thwart the battery-powered triggers that set off IEDs and mines along our route. The best thing about the MRAPs was that they were hermetically sealed against nonexistent chemical weapons and thus possessed near-nuclear-powered air-conditioning. You could crank that stuff and form frost. The MRAPs were so high off the ground that the turret often tore down the spaghetti web of pirated electric lines strung over most streets, lessening our popularity every time we drove in. Our parade of four or five vehicles, armed with nasty-looking machine guns and tough-looking soldiers, would nonetheless roll through small towns and slums to arrive at whatever dilapidated building served as the center of US-appointed local government. (By common consent no one was allowed to comment on the paradox of creating a democracy by appointing local leaders. It just wasn’t done.) As we drove, trash was a fact anywhere we looked, like the sun and the dust. The MRAPs specifically equipped to look for roadside bombs even had giant blowers welded to their front bumpers to whip garbage aside and expose the IEDs. For a poor country, everybody seemed to have a lot of things to throw away. Even though the trash was rarely collected, there were huge dumps filled with acres of it. You couldn’t help but be reminded that for all the counterinsurgency ideals about living among the people, we still lived near Iraq but not in it; on the FOB you couldn’t drop a Snickers wrapper without two people telling you to pick that shit up.

[Image]

Mine Resistant Ambush Protected vehicles secure a local village while members of Provincial Reconstruction Team Zabul conduct a key leader engagement with village elders in Arghandab, Afghanistan, July 30, 2011. PRT Zabul’s mission is to conduct civil-military operations in Zabul Province to extend the reach and legitimacy of the Government of Afghanistan. (U.S. Air Force photo/Senior Airman Grovert Fuentes-Contreras)(Released)

TOP-SECRET-State Department Cable says Colombian Army Responsible for Palace of Justice Deaths, Disappearances

Colombian security forces lead survivors of the Palace of Justice across the street to the Casa del Florero. [Photo: Revista Semana]

Document Introduced as Evidence in Trial of Col. Alfonso Plazas Vega

National Security Archive Electronic Briefing Book No. 289

Updated – September 2001
Secrets and Lies: The U.S. Embassy and Col. Plazas Vega

Col. Luis Alfonso Plazas Vega (ret.) [Photo: Revista Semana]

The recent appearance of a declassified U.S. Embassy report blaming the Colombian Army and Col. Luis Alfonso Plazas Vega for deaths and disappearances during operations to retake the Palace of Justice building in November 1985 has stirred up heated debate on both sides of the issue. As it happens, both sides have it wrong, at least in part. As the person who first uncovered the document, the result of a declassification request to the U.S. State Department, I submit the following points for the sake of clarification and in the hope that the real significance of the document is not lost in the confusion of the moment.

Initial reports on the matter dramatically mischaracterized the document and distorted its meaning. El Espectador, for example, attributed the information to supposed “intelligence agents at the service of the U.S. Embassy in Colombia” and reported that the document had been “brought to the attention of Colombian authorities in 1998”, details that the document simply does not support. Since El Espectador also failed to publish the document itself, many other Colombian news organizations simply followed its lead, repeating the same erroneous details.

Seizing the opportunity, defenders of Col. Plazas have sought to discredit the entire document, including what are by far the most important, verifiable and incriminating details. Pouncing on these inaccuracies in a letter to the editor, the colonel’s wife, Thania Vega de Plazas, said that the original report in El Espectador was “completely false” and went on to invent some facts of her own. Her assertion that the document is merely a summary of “the affirmations of some Colombian human rights NGOs” is 100 percent wrong and a gross mischaracterization of the document. (The colonel’s son, Miguel Plazas, made the same points, in the exact same words, in a letter to El Tiempo.)

She is correct that the document is not primarily about the Palace of Justice case or Col. Plazas. Rather, it is a report that mentions Col. Plazas in another context altogether: his participation in a January 1999 meeting between members of the Colombian Armed Forces and local human rights organizations—one of a series of gatherings meant to bridge the divide between the two groups. A U.S. Embassy representative (“Poloff” for Political Officer) also attended the meeting, hence this cable.

Declassified records are tricky things. It is not always easy to determine the provenance or meaning of a particular document, especially when parts have been redacted. Nevertheless, the meaning of the passage concerning Col. Plazas is unambiguous:

The presence among the “NGO representatives” of two military officers (one active duty, one retired), who killed time with lengthy, pro-military diatribes, also detracted from the military-NGO exchange. One of the two was retired Colonel Alfonso Plazas Vargas [sic], representing the “Office for Human Rights of Retired Military Officers.” Plazas commanded the November, 1985 raid on the Supreme Court building after it had been taken over by the M-19. That raid resulted in the deaths of more than 70 people, including eleven Supreme Court justices. Soldiers killed a number of M-19 members and suspected collaborators hors de combat, including the Palace’s cafeteria staff.

It is not entirely clear on the basis of what evidence the Embassy made these statements about the Palace of Justice case, or why the cable’s author chose to include them here. And it certainly is not possible to determine whether the information was ever brought to the attention of the Colombian authorities, as the report in El Espectador disingenuouslyclaimed. But to attribute these statements to Colombian human rights groups, and to deny that they represent the view of the U.S. Embassy, is simply wrong. Anyone with a working knowledge of the English language can clearly see the meaning of these words.

This brief description of Col. Plazas represents the clearest and most concise statement yet declassified about the Army’s responsibility for the deaths and disappearances in the Palace of Justice case. It is extremely unlikely that the Embassy would make such accusations, however tangential they may be to the central subject of the document, without carefully evaluating the available evidence.

While it is appropriate for the defenders of Col. Plazas to question the hyperbolic and in some cases fabricated information that has appeared in some of the reporting on this matter, such objections do not justify the fabrication of equally erroneous information and cannot refute what is plainly evident in the document: that the U.S. Embassy, in January 1999, under Ambassador Curtis Kamman, believed that the Colombian military, under the command of Col. Plazas, was responsible for the vast majority of the deaths and disappearances in the Palace of Justice case.

Any further questions about the meaning of the document or the information therein should be directed to the U.S. State Department. With the case against Col. Plazas moving through the Colombian courts, and with the Truth Commission on the Palace of Justice in its final months, now is the time for the U.S.  Government to do the right thing and declassify all human rights related information it has pertaining to the Palace of Justice tragedy.


Original Post – October 8, 2009

State Department Cable says Colombian Army Responsible for Palace of Justice Deaths, Disappearances

Document Introduced as Evidence in Trial of Col. Alfonso Plazas Vega

National Security Archive Electronic Briefing Book No. 289

Washington, D.C., October 8, 2009 – A declassified U.S. State Department document filed in a Colombian court yesterday blames the Colombian Army, and Col. Alfonso Plazas Vega in particular, for the deaths of over 70 people during military operations to retake the Palace of Justice building from insurgents who had seized the building in November 1985. The document, a January 1999 cable from the U.S. Embassy in Colombia, was obtained by the National Security Archive under the Freedom of Information Act.

The Palace of Justice burned to the ground during military efforts to retake the building from M-19 guerrillas. Eleven Supreme Court justices died in the blaze, along with dozens of others. [Photo: Revista Semana]

The cable states in paragraph four that Col. Plazas Vega (misspelled as “Plazas Vargas”) “commanded the November, 1985 Army raid on the Supreme Court building” and that the operation “resulted in the deaths of more than 70 people, including eleven Supreme Court justices.” The Embassy adds that soldiers under the command of Col. Plazas Vega “killed a number of M-19 members and suspected collaborators hors de combat, including the Palace’s cafeteria staff.”

Col. Plazas Vega is currently on trial for the disappearances of eleven civilians during the course of the operation, several of whom worked in the Palace cafeteria. The Palace of Justice tragedy began on November 6, 1985, after insurgents from the M-19 guerrilla group seized the building, taking a number of hostages. The building caught fire and burned to the ground during Colombian military and police force efforts to retake the Palace, killing most of the guerrillas and hostages still inside.

“The information included in this brief description of Col. Plazas Vega is the clearest, most concise statement we have seen in declassified records about the Army’s responsibility for the deaths and disappearances in the Palace of Justice case,” said Michael Evans, director of the Archive’s Colombia documentation project.

“The Palace of Justice tragedy is one of the most searing events in Colombian history,” Evans added, “and with both this case and the Truth Commission on the Palace of Justice in progress, now is the time for the U.S. government to come forward with all human rights related information it has pertaining to the Palace of Justice tragedy.”

Other documents published today provide new details on military operations to retake the building and on Colombia’s fruitless efforts to find a diplomatic post for Col. Plazas Vega in the mid-1990s.

  • In the midst of the crisis, the Embassy reported, “We understand that orders are to use all necessary force to retake building.” Another cable reported that, “FonMin [Foreign Minister] said that President, DefMin [Defense Minster], Chief of National Police, and he are all together, completely in accord and do not intend to let this matter drag out.”
  • A pair of contradictory Embassy cables: one reporting that “surviving guerrillas have all been taken prisoner,” followed by another, two days later, reporting that “None of the guerrillas survived.”
  • A February 1986 Embassy cable reporting that Colombian military influence on society and politics, “no doubt exercised at times of crisis such as the Palace of Justice takeover, is also sometimes overdrawn.”
  • A highly-redacted U.S. Embassy document from 1996 regarding an inquiry about “human rights and narcotics allegations” against Col. Plazas Vega. Discussing his rejection as Colombian Consul to Hamburg by the German government, the cable notes that “[the State] Department concurred that the [Colombian government] be informally asked to withdraw Plazas’ nomination…” The Embassy adds that, “None of the above allegations [against Plazas] were ever investigated by the authorities — a common problem during the 1980’s in Colombia.”

TOP-SECRET-Operation Sofia: Documenting Genocide in Guatemala

Army occupation of Río Azul model village, Nebaj, Quiché. Photograph courtesy of Jean-Marie Simon, Guatemala: Eternal Spring, Eternal Tyranny.

Operation Sofia: Documenting Genocide in Guatemala

National Security Archive Electronic Briefing Book No. 297

September 10, 2011, Washington, DC – The Guatemalan army, under the direction of military ruler Efraín Ríos Montt, carried out a deliberate counterinsurgency campaign in the summer of 1982 aimed at massacring thousands of indigenous peasants, according to a comprehensive set of internal records presented as evidence to the Spanish National Court and posted today by the National Security Archive on its Web site. The files on “Operation Sofia” detail official responsibility for what the 1999 UN-sponsored Historical Clarification Commission determined were “acts of genocide against groups of Mayan people.”

The National Security Archive’s Kate Doyle presented the documentation as evidence in the international genocide case, which is under investigation by Judge Santiago Pedraz in Madrid. Ms. Doyle testified today before Judge Pedraz on the authenticity of the documents, which were obtained from military intelligence sources in Guatemala. Earlier this year, Defense Minister Gen. Abraham Valenzuela González claimed that the military could not locate the documents or turn them over to a judge in Guatemala, as ordered by the Guatemalan Constitutional Court in 2008.

After months of analysis, which included evaluations of letterheads and signatures on the documents and comparisons to other available military records, Doyle said, “we have determined that these records were created by military officials during the regime of Efraín Ríos Montt to plan and implement a ‘scorched earth’ policy on Mayan communities in El Quiché. The documents record the military’s genocidal assault against indigenous populations in Guatemala.”

The Archive’s Guatemala project has a long track record of obtaining and authenticating internal records on Guatemalan repression. In 1999, Ms. Doyle obtained a “death squad diary”—a logbook of kidnappings, secret detentions, torture, disappearances and executions between 1983 and 1985 kept by the feared “Archivo,” a secret intelligence unit controlled by President Oscar Humberto Mejía Víctores. Although the military claimed the document was a fabrication, a team of experts led by Doyle was able to establish its authenticity. The logbook has been accepted as official, authentic evidence by the Inter-American Human Rights Commission.

The appearance of the original “Operation Sofía” documents provides the first public glimpse into secret military files on the counterinsurgency campaign that resulted in massacres of tens of thousands of unarmed Mayan civilians during the early 1980s, and displaced hundreds of thousands more as they fled the Army’s attacks on their communities. The records contain explicit references to the killing of unarmed men, women and children, the burning of homes, destruction of crops, slaughter of animals and indiscriminate aerial bombing of refugees trying to escape the violence.

Among the 359 pages of original planning documents, directives, telegrams, maps, and hand-written patrol reports is the initial order to launch the operation issued on July 8, 1982, by Army Chief of Staff Héctor Mario López Fuentes. The records make clear that “Operation Sofía” was executed as part of the military strategy of Guatemala’s de facto president, Gen. Efraín Ríos Montt, under the command and control of the country’s senior military officers, including then Vice Minister of Defense Gen. Mejía Víctores. Both men are defendants in the international genocide case in front of the Spanish Court.

In 1999, the UN-sponsored Historical Clarification Commission concluded that the Guatemalan Army had committed “massacres, human rights violations, and other atrocities” against Mayan communities that “illustrated a government policy of genocide.” Due to military stonewalling, which included refusing to turn over internal records, the Commission based its findings almost exclusively on testimony from witnesses and perpetrators, human rights reports, and data from exhumations. The Commission also drew on declassified U.S. government documents obtained through the Freedom of Information Act and provided by the National Security Archive.

The posting today includes an analysis by Kate Doyle of the Operation Sofia documents, as well as photographs from the Ixil region taken in 1982 by photojournalist and human rights advocate, Jean-Marie Simon.


Documents

Document 1
July 8 – August 20, 1982
Operación Sofía
Guatemalan Armed Forces

Complete reportLow resolution – (18 MB) | High resolution – (70 MB)

Report in sectionsPart 1 | Part 2 | Part 3 | Part 4

The Operation Sofía archive is a bound collection of 359 pages of documents sent to and from the Army General Staff (Estado Mayor General del Ejército – EMGE), the Commander of the Guatemalan Airborne Troops – who planned and ran the operation – the Commander of the special counterinsurgency Task Force “Gumarcaj,” the Commander of the Huehuetenango Military Zone, and the commanding officers of the Army battalions, companies and patrol units assigned to carry out the offensive.

Document 2Excerpt from an analysis of the Operation Sofía documents by Kate Doyle

Refugees being brought into town on trucks following army sweeps into mountainsides, Nebaj, Quiche. Photograph courtesy of Jean-Marie Simon, Guatemala: Eternal Spring, Eternal Tyranny.

Interrogation of woman and child, suspected subversives, at army garrison, Chajul, Quiché. Photograph courtesy of Jean-Marie Simon, Guatemala: Eternal Spring, Eternal Tyranny.

TOP-SECRET-FBI FILES ABOUT 9-11-NINE-ELEVEN

1097129INTERPOL Section 1 -19

Khalifa Part 1

Khalifa part 2

Khalifa Part 3 pages 1-249

Khalifa part 4

Khalifa part 5

TOP-SECRET-Archival Evidence of Mexico’s Human Rights Crimes: The Case of Aleida Gallangos

Roberto Antonio Gallangos Cruz, following his detention on July 26, 1968, in the midst of the student protests. The photograph was part of the Mexican intelligence files compiled by DFS agents, and made available in the AGN years later.

[Source: AGN, DFS files, 11-235, Legajo 30, Folio 17]

Archival Evidence of Mexico’s Human Rights Crimes: The Case of Aleida Gallangos National Security Archive Electronic Briefing Book No. 307

Washington, DC, September 9, 2011 – A Mexican human rights activist who was orphaned in infancy when her parents disappeared at the hands of government forces filed a petition before the Inter-American Human Rights Commission (IAHRC) yesterday, drawing on dozens of declassified U.S. and Mexican documents as evidence. Aleida Gallangos Vargas–whose case became widely known in 2004 when she tracked down her long-lost brother through intelligence records found in Mexico’s national archives–joined with her paternal grandmother to charge the State with responsibility for the secret detention and disappearance in 1975 of her parents, Roberto Antonio Gallangos Cruz and Carmen Vargas Pérez, among other family members. Today the National Security Archive is posting a selection of the documents being used in the case, obtained by the Archive through the Freedom of Information Act and from the Mexican government. Aleida was two years old when her parents were captured; she was rescued by a friend of her parents who himself was killed by security forces in 1976. Aleida was adopted by his family and renamed Luz Elba Gorostiola Herrera. Aleida’s brother Lucio Antonio, who was three when Roberto Antonio and Carmen disappeared, was taken by members of the government death squad that raided their home in June 1975; shortly afterwards he was delivered to an orphanage and in February 1976 was adopted by a couple and christened Juan Carlos Hernández Valadez. The two children grew up in separate lives knowing nothing of their true identities or of their relationship. The history of the Gallangos-Vargas family emerged in 2001 when a magazine published an interview with Roberto Antonio’s mother, Quirina Cruz Calvo, along with photographs of the disappeared couple and their two small children. Aleida’s adoptive family recognized Luz Elba’s face in the pictures and Aleida was reunited with her grandmother. She spent the next several years piecing together the circumstances of the Mexican government’s role in abducting and secretly detaining her parents. Using government records that had been located by the office of the Special Prosecutor assigned to investigate past political crimes, Aleida managed to track down her brother in the United States in 2004, 29 years after their separation. The records Aleida used to find Lucio Antonio–along with dozens more obtained by the National Security Archive through requests to the Mexican and U.S. governments–now serve as critical evidence in the case brought by Aleida on March 8 before the Inter-American Human Rights Commission. The Inter-American system has been an important venue for victims and activists seeking recourse from the Mexican government for state-sponsored human rights crimes committed during the 1960s-80s. On November 23, 2009, the Inter-American Human Rights Court issued a landmark decision, finding Mexico responsible for the illegal detention and disappearance of Rosendo Radilla, a schoolteacher and social activist stopped at a military checkpoint in Atoyac, Guerrero on August 25, 1974. Radilla–known for his songs of social protest and his admiration of Lucio Cabañas, the popular guerrilla leader from Guerrero–was disappeared at the height of the State’s extralegal counterinsurgency campaign against rebels and their supporters in southern Mexico in the early 1970s [see NSA briefing book on Lucio Cabañas, and the Dawn of the Dirty War]. The 2009 ruling marked the first Inter-American decision against Mexico for abuses committed during the “dirty war.” The court ordered the government to pay reparations to the family members for the years of suffering inflicted as a result of the crime. The Radilla decision established an important precedent for future legal action targeting Mexico’s unresolved human rights crimes of the past. To date, Mexico’s political and judicial systems have proven incapable of dealing with even the most notorious atrocities of the “dirty war,” such as the 1968 and 1971 student massacres and the hundreds of cases of illegal detentions, torture, and forced disappearances carried out around the country in the 1970s and early 1980s. In addition to the Army’s rural counterinsurgency violence, Mexico’s intelligence services carried out a carefully orchestrated program of kidnappings and disappearances in the country’s urban centers in an effort to dismantle guerrilla networks and eliminate social and political opposition. One of the victims of the government’s urban counterinsurgency was Roberto Antonio Gallangos Cruz, an activist involved in the 1968 student movement and later a militant in the radical 23rd of September Communist League. In the summer of ’68, Roberto Antonio joined the anti-war protests in Mexico City and marched for greater democratic openness from Mexico’s closed political system. He became one of the hundreds of protestors monitored by government spies gathering information on student activists. Internal Mexican intelligence records report that Roberto Antonio participated in rallies, reciting anti-war poems such as “los tres pueblos,” which he delivered during a demonstration on April 23, 1968 [see Doc 5; DFS report on Roberto Antonio]. Security forces detained Roberto Antonio on July 26 during government round-ups of student agitators that culminated in the October 2 Tlatelolco massacre. (Note 1) He was held in the infamous Lecumberri prison in Mexico City for over two months, where state intelligence agents kept close tabs on his visitors. While the charges against him were insufficient to keep him in prison, the Federal Security Directorate (Dirección Federal de Seguridad – DFS) continued to monitor his activities following his release. Over the next seven years, government security services assembled a thick intelligence file documenting Roberto Antonio’s association with Mexico’s guerrilla groups. The violent efforts of the ruling Institutional Revolutionary Party (Partido Revolucionario Institutional—PRI) to crush the peaceful 1968 student movement was a pivotal moment that dramatically radicalized the social and political opposition, increasing popular support for Mexico’s insurgent groups. The 23rd of September Communist League (Liga Comunista de 23 de Septiembre) was one of the urban guerrilla groups that grew in strength as a result, and in turn became a central target of the organized violence that characterized the government’s counterinsurgency efforts during the period. Following the kidnapping by leftists of U.S. Consul General Terrance Leonhardy in May 1973 and U.S. Vice-Consul John L. Patterson in March 1974, Mexican security forces were given even greater freedom to attack insurgent groups and their supporters. The DFS in particular became the driving force behind State terror, serving as Mexico’s internal political police force [see Doc 1: on the growth of the DFS]. U.S. agencies also expanded their coordination with their Mexican intelligence counterparts, increasing their information gathering on Mexico’s leftists groups. The DFS agents regularly shared intelligence with the FBI attachés in the U.S. Embassy and consulates in Mexico’s northern cities [see FBI memorandum: Doc 2 on the 23 of September group]. The long connection between the DFS and the CIA also provided a central source of information for Mexico’s internal security apparatus to confront the armed groups. (Note 2) It was during this period of urban counterinsurgency that the web of Mexico’s intelligence services grew, as information flowed to and from Mexico City to the Army and police installations throughout the country. The DFS institutionalized the State’s ability to gather information, detain suspects, torture and disappear with ultimate deniability. Seven years after the 1968 crackdown, Roberto Antonio Gallangos became a victim of the DFS campaign of disappearances. According to Mexican intelligence documents obtained by the National Security Archive, Roberto Antonio – by then living underground as a member of the 23rd of September Communist League – was spotted walking on a Mexico City street by a police sergeant. After a brief shootout, police captured Gallangos and turned him over to the DFS [Doc 4]. DFS agents interrogated and tortured him, extracting information about his family, social, and organizational affiliations. The declassified Mexican documents describe Roberto Antonio Gallangos as a radical criminal, with links to a network of subversive organizations and a background in bank robberies, kidnapping and murder. It is difficult to evaluate the veracity of the many allegations made in the documents against him, his family, friends and associates. Federal security agents often exaggerated the threat from leftist groups in order to justify aggressive counterinsurgency measures. (Note 3) Torture and forced confessions were commonly used against suspected subversives, and photos taken of Gallangos during detention seem to show signs of torture [Doc 6]. But while the DFS files reported on his alleged crimes, the information was never meant for use as legal evidence in a court of law. Rather, intelligence gathered through surveillance, abduction and torture was used to locate associates of suspected guerrillas, dismantle social networks, and terrorize their base of support. In the case of Gallangos, the DFS agents sought information about his wife and other militant friends and family members, but it is uncertain whether or not what Gallangos told his interrogators was true. Security forces did not capture his wife Carmen Vargas Pérez for more than a month after his kidnapping (detained July 26, 1975); his brother Avelino Francisco Gallangos Cruz was caught one month after that (August 22, 1975). Both remain among Mexico’s disappeared (Note 4). What is clear is that the government’s detention of Gallangos on June 19, 1975, had tragic and lasting repercussions for Roberto’s family, including the “disappearance” of his children until they discovered their identities years later. The case exemplifies how government terror functioned not only to combat the guerrillas, but also destroy the social fabric of groups who opposed the government’s authority. The secret DFS documents obtained by the Archive expose the inner workings of Mexico’s urban counterinsurgency campaign in the 1970s and reveal the involvement of the highest levels of government in political crimes of state. The abuses included illegal spying and infiltration of leftist groups, unwarranted police raids, secret detentions and transfers of prisoners, abduction, torture, and murder. The intelligence files were signed by then-Chief of the agency, Capitan Luis de la Barreda Moreno (head from 1970-75). Senior DFS agents such as Miguel Nazar Haro participated directly in the operations, interrogation and torture of prisoners. (Note 5) The information gathered flowed to the Interior Ministry (Secretaría de Gobernación), at the time led by Mario Moya Palencia. Number two in Gobernación was the career-spy chief Fernando Gutiérrez Barrios, who served in the DFS for over 20 years and directed the agency from 1964 until his long-time friend de la Barreda took over in 1970. Gutiérrez Barrios occupied Mexico’s most senior intelligence position as Deputy Minister of the Interior, regularly receiving DFS traffic on suspected subversives, and playing a central role in the extermination campaign against Mexico’s left. At the top of the chain of command was Luis Echeverría, Interior Minister from 1964-70, and head of state from 1970-76. Despite evidence demonstrating direct government involvement in the urban disappearances, a special prosecutor assigned in 2002 by President Vicente Fox to investigate past human rights crimes failed to bring Luis Echeverría or any of his senior military, police or intelligence commanders to justice. In 2003, the prosecutor, Dr. Ignacio Carillo Prieto, asked the United State Embassy in Mexico City for declassified cables on de la Barreda and Nazar Haro [Doc 13] and brought charges against the officials for the forced disappearance of Jesús Piedra Ibarra, another member of the 23rd of September group detained in April 1975. But the special prosecutor was unable to win convictions and the charges were dropped. The DFS officials who have gone to jail since the “dirty war” have done so for their involvement in drug trafficking rather than for human rights crimes. There is a deep connection between the former Mexican intelligence service and the country’s drug mafias. As DFS agents took command of counterinsurgency raids in the 1970s, they often stumbled upon narcotics safe houses and quickly took on the job of protecting Mexico’s drug cartels. The DFS was disbanded in 1985 following revelations that it was behind the murder of DEA agent Enrique “Kiki” Camarena, and Mexican journalist Manuel Buendia. (Note 6) Some 1,500 agents suddenly unemployed with the abolishment of the DFS found their training in covert activities and brutal counterinsurgency operations easily adaptable to the needs of the criminal underworld. Many joined the ranks of the powerful drug cartels or served the traffickers while working on local and federal police forces [see Doc 11 & Doc 12 on DFS agents and drugs]. By failing to prosecute a single case against the former agents, the Special Prosecutor missed a crucial opportunity to bring some of Mexico’s most corrupt officials to justice, allowing impunity to remain entrenched in Mexican society. The Special Prosecutor also failed to fully clarify the crimes of the past or locate any of Mexico’s disappeared. Carrillo Prieto claimed as his own success the discovery and identification of Lucio Antonio Gallangos Vargas, the missing son of Roberto Antonio Gallangos and Carmen Vargas. (Note 7) In fact it was due to the efforts Aleida Gallangos that her brother was located. Although she began her search as part of the “Citizen’s Committee” created by the Special Prosecutor’s office, she resigned from the committee in disgust with the prosecutor’s fruitless investigations. After traveling to Washington, where she says she was threatened by the Mexican consulate, she finally located her brother in the winter of 2004. The Special Prosecutor then organized an ad-hoc press conference in an attempt to take credit for locating Lucio Antonio. In a cable to Washington, U.S. Embassy officials discounted Carrillo Prieto’s claims and cited an independent evaluation of his work that called his office “unresponsive” to victims’ needs. [see Doc 14]. With yesterday’s filing of the case “Luz Elba Gorostiola Herrera and Quirina Cruz Calvo against the State of Mexico” before the Inter-American Human Rights Commission, Aleida and her biological and adoptive families have underscored the failure of the Mexican government to bring the perpetrators of past human rights atrocities to justice. Mexico’s inability to resolve these cases has left survivors of the dirty war and families of the disappeared without legal recourse at the national level. With the groundbreaking Radilla decision of 2009, the Inter-American system offers new hope for victims of Mexico’s dirty war to find a measure of justice at last. It is a critical juncture for Mexican citizens searching for truth about the country’s dark period of state-sponsored violence that remains an impediment to justice in Mexico today.


U.S. and Mexican Documents on the Dirty War Disappearances, Drugs, and the Failure of the Special Prosecutor Document 1 January 4, 1974 The Current Security Situation in Mexico: An Appraisal U.S. Embassy in Mexico, Secret Airgram 13 pages The U.S. Embassy in Mexico reports on a rising wave of crime beginning in mid-September 1973, creating a “climate of some anxiety” in Mexico. The report provides background on the rising tide of armed opposition to the Mexican government, tracing the growing rebellion to the government’s brutal “counteraction” against 1968 student demonstrations. It also provides a list of “politically-motivated acts of violence” that characterized the first three years of the Echeverría administration, including the 1971 student killings by government forces, and the kidnapping by leftists of U.S. Consul General Terrance G. Leonhardy. To U.S. officials, these incidents demonstrated the “deficiencies” of the army and police forces, and highlighted the importance of covert operations under the direction of the Federal Security Directorate (Dirección Federal de Seguridad – DFS). The Embassy believed that the DFS, “whose responsibilities also include protection of the president, intelligence collection and coordination, surveillance of some foreign embassies, etc.”, was the only body to have “emerged from this period with reason for pride in its accomplishments.” While Luis Echeverría had increased DFS staff and power, the Embassy predicts that sporadic acts of political violence will continue until “security agencies have improved their capabilities to the point where they can quickly apprehend the perpetrators in a high percentage of cases and infiltrate terrorist groups in order to dismantle them completely.” Source: Released to the National Security Archive under the Freedom of Information Act Document 2 March 11, 1974 Characterization of Mexican Revolutionary, Terrorist and Guerrilla Groups FBI, Legal Attaché in Mexico City, Secret Memorandum 12 pages The FBI attachés in Mexico produced regular reports on the urban guerrilla groups during this period, relating back to Washington the information they received from Mexican intelligence agents. This memorandum provides profiles of ten Mexican revolutionary and guerrilla groups, including the 23rd of September Communist League (LCS). It refers to the 23rd of September group as one of the most highly organized guerrilla organizations, and says that its many of its members have been involved in other revolutionary groups in Mexico. Source: Released to the National Security Archive under the Freedom of Information Act Document 3 December 6, 1974 Mexican Terrorist Captured in Abortive Attempt to Negotiate Safe Passage out of Mexico U.S. Embassy in Mexico, Unclassified Cable 1 page DFS agents not only coordinated counterinsurgency strategies during the 1970s, but participated directly in operations, including detentions, extralegal raids, and forced disappearances. This cable reports on the arrest of Miguel Angel Torres Enríquez, an alleged member of the 23rd of September Communist League, on December 5, 1974, after he had taken two French embassy consular officers hostage in an attempt to secure safe passage to France. Working undercover, then-DFS agent Miguel Nazar Haro participated directly in the operation, posing as a Mexican Foreign Secretary official and, after exchanging himself for the hostages, bringing Torres to the airport where he was arrested. According to the Special Prosecutor’s report released years later, the search for Torres Enríquez involved raids by DFS agents on his house and violent attacks against his family and friends. Source: Released to the National Security Archive under the Freedom of Information Act Document 4 June 19, 1975 “23 of September” Communist League; “Red Brigade” Dirección Federal de Seguridad (DFS) 1 page This document, signed by DFS Director Luis de la Barreda Moreno, gives the agency’s version of the events that led to the arrest of Roberto Antonio Gallangos Cruz, alias “Simón.” According to the report, at 3:00 pm, July 19, 1975, police sergeant Lázaro Juárez Almaguer noticed an individual with a pistol hidden in his waist, who, when asked to identify himself, removed the weapon and fired, hitting one policeman in the arm. More police quickly arrived on the scene and detained the subject. DFS agents took custody of Roberto Antonio and interrogated him, identifying him as part of a clandestine cell of the urban guerrilla group the 23rd of September Communist League. Source: Archivo General de la Nación (AGN), made available by the Special Prosecutor’s Office [Fiscalía Especial para Movimientos Sociales y Políticos del Pasado (FEMOSPP)] Document 5 June 19, 1975 Antecedents of Roberto Antonio Gallangos Cruz (a) “Simón” Dirección Federal de Seguridad (DFS) 7 pages This intelligence report reveals that prior to the 1975 arrest of Roberto Antonio Gallangos, government agents had him under surveillance for years. The type of information gathered since at least the late 1960s included personal details such as his birthplace, education, physical characteristics, organizational affiliation, and previous arrests. The report also contains extensive information about his political activities, beginning with his involvement in the 1968 student protests. At a demonstration on April 23, 1968, for example, RobertoAntonio recited the anti-war poem, Los Tres Pueblos, “referring to the horrors of war, and demands for peace.” The report describes his detention on July 26, 1968 in the midst of the student round-ups, and the government’s attempts to charge Roberto Antonio with crimes such as damage to public property, robbery, resisting arrest, and causing injury to state authorities. It also tracks his visitors during his time in prison. The surveillance continued after his release. According to DFS intelligence, Roberto Antonio went on to participate in political meetings with Mexico’s leftist organizations and became involved with a wide variety of insurgent groups. Source: Archivo General de la Nación (AGN), made available by the Special Prosecutor’s Office [Fiscalía Especial para Movimientos Sociales y Políticos del Pasado (FEMOSPP)] Document 6 Photo Undated, taken after June 19, 1975 detention Dirección Federal de Seguridad (DFS) 2 pages This photograph of Roberto Antonio Gallangos Cruz was taken following his detention on June 19, 1975. The photo shows Roberto Antonio with a mark over his right eye, and a wet shirt; signs of the torture used by the DFS agents during his interrogation. Source: Archivo General de la Nación (AGN), DFS Exp. 11-235, Legajo 30, Folio 123 Document 7 June 20, 1975 “23 of September” Communist League Dirección Federal de Seguridad (DFS) 1 page A report filed by DFS director Luis de la Barreda 24 hours after Gallangos Cruz’s capture contains the first results of the agency’s interrogation of their prisoner, when he reveals the address of a supposed guerrilla safe house. The police proceeded to conduct a raid on the house, finding communist propaganda from the Liga Comunista “23 de Septiembre” and other incriminating material. Source: Archivo General de la Nación (AGN), made available by the Special Prosecutor’s Office[Fiscalía Especial para Movimientos Sociales y Políticos del Pasado (FEMOSPP)] Document 8 July 1, 1975 “23 of September” Communist League Dirección Federal de Seguridad (DFS) 1 page Under interrogation, Gallangos Cruz identified his wife and brother as fellow members of the Liga Comunista “23 de Septiembre.” This DFS report gives biographical background for Carmen Vargas Perez (“Sofía”) and Avelino Francisco Gallangos Cruz (“Federico,”). Source: Archivo General de la Nación (AGN), made available by the Special Prosecutor’s Office [Fiscalía Especial para Movimientos Sociales y Políticos del Pasado (FEMOSPP)] Document 9 August 22, 1975 “23 of September” Communist League Dirección Federal de Seguridad (DFS) 3 pages Roberto Antonio’s brother, Avelino Francisco Gallangos Cruz, was arrested in Mexico City at 9:40 am by three police officers. He was reportedly carrying a gun that they determined belonged to a police agent who was assassinated on November 30, 1974. The document gives biographical details and intelligence information about “Federico,” compiled through interrogations of his family and friends. Source: Archivo General de la Nación (AGN), made available by the Special Prosecutor’s Office [Fiscalía Especial para Movimientos Sociales y Políticos del Pasado (FEMOSPP)] Document 10 August 23, 1975 Liga Comunista “23 de Septiembre” Dirección Federal de Seguridad (DFS) 2 pages This document summarizes the result of the interrogations of Avelino Francisco Gallangos Cruz “Federico” and another member of the Liga Comunista “23 de Septiembre.” It describes how the Gallangos Cruz brothers joined the organization and contains details about the League’s purported activities. Source: Archivo General de la Nación (AGN), made available by the Special Prosecutor’s Office [Fiscalía Especial para Movimientos Sociales y Políticos del Pasado (FEMOSPP)] Document 11 March 27, 1990 Senior Customs Representative Hermosillo – Intelligence Report U.S. Consulate in Hermosillo, Mexico, redacted cable 7 pages Five years after the DFS was disbanded due to abuses and pervasive corruption, a U.S. Customs agent stationed in the Hermosillo Consulate, issues this report conveying growing concern over connections between former DFS agents and drug traffickers. The heavily redacted cable reports on drug kingpins who had worked with the DFS, and states that “several members of the DFS became heavily involved in drug trafficking and then in the murder of United States Drug Enforcement Administration Special Agent Enrique Camarena-Salazar.” Source: Released to the National Security Archive under the Freedom of Information Act Document 12 March 12, 1991 Javier García Paniagua to Head National Lottery, is Replaced by Santiago Tapia as Mexico City’s Police Chief U.S. Embassy in Mexico, Confidential Cable On March 7, 1991, Javier García Paniagua, former Director of Mexico’s Directorate of Federal Security (DFS), resigned as Mexico City’s Police Chief to become Director General of the National Lottery. García Paniagua had been police chief since 1988, and his appointment caused controversy due to accusations that he approved and used torture during his years in the DFS.  In the cable, Embassy officials describe the DFS as “an agency with a reputation for corruption and ruthlessness.” The cable notes that Miguel Nazar Haro, García Paniagua’s police deputy and intelligence chief, was accused of carrying out political killings and human rights abuses when he headed the DFS in the 1980s. In 1989, he was forced to resign from the Mexico City police amidst allegations that he protected drug traffickers. Source: Released to the National Security Archive under the Freedom of Information Act Document 13 June 13, 2003 Mexican Supreme Court Hands Down Landmark Decision on Extradition of Ricardo Cavallo for Crimes Against Humanity U.S. Embassy in Mexico, Unclassified Cable 3 pages On September 12, 2000, the Mexican Supreme Court handed down a decision upholding the legal basis for the extradition of Argentine national Ricardo Miguel Cavallo to Spain. Cavallo was arrested by Mexican Interpol on August 24 and was extradited to Spain for crimes of genocide and terrorism committed between 1976 and 1983. In this cable the Embassy comments on the possibility of the decision affecting Mexican domestic human rights cases, such as the case against Miguel Nazar Haro and Luis de la Barreda, who were “both accused of torture and ‘disappearing’ leftists during the so-called ‘Dirty War’ in Mexico during the 60s, 70s, and 80s.” The cable reports that Special Prosecutor Ignacio Carrillo Prieto, assigned to investigate human rights cases of the past, asked the Embassy to provide copies of declassified cables with information on the two former intelligence chiefs and their involvement in human rights abuses. Source: Released to the National Security Archive under the Freedom of Information Act Document 14 January 13, 2005 Special Prosecutor Makes Headlines but Limited Progress in Unraveling Past Human Rights Crimes U.S. Embassy in Mexico, Confidential Cable 3 pages The U.S. Embassy reports that the Special Prosecutor’s Office is moving slowly to prosecute Mexico’s political crimes of the past. Although the office had achieved some incremental progress, it was slow to locate victims and bring the perpetrators to trial. The cable cites the case of Aleida Gallangos and her efforts to locate her brother Lucio, almost 30 years after they were separated from their parents at the hands of government forces. Aleida had strongly criticized the Special Prosecutor’s Office, which, according to the cable, offered her little support in her search for her brother, but nevertheless tried to take the credit in a “hastily-called press conference,” after Aleida found Lucio living in the United States in December 2004. Source: Released to the National Security Archive under the Freedom of Information Act


Notes

1. Chapter 6 of the Special Prosecutor’s Report lists Roberto Antonio among those detained on July 26, 1968.
2. For more information on the historical collaboration between the CIA station in Mexico and DFS intelligence agents, see NSA briefing book “LITEMPO: The CIA’s Eyes on Tlatelolco”.
3. See for example Sergio Aguayo, La charola: una historia de los servicios de intelligencia en México, México, D.F, Grijalbo; Hoja Editorial; Hechos Confiables, 2001, pp. 133-34 for a reference to the “fantasies and exaggerations” employed in DFS documents about student protesters in 1968.
4. Chapter 8 of the Special Prosecutor’s report lists Avelino Gallangos and Carmen Vargas among the 69 individuals disappeared in Mexico City during the dirty war.
5. Chapter 10 of the Special Prosecutor’s report describes the counterinsurgency operations carried out by DFS agents in the early 1970s, and reports that Nazar Haro participated directly in extralegal detentions and interrogations of suspected guerrillas.
6. DFS chief Zorrilla was charged and sentence in 1989 to thirty-five years for the 1984 murder of Manuel Buendia, a journalist who exposed DFS official links to narco-trade. Another DFS chief, Nazar Haro, was linked to the murder of U.S. DEA agent Enrique Camarena. For more information on the DFS and drugs, see Julia Preston and Samuel Dillon, Opening Mexico: The Making of a Democracy, New York, Straus and Giroux, 2004.
7. See chapter 10 of the Special Prosecutor’s report.
In front of Lecumberri, the “Black Palace” – formerly a detention center for political prisoners, now home to the historical National Archives (AGN) – activists hang pictures of Mexico’s disappeared [Undated Photo. Source: AGN files].
Luis Echeverría (president from 1970-76) visiting Mexican officers and soldiers in Guerrero during the height of the military’s “dirty war” counterinsurgency campaign against Lucio Cabañas and his Party of the Poor [Source: AGN files]
Roberto Antonio Gallangos Cruz, taken sometime in between 1968 and 1975. This picture was part of the DFS intelligence files, and was retrieved prior to his disappearance as part of the government’s surveillance efforts to monitor his activities after the 1968 protests [Source: AGN, DFS files]
Roberto Antonio Gallangos Cruz, with his hands tied behind his back, after being detained on June 19, 1975. [Source: AGN, DFS files, 11-235, Legajo 30, Folio 124]
Carmen Vargas Pérez, prior to her detention and disappearance by DFS agents. This picture was part of the DFS intelligence files, and was retrieved by intelligence agents as part of the government’s surveillance efforts [Source: AGN, DFS files, 11-235, Legajo 30, Folio 43]
Carmen Vargas Pérez, prior to her detention and disappearance by DFS agents [Source: family’s personal files]
Weapons and leftist propaganda reportedly obtained through counterinsurgency raids in Mexico’s urban centers
</div></td>
</tr>
<tr>
<td></td>
</tr>
<tr>
<td>

</td>
</tr>
<tr>
<td>
<div align=”justify”>Suspected guerrillas detained by Mexican authorities

Meridian Capital about GoMoPa STASI-FÄLSCHUNGEN DER “GoMoPa” Fingierter “Press Releaser”

Sehr geehrte Damen und Herren,

die Betrüger und durch uns inhaftierten Erpresser der GoMoPa versuchen mit einer gefälschten Presse-Mitteilung von sich abzulenken und einen investigativen Journalisten, Bernd Pulch, zu belasten.

Die Presse-Mitteilung auf pressreleaser.org ist eine Fälschung und die gesamte Webseite ist der GoMoPa zu zuordnen.

Hier noch einmal die tatäschlichen Geschehnisse:

Hier der Artikel von “GoMoPa” über Meridian Capital.


Der Beweis: Erpressungsversuch des „NACHRICHTENDIENSTES“ GoMoPa“ an Meridian Capital „GoMopa“ schreibt:08.09.2008
Weltweite Finanzierungen mit WidersprüchenDie Meridian Capital Enterprises Ltd. gibt an, weltweite Finanzierungen anbieten zu können und präsentiert sich hierbei auf aufwendig kreierten Webseiten. GOMOPA hat die dort gemachten Angaben analysiert und Widersprüche entdeckt.Der FirmensitzDer Firmensitz befindet sich laut eigener Aussage in Dubai, Vereinigte Arabische Emirate. In einem GOMOPA vorliegenden Schreiben der Meridian Capital Enterprises Ltd. heißt es jedoch, der Firmensitz sei in London. Auf der Homepage des Unternehmens taucht die Geschäftsadresse in der Londoner Old Broad Street nur als „Kundenabteilung für deutschsprachige Kunden“ auf. Eine weitere Adresse in der englischen Hauptstadt, diesmal in der Windsor Avenue, sei die „Abteilung der Zusammenarbeit mit Investoren“.Die Meridian Capital Enterprises ist tatsächlich als „Limited“ (Ltd.) mit Sitz in England und Wales eingetragen. Aber laut Firmenhomepage hat das Unternehmen seinen „rechtlichen Geschäftssitz“ in Dubai. Eine Abfrage beim Gewerbeamt Dubais (DED) zu dieser Firmierung bleibt ergebnislos.Bemerkenswert ist auch der vermeintliche Sitz in Israel. Auf der Webseite von Meridian Capital Enterprises heißt es: „Die Firma Meridian Capital Enterprises Ltd. ist im Register des israelischen Justizministeriums unter der Nummer 514108471, gemäß dem Gesellschaftsrecht von 1999, angemeldet.“ Hierzu Martin Kraeter, Gomopa-Partner und Prinzipal der KLP Group Emirates in Dubai: „Es würde keinem einzigen Emirati – geschweige denn einem Scheich auch nur im Traum einfallen, direkte Geschäfte mit Personen oder Firmen aus Israel zu tätigen. Und schon gar nicht würde er zustimmen, dass sein Konterfei auch noch mit vollem Namen auf der Webseite eines Israelischen Unternehmens prangt.“Auf der Internetseite sind diverse Fotos mit Scheichs an Konferenztischen zu sehen. Doch diese großen Tagungen und großen Kongresse der Meridian Capital Enterprises werden in den Pressearchiven der lokalen Presse Dubais mit keinem Wort erwähnt.
Martin Kraeter: „ Ein ‚britisch-arabisch-israelisches bankfremdes Finanzinstitut sein zu wollen, wie die Meridian Capital Enterprises Ltd. es darstellt, ist mehr als zweifelhaft. So etwas gibt es schlicht und ergreifend nicht! Der Nahostkonflikt schwelt schon seit mehr als 50 Jahren. Hier in den Vereinigten Arabischen Emiraten (VAE) werden Israelis erst gar nicht ins Land gelassen. Israelische Produkte sind gebannt. Es gibt nicht einmal direkte Telefonverbindungen. Die VAE haben fast 70% der Wiederaufbaukosten des Libanon geschultert, nachdem Israel dort einmarschiert ist.“

Zwei angebliche Großinvestitionen der Meridian Capital Enterprises in Dubai sind Investmentruinen bzw. erst gar nicht realisierte Projekte. Das Unternehmen wirbt mit ihrer finanziellen Beteiligung an dem Dubai Hydropolis Hotel und dem Dubai Snowdome.

Der Aktivitätsstatus der Meridian Capital Enterprises Ltd. ist laut englischen Handelsregister (UK Companies House) „dormant“ gemeldet. Auf der Grundlage des englischen Gesellschaftsrechts können sich eingetragene Unternehmen selbst „dormant“ (schlafend) melden, wenn sie keine oder nur unwesentliche buchhalterisch zu erfassende Transaktionen vorgenommen haben. Dies ist angesichts der angeblichen globalen Investitionstätigkeit der Meridian Capital Ltd. sehr erstaunlich.

Der Webauftritt

Die Internetseite der MCE ist sehr aufwendig gestaltet, die Investitionen angeblich in Millionen- und Milliardenhöhe. Bei näherer Betrachtung der Präsentationselemente fällt jedoch auf, dass es sich bei zahlreichen veröffentlichen Fotos, die Veranstaltungen der Meridian Capital Enterprises dokumentieren sollen, meist um Fotos von Online-Zeitungen oder frei zugänglichen Medienfotos einzelner Institutionen handelt wie z.B. der Börse Dubai.

Auf der Internetpräsenz befinden sich Videofilmchen, die eine frappierende Ähnlichkeit mit dem Werbematerial von NAKHEEL aufweisen, dem größten Bauträger der Vereinigten Arabischen Emirate. Doch den schillernden Videos über die berühmten drei Dubai Palmen „Jumeirah, Jebel Ali und Deira“ oder das Archipel „The World“ wurden offensichtlich selbstproduzierte Trailersequenzen der Meridian Capital Enterprises vorangestellt. Doch könnte es sich bei den Werbevideos um Fremdmaterial handeln.

Auch die auf der Webseite wahllos platzierten Fotos von bekannten Sehenswürdigkeiten Dubais fungieren als Augenfang für den interessierten Surfer mit eigenem Finanzierungswunsch. Bei einem Volumen von 10 Millionen Euro oder höher präsentiert sich die Meridian Capital Enterprises Ltd. als der passende Investitionspartner. Das Unternehmen verfügt weltweit über zahlreiche Standorte: Berlin, London, Barcelona, Warschau, Moskau, Dubai, Riad, Tel Aviv, Hong Kong und New York. Aber nahezu alle Standorte sind lediglich Virtual Offices eines global arbeitenden Büroservice-Anbieters. „Virtual Office“ heißt im Deutschen schlicht „Briefkastenfirma“. Unter solchen Büroadressen sollen laut Meridian Capital Enterprises ganze Kommissionen ansässig sein, alles zum Wohle des Kunden.“

Zitatende

Hier die Hintergründe der Erpressung:

http://www.immobilien-vertraulich.com/law/7154-opfer-nach-immovation-und-estavis-versucht-gomopa-nun-dkb-zu-erpressen-gomopa-hintermann-ra-resch.html

Hier unsere Original-Stellungnahme:

Anfang Oktober 2008 erhielt einer der Arbeiter der Meridian Capital Enterprises Ltd. eine Meldung von einem anonymen Sender, dass in naher Zukunft – zuerst im Internet, dann im Fernsehen, im Radio und in der deutschen Presse – Informationen erscheinen, die die Funktionsweise und Tätigkeiten der Meridian Capital Enterprises Ltd. in einem äußerst negativen Licht darstellen. Der Mitarbeiter der Meridian Capital Enterprises Ltd. wurde also informiert, dass diese Meldungen/Nachrichten zweifelsohne deutlich das Aussehen und den guten Ruf der Firma Meridian Capital Enterprises Ltd. beeinträchtigen.
Der an dieser Stelle erwähnte „Gesprächspartner” hat den Arbeiter der Meridian Capital Enterprises Ltd. informiert, dass die Möglichkeit besteht die peinliche Situation zu vermeiden, indem die Meridian Capital Enterprises Ltd. auf das von der Person gezeigte Konto die Summe von 100.000,00 EUR überweist. Wie sich aber später zeigte, war der Herr Klaus Maurischat – dieser anonyme Gesprächspartner – „Gehirn“ und „Lider des GOMOPA“. Die Ermittlungen wurden angestellt durch die Bundeskriminalpolizei (Verfolgungs- und Ermittlungsorgan auf der Bundesebene) während des Ermittlungsverfahrens wegen einer finanziellen Erpressung, Betrügereien auch wegen der Bedrohungen, welche von Herrn Maurischat und seine Mitarbeiter praktiziert wurden sowie wegen Teilnahme anderer (Leiter der Internetservices und Moderatoren der Blogs) an diesem Prozedere. Diese Straftaten wurden begangen zu Schaden vieler Berufs- und Justizpersonen, darunter auch der Meridian Capital Enterprises Ltd. Die Opfer dieses Verbrechens sind in Deutschland, Österreich, der Schweiz, Spanien, Portugal, Großbritannien, den USA und Kanada sichtbar.
In diesem Moment taucht folgende Frage auf: Wie war die Reaktion der Meridian Capital Enterprises Ltd. auf die Forderungen seitens GOMOPA? Entsprach die Reaktion den Erwartungen von GOMOPA? Hat die Meridian Capital Enterprises Ltd. die geforderte Summe 100.000,00 EUR überwiesen?
Seites der Meridian Capital Enterprises Ltd. gab es überhaupt keine Reaktion auf den Erpressungsversuch von GOMOPA. Ende August 2008 auf dem Service http://www.gompa.net sind zahlreiche Artikel/Meldungen erscheinen, welche die Tätigkeit der Meridian Capital Enterprises Ltd. in einem sehr negativen Licht dargestellt haben. Nachdem die auf http://www.gomopa.net enthaltenen Informationen ausführlich und vollständig analysiert worden waren, ergab es sich, dass sie der Wahrheit nicht einmal in einem Punkt entsprechen und potenzielle und bereits bestehende Kunden der Meridian Capital Enterprises Ltd. in Bezug auf die von diesem Finanzinstitut geführten Geschäftstätigkeit irreführen. Infolge der kriminellen Handlugen von GOMOPA und der mit ihm kooperierenden Services und Blogs im Netz hat die Meridian Capital Enterprises Ltd. beachtliche und messbare geschäftliche Verluste erlitten. Die Meridian Capital Enterprises Ltd. hat nämlich in erster Linie eine wichtige Gruppe von potenziellen Kund verloren. Was sich aber als wichtiger ergab, haben sich die bisherigen Kunden von der Meridian Capital Enterprises Ltd. kaum abgewandt. Diejenigen Kunden haben unsere Dienstleitungen weiterhin genutzt und nutzen die immer noch. In Hinblick auf die bisherige Zusammenarbeit mit der Meridian Capital Enterprises Ltd., werden ihrerseits dem entsprechend keine Einwände erhoben .
GOMOPA hat so einen Verlauf der Ereignisse genau prognostiziert, dessen Ziel beachtliche und messbare geschäftliche durch die Meridian Capital Enterprises Ltd. erlittene Verluste waren. Der Verlauf der Ereignisse hat das Service GOMOPA mit Sicherheit gefreut. GOMOPA hat nämlich darauf gerechnet, dass die Stellung der Meridian Capital Enterprises Ltd. nachlässt und das Finanzinstitut die geforderte Summe (100.000,00 EUR) bereitstellt. Im Laufe der Zeit, als das ganze Prozedere im Netz immer populärer war, versuchte GOMOPA noch vier mal zu der Meridian Capital Enterprises Ltd. Kontakte aufzunehmen, indem es jedes mal das Einstellen dieser kriminellen „Kompanie” versprochen hat, wobei es jedes mal seine finanziellen Forderungen heraufsetzte. Die letzte für das Einstellen der „Kompanie“ gegen die Meridian Capital Enterprises Ltd. vorgesehene Quote betrug sogar 5.000.000,00 EUR (in Worten: fünfmilionen EURO). Die Meridian Capital Enterprises Ltd. konnte sich aber vor den ständig erhöhenden Forderungen seitens des Services GOMOPA behaupten.
Im Oktober 2008 traf die Leitung der Meridian Capital Enterprises Ltd. Entscheidung über die Benachrichtigung der Internationalen Polizei INTERPOL sowie entsprechender Strafverfolgungsorgane der BRD (die Polizei und die Staatsanwaltschaft) über den bestehenden Sachverhalt. In der Zwischenzeit meldeten sich bei der Meridian Capital Enterprises Ltd. zahlreiche Firmen und Korporationen, sogar Berufsperson wie Ärzte, Richter, Priester, Schauspieler und anderen Personen aus unterschiedlichen Ländern der Welt, die der Erpressung von GOMOPA nachgegeben und die geforderten Geldsummen überwiesen haben. Diese Personen gaben bereits Erklärungen ab, dass sie dies getan haben, damit man sie bloß endlich „in Ruhe lässt” und um unnötige Probleme, Schwierigkeiten und einen kaum begründbaren Ausklang vermeiden zu können. Die Opfer dieses kriminellen Vorgehens haben die Meridian Capital Enterprises Ltd. über unterschiedliche Geldsummen, welche verlangt wurden, informiert.
In einem Fall gab es verhältnismäßig kleine (um ein paar tausend EURO), in einem anderen Fall handelte es schon um beachtliche Summen (rund um paar Millionen EURO).
Zusätzlich wendeten sich an die Meridian Capital Enterprises Ltd. Firmen, welche dem GOMOPA noch keine „Gebühr” überweisen haben und bereits überlegen, ob sie dies tun sollen, oder nicht. Diese Firmen erwarteten von der Meridian Capital Enterprises Ltd. eine klare Stellungnahme sowie eine professionelle praktische Beratung, wie man sich in solch einer Lage verhalten soll und wie man diese Geldforderungen umgehen kann. Die Meridian Capital Enterprises Ltd. hat ausnahmslos allen Verbrechensopfern, welche sich bei unserer Firma gemeldet haben, eine Zusammenarbeit vorgeschlagen. Als oberste Aufgabe stellt sich diese Kooperation, gemeinsam entschlossene und wirksame Maßnahmen gegen GOMOPA, gegen andere Services im Netz sowie gegen alle Bloggers zu treffen, die an dem hier beschriebenen internationalen kriminellen Vorgehen mit GOMOPA-Führung teilnehmen.Auf unsere Bitte benachrichtigten alle mitbeteiligten Firmen die Internationale Polizei INTERPOL sowie ihre heimischen Verfolgungsorgane, u. a. die zuständige Staatsanwaltschaft und die Polizeibehörden über den bestehenden Sachverhalt.
In Hinblick auf die Tatsache, dass das verbrecherische Handeln von GOMOPA sich über viele Staaten erstreckte und dass die Anzahl der in der Bundesrepublik Deutschland erstatteten Anzeigen wegen der durch GOMOPA, Internetservices und Bloggers begangenen Straftaten, rasant wuchs – was zweifelsohne von einer weit gehenden kriminellen Wirkungskraft des GOMOPA zeugt – schlug die Internationale Wirtschaftspolizei INTERPOL der Meridian Capital Enterprises Ltd. vor, dass sich ihr Vertreter in Berlin mit dem Vertreter von GOMOPA trifft, um die „Zahlungsmodalitäten“ und Überweisung der Summe von 5.000.000,00 EUR zu besprechen. Dieser Schritt meinte, eine gut durchdachte und durch die Bundeskriminalpolizei organisierte Falle durchzuführen, deren Ziel die Festnahme der unter GOMOPA wirkenden internationalen Straftäter war.
Die koordinierten Schritte und Maßnahmen der Meridian Capital Enterprises Ltd. und anderer Beschädigter, geleitet von der Internationalen Wirtschaftspolizei INTERPOL, dem Bundeskriminalamt und der Staatsanwaltschaft der Bundesrepublik Deutschland haben zur Aus-, Einarbeitung und Durchführung der oben beschriebenen Falle beigetragen. Im November 2008 führte die in Berlin vorbereitete Falle zur Festnahme und Verhaftung des Vertreters des GOMOPA, der nach der Festnahme auf Herrn Klaus Maurichat – als den Hauptverantwortlichen und Anführer der internationalen kriminellen Gruppe GOMOPA verwies. Der Festgenommene benannte und zeigte der Bundeskriminalpolizei zugleich den aktuellen Aufenthaltsort des Herrn Klaus Maurischat. „Gehirn“ und Gründer dieser internationalen kriminellen Gruppe GOMOPA, Herr Klaus Maurischat wurde am selben Tag auch festgenommen und auf Frist verhaftet, wird bald in Anklagezustand gestellt, wird die Verantwortung für eigene Straftaten und die des Forums GOMOPA vor einem zuständigen Bundesgericht tragen. Die Meridian Capital Enterprises Ltd. unternahm bereits alle möglichen Schritte, damit Herr Klaus Maurischat auch auf der Anklagebank des zuständigen Gerichts des Vereinigten Königsreiches Großbritannien erscheint. Unter den beschädigten Berufs- und Justizpersonen aus Großbritannien, neben der Meridian Capital Enterprises Ltd. gibt es noch viele Opfer von GOMOPA…

Die dreisten Verbrecher wagen es unter http://www.pressreleaser.org, einer eigenen “GoMoPa”-Seite unsere Pressemitteilung oben zu verfälschen und unschuldige Personen zu belasten.

Dear Readers,

after a thorough research we are sure that the real “GoMoPa” boss is Jochen Resch, lawyer in Berlin, Germany. He is the brain behind “GoMoPa” and responsable for blackmailing, extortion, racketeering, cybermurder and murder – in the tradition of the East German “Inteeligence” STASI that is why he called “GoMoPa” – Financial “Intelligence” Service .

Webmaster

Meridian Capital about GoMoPa

Meridian Capital Enterprises Ltd.. unveils new criminal phenomena in network. In recently appeared on the net more often at the same time a new a very worrying phenomenon of criminal nature. Professional criminals groups in the network are taking part, to extortion, fraud, Erschwindeln relating to certain specifically selected companies and businesses are capable of. These criminals developed new methods and means, simply and in a short time to bereichern.Strategien and manifestations, which underlie this process are fairly simple. A criminal is looking to “carefully” on the Internet specific companies and corporations (victims of crime) and informed them in the next step, that of the business activities of such companies and corporations in the near future – first on the Internet then in other available mass media – numerous and very unfavorable information appears. At the same time, the criminals beat their future victims an effective means of reducing unnecessary difficulties and problems to escape the loss of good name and image of the company and corporate sector. These offenders are aware of that reputation, name and appearance of each company is a value in itself. It was therefore a value of what each company is prepared to pay any price. But the reason for difficulties and problems arising from the loss of good name and reputation result. The criminals and their victims are already aware that this loss is devastating consequences might have been the closing down of a particular business can enforce. It takes both to No as well as at large companies regard. The company is concerned that in virtually every industry in each country and cross-border activities sind.Das criminal procedure in the form of a blackmail on money, a fraud is becoming rapidly and globally, ie led cross-border and internationally. Among the victims of extortion, fraud is now looking both at home (domestic) and international corporations, the major emphasis on conservation, keeping and maintaining their reputation in the business according to their credibility lay. The criminals in the network have understood that maintaining an unassailable reputation and name of a company the unique ability to provide fast and easy enrichment forms. The above-mentioned criminal procedure is difficult to track because it is international in nature, and by overlapping or even nonexistent (fictional) professional and judicial persons in various countries and operated company wird.Diese offenders in the network publish it and disseminate false information about your victims on remote servers, which are not uncommon in many exotic countries. There are those countries in which serious gaps in the legal system, investigative and prosecution procedures are visible. As an example, at this point mention India werden. Mit criminals working in the network grid portals known leader of blogs with your seat-consciously or unconsciously, even in highly developed countries. For example, at this point, countries such as Germany, Austria, Switzerland, the United States, Britain, Spain or Portugal are mentioned. The below listed criminals were able to act unpunished today. As a symptom of such action appears here the activity and “effectiveness” of the company GOMOPA, which is on countries such as Germany, Switzerland, Austria, the United States, Britain, Spain and India. A good example of such an action is Mr. Klaus Mauri Chat – the leader and “brain” of the company GOMOPA with many already in force and criminal judgments “on his account”, which in this way for years and funded its maintenance in the industry almost unlimited activity. This status will change dramatically, however, including far and wide thanks to discontinued operations of the firm Meridian Capital Enterprises Ltd.. who would oppose such offenses addressed in the network. Other companies and corporations, in which the crime network and outside of this medium have fallen victim to contribute to combating such crimes bei.Die situation is changing, thanks to effective steps and the successful cooperation of the firm Meridian Capital Enterprises Ltd.. with the international police Interpol, with the federal agency (FBI) in the U.S., the Federal Criminal Police in Germany, with Scotland Yard in Britain, as well as with the Russian secret service FSB.Die Meridian Capital Enterprises Ltd.. – Together with other companies and cooperations, the victim of criminal activities of the network of crime have fallen – has undeniably already started to yield results. The fact that in recent weeks (November 2008) on the territory of the Federal Republic of Germany of the above-mentioned leaders and “brain” of the company GOMOPA, Mr Klaus Maurishat was arrested should not be ignored. The Meridian Capital Enterprises Ltd.. information available results clearly show that the next arrests of persons participating in this process in such countries as: Austria, Switzerland, Russia, Ukraine, Poland, Spain, Mexico, Portugal, Brazil, the USA, Canada, UK, Ireland , Australia, New Zealand and made in a.. The ultimate goal of Meridian Capital Enterprises Ltd.. and the other victims of crime in the network is to provide all participants in this criminal procedure before the competent court to lead. All professional and judicial persons, regardless of the seat and out of the business, which the above-described criminal action (fraud, extortion) to have fallen victim can of Meridian Capital Enterprises Ltd.. led company to join the goal set at all at this point the procedure described those associated in the public and the economic life out. II blacklist blackmail and with international fraudsters and their methods (opus operandi) in the following countries: 1 The Federal Republic Deutschland2. Dubai 3rd Russia 1st The Federal Republic of Germany GmbH GOMOPA, Goldman Morgenstern & Partners LLC., Goldman Morgenstern & Partners Consulting LLC, Wottle collection. In these firms are quite active following persons: – Klaus Mauri Chat ( “Father” and “brain” of the criminal organization responsible for countless final judgments have been achieved (arrested in Germany in November 2008) – Josef Rudolf Heckel ( “right hand “when Mr Klaus Mauri chat, denounced former banker who is excessive in many Bankschmuggeleien was involved.
The study of 900 pages named Toxdat by Ehrenfried Stelzer is the “Stasi Killer Bible”. It lists all kind of murder methods and concentrates on the most effective and untraceable.
“The toxdat study was ordered by Stasi Vice-President Gerhard Neiber, the second man in rank after boss Erich Mielke. The toxdat study was also the theoretical “story book” for the murder of the famous German watchdog and journalist Heinz Gerlach by former Stasi member under the guidance of “GoMoPa”,” an informer stated. “Ehrenfried stelzer” was nicknamed “Professor Murder” by his victims. Even close co-worker now compare him with the German SS”doctor” Mengele, “Dr. Death” from Auschwitz.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution.

For more Information the victims have launched a new site: http://www.victims-opfer.com

The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.
Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.
The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.
This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelzner, Berlin.
Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror Regime in Eastern Germany.
Furthermore the Stasi Top Agent Ehrenfried Stelzer disguised as Professor for Criminal studies during the Communist Regime at the Eastern Berlin Humboldt University.
Background:
The man behind the Berlin lawyer Jochen Resch and his activities is Ehrenfried Stelzer, former Stasi Top officer in Berlin and “Professor for Criminal Studies” at the Eastern Berlin Humboldt University during the Communist regime, the SJB-GoMoPa-victims say (www.sjb-fonds-opfer.com) is responsable for the killing of German watchdog and journalist Heinz Gerlach.
These informations stem from various sources who were close to the criminal organization of GoMoPa in the last years. The SJB-GoMoPa say that the well-known German watchdog and journalist Heinz Gerlach was killed by former Stasi members with dioxins. Polychlorinated dibenzodioxins (PCDDs), or simply dioxins, are a group of organic polyhalogenated compounds that are significant because they act as environmental pollutants. They are commonly referred to as dioxins for simplicity in scientific publications because every PCDD molecule contains a dioxin skeletal structure. Typically, the p-dioxin skeleton is at the core of a PCDD molecule, giving the molecule a dibenzo-p-dioxin ring system. Members of the PCDD family have been shown to bioaccumulate in humans and wildlife due to their lipophilic properties, and are known teratogens, mutagens, and confirmed (avered) human carcinogens. They are organic compounds.
Dioxins build up primarily in fatty tissues over time (bioaccumulate), so even small exposures may eventually reach dangerous levels. In 1994, the US EPA reported that dioxins are a probable carcinogen, but noted that non-cancer effects (reproduction and sexual development, immune system) may pose an even greater threat to human health. TCDD, the most toxic of the dibenzodioxins, is classified as a Group 1 carcinogen by the International Agency for Research on Cancer (IARC).
In 2004, a notable individual case of dioxin poisoning, Ukrainian politician Viktor Yushchenko was exposed to the second-largest measured dose of dioxins, according to the reports of the physicians responsible for diagnosing him. This is the first known case of a single high dose of TCDD dioxin poisoning, and was diagnosed only after a toxicologist recognized the symptoms of chloracne while viewing television news coverage of his condition.
German dioxin scandal: In January 2011 about 4700 German farms were banned from making deliveries after tests at the Harles und Jentzsch plant in the state of Schleswig-Holstein showed high levels of dioxin. Again this incident appears to involve PCBs and not PCDDs at all. Dioxin were found in animal feed and eggs in many farms. The person who is responsible for this, Siegfried Sievert is also a former Stasi Agent. At “GoMoPa” the notorious Eastern-Berlin press agency (see article below) one of the henchmen acted under the name of “Siegfried Siewert”.
Further evidence for the killing of Mr.Heinz Gerlach is provided by the SJB-GoMoPa-victims by analyzing the dubious role of former Stasi-Top-agent Ehrenfried Stelzer, also a former “Professor for Crime Studies” under the Communist regime in Eastern Germany and the dubious role of “detective” Medard Fuchsgruber. Both are closely tied to the dubious “GoMoPa” and Berlin lawyer Jochen Resch.
According to the SJB-GoMoPa-victims is Berlin lawyer Jochen Resch the mastermind of the criminal organization “GoMoPa2. The victims state that they have a source inside “GoMoPa” who helped them discover  the shocking truth. The so-called “Deep Throat from Berlin” has information that Resch had the idea to found the criminal organization “GoMoPa” and use non-existing Jewish lawyers  named Goldman, Morgenstern & Partner as camouflage. Their “office” in Madison Avenue, New York, is a mailbox. This is witnessed by a German Ex-Patriot, a lawyer, whose father, Heinz Gerlach, died under strange circumstances.
Resch seems to use “GoMoPa” as an instrument to blackmail parts of the German Property and Investment.

German authorities are under growing pressure to reopen investigations into at least a dozen suspicious deaths after the arrest of an alleged East German assassin cast new light on the communist regime. Stasi victims quoted a source saying “isolated units” had conducted operations that were “extremely well organised” and had “100 per cent logistical support” from the East German state.
A statement from prosecutors read: “The accused [Jurgen G] is suspected, as a member of a commando of the former DDR, of killing a number of people between 1976 and 1987 who from the point of view of the DDR regime had committed treason or were threatening to do so.”
Details of his Jurgen G’s arrest have been described in suitably florid terms, with the mass circulation tabloid Bild saying he was working at the Wolfsbruch marina near Rheinsberg in north-eastern Germany when a woman approached him. “Excuse me, is that your yellow Trabant in the car park? I just ran into it with my car,” she is said to have asked.
When he followed her to the car park, masked officers jumped out of vans and bushes and overpowered him in an operation worthy of the Stasi itself.
An eyewitness told Bild: “They blindfolded him and raced off in an unmarked car.”
Police across Germany are reported to be sifting through files to see who the victims may have been, and some intelligence officers are greeting the arrest of Jurgen G as a breakthrough.
Thomas Auerbach, who works for the Stasi file authority in Berlin and has written a book based on the death squad files, said: “These people were trained to make such murders look like accidents or suicides, even as ‘ordinary’ crimes such as robberies. They were real terror experts.”
The cases said to be linked to Jurgen G or his unit include many people involved with the commercial arm of the East German ruling socialist party, the SED (Socialist Unity Party).
Uwe Harms, the head of a Hamburg-based haulage firm which was part of a network of companies secretly owned by the SED, disappeared in March 1987 after conversations with various DDR functionaries. Six weeks later, his body was found in a plastic bag.
Weeks before his death he told friends that he felt he was being followed. After reunification, one of the other SED company heads said Mr Harms had been liquidated for refusing to allow his firm to be used to transport arms into East Germany.
Dieter Vogel, a businessman who had been jailed for life for spying for the CIA, was found suffocated in his cell in the East German prison Bautzen on March 9, 1982. The fact that he was due to be taken to the West in a spy swap arrangement just a few weeks later cast doubt on the suicide theory.
He had passed the names of several Stasi moles to the BND, West Germany’s heavily penetrated counter-intelligence service.
The Christian Democrat Union politician Uwe Barschel, 43, was found dead by magazine reporters in his bathtub in a hotel room in Geneva in October, 1987. He died of poisoning, but rumours that he was involved somehow in arms deals and the Stasi have clung to the case.
One of the more high-profile and enduring mysteries is that of Lutz Eigendorf, an East German footballer from the Stasi-backed Dynamo Berlin.
He fled to the West in 1979 amid great publicity. Four years later, he died after crashing his car into a tree on a straight stretch of road with blood alcohol levels way over the limit. Witnesses who had seen him earlier in the evening said he had not been drinking.
Most controversial though is the suggestion that the assassination squad was linked to the murder of a Swedish television reporter and her friend in 1984.
Cats Falk and her friend Lena Graens went missing on Nov 19, 1984. Their bodies were fished out of a Stockholm canal six months later.
Reports suggested a three-man assassination squad killed them, spiking their drinks with drugs, putting them into their car and pushing it into the Hammarby canal.
Shortly before her death, Cats Falk had reportedly uncovered a deal between an arms dealer and an East German firm.
Germany has recently undergone a wave of nostalgia for all things East German, dubbed Ostalgie, with colourful television shows featuring former DDR stars such as the ice skater Katerina Witt talking wistfully about socialist pop music.
A reassessment may be coming in the wake of the revelations.

Victims: The DDR-STASI MURDER GANG “GoMOPa” in murderoplot against Joerg Berger

The Stasi Murder Gang of „GoMoPa“ was involved in many trials to kill the popular East German soccer trainer Joerg Berger, Stasi victims tell in postings on their hompage http://www.sjb-fonds-opfer.com. Berger stated before his early death in his biography that they tried to pollute him with arsenic.
Arsenic and many of its compounds are especially potent poisons. Many water supplies close to mines are contaminated by these poisons. Arsenic disrupts ATP production through several mechanisms. At the level of the citric acid cycle, arsenic inhibits lipoic acid which is a cofactor for pyruvate dehydrogenase; and by competing with phosphate it uncouples oxidative phosphorylation, thus inhibiting energy-linked reduction of NAD+, mitochondrial respiration and ATP synthesis. Hydrogen peroxide production is also increased, which might form reactive oxygen species and oxidative stress. These metabolic interferences lead to death from multi-system organ failure, probably from necrotic cell death, not apoptosis. A post mortem reveals brick red coloured mucosa, owing to severe haemorrhage. Although arsenic causes toxicity, it can also play a protective role.[
Elemental arsenic and arsenic compounds are classified as “toxic” and “dangerous for the environment” in the European Union under directive 67/548/EEC. The International Agency for Research on Cancer (IARC) recognizes arsenic and arsenic compounds as group 1 carcinogens, and the EU lists arsenic trioxide, arsenic pentoxide and arsenate salts as category 1 carcinogens.
Arsenic is known to cause arsenicosis owing to its manifestation in drinking water, “the most common species being arsenate [HAsO42- ; As(V)] and arsenite [H3AsO3 ; As(III)]”. The ability of arsenic to undergo redox conversion between As(III) and As(V) makes its availability in the environment more abundant. According to Croal, Gralnick, Malasarn and Newman, “[the] understanding [of] what stimulates As(III) oxidation and/or limits As(V) reduction is relevant for bioremediation of contaminated sites (Croal). The study of chemolithoautotrophic As(III) oxidizers and the heterotrophic As(V) reducers can help the understanding of the oxidation and/or reduction of arsenic.
Treatment of chronic arsenic poisoning is easily accomplished. British anti-lewisite (dimercaprol) is prescribed in dosages of 5 mg/kg up to 300 mg each 4 hours for the first day. Then administer the same dosage each 6 hours for the second day. Then prescribe this dosage each 8 hours for eight additional days. However the Agency for Toxic Substances and Disease Registry (ATSDR) states that the long term effects of arsenic exposure cannot be predicted. Blood, urine, hair and nails may be tested for arsenic, however these tests cannot foresee possible health outcomes due to the exposure. Excretion occurs in the urine and long term exposure to arsenic has been linked to bladder and kidney cancer in addition to cancer of the liver, prostate, skin, lungs and nasal cavity.[
Occupational exposure and arsenic poisoning may occur in persons working in industries involving the use of inorganic arsenic and its compounds, such as wood preservation, glass production, nonferrous metal alloys and electronic semiconductor manufacturing. Inorganic arsenic is also found in coke oven emissions associated with the smelter industry.

THE DDR GESTAPO-STASI MURDER GANG responsable for the murder of Lutz Eigendorf

The talented Eigendorf played for East German side Dynamo Berlin.
He made his debut for the GDR in an August 1978 match against Bulgaria, immediately scoring his first two goals in a 2–2 draw. He went on to collect six caps, scoring three goals.[1] His final international was a February 1979 friendly match against Iraq.
On 20 March 1979, after a friendship match between Dynamo and West German club 1. FC Kaiserslautern in Gießen he fled to the west hoping to play for that team. But because of his defection he was banned from play for one year by UEFA and instead spent that time as a youth coach with the club.
This was not the first time an East German athlete had fled to the west, but it was a particularly embarrassing defection. Eigendorf’s club Dynamo was under the patronage of the Stasi, East Germany’s secretive state police, and subject to the personal attentions of the organisation’s head, Erich Mielke. He ensured that the club’s roster was made up of the country’s best players, as well as arranging for the manipulation of matches in Dynamo’s favour. After his defection Eigendorf openly criticised the DDR in the western media.
His wife Gabriele remained behind in Berlin with their daughter and was placed under constant police surveillance. Lawyers working for the Stasi quickly arranged a divorce and the former Frau Eigendorf re-married. Her new husband was eventually revealed as a Lothario – an agent of the state police whose role it was to spy on a suspect while romancing them.
In 1983 Eigendorf moved from Kaiserslautern to join Eintracht Braunschweig, all the while under the scrutiny of the Stasi who employed a number of West Germans as informants. On 5 March that year he was badly injured in a suspicious traffic accident and died within two days. An autopsy indicated a high blood alcohol level despite the testimony of people he had met with that evening indicating that Eigendorf had only a small amount of beer to drink.
After German re-unification and the subsequent opening of the files of the former East Germany’s state security service it was revealed that the traffic accident had been an assassination attempt orchestrated by the Stasi, confirming the longtime suspicions held by many. A summary report of the events surrounding Eigendorf’s death was made on German television on 22 March 2000 which detailed an investigation by Heribert Schwan in the documentary “Tod dem Verräter” (“Death to the Traitor”).
On 10 February 2010, a former East German spy revealed the Stasi ordered him to kill Eigendorf, which he claimed not to have done

MfS has been accused of a number of assassinations against political dissidents and other people both inside and outside the country. Examples include the East German football player Lutz Eigendorf and the Swedish journalist Cats Falck.
The terrorists who killed Alfred Herrhausen were professionals. They dressed as construction workers to lay a wire under the pavement of the road along Mr. Herrhausen’s usual route to work. They planted a sack of armor-piercing explosives on a parked bicycle by the roadside. An infrared beam shining across the road triggered the explosion just when the limousine, one of three cars in a convoy, sped by.
The operation, from the terrorists’ point of view, was flawless: Mr. Herrhausen, the chairman of one of Europe’s most powerful companies, Deutsche Bank, was killed in the explosion along that suburban Frankfurt road on Nov. 30, 1989.
But was everything what it seemed?
Within days, the Red Army Faction — a leftist terrorist group that had traumatized West Germany since 1970 with a series of high-profile crimes and brazen killings of bankers and industrialists — claimed responsibility for the assassination. An intense manhunt followed. In June 1990, police arrested 10 Red Army Faction members who had fled to East Germany to avoid arrest for other crimes. To the police’s surprise, they were willing to talk. Equally confounding to authorities: All had solid alibis. None was charged in the Herrhausen attack.
Now, almost two decades later, German police, prosecutors and other security officials have focused on a new suspect: the East German secret police, known as the Stasi. Long fodder for spy novelists like John le Carré, the shadowy Stasi controlled every aspect of East German life through imprisonment, intimidation and the use of informants — even placing a spy at one point in the office of West German Chancellor Willy Brandt.
According to documents reviewed by The Wall Street Journal, the murders of Mr. Herrhausen and others attributed to the Red Army Faction bear striking resemblance to methods and tactics pioneered by a special unit of the Stasi. The unit reported to Stasi boss Erich Mielke and actively sought in the waning years of the communist regime to imitate the Red Army Faction to mask their own attacks against prominent people in Western Germany and destabilize the country.
“The investigation has intensified in recent months,” said Frank Wallenta, a spokesman for the Federal Prosecutor. “And we are investigating everything, including leads to the Stasi.”
If those leads turn out to be true, it would mean not only rewriting some of the most dramatic episodes of the Cold War, but would likely accelerate a broader soul-searching now under way in Germany about the communist past.
In building a reunified country, many Germans have ignored discussion of the brutal realities of its former communist half. When the former East Germany is discussed, it’s often with nostalgia or empathy for brothers hostage to Soviet influence.

Stasi boss Erich Mielke, middle, with unnamed associates
That taboo is slowly being broken. Last year’s Oscar-winning movie, “The Lives of Others,” chronicled in dark detail a Stasi agent’s efforts to subvert the lives of ordinary people. Material in the Stasi archives shows that senior leaders had a shoot-to-kill order against those fleeing from East to West — a controversial order that contradicts East German leaders’ claims that they never ordered any shootings.
This story is based on more than a dozen interviews with police, prosecutors and other security officials. Several policemen and prosecutors confirmed that the allegation of extensive Stasi involvement with the Red Army Faction is a key part of the current investigation.
Court cases in West Germany in the 1990s established that members of the Red Army Faction were granted free passage to other countries in the 1970s and refuge in East Germany in the 1980s. But the current investigation and documents from Stasi archives suggest far deeper involvement — that members of the Red Army Faction were not only harbored by the Stasi but methodically trained in sophisticated techniques of bombing and murder.
Traudl Herrhausen, Mr. Herrhausen’s widow, is one of those pushing for further investigation. She says she long suspected involvement by the Stasi or other intelligence service such as the KGB, but never spoke publicly because she didn’t have evidence and didn’t want to interfere in the investigation. She says she is now breaking an 18-year silence in her desire to see justice done. “Now I want to look my husband’s killers in the eye,” she said in an interview.
The Red Army Faction was founded about 1970 by a band of leftists who justified their terrorism based on opposition to West Germany’s ruling elite. Killing members of this elite would provoke the West German state to take repressive measures that would show its true fascist face, Red Army Faction leaders believed.
In its early years, the group, also known as the Baader-Meinhof band, made headlines with prison breaks, bank robberies, bomb attacks and deadly shootouts. Four gang members led by Ulrike Meinhof freed Red Army Faction leader Andreas Baader from a Berlin jail a month after his arrest.
Red Army Faction violence in West Germany intensified in 1977 when Jürgen Ponto, then head of Dresdner Bank, was shot and killed at his home. Five weeks later, the group killed four people and abducted the chairman of the German employer association, Hans-Martin Schleyer, one of West Germany’s most prominent businessmen. It was the start of a six-week ordeal in which neither government nor terrorists would compromise. To support the Red Army Faction cause, Palestinian terrorists hijacked a Lufthansa jet in Spain, forcing it to land in Mogadishu, Somalia. After the plane was rushed by West German commandos, top Red Army Faction leaders in West Germany committed suicide and Mr. Schleyer was executed by his captors.
Red Army Faction violence began to abate in the late 1970s after the Lufthansa incident. Many in Germany thought the group — whose attacks were often crude — lost its will to kill after the arrest of its senior leaders in 1982. So when the group appeared to renew its terror campaign with a series of high-profile attacks in 1985, police were stunned by the level of their sophistication and determination.
This time, the group dazzled police with its ability to hit targets and leave little substantial evidence behind. They used high-tech devices no one thought they possessed. Their marksmen killed with military precision.

Weapons used by terrorists during the 1977 kidnapping of German industrialist Hanns-Martin Schleyer.
Surprisingly, members of the Red Army Faction so-called third generation had a policeman’s understanding of forensic science. From 1985 onward, the Red Army Faction rarely left a fingerprint or other useful piece of evidence at a crime scene, according to court records. The murder cases from this era are still open. Some suspected Stasi involvement, but no one could ever prove it, according to a senior police official.
The 1989 car-bomb murder of Mr. Herrhausen particularly stunned police with its audacity and sophistication. Mr. Herrhausen was the head of Deutsche Bank, Germany’s largest bank. He was part of the political-business elite that helped turn West Germany from a war-ravaged rump state into an economic powerhouse — all while East Germany languished in frustration. Mr. Herrhausen was a vocal proponent of a united Germany.
In November 1989, Mr. Herrhausen was following the fall of the Berlin wall and events in the Soviet Union closely, conferring frequently with Mikhail Gorbachev, according to his wife and friends. Then on Nov. 27, Mr. Herrhausen announced a plan to acquire the investment banking firm Morgan Grenfell — at the time a record-breaking bank acquisition.
Also during November, a spot along Mr. Herrhausen’s usual route to work was closed because of construction. Terrorists, dressed as construction workers, laid an electric wire under the road’s pavement. On Nov. 29, the stretch reopened.
On the morning of Nov. 30, like every workday morning, Mr. Herrhausen stepped into his limousine at about 8:30. Mr. Herrhausen’s driver waited about one minute to allow the first of the three-car entourage to drive ahead and survey the road.
“It was the route they hadn’t used in weeks,” Mrs. Herrhausen said.
As Mr. Herrhausen sped down the road, a team of terrorists waited. Beside the road, a parked bicycle held a sack of armor-piercing explosives. The detonator was connected by the electric wire under the road to a trigger activated by an interruption in an infrared beam shining across the road.
A terrorist activated the detonator after the first car of bodyguards drove past the bomb. Mr. Herrhausen died at the scene.
As they had during previous attacks, police set up dragnets to round up Red Army Faction cadre. But the June 1990 arrests of 10 members of the group who had earlier been granted political asylum in East Germany produced no leads. All the seized Red Army Faction members had solid alibis.
In July 1991, prosecutors believed they had a breakthrough when an informant claimed he had allowed two members of the Red Army Faction to stay at his home near the Herrhausen residence. Prosecutors followed that trail 13 years before dropping charges in 2004.
Frustrated with the inability of prosecutors to solve the Herrhausen case and believing that prosecutors were ignoring other leads including possible Stasi involvement, German officials replaced the prosecutor overseeing the case.
Police acknowledge that part of the reason for their focus on possible Stasi involvement was that all other leads had dried up. But they say they also knew that over the years the Stasi had worked with and given explosives to other terrorists, including “Carlos the Jackal” and the Basque group ETA in Spain. And in 2001 to 2003, an undercover police officer met with a man who claimed he had been a killer for the Stasi operating in Western Germany, although police were never able to tie him to specific murders.
German investigators turned their attention to Wartin, a small eastern German village nestled in yellow-brown fields of grain near the Polish border. Today, sheep graze in a field spotted with wooden posts.
In the 1980s, however, Wartin was home to the Stasi’s AGM/S — “Minister Working Group/Special Operations.” It got its name because it reported to Mr. Mielke, the minister who headed the Stasi for almost all of East Germany’s 40-year history.
The Wartin unit’s peacetime duties included the kidnapping and murder of influential people in the West, according to Stasi records reviewed by The Wall Street Journal in the Stasi archives in Berlin.
The documents say the unit’s activities included “intimidating anti-communist opinion leaders” by “liquidation,” and “kidnapping or hostage taking, connected with the demand that political messages be read,” according to a description of the unit’s activities written by a senior Wartin official in 1982.
Based on these documents, German investigators increasingly believe that the Stasi played a more active role than previously believed in Red Army Faction terrorism. After years of not being able to draw parallels between the Stasi unit in Wartin and the Red Army Faction killings, police are now focusing closely on such a link. Joachim Lampe, who assisted the successful prosecution of the first wave of Red Army Faction terrorists up until 1982 and was then assigned to prosecute Stasi-related crimes in West Germany, says it’s time to compare the activities of Wartin with the activities of the Red Army Faction to see where they overlap. “It is an important line of investigation,” he said.
A year after the Red Army Faction’s first generation collapsed in 1972, an internal Wartin report said cooperation with terrorists is possible if the individuals could be trusted to maintain secrecy and obey orders. Initial contacts, however, may not have taken place until later in the decade. Disillusionment gripped many of the terrorists living on the lam, according to court records citing witness statements by accused terrorists. Beginning about 1980, the Stasi granted refuge to 10 members of the Red Army Faction in East Germany and gave them assumed identities.
The Stasi sympathized with the anti-capitalist ideals of the Red Army Faction, but Stasi leaders were concerned about placing their trust in a group of uncontrollable leftist militants, a review of Stasi records shows. Stasi officials did not want to tarnish East Germany’s international reputation, so they toyed with different concepts for cooperation with terrorist groups, according to a prosecutor who has investigated Stasi involvement with terrorism.
One suggestion, contained in a document prepared for new officers assigned to the unit, was to emulate Romanian intelligence, which successfully worked with the terrorist “Carlos” to bomb the Radio Free Europe office in Munich, Germany, in 1981. To assist in such operations, the Wartin unit developed highly specialized explosives, poisons and miniature firearms.
About 1980 the Stasi also proposed a second strategy: instead of using a terrorist group directly — such cooperation always contained risk of discovery — they could simply execute attacks so similar to those of known terrorists that police would never look for a second set of suspects, according to Wartin records. The Wartin leadership called this strategy the “perpetrator principle,” according to Stasi records. The unit’s progress in implementing the steps to imitate terrorist attacks is described in a series of progress reports by Wartin officials between 1980 and 1987.
In September 1981, Red Army Faction terrorists attempted to kill U.S. Gen. James Kroesen in Heidelberg, Germany, shooting a bazooka at his car. About the same time, members of the same Red Army Faction team visited East Germany, where they were asked by the Stasi to shoot a bazooka at a car containing a dog. The dog died, according to court records.
In Wartin, officials wrote up a detailed description of the Red Army Faction members’ re-enactment of the Kroesen attack. “It is important to collect all accessible information about the terrorist scene in imperialist countries, to study and analyze their equipment, methods and tactics, so we can do it ourselves,” a senior Wartin official wrote in February 1982, according to the report.
In 1982, West German police discovered two troves of Red Army Faction weapons and documents buried in German forests. Three terrorists, including Red Army Faction leader Christian Klar, were arrested when they approached the sites. The troves were buried in locations easy to find at night, a tactic used by Wartin’s own agents to store operational equipment in West Germany, according to an investigator who viewed the troves and Stasi records.
That same year, a Wartin official described the staged bombing of a moving vehicle. According to the report, several Stasi officers shed “tears of joy” when electronic sensors detected the approaching car and ignited the detonator.
A spokesman at Germany’s federal police investigative agency, the equivalent of the U.S. Federal Bureau of Investigation, declined to comment on the close similarity between the detonator used in the demonstration and the device that killed Mr. Herrhausen, saying this is part of their investigation.
Wartin officers continued their preparations for imitating terrorist attacks in West Germany, according to a 1985 internal Wartin report. They created a special archive profiling the characteristics of known terrorists and terrorist groups, and taught staff members to execute nearly identical attacks, according to Stasi records. Each year, the unit’s officers detailed the unit’s success in teaching these techniques in their annual reports, according to the reports.
Then, in 1987, the AGM/S stopped offensive operations. The unit was disbanded.
Werner Grossmann, a former three-star Stasi General and former head of foreign intelligence operations, says the AGM/S was responsible for planning attacks in West Germany, but was dissolved “because it didn’t produce results.” Mr. Grossmann assumed control of part of the AGM/S after most of the unit was dissolved.
Mr. Grossmann says he took control of part of the AGM/S because he wanted to run intelligence operations against West Germany’s civil defense infrastructure.
“I refused to have anything to do with terrorism and terrorists,” Mr. Grossmann said in an interview. He said he didn’t have any influence over the AGM/S activities before 1987 and wasn’t informed about the unit’s activities before it came under his control.
Olaf Barnickel, a career Stasi officer who served at Wartin, says his unit planned murders in West Germany, but never committed one. “It was all theory and no practice,” Mr. Barnickel said in an interview.
But some German police are unpersuaded. They believe the seeds may have been planted for future violent attacks.
In November 1989, as East Germany disintegrated, groups of citizens forced their way into Stasi installations, seizing control. In Wartin, a local church minister led a group of demonstrators to the main entrance of the Stasi base. The base closed.
Within the Stasi as a whole, the chain of command began to disintegrate. Links to organizations in West Germany, including the Red Army Faction, were broken.
Sixteen months after Mr. Herrhausen’s murder, the Red Army Faction claimed its last victim, killing Detlev Karsten Rohwedder, the head of the Treuhandanstalt, the powerful trust that controlled most state-owned assets in the former East Germany and was overseeing their privatization. Mr. Rohwedder was killed while he was standing by the window of his house in Düsseldorf.
The murder was performed by a trained sharpshooter, according to a police official familiar with the investigation. The Stasi trained members of the Red Army Faction in sharpshooting skills and had its own teams of sharpshooters, according to witness statements by Stasi officials to a Berlin prosecutor and Stasi records.
In 1998, the Red Army Faction issued the last of its communiques, announcing it was disbanding. German police attribute the group’s disappearance to changing times, which made the group seem a relic of the past. Indeed, the Red Army Faction today is largely seen by the German public as part of the social upheaval that plagued West Germany in the 1970s and 1980s. More than one in four Germans consider former Red Army Faction members to have been misguided idealists. More than half now think the investigations should be closed for good in the coming decade when the current group of Red Army Faction prisoners finish serving their prison sentences.
German prosecutors say their investigation of the Stasi’s role is continuing.
Since last month, Mrs. Herrhausen has been in contact with the next of kin of victims in the other unsolved Red Army Faction murder cases, looking for support to push the investigation. The bomb that killed her husband nearly 18 years ago exploded soon after he left for work, within earshot of their home in suburban Frankfurt.
“I still hear that bomb every day,” she says.

Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution.
The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.
Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.
The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.
This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelzner, Berlin.
Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror Regime in Eastern Germany.
Furthermore the Stasi Top Agent Ehrenfried Stelzer disguised as Professor for Criminal studies during the Communist Regime at the Eastern Berlin Humboldt University.
Background:
The man behind the Berlin lawyer Jochen Resch and his activities is Ehrenfried Stelzer, former Stasi Top officer in Berlin and “Professor for Criminal Studies” at the Eastern Berlin Humboldt University during the Communist regime, the SJB-GoMoPa-victims say (www.sjb-fonds-opfer.com) is responsable for the killing of German watchdog and journalist Heinz Gerlach.
These informations stem from various sources who were close to the criminal organization of GoMoPa in the last years. The SJB-GoMoPa say that the well-known German watchdog and journalist Heinz Gerlach was killed by former Stasi members with dioxins. Polychlorinated dibenzodioxins (PCDDs), or simply dioxins, are a group of organic polyhalogenated compounds that are significant because they act as environmental pollutants. They are commonly referred to as dioxins for simplicity in scientific publications because every PCDD molecule contains a dioxin skeletal structure. Typically, the p-dioxin skeleton is at the core of a PCDD molecule, giving the molecule a dibenzo-p-dioxin ring system. Members of the PCDD family have been shown to bioaccumulate in humans and wildlife due to their lipophilic properties, and are known teratogens, mutagens, and confirmed (avered) human carcinogens. They are organic compounds.
Dioxins build up primarily in fatty tissues over time (bioaccumulate), so even small exposures may eventually reach dangerous levels. In 1994, the US EPA reported that dioxins are a probable carcinogen, but noted that non-cancer effects (reproduction and sexual development, immune system) may pose an even greater threat to human health. TCDD, the most toxic of the dibenzodioxins, is classified as a Group 1 carcinogen by the International Agency for Research on Cancer (IARC).
In 2004, a notable individual case of dioxin poisoning, Ukrainian politician Viktor Yushchenko was exposed to the second-largest measured dose of dioxins, according to the reports of the physicians responsible for diagnosing him. This is the first known case of a single high dose of TCDD dioxin poisoning, and was diagnosed only after a toxicologist recognized the symptoms of chloracne while viewing television news coverage of his condition.
German dioxin scandal: In January 2011 about 4700 German farms were banned from making deliveries after tests at the Harles und Jentzsch plant in the state of Schleswig-Holstein showed high levels of dioxin. Again this incident appears to involve PCBs and not PCDDs at all. Dioxin were found in animal feed and eggs in many farms. The person who is responsible for this, Siegfried Sievert is also a former Stasi Agent. At “GoMoPa” the notorious Eastern-Berlin press agency (see article below) one of the henchmen acted under the name of “Siegfried Siewert”.
Further evidence for the killing of Mr.Heinz Gerlach is provided by the SJB-GoMoPa-victims by analyzing the dubious role of former Stasi-Top-agent Ehrenfried Stelzer, also a former “Professor for Crime Studies” under the Communist regime in Eastern Germany and the dubious role of “detective” Medard Fuchsgruber. Both are closely tied to the dubious “GoMoPa” and Berlin lawyer Jochen Resch.
According to the SJB-GoMoPa-victims is Berlin lawyer Jochen Resch the mastermind of the criminal organization “GoMoPa2. The victims state that they have a source inside “GoMoPa” who helped them discover  the shocking truth. The so-called “Deep Throat from Berlin” has information that Resch had the idea to found the criminal organization “GoMoPa” and use non-existing Jewish lawyers  named Goldman, Morgenstern & Partner as camouflage. Their “office” in Madison Avenue, New York, is a mailbox. This is witnessed by a German Ex-Patriot, a lawyer, whose father, Heinz Gerlach, died under strange circumstances.
Resch seems to use “GoMoPa” as an instrument to blackmail parts of the German Property and Investment.

The name of Benno Ohnesorg became a rallying cry for the West German left after he was shot dead by police in 1967. Newly discovered documents indicate that the cop who shot him may have been a spy for the East German secret police.
It was one of the most important events leading up to the wave of radical left-wing violence which washed over West Germany in the 1970s. On the evening of June 2, 1967, the literature student Benno Ohnesorg took part in a demonstration at West Berlin’s opera house. Mohammad Reza Pahlavi, the shah of Iran, was to attend and the gathered students wanted to call attention to his brutal regime.
The protests, though, got out of hand. Pro-shah demonstrators, some of them flown in from Iran for the occasion, battled with the student protestors. West Berlin police also did their part, brutally beating back the crowd. At 8:30 p.m., a shot was fired, and a short time later the 26-year-old Ohnesorg, having been hit in the back of the head, became the left wing’s first martyr.
Now, though, the history of the event may have to be re-written. New documents discovered in the Stasi archive — the vast collection of files left behind by the East German secret police — reveal that the policeman who shot Ohnesorg, Karl-Heinz Kurras, could in fact have been a spy for East Germany’s communist regime.
In an article that will appear in late May in Deutschlandarchiv, a periodical dedicated to the ongoing project of German reunification, Helmut Müller-Enbergs and Cornelia Jabs reveal that documents they found in the Stasi papers show that Kurras began working together with the Stasi in 1955. He had wanted to move to East Berlin to work for the East German police. Instead, he signed an agreement with the Stasi to remain with the West Berlin police force and spy for the communist state.
As a result of the new information, criminal charges have once again been filed against Kurras, who was acquitted twice, once in 1967 and again in 1970, of negligent homicide charges related to Ohnesorg’s death. Kurras told the Berlin paper Tagesspiegel on Friday that he had never worked together with the Stasi.
But in addition to finding the agreement between Kurras and the Stasi, the two researchers also discovered numerous documents indicating that the East Germans were pleased with the information Kurras passed along — particularly given that he was posted to a division responsible for rooting out moles within the West German police force.
Immediately after Ohnesorg’s death, Kurras received a Stasi communication ordering him to destroy his records and to “cease activities for the moment.” Kurras responded with his acquiescence and wrote “I need money for an attorney.”
The exact circumstances surrounding the death of Ohnesorg have never been completely clarified. Kurras himself, now 81, gave conflicting versions of the story during the investigation but the official version has long been that Kurras fired in self defense. Many others point to witness accounts whereby the police were beating Ohnesorg when the shot was fired.
It is still unclear how the new evidence might play into history’s understanding of the tragic event. The day was one full of violence, with demonstrators and police battling each other with pipes, wooden clubs and stones. Police were further incited by rumors that an officer had been stabbed earlier in the evening. Ohnesorg himself, however, was not directly involved in the violence.
West Berlin in the 1960s and 70s became a focal point of German left wing radicalism. The city had long been left-leaning, and the fact that Berliners were exempt from military service meant that it became a magnate for pacifists and anti-state activists.
Ohnesorg’s death gave them an immediate rallying cry. As the left-wing movement became more radical, many justified their violent activities by pointing to the police brutality that led to the student’s death. A letter written by Ulrike Meinhof announcing the founding of the Red Army Faction, which appeared in SPIEGEL in the fall of 1967, explicitly mentioned the Ohnesorg incident. The RAF went on to terrorize Germany for decades, ultimately killing over 30 people across the country. The radical “June 2 Movement” used the date of the incident in its name.
Kurras, for his part, seems to have been a highly valued Stasi agent. In his files, it is noted that “he is prepared to complete any task assigned to him.” It also mentions that he is notable for having the “courage and temerity necessary to accomplish difficult missions.”

Now it seems the STASI is back again in business after transforming it in to the CYBER-STASI of the 21st Century.

The serial betrayer and cyberstalker Klaus Maurischat is on the run again. The latest action against him (see below) cause him to react in a series of fake statements and “press releases” – one more absurd than the other. Insider analyze that his criminal organisation “GoMoPa” is about to fade away.

On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders say they have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the Encyclopedia – Britannica

The case is also directed against Google, Germany, whilst supporting criminal action of “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention ofGoogle Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.
Besides that many legal institutions, individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.
The case number is ST/0148943/2011

In a series of interviews beginning 11 months before the sudden death of German watchdog Heinz Gerlach Berlin lawyer Joschen Resch unveilved secrets of Gerlach, insiders say. Secret documents from Mr Gerlachs computer were published on two dubious hostile German websites. Both have a lot of similarities in their internet registration. One the notorious “GoMoPa” website belongs to a n Eastern German organization which calls itself “
Numerous attempts have been made to stop our research and the publication of the stories by “GoMoPa” members in camouflage thus confirming the truth and the substance of it in a superior way.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution. The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.

Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.

The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.

This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)

Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelznr, Berlin.

Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror

The Stasi murder:
„GoMoPa“ & Backers: Blackmailing, Extortion, Racketeering, Internet Murder and Murder. These are the weapons of the East-German “NACHRICHTENDIENST” “GoMoPa”, a renegate confesses.
Deep Throat, Berlin; confesses: „Since months the „GoMoPa“ keyfigures like Klaus-Dieter Maurischat< are in hide-aways because the German police is hunting them for the wirecard fraud and a lot of other criminal actions. I left the group when I noticed that. The found and former Stasi-Colonel Ehrenfried Stelzer died under strange circumstances in Berlin. This has been told to us. But it is also possible that his death was staged. In any case the criminal organization of “GoMoPa” is responsible for the murder of Heinz Gerlach by dioxin. Now my life is also in danger that is why I hide myself.”
According to Deep Throat, Hans J. the murder was done with the help of the old Stasi-connections of the “NACHRICHTENDIENST” “GoMoPa”.
The renegate says that computer hacker Thomas Promny and Sven Schmidt are responsible for the computer crimes and he states that the crime organization of “GoMoPa” has also helpers inside internet companies like Go-Daddy, Media-on and even in Google, Hamburg..

THE “NACHRICHTENDIENST”:New criminal police action against “GoMoPa”:

German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground.

On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders say they have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the
Encyclopedia – Britannica

The case is also directed against Google, Germany, whilst supporting criminal action of “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention of Google Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.

Besides that many legal institutions, individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.

The case number is

ST/0148943/2011

Stasi-Dioxin: The “NACHRICHTENDIENST”  searching for the perfect murder:

Viktor Yushchenko was running against Prime Minister Viktor Yanukovych. Yanukovych was a political ally of outgoing president Leonid Kuchma. Kuchma’s administration depended upon corruption and dishonesty for its power. Government officials ruled with a sense of terror rather than justice. For the powerful and wealthy few, having Yanukovych elected president was important. Should Yushchenko win, Ukraine’s government was sure to topple. Yushchenko’s campaign promises included a better quality of life for Ukrainians through democracy. His wife, Katherine, told CBS in a 2005 interview, “He was a great threat to the old system, where there was a great deal of corruption, where people were making millions, if not billions.”
On September 6, 2004, Yushchenko became ill after dining with leaders of the Ukrainian secret police. Unlike other social or political engagements, this dinner did not include anyone else on Yushchenko’s team. No precautions were taken regarding the food. Within hours after the dinner, Yushchenko began vomiting violently. His face became paralyzed; he could not speak or read. He developed a severe stomachache and backache as well as gastrointestinal pain. Outwardly, Yushchenko developed what is known as chloracne, a serious skin condition that leaves the face scarred and disfigured.
By December 2004, doctors had determined that Yushchenko had been the victim of dioxin poisoning. Dioxin is a name given to a group of related toxins that can cause cancer and even death. Dioxin was used in the biochemical weapon called Agent Orange during the Vietnam War controversial war in which the United States aidedSouth Vietnam in its fight against a takeover by Communist North Vietnam). Yushchenko had a dioxin level six thousand times greater than that normally found in the bloodstream. His is the second-highest level ever recorded.
Yushchenko immediately suspected he had been poisoned, though Kuchma’s camp passionately denied such allegations. Instead, when Yushchenko showed up at a parliamentary meeting shortly after the poisoning incident, Kuchma’s men teased him, saying he must have had too much to drink or was out too late the night before.
Dioxin can stay in the body for up to thirty-five years. Experts predict that his swelling and scars will fade but never completely disappear. John Henry, a toxicologist at London’s Imperial Hospital, told RedNova.com, “It’ll be a couple of years, and he will always be a bit pockmarked. After damage as heavy as that, I think he will not return to his film star looks.” And Yushchenko will live with the constant threat of cancer.
At first it was believed the poison must have come from a Russian laboratory. Russia was a strong supporter of Kuchma and lobbied against Yushchenko in the 2004 election. But by July 2005, Yushchenko’s security forces were able to trace the poison to a lab in Ukraine. Though not entirely ruling out Russia’s involvement, Yushchenko is quoted on his Web site as saying “I’m sure that even though some people are running from the investigation, we will get them. I am not afraid of anything or anybody.”

Evidence shows that such a perfect murder plotted by former Stasi agents is the cause of the death of German watchdog and journalist Heinz Gerlach.

The Ministry for State Security (German: Ministerium für Staatssicherheit (MfS), commonly known as the Stasi (IPA: [‘?tazi?]) (abbreviation German: Staatssicherheit, literally State Security), was the official state security service of East Germany. The MfS was headquartered in East Berlin, with an extensive complex in Berlin-Lichtenberg and several smaller facilities throughout the city. It was widely regarded as one of the most effective and repressive intelligence and secret police agencies in the world. The MfS motto was “Schild und Schwert der Partei” (Shield and Sword of the Party), that is the ruling Socialist Unity Party of Germany (SED).

According to the confessions of an informer, Berlin lawyer Jochen Resch writes most of the “articles” of the communist “STASI” agency “GoMoPa” himself or it is done by lawyers of his firm. The whistleblower states that lawyer Resch is the mastermind behind the “CYBER-STASI” called “NACHRICHTENDIENST” “GoMoPa”. Bizarre enough they use Jewish names of non-existing Jewish lawyers by the name of “Goldman, Morgenstern and Partner” to stage their bogus “firm”.  Further involved in their complots are a “detective” Medard Fuchsgruber and “STASI”-Colonel Ehrenfried Stelzer, “the first crime expert” in the former communist East-Germany.
According to London based Meridian Capital hundreds and thousands of wealthy people and companies have paid to the “NACHRICHTENDIENST” to avoid their cyberstalking (see article below).
Finally the German criminal police started their investigations (case number ST/0148943/2011).
The “NACHRICHTENDIENST” is also involved in the death of the well-known German watchdog and journalist Heinz Gerlach who died under strange circumstances in July 2010.
Only hours after his death the “NACHRICHTENDIENST” was spreading the news that Mr Gerlach died of blood pollution and set the stage for a fairy tale. Months before his death the “NACHRICHTENDIENST” started a campaign to ruin his reputation and presumably was also responsable for cyberattacks to bring his website down. In fact they presumably used the same tactics also against our servers. Therefore we investigated all internet details of them and handed the facts to the FBI and international authorities.

Story background:
Now it seems the STASI is back again in business after transforming it in to the CYBER-STASI of the 21st Century.

The serial betrayer and  cyberstalker Klaus Maurischat is on the run again. The latest action against him (see below) cause him to react in a series of fake statements and “press releases” – one more absurd than the other. Insider analyze that his criminal organisation “GoMoPa” is about to fade away.
On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders  say they  have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the Encyclopedia – Britannica
The case is also directed against Google, Germany, whilst supporting criminal action of  “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention of Google Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.
Besides that many legal institutions,  individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.
The case number is ST/0148943/2011
In a series of interviews beginning 11 months before the sudden death of German watchdog Heinz Gerlach Berlin lawyer Joschen Resch unveilved secrets of Gerlach, insiders say. Secret documents from Mr Gerlachs computer were published on two dubious hostile German websites. Both have a lot of similarities in their internet registration. One the notorious “GoMoPa” website belongs to a n Eastern German organization which calls itself “
Numerous attempts have been made to stop our research and the publication of the stories by “GoMoPa” members in camouflage thus confirming the truth and the substance of it in a superior way.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution. The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.

Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.

The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.

This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelzner, Berlin.

Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror Regime in Eastern Germany.
Furthermore the Stasi Top Agent Ehrenfried Stelzer disguised as Professor for Criminal studies during the Communist Regime at the Eastern Berlin Humboldt University.

Background:
The man behind the Berlin lawyer Jochen Resch and his activities is Ehrenfried Stelzer, former Stasi Top officer in Berlin and “Professor for Criminal Studies” at the Eastern Berlin Humboldt University during the Communist regime, the SJB-GoMoPa-victims say (www.sjb-fonds-opfer.com) is responsable for the killing of German watchdog and journalist Heinz Gerlach.
These informations stem from various sources who were close to the criminal organization of GoMoPa in the last years. The SJB-GoMoPa say that the well-known German watchdog and journalist Heinz Gerlach was killed by former Stasi members with dioxins. Polychlorinated dibenzodioxins (PCDDs), or simply dioxins, are a group of organic polyhalogenated compounds that are significant because they act as environmental pollutants. They are commonly referred to as dioxins for simplicity in scientific publications because every PCDD molecule contains a dioxin skeletal structure. Typically, the p-dioxin skeleton is at the core of a PCDD molecule, giving the molecule a dibenzo-p-dioxin ring system. Members of the PCDD family have been shown to bioaccumulate in humans and wildlife due to their lipophilic properties, and are known teratogens, mutagens, and confirmed (avered) human carcinogens. They are organic compounds.
Dioxins build up primarily in fatty tissues over time (bioaccumulate), so even small exposures may eventually reach dangerous levels. In 1994, the US EPA reported that dioxins are a probable carcinogen, but noted that non-cancer effects (reproduction and sexual development, immune system) may pose an even greater threat to human health. TCDD, the most toxic of the dibenzodioxins, is classified as a Group 1 carcinogen by the International Agency for Research on Cancer (IARC).
In 2004, a notable individual case of dioxin poisoning, Ukrainian politician Viktor Yushchenko was exposed to the second-largest measured dose of dioxins, according to the reports of the physicians responsible for diagnosing him. This is the first known case of a single high dose of TCDD dioxin poisoning, and was diagnosed only after a toxicologist recognized the symptoms of chloracne while viewing television news coverage of his condition.
German dioxin scandal: In January 2011 about 4700 German farms were banned from making deliveries after tests at the Harles und Jentzsch plant in the state of Schleswig-Holstein showed high levels of dioxin. Again this incident appears to involve PCBs and not PCDDs at all. Dioxin were found in animal feed and eggs in many farms. The person who is responsible for this, Siegfried Sievert is also a former Stasi Agent. At “GoMoPa” the notorious Eastern-Berlin press agency (see article below) one of the henchmen acted under the name of “Siegfried Siewert”.
Further evidence for the killing of Mr.Heinz Gerlach is provided by the SJB-GoMoPa-victims by analyzing the dubious role of former Stasi-Top-agent Ehrenfried Stelzer, also a former “Professor for Crime Studies” under the Communist regime in Eastern Germany and the dubious role of “detective” Medard Fuchsgruber. Both are closely tied to the dubious “GoMoPa” and Berlin lawyer Jochen Resch.
According to the SJB-GoMoPa-victims is Berlin lawyer Jochen Resch the mastermind of the criminal organization “GoMoPa2. The victims state that they have a source inside “GoMoPa” who helped them discover  the shocking truth. The so-called “Deep Throat from Berlin” has information that Resch had the idea to found the criminal organization “GoMoPa” and use non-existing Jewish lawyers  named Goldman, Morgenstern & Partner as camouflage. Their “office” in Madison Avenue, New York, is a mailbox. This is witnessed by a German Ex-Patriot, a lawyer, whose father, Heinz Gerlach, died under strange circumstances.
Resch seems to use “GoMoPa” as an instrument to blackmail parts of the German Property and Investment section.

-”Worse than the Gestapo.” —Simon Wiesenthal, Nazi hunter said about the notorious “Stasi”.

Less than a month after German demonstrators began to tear down the Berlin Wall on November 9, 1989, irate East German citizens stormed the Leipzig district office of the Ministry for State Security (MfS)—the Stasi, as it was more commonly called. Not a shot was fired, and there was no evidence of “street justice” as Stasi officers surrendered meekly and were peacefully led away. The following month, on January 15, hundreds of citizens sacked Stasi headquarters in Berlin. Again there was no bloodshed. The last bit of unfinished business was accomplished on May 31 when the Stasi radioed its agents in West Germany to fold their tents and come home.
The intelligence department of the Nationale Volksarmee (NVA), the People’s Army, had done the same almost a week earlier, but with what its members thought was better style. Instead of sending the five-digit code groups that it had used for decades to message its spies in West Germany, the army group broadcast a male choir singing a children’s ditty about a duck swimming on a lake. There was no doubt that the singing spymasters had been drowning their sorrow over losing the Cold War in schnapps. The giggling, word-slurring songsters repeated the refrain three times: “Dunk your little head in the water and lift your little tail.” This was the signal to agents under deep cover that it was time to come home.
With extraordinary speed and political resolve, the divided nation was reunified a year later. The collapse of the despotic regime was total. It was a euphoric time for Germans, but reunification also produced a new national dilemma. Nazi war crimes were still being tried in West Germany, forty-six years after World War II. Suddenly the German government was faced with demands that the communist officials who had ordered, executed, and abetted crimes against their own people—crimes that were as brutal as those perpetrated by their Nazi predecessors—also be prosecuted.
The people of the former Deutsche Demokratische Republik (DDR), the German Democratic Republic, as the state had called itself for forty years, were clamoring for instant revenge. Their wrath was directed primarily against the country’s communist rulers—the upper echelon of the Sozialistische Einheitspartei (SED), the Socialist Unity Party. The tens of thousands of second-echelon party functionaries who had enriched themselves at the expense of their cocitizens were also prime targets for retribution.
Particularly singled out were the former members of the Stasi, the East German secret police, who previously had considered themselves the “shield and sword” of the party. When the regime collapsed, the Stasi had 102,000 full-time officers and noncommissioned personnel on its rolls, including 11,000 members of the ministry’s own special guards regiment. Between 1950 and 1989, a total of 274,000 persons served in the Stasi.
The people’s ire was running equally strong against the regular Stasi informers, the inoffizielle Mitarbeiter (IMs). By 1995, 174,000 had been identified as IMs, or 2.5 percent of the total population between the ages of 18 and 60. Researchers were aghast when they found that about 10,000 IMs, or roughly 6 percent of the total, had not yet reached the age of 18. Since many records were destroyed, the exact number of IMs probably will never be determined; but 500,000 was cited as a realistic figure. Former Colonel Rainer Wiegand, who served in the Stasi counterintelligence directorate, estimated that the figure could go as high as 2 million, if occasional stool pigeons were included.
“The Stasi was much, much worse than the Gestapo, if you consider only the oppression of its own people,” according to Simon Wiesenthal of Vienna, Austria, who has been hunting Nazi criminals for half a century. “The Gestapo had 40,000 officials watching a country of 80 million, while the Stasi employed 102,000 to control only 17 million.” One might add that the Nazi terror lasted only twelve years, whereas the Stasi had four decades in which to perfect its machinery of oppression, espionage, and international terrorism and subversion.
To ensure that the people would become and remain submissive, East German communist leaders saturated their realm with more spies than had any other totalitarian government in recent history. The Soviet Union’s KGB employed about 480,000 full-time agents to oversee a nation of 280 million, which means there was one agent per 5,830 citizens. Using Wiesenthal’s figures for the Nazi Gestapo, there was one officer for 2,000 people. The ratio for the Stasi was one secret policeman per 166 East Germans. When the regular informers are added, these ratios become much higher: In the Stasi’s case, there would have been at least one spy watching every 66 citizens! When one adds in the estimated numbers of part-time snoops, the result is nothing short of monstrous: one informer per 6.5 citizens. It would not have been unreasonable to assume that at least one Stasi informer was present in any party of ten or twelve dinner guests.

THE STASI OCTOPUS

Like a giant octopus, the Stasi’s tentacles probed every aspect of life. Full-time officers were posted to all major industrial plants. Without exception, one tenant in every apartment building was designated as a watchdog reporting to an area representative of the Volkspolizei (Vopo), the People’s Police. In turn, the police officer was the Stasi’s man. If a relative or friend came to stay overnight, it was reported. Schools, universities, and hospitals were infiltrated from top to bottom. German academe was shocked to learn that Heinrich Fink, professor of theology and vice chancellor at East Berlin’s Humboldt University, had been a Stasi informer since 1968. After Fink’s Stasi connections came to light, he was summarily fired. Doctors, lawyers, journalists, writers, actors, and sports figures were co-opted by Stasi officers, as were waiters and hotel personnel. Tapping about 100,000 telephone lines in West Germany and West Berlin around the clock was the job of 2,000 officers.
Stasi officers knew no limits and had no shame when it came to “protecting the party and the state.” Churchmen, including high officials of both Protestant and Catholic denominations, were recruited en masse as secret informers. Their offices and confessionals were infested with eavesdropping devices. Even the director of Leipzig’s famous Thomas Church choir, Hans-Joachim Rotch, was forced to resign when he was unmasked as a Spitzel, the people’s pejorative for a Stasi informant.
Absolutely nothing was sacred to the secret police. Tiny holes were bored in apartment and hotel room walls through which Stasi agents filmed their “suspects” with special video cameras. Even bathrooms were penetrated by the communist voyeurs.8 Like the Nazi Gestapo, the Stasi was the sinister side of deutsche Gründlichkeit (German thoroughness).
After the Berlin wall came down, the victims of the DDR regime demanded immediate retribution. Ironically, their demands were countered by their fellow Germans in the West who, living in freedom, had diligently built einen demokratischen Rechtsstaat, a democratic state governed by the rule of law. The challenge of protecting the rights of both the victims and the accused was immense, given the emotions surrounding the issue. Government leaders and democratic politicians recognized that there could be no “quick fix” of communist injustices without jeopardizing the entire system of democratic jurisprudence. Moving too rapidly merely to satisfy the popular thirst for revenge might well have resulted in acquittals or mistrials. Intricate jurisdictional questions needed to be resolved with both alacrity and meticulousness. No German government could afford to allow a perpetrator to go free because of a judicial error. The political fallout from any such occurrence, especially in the East, could prove fatal to whatever political party occupied the chancellor’s office in Bonn at the time.
Politicians and legal scholars of the “old federal states,” or West Germany, counseled patience, pointing out that even the prosecution of Nazi criminals had not yet been completed. Before unification, Germans would speak of Vergangenheitsbewältigung (“coming to grips with the past”) when they discussed dealing with Nazi crimes. In the reunited Germany, this word came to imply the communist past as well. The two were considered comparable especially in the area of human rights violations. Dealing with major Nazi crimes, however, was far less complicated for the Germans: Adolf Hitler and his Gestapo and Schutzstaffel (SS) chief, Heinrich Himmler, killed themselves, as did Luftwaffe chief and Vice Chancellor Hermann Göring, who also had been the first chief of the Gestapo. The victorious Allies prosecuted the rest of the top leadership at the International War Crimes Tribunal in Nürnberg. Twelve were hanged, three received life terms, four were sentenced to lesser terms of imprisonment (up to twenty years), and three were acquitted.
The cases of communist judges and prosecutors accused of Rechtsbeugung (perversion of justice) are more problematic. According to Franco Werkenthin, a Berlin legal expert charged with analyzing communist crimes for the German parliament, those sitting in judgment of many of the accused face a difficult task because of the general failure of German justice after World War II. Not a single judge or prosecutor who served the Nazi regime was brought to account for having perverted justice—even those who had handed down death sentences for infringements that in a democracy would have been considered relatively minor offenses. Werkenthin called this phenomenon die Jauche der Justiz, the cesspool of justice.
Of course, the crimes committed by the communists were not nearly as heinous as the Nazis’ extermination of the Jews, or the mass murders in Nazi-occupied territories. However, the communists’ brutal oppression of the nation by means including murder alongside legal execution put the SED leadership on a par with Hitler’s gang. In that sense, Walter Ulbricht or Erich Honecker (Ulbricht’s successor as the party’s secretary-general and head of state) and secret police chief Erich Mielke can justifiably be compared to Hitler and Himmler, respectively.
Arrest warrants were issued for Honecker and Mielke. The Soviet government engineered Honecker’s escape to Moscow, where he became the ward of Soviet President Mikhail S. Gorbachev. When the Soviet Union crumbled, the new Russian President Boris Yeltsin expelled Honecker. He was arrested on his return to Germany, but a court decided against a trial when he was diagnosed with liver cancer. Honecker flew to Chile with his wife Margot to live with their daughter, a Chilean citizen by marriage. His exile was short, and he died in 1994. Mielke was not so fortunate: His KGB friends turned their backs on him. He was tried in Germany for the 1931 murder of two police officers, found guilty, and sentenced to six years in prison. Other charges, including manslaughter, were dismissed because of his advanced age and poor health.
Three other members of the twenty-one-member ruling Politburo also have been tried. Former Defense Minister Heinz Kessler was convicted of manslaughter in connection with the order to kill people who were trying to escape to the West. He received a seven-and-a-half-year term. Two others, members of the Central Committee and the National Defense Council, were tried with Kessler and sentenced to seven and a half years and five years, respectively. Politburo member Harry Tisch, who was also head of the communist trade union, was found guilty of embezzlement and served eighteen months. Six others, including Egon Krenz (Honecker’s successor as party chief), were charged with manslaughter. Krenz was found guilty, and on August 25, 1997, was sentenced to six and a half years in prison.
However, eight years after reunification, many of the 165 members of the Central Committee have not yet been put under investigation. In 1945, Nazis holding comparable or lesser positions were subject to automatic arrest by the Allies. They spent months or even years in camps while their cases were adjudicated. Moreover, the Nürnberg Tribunal branded the Reich and its Corps of Political Leaders, SS, Security Service (SD), Secret State Police (Gestapo), SA (Storm Troopers), and Armed Forces High Command criminal organizations. Similarly sweeping actions against communist leaders and functionaries such as Stasi officers were never contemplated, even though tens of thousands of political trials and human rights abuses have been documented. After the East German regime fell, German judicial authorities scrupulously avoided the appearance of waging witch-hunts or using the law as a weapon of vengeance. Prosecutors and judges made great efforts to be fair, often suspending legal action while requesting rulings from the supreme court on possible constitutional conflicts.
The victims of oppression clamored for revenge and demanded speedy prosecution of the erstwhile tyrants. They had little patience for a judicial system that was handicapped by a lack of unblemished and experienced criminal investigators, prosecutors, and judges. Despite these handicaps, the Berlin Central Police Investigations Group for Government Criminality, mindful that the statute of limitations for most communist crimes would expire at the end of 1999, made significant progress under its director Manfred Kittlaus, the able former director of the West Berlin state police. Kittlaus’s major task in 1998 was to investigate wrongful deaths, including 73 murders, 30 attempted murders, 583 cases of manslaughter, 2,938 instances of attempted manslaughter, and 425 other suspicious deaths. Of the 73 murders, 22 were classified as contract murders.
One of those tried and convicted for attempted contract murder was former Stasi collaborator Peter Haak, who was sentenced to six and a half years in prison. The fifty-two-year-old Haak took part in the Stasi’s 1981 Operation Scorpion, which was designed to pursue people who helped East Germans escape to the West. Proceedings against former General Gerhard Neiber, whose Stasi directorate was responsible for preventing escapes and for wreaking vengeance, were still pending in 1998.
Peter Haak’s murder plot was hatched after he befriended Wolfgang Welsch and his family. Welsch was a thorn in the side of the Stasi because of his success in smuggling people out of the DDR. Haak joined Welsch and the latter’s wife and seven-year-old daughter on a vacation in Israel, where he mixed a gram of thallium, a highly poisonous metallic chemical element used in rat poison, into the hamburgers he was preparing for a meal. Welsch’s wife and daughter vomited immediately after ingesting the poison and recovered quickly. Welsch suffered severe aftereffects, but eventually recovered: He had consumed a large amount of beer with the meal, and an expert testified that the alcohol had probably flushed the poison from his system.
Berlin Prosecutor General Christoph Schäfgen revealed that after the DDR’s demise 15,200 investigations had been launched, of which more than 9,000 were still active at the beginning of 1995. Indictments were handed down in 153 cases, and 73 perpetrators were convicted. Among those convicted were the aforementioned Politburo members as well as a number of border guards who had killed people who were trying to escape to the West.
Despite widespread misgivings about the judicial failures in connection with some Nazi crimes, a number of judges and prosecutors were convicted and jailed for up to three years for perversion of justice. In collusion with the Stasi, they had requested or handed down more severe sentences in political cases so that the state could collect greater amounts when the “convicts” were ransomed by the West German government. {The amount of ransom paid was governed by the time a prisoner had been sentenced to serve.)
The enormity of the task facing judicial authorities in reunified Germany becomes starkly evident when one examines the actions they have taken in all five former East German provinces and in East Berlin. From the end of 1990 to July 1996, 52,050 probes were launched into charges of murder, attempted murder, manslaughter, kidnapping, election fraud, and perversion of justice. A total of 29,557 investigations were halted for various reasons including death, severe illness, old age, or insufficient evidence. In those five and a half years, there were only 139 convictions.
The problem is even more staggering when cases of espionage are included. Between 1990 and 1996, the office of the federal prosecutor general launched 6,641 probes, of which 2,431 were terminated before trial—most due to the statute of limitations. Of 175 indictments on charges of espionage, 95 resulted in convictions. In addition to the cases handled at the federal level, the prosecutor general referred 3,926 investigations to state authorities, who terminated 3,344 without trial. State courts conducted 356 trials, resulting in 248 convictions. Because the statute of limitations for espionage is five years, the prosecutor general’s office told me in 1997 it was unlikely that more espionage trials would be conducted.
It is important to emphasize the difference between the statute’s application to so-called government crimes committed in East Germany before the collapse and to crimes, such as espionage, committed in West Germany. The Unification Treaty specifically permits the belated prosecution of individuals who committed acts that were punishable under the East German criminal code and who due to official connivance were not prosecuted earlier. There is no statute of limitations for murder. For most other crimes the limit is five years; however, due to the obstacles created by previous government connivance, the German parliament in 1993 doubled this time limit for prosecution of the more serious crimes. At the same time, the parliament decreed that all cases must be adjudicated by the end of 2002. For less serious offenses, the statute would have run out on December 31, 1997, but the parliament extended it to 2000.
A number of politicians, jurists, and liberal journalists pleaded for a general amnesty for crimes committed by former DDR leaders and Communist Party functionaries. A former West German supreme court judge, Ernst Mahrenholz, said the “sharp sword of justice prevents reconciliation.” Schäfgen, the Berlin prosecutor general, had this answer for the former high court judge and other amnesty advocates:

I cannot agree. We are raising no special, sharp sword against East Germans. We must pursue state-sponsored injustice in exactly the same manner as we do when a thief steals or when one human being kills another. If one wants to change that, then we would have to do away with the entire criminal justice system, because punishment always hurts. We are not criminalizing an entire people but only an ever shrinking, small portion.

German Foreign Minister Klaus Kinkel, who was West Germany’s minister of justice when the nation was unified, said this at a session of parliament in September 1991: “We must punish the perpetrators. This is not a matter of a victor’s justice. We owe it to the ideal of justice and to the victims. All of those who ordered injustices and those who executed the orders must be punished; the top men of the SED as well as the ones who shot [people] at the wall.” Aware that the feelings against communists were running high among their victims, Kinkel pointed to past revolutions after which the representatives of the old system were collectively liquidated. In the same speech before parliament, he said:

Such methods are alien to a state ruled by law. Violence and vengeance are incompatible with the law in any case. At the same time, we cannot tolerate that the problems are swept under the rug as a way of dealing with a horrible past, because the results will later be disastrous for society. We Germans know from our own experience where this leads. Jewish philosophy formulates it in this way: “The secret of redemption is called remembering.”

Defense attorneys for communist officials have maintained that the difficulty lies in the fact that hundreds of thousands of political opponents were tried under laws of the DDR. Although these laws were designed to smother political dissent and grossly violated basic human rights and democratic norms, they were nonetheless laws promulgated by a sovereign state. How could one justly try individual Stasi officers, prosecutors, and judges who had simply been fulfilling their legal responsibility to pursue and punish violators of the law?
Opinions varied widely on whether and how the Stasi and other perpetrators of state-sponsored crimes should be tried. Did the laws of the DDR, as they existed before reunification, still apply in the east? Or was the criminal code of the western part of the country the proper instrument of justice in reunified Germany? However, these questions were moot: As Rupert Scholz, professor of law at the University of Munich and a Christian Democratic member of parliament, pointed out, the Unification Treaty specifies that the penal code of the DDR and not that of the Federal Republic of Germany (FRG) shall be applied to offenses committed in East Germany. Scholz’s view was upheld by the Bundesverfassungsgericht, the supreme court. Most offenses committed by party functionaries and Stasi officers—murder, kidnapping, torture, illegal wiretapping, mail robbery, and fraud—were subject to prosecution in reunified Germany under the DDR’s penal code. But this would not satisfy the tens of thousands of citizens who had been sent to prison under East German laws covering purely political offenses for which there was no West German equivalent.
Nevertheless, said Scholz, judicial authorities were by no means hamstrung, because West Germany had never recognized the East German state according to international law. “We have always said that we are one nation; that the division of Germany led neither to full recognition under international law nor, concomitantly, to a recognition of the legal system of the DDR,” Scholz said. Accordingly, West German courts have consistently maintained that West German law protects all Germans equally, including those living in the East. Therefore, no matter where the crimes were committed, whether in the East or the West, all Germans have always been subject to West German laws. Applying this logic, East German border guards who had either killed or wounded persons trying to escape to the West could be tried under the jurisdiction of West Germany.
The “one nation” principle was not upheld by the German supreme court. Prior to the court’s decision, however, Colonel General Markus Wolf, chief of the Stasi’s foreign espionage directorate, and some of his officers who personally controlled agents from East Berlin had been tried for treason and convicted. Wolf had been sentenced to six years in prison. The supreme court ruling overturned that verdict and those imposed on Wolf’s cohorts, even though they had obtained the most closely held West German secrets and handed them over to the KGB. The maximum penalty for Landesverrat, or treason, is life imprisonment. In vacating Wolf’s sentence, the court said he could not be convicted because he operated only from East German territory and under East German law.
However, Wolf was reindicted on charges of kidnapping and causing bodily harm, crimes also punishable under East German law. The former Stasi three-star general, on March 24, 1955, had approved in writing a plan to kidnap a woman who worked for the U.S. mission in West Berlin. The woman and her mother were tricked by a Stasi agent whom the woman had been teaching English, and voluntarily got into his car. He drove them into the Soviet sector of the divided city, where they were seized by Stasi officers. The woman was subjected to psychological torture and threatened with imprisonment unless she signed an agreement to spy for the Stasi. She agreed. On her return to the American sector, however, the woman reported the incident to security officials. Wolf had committed a felony punishable by up to fifteen years’ imprisonment in West Germany. He was found guilty in March 1977 and sentenced to two years’ probation.
Those who have challenged the application of the statute of limitations to communist crimes, especially to the executions of citizens fleeing to the West, have drawn parallels to the notorious executive orders of Adolf Hitler. Hitler issued orders mandating the summary execution of Soviet Army political commissars upon their capture and initiating the extermination of Jews. An early postwar judicial decision held that these orders were equivalent to law. When that law was declared illegal and retroactively repealed by the West German Bundestag, the statute of limitations was suspended—that is, it never took effect. Many of those convicted in subsequent trials of carrying out the Führer’s orders were executed by the Allies. The German supreme court has ruled the same way as the Bundestag on the order to shoot people trying to escape to West Germany, making the statute of limitations inapplicable to such cases. The ruling made possible the trial of members of the National Defense Council who took part in formulating or promulgating the order. A number of border guards who had shot would-be escapees also have been tried and convicted.
Chief Prosecutor Heiner Sauer, former head of the West German Central Registration Office for Political Crimes, was particularly concerned with the border shootings. His office, located in Salzgitter, West Germany, was established in 1961 as a direct consequence of the Berlin Wall, which was erected on August 13 of that year. Willy Brandt, at the time the city’s mayor (later federal chancellor) had decided that crimes committed by East German border guards should be recorded. At his behest, a central registry of all shootings and other serious border incidents was instituted. Between August 13, 1961 and the opening of the borders on November 9, 1989, 186 border killings were registered. But when the Stasi archives were opened, investigators found that at least 825 people had paid with their lives for trying to escape to the West. This figure was reported to the court that was trying former members of the National Defense Council. In addition to these border incidents, the registry also had recorded a number of similar political offenses committed in the interior of the DDR: By fall 1991, Sauer’s office had registered 4,444 cases of actual or attempted killings and about 40,000 sentences handed down by DDR courts for “political offenses.”
During the early years of Sauer’s operation, the details of political prosecutions became known only when victims were ransomed by West Germany or were expelled. Between 1963 and 1989, West Germany paid DM5 billion (nearly US$3 billion) to the communist regime for the release of 34,000 political prisoners. The price per head varied according to the importance of the person or the length of the sentence. In some cases the ransom amounted to more than US$56,000. The highest sum ever paid to the East Germans appears to have been DM450,000 (US$264,705 using an exchange rate of US$1.70 to the mark). The ransom “object” in this case was Count Benedikt von Hoensbroech. A student in his early twenties, von Hoensbroech was attending a West Berlin university when the wall went up. He was caught by the Stasi while trying to help people escape and was sentenced to ten years at hard labor. The case attracted international attention because his family was related to Queen Fabiola of Belgium, who interceded with the East Germans. Smelling money, the East German government first demanded the equivalent of more than US$1 million from the young man’s father as ransom. In the end, the parties settled on the figure of DM450,000, of which the West German government paid DM40,000 (about $23,529). Such ransom operations were fully controlled by the Stasi.
Political prisoners released in the DDR could not be registered by the West Germans because their cases remained secret. The victims were admonished to keep quiet or face another prison term. Nonetheless, in the first year after reunification, Sauer’s office added another 20,000 documented cases, for a total of 60,000. Sauer said he believed the final figure of all political prosecutions would be somewhere around 300,000. In every case, the Stasi was involved either in the initial arrest or in pretrial interrogations during which “confessions” were usually extracted by physical or psychological torture, particularly between the mid-1940s and the mid-1960s.
Until 1987, the DDR imposed the death penalty for a number of capital crimes, including murder, espionage, and economic offenses. But after the mid-1950s, nearly all death sentences were kept quiet and executions were carried out in the strictest secrecy, initially by guillotine and in later years by a single pistol shot to the neck. In most instances, the relatives of those killed were not informed either of the sentence or of the execution. The corpses were cremated and the ashes buried secretly, sometimes at construction sites. In reporting about one executioner who shot more than twenty persons to death, the Berlin newspaper Bildzeitung said that a total of 170 civilians had been executed in East Germany. However, Franco Werkenthin, the Berlin official investigating DDR crimes, said he had documented at least three hundred executions. He declined to say how many were for political offenses, because he had not yet submitted his report to parliament. “But it was substantial,” he told me. The true number of executions may never be known because no complete record of death sentences meted out by civil courts could be found. Other death sentences were handed down by military courts, and many records of those are also missing. In addition, German historian Günther Buch believes that about two hundred members of the Stasi itself were executed for various crimes, including attempts to escape to the West.

SAFEGUARDING HUMAN DIGNITY?

The preamble to the East German criminal code stated that the purpose of the code was to “safeguard the dignity of humankind, its freedom and rights under the aegis of the criminal code of the socialist state,” and that “a person can be prosecuted under the criminal code only in strictest concurrence with the law.” However, many of the codified offenses for which East German citizens were prosecuted and imprisoned were unique to totalitarian regimes, both fascist and communist.
Moreover, certain sections of the code, such as those on “Treasonable Relaying of Information” and “Treasonable Agent Activity,” were perversely applied, landing countless East Germans in maximum security penitentiaries. The victims of this perversion of justice usually were persons who had requested legal exit permits from the DDR authorities and had been turned down. In many cases, their “crime” was having contacted a Western consulate to inquire about immigration procedures. Sentences of up to two and a half years’ hard labor were not unusual as punishment for such inquiries.
Engaging in “propaganda hostile to the state” was another punishable offense. In one such case, a young man was arrested and prosecuted for saying that it was not necessary to station tanks at the border and for referring to border fortifications as “nonsense.” During his trial, he “admitted” to owning a television set on which he watched West German programs and later told friends what he saw. One of those “friends” had denounced him to the Stasi. The judge considered the accused’s actions especially egregious and sentenced him to a year and a half at hard labor.
Ironically, another part of this section of the criminal code decreed that “glorifying militarism” also was a punishable offense, although the DDR itself “glorified” its People’s Army beyond any Western norm. That army was clad in uniforms and insignia identical to those of the Nazi Wehrmacht, albeit without eagles and swastikas. The helmets, too, were differently shaped, but the Prussian goose step was regulation during parades.
A nineteen-year-old who had placed a sign in an apartment window reading “When justice is turned into injustice, resistance becomes an obligation!” was rewarded with twenty-two months in the penitentiary. Earlier, the youth had applied for an exit visa and had been turned down. A thirty-four-year-old father of two who also had been denied permission to leave the “workers’ and peasants’ state” with his family similarly advertised that fact with a poster reading “We want to leave, but they won’t let us.” The man went to prison for sixteen months. The “crimes” of both men were covered by a law on “Interference in Activities of the State or Society.”
Two letters—one to a friend in West Germany, seeking assistance to legally emigrate to the West, and another containing a similar appeal to Chief of State Honecker—brought a four-year sentence to their writer, who was convicted under two laws: those on “establishing illegal contacts” (writing to his friend) and on “public denigration” (writing to Honecker). The Stasi had illegally intercepted both letters.
The East German party chiefs were not content to rely only on the Stasi’s millions of informers to ferret out antistate sentiments. Leaving nothing to chance, they created a law that made the failure to denounce fellow citizens a crime punishable by up to five years’ imprisonment. One man was sentenced to twenty-three months for failing to report that a friend of his was preparing to escape to the West. The mandatory denunciation law had its roots in the statutes of the Socialist Unity Party, which were published in the form of a little red booklet. I picked up a copy of this booklet that had been discarded by its previous owner, a Stasi chauffeur, who had written “Ha, Ha” next to the mandate to “report any misdeeds, regardless of the person responsible, to leading party organs, all the way up to the Central Committee.”
Rupert Scholz, member of parliament and professor of law at the University of Munich, said many East Germans feel there is little determination among their Western brethren to bring the Stasi criminals to trial. “In fact, we already have heard many of them say that the peaceful revolution should have been a bloody one instead so they could have done away with their tormentors by hanging them posthaste,” Scholz told me.
The Reverend Joachim Gauck, minister to a Lutheran parish in East Germany, shared the people’s pessimism that justice would be done. Following reunification, Gauck was appointed by the Bonn government as its special representative for safeguarding and maintaining the Stasi archives. “We must at least establish a legal basis for finding the culprits in our files,” Gauck told me. “But it will not be easy. If you stood the millions of files upright in one line, they would stretch for 202 kilometers [about 121 miles]. In those files you can find an unbelievable number of Stasi victims and their tormentors.”
Gauck was given the mandate he needed in November 1991, when the German parliament passed a law authorizing file searches to uncover Stasi perpetrators and their informants. He viewed this legislation as first step in the right direction. With the evidence from Stasi files, the perpetrators could be removed from their public service jobs without any formal legal proceedings. Said Gauck: “We needed this law badly. It is not reasonable that persons who served this apparatus of oppression remain in positions of trust.”

See more at the journalist Bernd Pulch website http://www.berndpulch.org

TOP-SECRET – Munich Prosecutor Classified Data Spy Guide DE

munich-spy

Opfer: VON RUFMÖRDERN u. Serienbetrügern erfundene “GoMoPa-SJB”: “Wer stoppt Rufmorde ?”

http://www.victims-opfer.com/?p=16359

TOP-SECRET – Operación México: Programa argentino de rendición extraordinaria revelado por documentos desclasificados

En julio de 1978, fuerzas de seguridad argentinas, enviaron documentación a sus pares en Paraguay buscando al fugado Jaime Dri, único testigo sobreviviente de la Operación México.

Operación México: Programa argentino de rendición extraordinaria revelado por documentos desclasificados

Analista del National Security Archive presenta nueva evidencia ante un tribunal argentino

Septiembre 9, 2009, Washington, DC – El National Security Archive revela hoy un documento que Jaime Dri, único sobreviviente, conoció directamente sobre la Operación México que forzó a desaparecidos detenidos en Rosario a participar en un escuadrón de la muerte para infiltrar a la dirección de Montoneros en Ciudad de México en enero de 1978. “DRI JAIME ‘Pelado'” indica el documento, estuvo presente cuando vino “de regreso de México, la comisión oficial” que salió de Rosario.

Dri fue capturado en diciembre de 1977 y luego pasó por un periplo que lo llevó a varios centros de detención clandestina incluyendo el de Rosario donde encontró a 14 detenidos hoy desaparecidos, a Tucho Valenzuela y a agentes de inteligencia que forzaron a algunos a viajar a México. El 19 de Julio Dri se escapó a Asunción, Paraguay. Sus captores clandestinos, enviaron desesperadas peticiones a sus pares en Paraguay y dejaron pistas sobre lo que vio Dri durante esos ocho meses. Un informe del 21 de julio de 1978  del Estado Mayor General del Ejercito de las Fuerzas Armadas Paraguayas encontrado en el Archivo del Terror dice que han recibido un pedido de búsqueda de una agencia secreta argentina por Jaime Dri quien “se escapó de las Autoridades Argentinas de Pilcomayo, Argentina” hacia Paraguay. El pedido de Argentina incluye un prontuario de dos páginas sobre Dri donde claramente establecen que “De regreso de México, la comisión oficial que acompaño a ‘TUCHO’ le hizo saber a DRI JAIME ‘Pelado'” noticias de México. ‘TUCHO'” Valenzuela, fue uno de los secuestrados sacado de una prisión en Argentina y forzado a viajar con los agentes de inteligencia.

El informe descubierto por Carlos Osorio, director del Proyecto de Documentación del Cono Sur del National Security Archive, en el Archivo del Terror del Paraguay, fue presentado ayer ante el tribunal numero 1 de Rosario Argentina, donde se enjuicia a agentes del destacamento de inteligencia 121. La causa Guerrieri, por el nombre de uno de los imputados, trata de la detención ilegal y posterior asesinato de 14 insurgentes Montoneros en una cárcel secreta en la ciudad de Rosario, Argentina. Los prisioneros habrían sido testigos y forzados a colaborar en lo que se conoce como Operación México, un escuadrón de inteligencia militar enviado a Ciudad de México a liquidar a cabecillas Montoneros en enero de 1978. [Ver 1978: Operación Clandestina de la Inteligencia Militar Argentina en México, National Security Archive Electronic Briefing Book No. 241]

Los documentos de Paraguay se complementan con la media docena de otros publicados en enero de 2008 por el National Security Archive provenientes de la Dirección Federal de Seguridad de México (DFS) que dan cuenta que la DFS capturó e interrogó a dos de los agentes secretos argentinos y los expulsó de vuelta a su país. “Los nuevos documentos concluyen una triangulación de evidencia documental internacional sobre Operación México y confirman la veracidad del testimonio de Dri que por años, fue conocido solamente por el libro Recuerdos de la Muerte” dijo Carlos Osorio.

Esta gacetilla electrónica incluye los documentos centrales provenientes del Archivo del Terror y están acompañados de otros doce de EEUU, Argentina y México que verifican la solidez de la historia aparecida en el libro Recuerdo de la Muerte. Paso a paso, los documentos que presentamos hoy en esta gacetilla presentan una narrativa que calza perfectamente con el testimonio de Dri: su captura y herida en Uruguay, su traslado clandestino a la Escuela Mecánica de la Armada (ESMA) en Buenos Aires y luego Rosario, el haber sido testigo de Operación México, estar nuevamente en la ESMA y haberse escapado a través de Asunción Paraguay. Un informe de la Embajada de EEUU por ejemplo informa que Dri fue “detenido cerca de Montevideo el pasado 15 de diciembre” y SERA entregado “solapadamente a las autoridades argentinas” en 1977. Por otra parte un documento secreto de una agencia de inteligencia argentina informa que en julio de 1978 “se escapó de un Taxi camino a Itá Enramada [Paraguay] de su custodia”.

Luego de escapar a Paraguay, Dri se refugió en la Embajada de Panamá, país de origen de su esposa y donde finalmente se radicó.


Documentos
Los documentos están en formato PDF.
Se necesita bajar e instalar el programa gratuito Adobe Acrobat Reader para visionarlos.

Los documentos del Archivo del Terror usados en esta publicación son propiedad de la Corte Suprema de Justicia y han sido puestos a disposición pública gracias a la cortesía y anuencia de la Excelentísima Corte Suprema de Justicia, en el marco de varios Convenios en apoyo del Centro de Documentación y Archivo (CDyA). Copias oficiales de los originales pueden ser pedidas al CDyA, PALACIO DE JUSTICIA, Testanova y Mariano Roque Alonso, 8vo. Piso Of.13, Asunción -Paraguay, Tel: 595-21-424212/15 Interno: 2269, e-mail: cdya_py@hotmail.com, http://www.pj.gov.py/cdya. Los nuevos descubrimientos han sido hechos usando una  herramienta clave de investigación del CDyA, el Archivo del Terror Digital (ATD). El ATD es un instrumento que cuenta con la digitalización en una base de datos de los más de 300,00 documentos del Archivo del Terror.


Diciembre 30, 1977 – Derechos Humanos: Arresto por el GOU del Pianista Miguel Estrella y Otros Presuntos Montoneros en Uruguay

Cable Secreto de la Embajada de EEUU en Montevideo

La Embajada de EEUU en Uruguay informa que el arresto del pianista argentino refugiado en Uruguay Miguel Ángel Estrella es parte de una serie de redadas llevadas a cabo entre el 15 y 16 de diciembre donde han sido capturados ocho Montoneros. Estos últimos “se encuentran esperando ser extraditados a Argentina”.

Jaime Dri, en el recuento de su detención clandestina, da cuenta* que él cayó en esta redada. La palabra “extraditados” es usada en el cable como un eufemismo. Investigaciones realizadas posteriormente dan prueba que los prisioneros fueron trasladados ilegalmente de una fuerza de seguridad uruguaya a una fuerza de seguridad argentina.

*”Al  menos era todo lo que el Pelado [Jaime Dri] recordaba. La explicación más sencilla era que toda la estructura clandestina había caído a partir de la vigilancia de la punta del iceberg: la casa de [Miguel Ángel] Estrella”.
(Bonasso, 56)


Enero 4, 1978 – Derechos Humanos: Rubén De Gregorio

Cable Secreto de la Embajada de EEUU en Montevideo

La Embajada estadounidense en Montevideo informa que el ciudadano argentino Rubén De Gregorio fue capturado por autoridades uruguayas mientras intentaba ingresar al país…. Al ser arrestado, De Gregorio tenía en su posesión un revolver calibre .38…” Posteriormente, dice el cable, fue “entregado a las autoridades argentinas”.

Jaime Dri en sus declaraciones* da cuenta de haber estado prisionero con De Gregorio en el centro clandestino de detención de la Escuela Mecánica de la Armada Argentina, ESMA.

*”‘Sordo De Gregorio, un oficial superior del Partido [Montoneros] que  había  caído en Colonia, cuando le encontraron un revólver  dentro  de  un  termo  para  el  mate” (Bonasso, 55-56)


Enero 6, 1978 – Rubén De Gregorio

Cable secreto de la Embajada de EEUU en Buenos Aires

Dando seguimiento al cable de la Embajada en Montevideo del 4 de enero, la Embajada de EEUU en Argentina informa que “una fuente de de habitud  confiable…. Dijo el 19 de diciembre de 1977 que De Gregorio era un oficial de alto rango dentro de los Montoneros y que estaba detenido en le Escuela Mecánica de la Armada”.

De Gregorio desapareció luego de ser visto prisionero en la ESMA por varios testigos incluyendo a Jaime Dri*.

*”Ya en las proximidades de la ESMA los del Falcon llamaron a Selenio, anunciando el regreso. Diez minutos después los enfermeros depositaban  al  Sordo [De Gregorio]  en  una  camilla de la enfermería”. (Bonasso, 321)


Enero 12, 1978 – Petición de Asistencia de EEUU para Encontrar a Parlamentario

Cable Secreto de la Embajada de EEUU en Roma

El Ministro Consejero (Deputy Chief of Mission) estadounidense en Roma explica al Departamento de Estado y las Embajadas en Montevideo y Buenos Aires que el Embajador ha recibido una carta del Nuncio Apostólico pidiendo ayuda para localizar a parlamentario argentino Jaime Dri. El Nuncio ha tomado esta iniciativa a instancias del hermano de Jaime Dri, quien es sacerdote en Roma. Según la información proporcionada, Jaime Dri se encontraba en Uruguay cuando se dejo de comunicar con su familia en diciembre. Se dice que la familia Dri tiene amistad con el presidente panameño Omar Torrijos. El Nuncio solicita que la embajada estadounidense en Montevideo investigue para aclarar lo que ha sido de Jaime Dri.


Enero 18, 1978 – [Conferencia de Prensa de Tucho Valenzuela]

Transcripción de la Dirección Federal de Seguridad de México

En una explosiva conferencia de prensa en Ciudad de México, el Montonero Tulio [Tucho] Valenzuela cuenta como fue capturado en Rosario, Argentina, a finales del año 1977, detenido clandestinamente junto a un grupo de Montoneros forzados a colaborar con el ejército argentino, y traído a México junto a otro colaborador y agentes de inteligencia argentinos con el fin de dar un golpe a Montoneros que tiene una base política en México. Una vez en esta ciudad, Valenzuela escapa al control de los agentes de inteligencia argentinos y denuncia la operación ante la prensa. Este documento obtenido de la Dirección Federal de Seguridad de México, transcribe las declaraciones de Valenzuela. Entre otras revelaciones, Valenzuela da cuenta que:

“En una parte del Segundo Cuerpo del Ejercito [argentino en Rosario] uno de los compañeros que está en esa quinta es el compañero Jaime Dri, quien me relata su historia de su detención y como llegó hasta ahí. El compañero fue detenido en la calle cuando estaba en un auto, después de una cita junto con el compañero Juan Alejandro Barry. Los chocaron en un auto. Ellos estaban desarmados. Esto fue en Uruguay. Trataron de escaparse… al compañero Barry lo matan y el compañero Jaime Dri recibe dos impactos, uno en cada pierna. Inmediatamente es trasladado… [a] dependencias militares del ejército del Uruguay y torturado salvajemente por 15 días…. Participan en el interrogatorio miembros de la Escuela Mecánica de la Armada de la Argentina… Trasladan al compañero Jaime Dri a la Escuela Mecánica de la Armada… posteriormente el compañero Jaime Dri es trasladado a Rosario, a la misma quinta donde estoy yo… Me relata también las circunstancias de la caída de un comandante segundo del partido [Montoneros], compañero De Gregorio, que fue capturado en Colonia [Uruguay] el 14 de Noviembre…”

Tulio Valenzuela informa además que antes de llegar a México los agentes de inteligencia y prisioneros pasaron por Brasil y Guatemala. En sus declaraciones aparecidas en el libro Recuerdo de la Muerte, Jaime Dri cuenta que fue trasladado de la ESMA a Rosario temporalmente, donde encontró a Tulio Valenzuela y se enteró de la operación de la inteligencia militar a México.

Nota: El transcriptor de la conferencia de prensa es seguramente un agente de inteligencia mexicano que desconoce el contexto por lo que varios nombres en la transcripción están cambiados seguramente por ignorancia del transcriptor sobre como deletrear los nombres originales. Jaime Dri por  ejemplo aparece como Jaime Lee. Una versión original de estas declaraciones encontrada entre los documentos del Departamento de EEUU, fue publicada en 2008 en la gacetilla electrónica Operación Clandestina de la Inteligencia Militar Argentina en México, National Security Archive Electronic Briefing Book No. 241.


Enero 20, 1978 – [Carta al Presidente de EEUU James Carter de Olimpia Díaz]

Copia de carta en archivos del Departamento de Estado de EEUU

Dos días después de enterarse del testimonio del ciudadano argentino Tulio Valenzuela en México, la esposa de Jaime Dri, la panameña Olimpia Díaz, envía una carta dirigida al presidente estadounidense James Carter solicitando su ayuda para localizar a su esposo. Olimpia explica que antes de desaparecer, su esposo fue visto por última vez en Montevideo el 10 de diciembre de 1977, de camino a Panamá. Además, se ha enterado que a mediados de diciembre, varios argentinos fueron detenidos en Uruguay y trasladados a Argentina, lo cual coincide con la desaparición de su esposo y teme que él se encuentre entre ellos. Lo que confirmó sus sospechas fueron las declaraciones hechas por Tulio Valenzuela. Al final de su carta, Olimpia añade que su cuñado, hermano de Jaime Dri, “ha realizado gestiones ante la Santa Sede”.


Enero 23, 1978 – Parlamentario Desaparecido – Jaime Feliciano Dri Lodi

Cable Secreto de la Embajada de EEUU en Montevideo

En respuesta a la solicitud de la embajada estadounidense en Roma el 12 de enero de 1978, la embajada estadounidense en Montevideo envía un cable secreto dirigido a sus homólogos en Roma, explicando que Jaime Dri fue “detenido cerca de Montevideo el pasado 15 de diciembre, durante una redada de las fuerzas de seguridad locales contra terroristas argentinos Montoneros”. Y agrega que “el sujeto ofreció resistencia armada y fue herido en la pierna antes de su captura. Además nos han informado que el GOU [Gobierno de Uruguay] tiene la intención de entregar a todos los detenidos solapadamente a las autoridades argentinas… la detención del sujeto [Dri] no es, repito, no es de conocimiento público… Los detalles del incidente, las identidades de los arrestados que no han sido publicadas y su eventual destino, es información retenida firmemente por el GOU”. El cable termina diciendo que “la información anterior es clasificada y extremadamente sensible y es todo lo que está a disposición de la embajada y no pensamos que sea posible extraer información útil y desclasificada que pueda ser transmitida al Nuncio Apostólico en Roma”.


Marzo 17, 1978 – [Carta a Olimpia Díaz]

Inquisitoria Respecto de Jaime Dri
Documentos de la Embajada de EEUU en Panamá

A instancias de la Casa Blanca, la Segunda Secretaria de la embajada estadounidense en Panamá, Ruth Hansen, se comunica con Olimpia Díaz informándole que están requiriendo a la Embajada de EEUU en Argentina que recaben cualquier información que tengan respecto de Jaime Dri. Ese mismo día, Hansen envía un memorándum a la Embajada de EEUU en Buenos Aires pidiéndole información sobre el caso de Jaime Dri. Sorprendentemente, no se menciona por ninguna parte la información que tiene la Embajada de EEUU en Montevideo sobre la efectiva detención de Jaime Dri y su probable traslado a fuerzas de seguridad argentinas.


Abril 10, 1978 – [Carta de Horacio Domingo Maggio a Prensa Asociada]

[Carta de Horacio Domingo Maggio al Embajador de Estados Unidos]
Carta personal en los archivos del Departamento de Estado

Un prisionero clandestino que ha escapado de la Escuela Mecánica de la Armada envía una larga carta al Embajador de los Estados Unidos Raúl Castro y a la Prensa Asociada (Associated Press, AP). En ella da cuenta de un inmenso centro de detención en esas instalaciones y de las aberrantes prácticas de tortura. En particular, Horacio Domingo Maggio cuenta que “Me trasladaron a lo que luego supe era la Escuela Mecánica de la Armada. Fui sometido a torturas (‘picana’ o ‘maquina’ y ‘submarino’) al igual que la mayoría de la gente que estaba allí y que aun sigue estando. Entre otros… el dirigente nacional del Movimiento Peronista Montonero, Jaime Dri, que fuera secuestrado en Uruguay”.


Junio 23, 1978 – Desaparición de Jaime Dri  

En respuesta a la carta de la embajada estadounidense en Panamá del 17 de marzo de 1978, la embajada en Buenos Aires informa que presentó el caso de Jaime Dri al Grupo de Trabajo de Derechos Humanos de la Oficina del Ministerio de Relaciones Exteriores argentino. Sin embargo, Buenos Aires hace notar que esa oficina sólo suele responder a “solicitudes donde las personas han sido detenidas legalmente bajo cargos criminales o por decreto del ejecutivo”. La implicación es que probablemente no obtendrán respuesta positiva debido a que Dri está desaparecido, es decir detenido clandestinamente. Sorprende que al final el cable deje entrever que no conocen la información que la Embajada de Montevideo tiene respecto de la efectiva detención de Dri. El Embajador Castro concluye remitiendo “Para la Embajada de Montevideo: Materiales sobre este caso están siendo enviados por valija diplomática pues parece que el secuestro ocurrió en Uruguay”.


Julio 20, 1978 – Desaparición de Jaime Dri

Una breve nota de la Embajada de Panamá  responde al memo de Buenos Aires e indica que Olimpia Díaz fue notificada de los magros resultados que se han obtenido en Argentina. Según el informe, Olimpia Díaz también se ha puesto en contacto con el gobierno de Panamá, que supuestamente está investigando el caso a través de su embajada en Argentina.


Julio 20, 1978 – [Datos Personales del Sujeto Jaime Dri]

Nota de la Policía de Asunción, Paraguay

El Jefe de la policía de Asunción, Paraguay, remite a su subalterno Jefe de la Dirección de Investigaciones “fotocopia de la fotografía y datos personales del sujeto Jaime Dri, a fin de que se sirva disponer su captura”. Los datos han sido proveídos evidentemente a los paraguayos por una fuerza de seguridad argentina.

Junto a la fotografía, una serie de datos indican “Jaime Dri, ‘Pelado’, Oficial de Montoneros… Camisa a cuadros, pantalón gris”. Y concluyen “Ayer, se escapo de un Taxi camino a Itá Enramada de su custodia”*.

* En Recuerdo de la Muerte este episodio es relatado así: “- Yo me tomo un taxi…
-¡Vamos a Itá Enramada! – ordena [el custodia] Alberto… Antes de que se detenga la marcha, el Pelado [Jaime Dri] abre la puerta y se lanza…” (Bonasso, 428)


Julio 21, 1978

  1. Pedido de búsqueda N° 020/78:  Actividades de elementos subversivos Montoneros
  2. Anexo 1: Fotos, factura y documento de identidad

Documento del Estado Mayor General de la Fuerza Armada de  Paraguay (ESMAGENFA)

La Policía de Asunción, Paraguay, transcribe un informe del Departamento II de Inteligencia del Estado Mayor General de las Fuerzas Armadas Paraguayas (ESMAGENFA). El Ejército ha recibido de una “Agencia de Inteligencia de país amigo” una petición de capturar a Jaime Dri quien “se escapó de las Autoridades Argentinas de Pilcomayo, Argentina” hacia el Paraguay. “En el momento de la fuga, el causante vestía una camisa mangas largas a rayas verticales, color rosado y pantalones gris”*. Entre los anexos al pedido de búsqueda se incluyen fotos, una factura, documento de identidad y un Prontuario sobre Jaime Dri.

*En Recuerdo de la Muerte, Jaime Dri reflexiona que “[l]a policía debe tener ya la descripción de un hombre alto, calvo, así y así, vestido con un vaquero y una camisa de color rosado” (Bonasso, 430).


Julio 21, 1978 – Anexo 1: Prontuario: Informe Acerca de la Situación Personal de Jaime Dri, Pelado

Documento de Agencia de Seguridad Argentina

El Pedido de Búsqueda No 020/78 de la ESAMGENFA del Paraguay incluye un Prontuario de una agencia de inteligencia Argentina desconocida. El documento da un panorama general de Jaime Dri y sus actitudes disidentes de Montoneros. En un remarcable párrafo, el documento confirma media docena de aspectos secretos clave de Operación México, que hasta hoy sólo se conocían por el testimonio de Jaime Dri. Lanzada en enero de 1978, Operación México implicó a oficiales de inteligencia argentina, junto a Montoneros capturados, quienes viajaron desde Argentina hacia México a fin de asesinar a la dirigencia de Montoneros en Ciudad de México. La Operación falló, los agentes volvieron a Argentina y asesinaron a los prisioneros testigos. Jaime Dri sobrevivió.

Entre otros, Dri en su testimonio publicado da cuenta que:

  1. el  grupo de inteligencia salió en misión oficial de Rosario, Argentina rumbo a México
  2. llevaban prisionero al Montonero Tulio [Tucho] Valenzuela
  3. los agentes de inteligencia iban en misión oficial a México
  4. en el camino hicieron que Tucho aparentara no estar capturado y llamara a sus contactos en México
  5. respondió la esposa de Jaime Dri Olimpia Díaz quien informó volvería pronto a Panamá.
  6. Jaime Dri vio volver a los agentes de inteligencia luego de la fallida Operación México

El prontuario ratifica este recuento diciendo,

“De regreso de México, la comisión oficial que acompaño a ‘TUCHO’ le hizo saber a DRI JAIME ‘Pelado’, que en oportunidad de llamar ‘TUCHO’ desde Brasil a la casa Argentina en México, se comunicó con ella [su esposa] que en ese momento se encontraba allí; y había manifestado que el día siguiente regresaba a Panamá”.

*En recuerdo de la muerte varios episodios son relatados así:

“Valenzuela llama a México… Para su sorpresa lo atiende Olimpia Díaz. La negra le comenta… que regresa a Panamá…” (Bonasso, 208)

“Los protagonistas de la Operación México ya se habían reintegrado….” (Bonasso, 280)


Octubre 04, 1978 –
Desaparición de Jaime Dri

En octubre del 1978, la embajada estadounidense en Argentina, envía un informe a la embajada de Panamá lamentando la falta de información conseguida en el caso de Jaime Dri. Según el informe, “Nos parece que el Jaime Dri es uno de entre miles de desaparecidos cuyo destino es desconocido… en muy pocas ocasiones alguien que estaba desaparecido aparecerá en una lista de una prisión. La respuesta estándar por alguien que ha desaparecido es no hay registro de detención”.

Y concluye “Sentimos no poder ofrecer a la señora Dri algún tipo de aliento positivo o incluso información sólida.
Los oficiales de la embajada [de Panamá] se darán cuenta del nivel de secretividad que prevalece entre los oficiales argentinos sobre esta faceta de la campaña anti subversiva, y de por qué es improbable que alguna vez se conozca el destino de Jaime Dri a menos – que por alguna casualidad – este todavía vivo y las autoridades militares decidan hacerlo aparecer”.

TOP-SECRET – Archival Evidence of Mexico’s Human Rights Crimes: The Case of Aleida Gallangos

Roberto Antonio Gallangos Cruz, following his detention on July 26, 1968, in the midst of the student protests. The photograph was part of the Mexican intelligence files compiled by DFS agents, and made available in the AGN years later.

[Source: AGN, DFS files, 11-235, Legajo 30, Folio 17]

rchival Evidence of Mexico’s Human Rights Crimes: The Case of Aleida GallangosNational Security Archive Electronic Briefing Book No. 307

Washington, DC, September 9, 2011 – A Mexican human rights activist who was orphaned in infancy when her parents disappeared at the hands of government forces filed a petition before the Inter-American Human Rights Commission (IAHRC) yesterday, drawing on dozens of declassified U.S. and Mexican documents as evidence. Aleida Gallangos Vargas–whose case became widely known in 2004 when she tracked down her long-lost brother through intelligence records found in Mexico’s national archives–joined with her paternal grandmother to charge the State with responsibility for the secret detention and disappearance in 1975 of her parents, Roberto Antonio Gallangos Cruz and Carmen Vargas Pérez, among other family members. Today the National Security Archive is posting a selection of the documents being used in the case, obtained by the Archive through the Freedom of Information Act and from the Mexican government. Aleida was two years old when her parents were captured; she was rescued by a friend of her parents who himself was killed by security forces in 1976. Aleida was adopted by his family and renamed Luz Elba Gorostiola Herrera. Aleida’s brother Lucio Antonio, who was three when Roberto Antonio and Carmen disappeared, was taken by members of the government death squad that raided their home in June 1975; shortly afterwards he was delivered to an orphanage and in February 1976 was adopted by a couple and christened Juan Carlos Hernández Valadez. The two children grew up in separate lives knowing nothing of their true identities or of their relationship. The history of the Gallangos-Vargas family emerged in 2001 when a magazine published an interview with Roberto Antonio’s mother, Quirina Cruz Calvo, along with photographs of the disappeared couple and their two small children. Aleida’s adoptive family recognized Luz Elba’s face in the pictures and Aleida was reunited with her grandmother. She spent the next several years piecing together the circumstances of the Mexican government’s role in abducting and secretly detaining her parents. Using government records that had been located by the office of the Special Prosecutor assigned to investigate past political crimes, Aleida managed to track down her brother in the United States in 2004, 29 years after their separation. The records Aleida used to find Lucio Antonio–along with dozens more obtained by the National Security Archive through requests to the Mexican and U.S. governments–now serve as critical evidence in the case brought by Aleida on March 8 before the Inter-American Human Rights Commission. The Inter-American system has been an important venue for victims and activists seeking recourse from the Mexican government for state-sponsored human rights crimes committed during the 1960s-80s. On November 23, 2009, the Inter-American Human Rights Court issued a landmark decision, finding Mexico responsible for the illegal detention and disappearance of Rosendo Radilla, a schoolteacher and social activist stopped at a military checkpoint in Atoyac, Guerrero on August 25, 1974. Radilla–known for his songs of social protest and his admiration of Lucio Cabañas, the popular guerrilla leader from Guerrero–was disappeared at the height of the State’s extralegal counterinsurgency campaign against rebels and their supporters in southern Mexico in the early 1970s [see NSA briefing book on Lucio Cabañas, and the Dawn of the Dirty War]. The 2009 ruling marked the first Inter-American decision against Mexico for abuses committed during the “dirty war.” The court ordered the government to pay reparations to the family members for the years of suffering inflicted as a result of the crime. The Radilla decision established an important precedent for future legal action targeting Mexico’s unresolved human rights crimes of the past. To date, Mexico’s political and judicial systems have proven incapable of dealing with even the most notorious atrocities of the “dirty war,” such as the 1968 and 1971 student massacres and the hundreds of cases of illegal detentions, torture, and forced disappearances carried out around the country in the 1970s and early 1980s. In addition to the Army’s rural counterinsurgency violence, Mexico’s intelligence services carried out a carefully orchestrated program of kidnappings and disappearances in the country’s urban centers in an effort to dismantle guerrilla networks and eliminate social and political opposition. One of the victims of the government’s urban counterinsurgency was Roberto Antonio Gallangos Cruz, an activist involved in the 1968 student movement and later a militant in the radical 23rd of September Communist League. In the summer of ’68, Roberto Antonio joined the anti-war protests in Mexico City and marched for greater democratic openness from Mexico’s closed political system. He became one of the hundreds of protestors monitored by government spies gathering information on student activists. Internal Mexican intelligence records report that Roberto Antonio participated in rallies, reciting anti-war poems such as “los tres pueblos,” which he delivered during a demonstration on April 23, 1968 [see Doc 5; DFS report on Roberto Antonio]. Security forces detained Roberto Antonio on July 26 during government round-ups of student agitators that culminated in the October 2 Tlatelolco massacre. (Note 1) He was held in the infamous Lecumberri prison in Mexico City for over two months, where state intelligence agents kept close tabs on his visitors. While the charges against him were insufficient to keep him in prison, the Federal Security Directorate (Dirección Federal de Seguridad – DFS) continued to monitor his activities following his release. Over the next seven years, government security services assembled a thick intelligence file documenting Roberto Antonio’s association with Mexico’s guerrilla groups. The violent efforts of the ruling Institutional Revolutionary Party (Partido Revolucionario Institutional—PRI) to crush the peaceful 1968 student movement was a pivotal moment that dramatically radicalized the social and political opposition, increasing popular support for Mexico’s insurgent groups. The 23rd of September Communist League (Liga Comunista de 23 de Septiembre) was one of the urban guerrilla groups that grew in strength as a result, and in turn became a central target of the organized violence that characterized the government’s counterinsurgency efforts during the period. Following the kidnapping by leftists of U.S. Consul General Terrance Leonhardy in May 1973 and U.S. Vice-Consul John L. Patterson in March 1974, Mexican security forces were given even greater freedom to attack insurgent groups and their supporters. The DFS in particular became the driving force behind State terror, serving as Mexico’s internal political police force [see Doc 1: on the growth of the DFS]. U.S. agencies also expanded their coordination with their Mexican intelligence counterparts, increasing their information gathering on Mexico’s leftists groups. The DFS agents regularly shared intelligence with the FBI attachés in the U.S. Embassy and consulates in Mexico’s northern cities [see FBI memorandum: Doc 2 on the 23 of September group]. The long connection between the DFS and the CIA also provided a central source of information for Mexico’s internal security apparatus to confront the armed groups. (Note 2) It was during this period of urban counterinsurgency that the web of Mexico’s intelligence services grew, as information flowed to and from Mexico City to the Army and police installations throughout the country. The DFS institutionalized the State’s ability to gather information, detain suspects, torture and disappear with ultimate deniability. Seven years after the 1968 crackdown, Roberto Antonio Gallangos became a victim of the DFS campaign of disappearances. According to Mexican intelligence documents obtained by the National Security Archive, Roberto Antonio – by then living underground as a member of the 23rd of September Communist League – was spotted walking on a Mexico City street by a police sergeant. After a brief shootout, police captured Gallangos and turned him over to the DFS [Doc 4]. DFS agents interrogated and tortured him, extracting information about his family, social, and organizational affiliations. The declassified Mexican documents describe Roberto Antonio Gallangos as a radical criminal, with links to a network of subversive organizations and a background in bank robberies, kidnapping and murder. It is difficult to evaluate the veracity of the many allegations made in the documents against him, his family, friends and associates. Federal security agents often exaggerated the threat from leftist groups in order to justify aggressive counterinsurgency measures. (Note 3) Torture and forced confessions were commonly used against suspected subversives, and photos taken of Gallangos during detention seem to show signs of torture [Doc 6]. But while the DFS files reported on his alleged crimes, the information was never meant for use as legal evidence in a court of law. Rather, intelligence gathered through surveillance, abduction and torture was used to locate associates of suspected guerrillas, dismantle social networks, and terrorize their base of support. In the case of Gallangos, the DFS agents sought information about his wife and other militant friends and family members, but it is uncertain whether or not what Gallangos told his interrogators was true. Security forces did not capture his wife Carmen Vargas Pérez for more than a month after his kidnapping (detained July 26, 1975); his brother Avelino Francisco Gallangos Cruz was caught one month after that (August 22, 1975). Both remain among Mexico’s disappeared (Note 4). What is clear is that the government’s detention of Gallangos on June 19, 1975, had tragic and lasting repercussions for Roberto’s family, including the “disappearance” of his children until they discovered their identities years later. The case exemplifies how government terror functioned not only to combat the guerrillas, but also destroy the social fabric of groups who opposed the government’s authority. The secret DFS documents obtained by the Archive expose the inner workings of Mexico’s urban counterinsurgency campaign in the 1970s and reveal the involvement of the highest levels of government in political crimes of state. The abuses included illegal spying and infiltration of leftist groups, unwarranted police raids, secret detentions and transfers of prisoners, abduction, torture, and murder. The intelligence files were signed by then-Chief of the agency, Capitan Luis de la Barreda Moreno (head from 1970-75). Senior DFS agents such as Miguel Nazar Haro participated directly in the operations, interrogation and torture of prisoners. (Note 5) The information gathered flowed to the Interior Ministry (Secretaría de Gobernación), at the time led by Mario Moya Palencia. Number two in Gobernación was the career-spy chief Fernando Gutiérrez Barrios, who served in the DFS for over 20 years and directed the agency from 1964 until his long-time friend de la Barreda took over in 1970. Gutiérrez Barrios occupied Mexico’s most senior intelligence position as Deputy Minister of the Interior, regularly receiving DFS traffic on suspected subversives, and playing a central role in the extermination campaign against Mexico’s left. At the top of the chain of command was Luis Echeverría, Interior Minister from 1964-70, and head of state from 1970-76. Despite evidence demonstrating direct government involvement in the urban disappearances, a special prosecutor assigned in 2002 by President Vicente Fox to investigate past human rights crimes failed to bring Luis Echeverría or any of his senior military, police or intelligence commanders to justice. In 2003, the prosecutor, Dr. Ignacio Carillo Prieto, asked the United State Embassy in Mexico City for declassified cables on de la Barreda and Nazar Haro [Doc 13] and brought charges against the officials for the forced disappearance of Jesús Piedra Ibarra, another member of the 23rd of September group detained in April 1975. But the special prosecutor was unable to win convictions and the charges were dropped. The DFS officials who have gone to jail since the “dirty war” have done so for their involvement in drug trafficking rather than for human rights crimes. There is a deep connection between the former Mexican intelligence service and the country’s drug mafias. As DFS agents took command of counterinsurgency raids in the 1970s, they often stumbled upon narcotics safe houses and quickly took on the job of protecting Mexico’s drug cartels. The DFS was disbanded in 1985 following revelations that it was behind the murder of DEA agent Enrique “Kiki” Camarena, and Mexican journalist Manuel Buendia. (Note 6) Some 1,500 agents suddenly unemployed with the abolishment of the DFS found their training in covert activities and brutal counterinsurgency operations easily adaptable to the needs of the criminal underworld. Many joined the ranks of the powerful drug cartels or served the traffickers while working on local and federal police forces [see Doc 11 & Doc 12 on DFS agents and drugs]. By failing to prosecute a single case against the former agents, the Special Prosecutor missed a crucial opportunity to bring some of Mexico’s most corrupt officials to justice, allowing impunity to remain entrenched in Mexican society. The Special Prosecutor also failed to fully clarify the crimes of the past or locate any of Mexico’s disappeared. Carrillo Prieto claimed as his own success the discovery and identification of Lucio Antonio Gallangos Vargas, the missing son of Roberto Antonio Gallangos and Carmen Vargas. (Note 7) In fact it was due to the efforts Aleida Gallangos that her brother was located. Although she began her search as part of the “Citizen’s Committee” created by the Special Prosecutor’s office, she resigned from the committee in disgust with the prosecutor’s fruitless investigations. After traveling to Washington, where she says she was threatened by the Mexican consulate, she finally located her brother in the winter of 2004. The Special Prosecutor then organized an ad-hoc press conference in an attempt to take credit for locating Lucio Antonio. In a cable to Washington, U.S. Embassy officials discounted Carrillo Prieto’s claims and cited an independent evaluation of his work that called his office “unresponsive” to victims’ needs. [see Doc 14]. With yesterday’s filing of the case “Luz Elba Gorostiola Herrera and Quirina Cruz Calvo against the State of Mexico” before the Inter-American Human Rights Commission, Aleida and her biological and adoptive families have underscored the failure of the Mexican government to bring the perpetrators of past human rights atrocities to justice. Mexico’s inability to resolve these cases has left survivors of the dirty war and families of the disappeared without legal recourse at the national level. With the groundbreaking Radilla decision of 2009, the Inter-American system offers new hope for victims of Mexico’s dirty war to find a measure of justice at last. It is a critical juncture for Mexican citizens searching for truth about the country’s dark period of state-sponsored violence that remains an impediment to justice in Mexico today.


U.S. and Mexican Documents on the Dirty War Disappearances, Drugs, and the Failure of the Special Prosecutor Document 1 January 4, 1974 The Current Security Situation in Mexico: An Appraisal U.S. Embassy in Mexico, Secret Airgram 13 pages The U.S. Embassy in Mexico reports on a rising wave of crime beginning in mid-September 1973, creating a “climate of some anxiety” in Mexico. The report provides background on the rising tide of armed opposition to the Mexican government, tracing the growing rebellion to the government’s brutal “counteraction” against 1968 student demonstrations. It also provides a list of “politically-motivated acts of violence” that characterized the first three years of the Echeverría administration, including the 1971 student killings by government forces, and the kidnapping by leftists of U.S. Consul General Terrance G. Leonhardy. To U.S. officials, these incidents demonstrated the “deficiencies” of the army and police forces, and highlighted the importance of covert operations under the direction of the Federal Security Directorate (Dirección Federal de Seguridad – DFS). The Embassy believed that the DFS, “whose responsibilities also include protection of the president, intelligence collection and coordination, surveillance of some foreign embassies, etc.”, was the only body to have “emerged from this period with reason for pride in its accomplishments.” While Luis Echeverría had increased DFS staff and power, the Embassy predicts that sporadic acts of political violence will continue until “security agencies have improved their capabilities to the point where they can quickly apprehend the perpetrators in a high percentage of cases and infiltrate terrorist groups in order to dismantle them completely.” Source: Released to the National Security Archive under the Freedom of Information Act Document 2 March 11, 1974 Characterization of Mexican Revolutionary, Terrorist and Guerrilla Groups FBI, Legal Attaché in Mexico City, Secret Memorandum 12 pages The FBI attachés in Mexico produced regular reports on the urban guerrilla groups during this period, relating back to Washington the information they received from Mexican intelligence agents. This memorandum provides profiles of ten Mexican revolutionary and guerrilla groups, including the 23rd of September Communist League (LCS). It refers to the 23rd of September group as one of the most highly organized guerrilla organizations, and says that its many of its members have been involved in other revolutionary groups in Mexico. Source: Released to the National Security Archive under the Freedom of Information Act Document 3 December 6, 1974 Mexican Terrorist Captured in Abortive Attempt to Negotiate Safe Passage out of Mexico U.S. Embassy in Mexico, Unclassified Cable 1 page DFS agents not only coordinated counterinsurgency strategies during the 1970s, but participated directly in operations, including detentions, extralegal raids, and forced disappearances. This cable reports on the arrest of Miguel Angel Torres Enríquez, an alleged member of the 23rd of September Communist League, on December 5, 1974, after he had taken two French embassy consular officers hostage in an attempt to secure safe passage to France. Working undercover, then-DFS agent Miguel Nazar Haro participated directly in the operation, posing as a Mexican Foreign Secretary official and, after exchanging himself for the hostages, bringing Torres to the airport where he was arrested. According to the Special Prosecutor’s report released years later, the search for Torres Enríquez involved raids by DFS agents on his house and violent attacks against his family and friends. Source: Released to the National Security Archive under the Freedom of Information Act Document 4 June 19, 1975 “23 of September” Communist League; “Red Brigade” Dirección Federal de Seguridad (DFS) 1 page This document, signed by DFS Director Luis de la Barreda Moreno, gives the agency’s version of the events that led to the arrest of Roberto Antonio Gallangos Cruz, alias “Simón.” According to the report, at 3:00 pm, July 19, 1975, police sergeant Lázaro Juárez Almaguer noticed an individual with a pistol hidden in his waist, who, when asked to identify himself, removed the weapon and fired, hitting one policeman in the arm. More police quickly arrived on the scene and detained the subject. DFS agents took custody of Roberto Antonio and interrogated him, identifying him as part of a clandestine cell of the urban guerrilla group the 23rd of September Communist League. Source: Archivo General de la Nación (AGN), made available by the Special Prosecutor’s Office [Fiscalía Especial para Movimientos Sociales y Políticos del Pasado (FEMOSPP)] Document 5 June 19, 1975 Antecedents of Roberto Antonio Gallangos Cruz (a) “Simón” Dirección Federal de Seguridad (DFS) 7 pages This intelligence report reveals that prior to the 1975 arrest of Roberto Antonio Gallangos, government agents had him under surveillance for years. The type of information gathered since at least the late 1960s included personal details such as his birthplace, education, physical characteristics, organizational affiliation, and previous arrests. The report also contains extensive information about his political activities, beginning with his involvement in the 1968 student protests. At a demonstration on April 23, 1968, for example, RobertoAntonio recited the anti-war poem, Los Tres Pueblos, “referring to the horrors of war, and demands for peace.” The report describes his detention on July 26, 1968 in the midst of the student round-ups, and the government’s attempts to charge Roberto Antonio with crimes such as damage to public property, robbery, resisting arrest, and causing injury to state authorities. It also tracks his visitors during his time in prison. The surveillance continued after his release. According to DFS intelligence, Roberto Antonio went on to participate in political meetings with Mexico’s leftist organizations and became involved with a wide variety of insurgent groups. Source: Archivo General de la Nación (AGN), made available by the Special Prosecutor’s Office [Fiscalía Especial para Movimientos Sociales y Políticos del Pasado (FEMOSPP)] Document 6 Photo Undated, taken after June 19, 1975 detention Dirección Federal de Seguridad (DFS) 2 pages This photograph of Roberto Antonio Gallangos Cruz was taken following his detention on June 19, 1975. The photo shows Roberto Antonio with a mark over his right eye, and a wet shirt; signs of the torture used by the DFS agents during his interrogation. Source: Archivo General de la Nación (AGN), DFS Exp. 11-235, Legajo 30, Folio 123 Document 7 June 20, 1975 “23 of September” Communist League Dirección Federal de Seguridad (DFS) 1 page A report filed by DFS director Luis de la Barreda 24 hours after Gallangos Cruz’s capture contains the first results of the agency’s interrogation of their prisoner, when he reveals the address of a supposed guerrilla safe house. The police proceeded to conduct a raid on the house, finding communist propaganda from the Liga Comunista “23 de Septiembre” and other incriminating material. Source: Archivo General de la Nación (AGN), made available by the Special Prosecutor’s Office[Fiscalía Especial para Movimientos Sociales y Políticos del Pasado (FEMOSPP)] Document 8 July 1, 1975 “23 of September” Communist League Dirección Federal de Seguridad (DFS) 1 page Under interrogation, Gallangos Cruz identified his wife and brother as fellow members of the Liga Comunista “23 de Septiembre.” This DFS report gives biographical background for Carmen Vargas Perez (“Sofía”) and Avelino Francisco Gallangos Cruz (“Federico,”). Source: Archivo General de la Nación (AGN), made available by the Special Prosecutor’s Office [Fiscalía Especial para Movimientos Sociales y Políticos del Pasado (FEMOSPP)] Document 9 August 22, 1975 “23 of September” Communist League Dirección Federal de Seguridad (DFS) 3 pages Roberto Antonio’s brother, Avelino Francisco Gallangos Cruz, was arrested in Mexico City at 9:40 am by three police officers. He was reportedly carrying a gun that they determined belonged to a police agent who was assassinated on November 30, 1974. The document gives biographical details and intelligence information about “Federico,” compiled through interrogations of his family and friends. Source: Archivo General de la Nación (AGN), made available by the Special Prosecutor’s Office [Fiscalía Especial para Movimientos Sociales y Políticos del Pasado (FEMOSPP)] Document 10 August 23, 1975 Liga Comunista “23 de Septiembre” Dirección Federal de Seguridad (DFS) 2 pages This document summarizes the result of the interrogations of Avelino Francisco Gallangos Cruz “Federico” and another member of the Liga Comunista “23 de Septiembre.” It describes how the Gallangos Cruz brothers joined the organization and contains details about the League’s purported activities. Source: Archivo General de la Nación (AGN), made available by the Special Prosecutor’s Office [Fiscalía Especial para Movimientos Sociales y Políticos del Pasado (FEMOSPP)] Document 11 March 27, 1990 Senior Customs Representative Hermosillo – Intelligence Report U.S. Consulate in Hermosillo, Mexico, redacted cable 7 pages Five years after the DFS was disbanded due to abuses and pervasive corruption, a U.S. Customs agent stationed in the Hermosillo Consulate, issues this report conveying growing concern over connections between former DFS agents and drug traffickers. The heavily redacted cable reports on drug kingpins who had worked with the DFS, and states that “several members of the DFS became heavily involved in drug trafficking and then in the murder of United States Drug Enforcement Administration Special Agent Enrique Camarena-Salazar.” Source: Released to the National Security Archive under the Freedom of Information Act Document 12 March 12, 1991 Javier García Paniagua to Head National Lottery, is Replaced by Santiago Tapia as Mexico City’s Police Chief U.S. Embassy in Mexico, Confidential Cable On March 7, 1991, Javier García Paniagua, former Director of Mexico’s Directorate of Federal Security (DFS), resigned as Mexico City’s Police Chief to become Director General of the National Lottery. García Paniagua had been police chief since 1988, and his appointment caused controversy due to accusations that he approved and used torture during his years in the DFS.  In the cable, Embassy officials describe the DFS as “an agency with a reputation for corruption and ruthlessness.” The cable notes that Miguel Nazar Haro, García Paniagua’s police deputy and intelligence chief, was accused of carrying out political killings and human rights abuses when he headed the DFS in the 1980s. In 1989, he was forced to resign from the Mexico City police amidst allegations that he protected drug traffickers. Source: Released to the National Security Archive under the Freedom of Information Act Document 13 June 13, 2003 Mexican Supreme Court Hands Down Landmark Decision on Extradition of Ricardo Cavallo for Crimes Against Humanity U.S. Embassy in Mexico, Unclassified Cable 3 pages On September 12, 2000, the Mexican Supreme Court handed down a decision upholding the legal basis for the extradition of Argentine national Ricardo Miguel Cavallo to Spain. Cavallo was arrested by Mexican Interpol on August 24 and was extradited to Spain for crimes of genocide and terrorism committed between 1976 and 1983. In this cable the Embassy comments on the possibility of the decision affecting Mexican domestic human rights cases, such as the case against Miguel Nazar Haro and Luis de la Barreda, who were “both accused of torture and ‘disappearing’ leftists during the so-called ‘Dirty War’ in Mexico during the 60s, 70s, and 80s.” The cable reports that Special Prosecutor Ignacio Carrillo Prieto, assigned to investigate human rights cases of the past, asked the Embassy to provide copies of declassified cables with information on the two former intelligence chiefs and their involvement in human rights abuses. Source: Released to the National Security Archive under the Freedom of Information Act Document 14 January 13, 2005 Special Prosecutor Makes Headlines but Limited Progress in Unraveling Past Human Rights Crimes U.S. Embassy in Mexico, Confidential Cable 3 pages The U.S. Embassy reports that the Special Prosecutor’s Office is moving slowly to prosecute Mexico’s political crimes of the past. Although the office had achieved some incremental progress, it was slow to locate victims and bring the perpetrators to trial. The cable cites the case of Aleida Gallangos and her efforts to locate her brother Lucio, almost 30 years after they were separated from their parents at the hands of government forces. Aleida had strongly criticized the Special Prosecutor’s Office, which, according to the cable, offered her little support in her search for her brother, but nevertheless tried to take the credit in a “hastily-called press conference,” after Aleida found Lucio living in the United States in December 2004. Source: Released to the National Security Archive under the Freedom of Information Act


Notes

1. Chapter 6 of the Special Prosecutor’s Report lists Roberto Antonio among those detained on July 26, 1968.
2. For more information on the historical collaboration between the CIA station in Mexico and DFS intelligence agents, see NSA briefing book “LITEMPO: The CIA’s Eyes on Tlatelolco”.
3. See for example Sergio Aguayo, La charola: una historia de los servicios de intelligencia en México, México, D.F, Grijalbo; Hoja Editorial; Hechos Confiables, 2001, pp. 133-34 for a reference to the “fantasies and exaggerations” employed in DFS documents about student protesters in 1968.
4. Chapter 8 of the Special Prosecutor’s report lists Avelino Gallangos and Carmen Vargas among the 69 individuals disappeared in Mexico City during the dirty war.
5. Chapter 10 of the Special Prosecutor’s report describes the counterinsurgency operations carried out by DFS agents in the early 1970s, and reports that Nazar Haro participated directly in extralegal detentions and interrogations of suspected guerrillas.
6. DFS chief Zorrilla was charged and sentence in 1989 to thirty-five years for the 1984 murder of Manuel Buendia, a journalist who exposed DFS official links to narco-trade. Another DFS chief, Nazar Haro, was linked to the murder of U.S. DEA agent Enrique Camarena. For more information on the DFS and drugs, see Julia Preston and Samuel Dillon, Opening Mexico: The Making of a Democracy, New York, Straus and Giroux, 2004.
7. See chapter 10 of the Special Prosecutor’s report.
In front of Lecumberri, the “Black Palace” – formerly a detention center for political prisoners, now home to the historical National Archives (AGN) – activists hang pictures of Mexico’s disappeared [Undated Photo. Source: AGN files].
Luis Echeverría (president from 1970-76) visiting Mexican officers and soldiers in Guerrero during the height of the military’s “dirty war” counterinsurgency campaign against Lucio Cabañas and his Party of the Poor [Source: AGN files]
Roberto Antonio Gallangos Cruz, taken sometime in between 1968 and 1975. This picture was part of the DFS intelligence files, and was retrieved prior to his disappearance as part of the government’s surveillance efforts to monitor his activities after the 1968 protests [Source: AGN, DFS files]
Roberto Antonio Gallangos Cruz, with his hands tied behind his back, after being detained on June 19, 1975. [Source: AGN, DFS files, 11-235, Legajo 30, Folio 124]
Carmen Vargas Pérez, prior to her detention and disappearance by DFS agents. This picture was part of the DFS intelligence files, and was retrieved by intelligence agents as part of the government’s surveillance efforts [Source: AGN, DFS files, 11-235, Legajo 30, Folio 43]
Carmen Vargas Pérez, prior to her detention and disappearance by DFS agents [Source: family’s personal files]
Weapons and leftist propaganda reportedly obtained through counterinsurgency raids in Mexico’s urban centers
</div></td>
</tr>
<tr>
<td></td>
</tr>
<tr>
<td>

</td>
</tr>
<tr>
<td>
<div align=”justify”>Suspected guerrillas detained by Mexican authorities

TOP-SECRET – Arms smuggling into Lebanon and the Gaza Strip

Cable dated:2009-11-18T14:32:00
S E C R E T SECTION 01 OF 02 TEL AVIV 002501
SIPDIS
E.O. 12958: DECL: 11/18/2019
TAGS: PREL, PGOV, MOPS, PTER, KWBG, EG, IR, LE, IS
SUBJECT: 40TH JPMG: COUNTERSMUGGLING TECHNICAL DISCUSSION (PART 2 OF 4)
Classified By: A/DCM Marc Sievers, reasons 1.4 (b),(d)

1. (S) Summary: Concurrent to the Joint Political Military Group (JPMG) Executive Session, IDF J5 and Israel Defense Intelligence (IDI) officers briefed U.S. JPMG delegation members on current arms transfers and weapons smuggling into Lebanon and the Gaza Strip. IDF J5 and IDI officers first focused on arms transfers to Hizballah in Lebanon via Iran and Syria, and provided current estimates of Hizballah arms. IDF J5 and IDI officers argued that Hizballah’s ultimate goal during any future conflict is to launch a massive number of missiles and rockets daily into Israeli territory, including those that can reach the Tel Aviv area. J5 and IDI also described the sophisticated smuggling routes from Iran into the Gaza Strip, arguing that Hamas is now more powerful than prior to Operation Cast Lead. IDF J5 and IDI officers noted improved countersmuggling efforts by Egypt, but stressed more must be done to curb smuggling into Gaza. This is the second of four cables (septel) reporting on the 40th Joint Political Military Group. End summary.

2. (SBU) Israeli attendees included representatives from the IDF J5, IDI, Shin Bet, and Mossad. The U.S. delegation was led by PM Coordinator for Counter Piracy Robert Maggi, and included PM/RSAT John Schwenk, OSD Israel Desk Officer Eric Lynn, J5 Israel Desk Officer LTC Alan Simms, U.S. DAO Tel Aviv Assistant Air Attache Matt Yocum, EUCOM LCDR Molly McCabe, and U.S. Embassy Tel Aviv political-military officer Jason Grubb.

3. (S) Maggi stressed the importance of and noted progress with counter-smuggling efforts into Gaza — but also acknowledged the GOI desire to see even further progress. He said the USG was looking for practical ideas to improve counter-smuggling efforts. IDF J5 officers argued that smuggling represents a strategic challenge for the GOI, which is facing a proliferation of knowledge and capabilities that are severely limiting Israel’s diplomatic options for peace. IDF J5 made the case that weapons and knowledge proliferate from state actors, which disrupts diplomatic regional efforts. IDF J5 highlighted “regional faultlines,” with the United States and Iran leading two opposing camps — and countries such as China, Russia, and Qatar remaining on the sidelines with unclear intentions.

4. (S) IDI officers briefed on arms “deliveries” to the Gaza Strip and Lebanon, making the case with the latter that these arms transfers were done openly and should not be considered smuggling. IDI noted that since 2006, Hizballah has increased its quantity of sophisticated arms with improved range and accuracy — these arms were acquired via Syria and Iran despite the presence of UNIFIL and Lebanese Armed Forces (LAF). IDI highlighted the continued desire by Hizballah to avenge the assassination of its former military commander Imad Mughniyah, and pointed to failed attempts to do so in Azerbaijan and Egypt. Finally, IDI reviewed the arms delivery route from Syria to Lebanon via the Beqa’a Valley, and then to points south through Beirut.

5. (S) IDI presented estimates of Hizballah arms in Lebanon, including a breakdown of arms south of the Litani River. According to the IDI, Hizballah possesses over 20,000 rockets, hundreds of 220 mm and 302 mm rockets, several hundred “Fajr” rockets, hundreds of simple anti-tank (AT) launchers with rockets and missiles, and hundreds of advanced anti-tank wire guided missiles (ATGM), dozens of SA-14, SA-7, and QW-1 anti-aircraft guns, several Ababil unmanned aerial vehicles (UAVs), an unknown quantity of C-802 coastal missiles and up to thousands of improvised explosive devices (IEDs).

6. (S) Given this arsenal, Maggi asked what the IDF thought Hizballah’s intentions were. IDI officers opined that Hizballah was preparing for a long conflict with Israel in which it hopes to launch a massive number of rockets at Israel per day. IDI officers noted in the 2006 Second Lebanon War, Tel Aviv was left untouched — Hizballah will try to change the equation during the next round and disrupt everyday life in Tel Aviv. A Mossad official noted that Hizballah will want to ensure it can launch rockets and missiles to the very last day of the conflict, i.e., avoid running out of munitions. He estimated that Hizballah will try to launch 400-600 rockets and missiles at Israel per day — 100 of which will be aimed at Tel Aviv. He noted that Hizballah is looking to sustain such launches for at least two months.

7. (S) IDI then shifted focus to the Gaza Strip, describing three circles of arms smuggling: 1. arms sources and

TEL AVIV 00002501 002 OF 002

financing, such as Iran, Syria, Lebanon, and unfettered arms markets such as Eritrea and Yemen, and possibly China; 2. transit areas and states such as the Red Sea, Yemen, Sudan, Syrian, Lebanon, and Libya; and finally, 3. the “close circle” along the Sinai-Egyptian border and Philadelphi route. Maggi asked what percentage of arms transfers occurred via land, sea and air. IDI noted that it was difficult to determine: smugglers tend to prefer the naval route — as there are fewer obstacles — but the last segment almost always occurred overland. IDF J5 added that land smugglers are learning from past experience and building new overland “bypasses.” When asked about air routes from Iran over Turkey, IDI officials indicated that Turkey has been made aware of such activity, although a Mossad representative suggested Turkey may not be entirely aware of the extent of such activity, given the IRGC’s smuggling expertise. The GOI highlighted that focusing solely on the last phase of smuggling (e.g. along the Philadelphi route) would only lead to limited success, and that wider efforts were key.

8. (S) IDI also provided an analysis of weapons entering Gaza following Operation Cast Lead. IDI noted that one of the goals of Cast Lead was to damage Hamas’ ability to produce its own weapons. In this regard, the IDF was successful, but Hamas is reconstituting its capabilities. According to the IDI, Hamas possibly possesses a few rockets with ranges over 40 km — perhaps as far as 60-70 km, or within range of Tel Aviv. In addition, the IDI believes Hamas possesses quality AT systems such as the Kornet PG-29 and quality anti-aircraft artillery (AAA). These weapons join an already potent arsenal including Grad rockets with ranges up to 40 km, ammonium perchlorate (APC) oxidizer for indigenous rocket production, hundreds of 120, 80 and 60 mm MBs, dozens of mortars, C5 K air-to-surface rockets, PG-7 AT rockets and launchers, SA-7 MANPADS, PKS AAA MGs and thousands of rounds of ammunition, and quality AT, such as Sagger missiles and launchers, and light anti-tank weapon (LAW) rockets.

9. (S) IDF J5 presented some basic benchmarks for possible countersmuggling solutions for Gaza. First, Egyptian national commitment is required. Other benchmarks outlined by the IDF included a clear chain of command, control of the Sinai and its inhabitants, systematic treatment of tunnel infrastructure, trial and imprisonment of smugglers, and overcoming traditional failures such as bribery and lack of coordination. IDF J5 noted that Egyptian Intelligence Minister Soliman has been supportive, while there is growing awareness on the part of Egyptian Defense Minister Tantawi — who the IDF views as an obstacle to counter-smuggling efforts. However, IDF J5 said there is a lack of coordination between the Egyptian Army and intelligence service on counter-smuggling efforts.

10. (S) The IDF has observed a more systematic response by Egypt in recent months, including assigning guards to newly discovered tunnel entries, or even blowing up tunnels — by IDF estimates, the Egyptian Army has collapsed 20-40 tunnels in the last 4-5 months. Nevertheless, the IDF continues to see a lack of urgency on the part of Egypt regarding smuggling into the Sinai; little attention has been paid to improving the socio-economic conditions of Bedouins primarily responsible for Sinai smuggling. While Egypt has made several key arrests — including prominent smuggler Muhammad Sha’er — others are still at large. Finally, the IDF noted the construction of an underground barrier and sensors’ network — but in many cases, the smugglers have dug deeper tunnels to avoid the network.

11. (S) The IDF J5 outlined consultations with geology and tunnel experts, whom suggested several possible solutions to the Sinai-Gaza tunneling network: constant and specific mine activity in the vicinity of the border to a depth of 20-30 meters; the use of a shock device or stun charge, or smoke at a tunnel entrance for deterrence purposes; constructing underground obstacles 90 meters deep to destabilize current tunnel infrastructure; close supervision and inspection of buildings in urban areas, in which there is a high concentration of trucks and newly built rooftops and roads; and the arrest of major smugglers — such as Darwish Madi — and utilization of interrogation to discover major tunnels and dismantle smuggling networks.

12. (U) PM Coordinator for Counter Piracy Maggi has cleared this cable. CUNNINGHAM

TOP-SECRET – Yemeni insiders losing patience with Saleh

Cable dated:2005-05-23T14:26:00
S E C R E T SECTION 01 OF 02 SANAA 001352
SIPDIS
E.O. 12958: DECL: 05/21/2015
TAGS: PREL, PGOV, PTER, PINR, KMCA, KMPI, DOMESTIC POLITICS
SUBJECT: ROYG INSIDERS INCREASINGLY FRUSTRATED WITH SALEH CLAN
REF: SANAA 966
Classified By: Ambassador Thomas C. Krajeski for reasons 1.4 b and d.

1. (S/NF) Ambassador met informally with XXXXXXXXXXXX. XXXXXXXXXXXX said that President Saleh is more interested in enriching his family than in making the strategic choices necessary to lead Yemen into the future. XXXXXXXXXXXX was gloomy about President Saleh’s ability to understand the importance of the issues of controlling SA/LW and intelligence sharing to U.S.-ROYG cooperation, and said Saleh did not comprehend what was necessary to maintain a close relationship with the USG in the long term. End Summary.

2. (S/NF) Echoing what we are increasingly hearing from those ROYG interlocutors closest to the Embassy, XXXXXXXXXXXX said that Saleh is more and more isolated, and less and less responsive to advice from those practical, progressive ROYG insiders XXXXXXXXXXXX. XXXXXXXXXXXX moaned that Saleh “listens to no one,” and is “unrealistically and stupidly confident” that he will always make the right decisions. Saleh, he said, does not think strategically and cares only about enriching his own family, particularly: XXXXXXXXXXXX Ali Mohsen al-Ahmar Commander of Northern Army (considered the second most powerful man in Yemen); XXXXXXXXXXXX

3. (S/NF) Together with Sheikh Abdullah al Ahmar’s clan (speaker of the Parliament and supreme chief the Hashid tribal confederation which includes Saleh’s tribe), all of Yemen’s wealth is being squandered and stolen by Saleh who is increasingly “greedy and paranoid,” especially regarding American intentions, said XXXXXXXXXXXX. XXXXXXXXXXXX are making millions working the diesel smuggling and black market along with Ali Mohsen, using military vehicles and NSB and CSF staff to move the fuel to markets in Yemen and Saudi Arabia. XXXXXXXXXXXX

4. (S/NF) XXXXXXXXXXXX also said that his contacts in Saada, including a leading sheikh (he would not give his name), are all furious with Saleh over the amount of indiscriminate killing and destruction perpetrated by the regular army in the north during last month’s suppression of the al-Houthi rebellion. XXXXXXXXXXXX claimed that the “Believing Youth” were by far the minority of the fighters in Saada, rather he said, most fighters came from tribes allied together against Saleh and the central government. He said Saleh is “extremely concerned” that he could lose control of the tribes in Saada and that this will spread to the al-Jawf and Ma’rib tribes.

5. (S/NF) “Everyone”, according to XXXXXXXXXXXX, has had it with the corruption of Saleh and his family. As an example, XXXXXXXXXXXX cited the outrageous costs of this Sunday’s May 22 celebration of the fifteenth Unity Day being held in Mukalla at a cost, claimed XXXXXXXXXXXX, of more than 300 million USD, most of which will go into the pockets of those government officials arranging the show. (Note: The price tag XXXXXXXXXXXX gave likely includes some of the massive development projects in Mukalla and elsewhere that the government is rushing to complete before May 22. End Note.)

6. (S/NF) Comment: XXXXXXXXXXXX is only one source, and this is not the first time he has given a pessimistic assessment of Saleh and his cronies. XXXXXXXXXXXX. But we are increasingly hearing hints and murmurs from others, including XXXXXXXXXXXX and SXXXXXXXXXXXX (who told Ambassador recently that he “wants out” of politics because the President no longer listens to his advice). Even XXXXXXXXXXXX, who, while most certainly profiting from the corrupt business dealings of XXXXXXXXXXXX and Saleh, claimed that he and a group of young GPC and Islah MP‘s intend to band together to force the government to control corruption and enact reforms.

7. (S/NF) Comment Continued. We have heard rumors backing up XXXXXXXXXXXX’s claim of an opposition candidate in 2006. Saleh is worried about a possible political challenge next year from Islah and the new opposition coalition JMP, or even from within the GPC. We may well see another clamp-down on the press and political parties “for security reasons” that will roll back some or much of the progress made in democratic reforms and human rights just in time for this year’s MCC reports. End Comment. Krajeski

TOP-SECRET: US Navy Undersea Surveillance Processing Facilities Eyeball

Naval Ocean Processing Facility (NOPF), 352 Bullpup Street, Dam Neck, Virginia Beach, VA36.764744 -75.958012

Note high-security double-fencing customarily used at top secret facilities.

[Image]

Naval Ocean Processing Facility (NOPF), 352 Bullpup Street, Dam Neck, Virginia Beach, VA[Image]
[Image]
[Image]
[Image]
Naval Ocean Processing Facility, Whidbey Island NAS, WAhttp://maps.google.com/maps?q=Whidbey+Island+NAS,+WA&hl=en&ll=48.341457,-122.68394
&spn=0.001583,0.004292&sll=37.0625,-95.677068&sspn=62.484575,104.589844&vpsrc=6&t=h&z=19

[Image]

[Image]
[Image]
[Image]
[Image]
[Image]

 


	

TOP-SECRET – FBI Mossad Sting Bags Big-Headed Egghead

Department of Justice

Office of Public Affairs

FOR IMMEDIATE RELEASE

Wednesday, September 7, 2011

Noted Scientist Pleads Guilty to Attempted Espionage

Scientist Arrested in 2009 Following Undercover Operation

WASHINGTON – Stewart David Nozette, a scientist who once worked for the Department of Energy, the Department of Defense, the National Aeronautics and Space Administration and the White House’s National Space Council, pleaded guilty today to attempted espionage for providing classified information to a person he believed to be an Israeli intelligence officer.

The guilty plea, which took place this morning in the U.S. District Court for the District of Columbia, was announced by Lisa Monaco, Assistant Attorney General for National Security; Ronald C. Machen Jr., U.S. Attorney for the District of Columbia; and James W. McJunkin, Assistant Director in Charge of the FBI’s Washington Field Office.

Nozette, 54, of Chevy Chase, Md., pleaded guilty to one count of attempted espionage. Senior Judge Paul L. Friedman, who presided at the plea hearing, scheduled a status hearing for Nov. 15, 2011. No sentencing date was set. The plea agreement, which is subject to the judge’s approval, calls for an agreed-upon prison term of 13 years.

Nozette has been in custody since his arrest on Oct. 19, 2009. FBI agents arrested him following an undercover operation in which he provided classified materials on three occasions, including one occasion that forms the basis for today’s guilty plea. He was subsequently indicted by a federal grand jury. The indictment does not allege that the government of Israel or anyone acting on its behalf committed any offense under U.S. laws in this case.

“ Stewart Nozette betrayed America’s trust by attempting to sell some of the nation’s most closely-guarded secrets for profit. Today, he is being held accountable for his actions. As this case demonstrates, we remain vigilant in protecting America’s secrets and in bringing to justice those who compromise them,” said Assistant Attorney General Monaco.

“Stewart Nozette was once a trusted scientist who maintained high-level government security clearances and was frequently granted access to classified information relating to our national defense. Today he is a disgraced criminal who was caught red-handed attempting to trade American secrets for personal profit. He will now have the next 13 years behind bars to contemplate his betrayal,” said U.S. Attorney Machen. “The FBI and its partners deserve tremendous credit for their outstanding work on this case. This investigation and prosecution demonstrate our commitment to identifying and punishing those who would put our national security at risk.”

“Preventing the loss or compromise of high-technology and vital national security information is a top priority of the FBI,” said Assistant Director in Charge McJunkin. “This case is a prime example of what happens when a person decides to sell our nation’s most valuable secrets for individual gain.”

Background

Nozette received a Ph.D. in Planetary Sciences from the Massachusetts Institute of Technology in 1983. He has worked in various capacities on behalf of the U.S. government in the development of state-of-the-art programs in defense and space. For example, Nozette worked at the White House on the National Space Council, Executive Office of the President, from approximately 1989 through 1990. He also worked as a physicist for the U.S. Department of Energy’s Lawrence Livermore National Laboratory from approximately 1990 to 1999, where he designed highly advanced technology.

Among other things, Nozette assisted in the development of the Clementine bi-static radar experiment which purportedly discovered water ice on the south pole of the moon. A version of the Clementine satellite currently hangs on display at the National Air and Space Museum of the Smithsonian Institution in Washington, D.C., and was later hailed as the vanguard of the new “faster, cheaper, better” revolution in space exploration.

Nozette was also the president, treasurer and director of the Alliance for Competitive Technology (ACT), a non-profit organization that he organized in March 1990. Between January 2000 and February 2006, Nozette, through his company, ACT, entered into agreements with several government agencies to develop highly advanced technology. Nozette performed some of this research and development at the U.S. Naval Research Laboratory in Washington, D.C., the Defense Advanced Research Projects Agency in Arlington, Va., and the National Aeronautics and Space Administration Goddard Space Flight Center in Greenbelt, Md.

According to a factual proffer in support of the guilty plea, from 1989 through 2006, Nozette held security clearances as high as TOP SECRET and had regular, frequent access to classified information and documents related to the national defense of the United States. The factual proffer also provides details about the undercover operation that led to Nozette’s arrest.

The Investigation

According to the factual proffer, on Feb. 16, 2007, law enforcement agents executed a search warrant at Nozette’s home in Maryland as part of a fraud investigation and found classified documents. Further investigation into the classified documents revealed that in 2002, Nozette sent an e-mail threatening to take a classified program he was working on, “to [foreign country] or Israel and do it there selling internationally…” As a result of this and other information giving rise to suspicion of espionage, the FBI decided to conduct an undercover operation.

On Sept. 3, 2009, Nozette was contacted via telephone by an individual purporting to be an Israeli intelligence officer from the Mossad, but who was, in fact, an undercover employee of the FBI. During that call, the defendant agreed to meet with the undercover employee that day on Connecticut Avenue N.W., in front of the Mayflower Hotel in downtown Washington, D.C.

Later that day, Nozette met with the undercover employee and had lunch in the restaurant of the Mayflower Hotel. After the undercover employee made it clear that he was a “Mossad” agent, Nozette stated, “Good. Happy to be of assistance.”

After lunch in the hotel restaurant, Nozette and the undercover employee retired to a hotel suite to continue their discussion. During the conversation, the defendant informed the undercover employee that he had clearances “all the way to Top Secret SCI, I had nuclear…,” that “anything that the U.S. has done in space I’ve seen,” and that he would provide classified information for money and a foreign passport to a country without extradition to the United States.

The defendant and the undercover employee met again on Sept. 4, 2009, at the Mayflower Hotel. During this encounter, Nozette assured the undercover employee that, although he no longer had legal access to any classified information at a U.S. government facility, he could, nonetheless, recall the classified information to which he had been granted access. The defendant said, “It’s in my” head, and pointed to his head.

Undercover Operation Continues

On Sept. 10, 2009, FBI agents left a letter in the prearranged “dead drop” facility for the defendant. In the letter, the FBI asked Nozette to answer a list of questions concerning classified U.S. satellite information. FBI agents also provided signature cards, in the defendant’s true name and an alias, for Nozette to sign and asked the defendant to provide four passport sized photographs for the Israeli passport the defendant requested. The FBI agents also left $2,000 cash for the defendant in the “dead drop” facility, which Nozette retrieved the same day, along with the questions and signature cards.

On Sept. 16, 2009, Nozette left a manila envelope in the “dead drop” facility in the District of Columbia. One of the “answers” provided by the defendant contained information classified as SECRET/SCI which related to the national defense, in that it directly concerned classified aspects and mission capabilities of a prototype overhead collection system and which disclosure would negate the ability to support military and intelligence operations. In addition to disclosing SECRET/SCI information, Nozette offered to reveal additional classified information that directly concerned nuclear weaponry, military spacecraft or satellites, and other major weapons systems.

On Sept. 17, 2009, FBI agents left a second communication in the “dead drop” facility for the defendant. In the letter, the FBI asked Nozette to answer another list of questions concerning classified U.S. satellite information. Nozette retrieved the questions from the “dead drop” facility later that same day.

On Oct. 1, 2009, Nozette left a manila envelope in the “dead drop” facility in the District of Columbia. The FBI also left a cash payment of $9,000 in the “dead drop” facility. Later that day, the FBI agents retrieved the sealed manila envelope left by the defendant. Inside the envelope, FBI agents discovered the encrypted thumb drive that was provided to Nozette on Sept. 17, 2009, which included another set of “answers” from the defendant. The “answers” contained information classified as TOP SECRET/SCI and other information classified as SECRET/SCI. This classified information related to the national defense, in that it directly concerned satellites, early warning systems, means of defense or retaliation against large-scale attack, communications intelligence information, and major elements of defense strategy. (This information is what formed the basis for the charge in today’s guilty plea.)

On Oct. 5, 2009, Nozette left a manila envelope in the “dead drop” facility in the District of Columbia. Later that day, the FBI agents retrieved the sealed manila envelope left by the defendant. Inside the envelope, FBI agents discovered the encrypted thumb drive that was provided to Nozette on Oct. 1, 2009, which included another set of “answers” from the defendant. The “answers” contained information classified as TOP SECRET/SAR. This classified information related to the national defense, in that it directly concerned capabilities of a U.S. military weapon system research and development effort.

Nozette and the undercover employee met again on Oct. 19, 2009, at the Mayflower Hotel. During that meeting, the following exchanges took place:

NOZETTE: “So, uh, I gave you even in this first run, some of the most classified information that there is. . . . I’ve sort of crossed the Rubicon. . . . Now the, uh, so I think when I said like fifty K, I think that was probably too low. . . .The cost to the U.S. Government was two hundred million. . . . to develop it all. Uh, and then that’s not including the launching of it. . .Uh, integrating the satellites. . . . So if you say okay that probably brings it to almost a billion dollars. . . So I tell ya at least two hundred million so I would say, you know, theoretically I should charge you certainly, you know, at most a one percent.”

Nozette was arrested soon after he made these statements. He was subsequently indicted on four charges of attempted espionage. Under the plea agreement, Nozette pleaded guilty to the third count of the indictment, arising out of his passing of TOP SECRET/SCI information on Oct. 1, 2009.

At the time of his arrest, Nozette was awaiting sentencing in another federal case. On Jan. 30, 2009, he pleaded guilty in the U.S. District Court for the District of Columbia to charges of conspiracy to defraud the U.S. government with respect to false claims and tax evasion in an amount up to $399,999. In that case, Nozette agreed to pay restitution of $265,205 to the U.S. government. Nozette is awaiting sentencing in the case. Under terms of today’s plea, the sentence in the fraud case is to run concurrently with the sentence for attempted espionage.

This investigation was conducted by the FBI’s Washington Field Office, with assistance from the Naval Criminal Investigative Service, Naval Audit Service, National Reconnaissance Office, Air Force Office of Special Investigations, Defense Computer Forensics Laboratory, Defense Advanced Research Projects Agency, Defense Criminal Investigative Service, Defense Contract Audit Agency, U.S. Army 902nd Military Intelligence Group, National Aeronautics and Space Administration (NASA) Office of Counterintelligence, NASA Office of Inspector General, Department of Energy , Internal Revenue Service (IRS) Criminal Investigation Division, IRS Tax Exempt & Government Entities group, U.S. Customs and Border Protection and U.S. Postal Inspection Service, as well as other partners in the U.S. intelligence community.

The prosecution is being handled by Trial Attorneys Deborah A. Curtis and Heather M. Schmidt, from the Counterespionage Section of the Justice Department’s National Security Division, and Assistant U.S. Attorney Anthony Asuncion, from the U.S. Attorney’s Office for the District of Columbia.

11-1142

National Security Division

WIKIPEDIA ÜBER CYBERSTALKER wie die fingierten “GoMoPa”

http://de.wikipedia.org/wiki/Cyberstalking

Vorsicht: Cyber-Stalker im Netz

http://bonner-presseblog.de/2009/01/22/bonn-vorsicht-cyber-stalker-im-netz/

STALKING STUDIE DES WEISSEN RING

https://www.weisser-ring.de/internet/verwaltung/news/details/article/15290/59/neste/11/index.html?tx_ttnews%5BpS%5D=1277299889&cHash=a7e6028b0d

Süddeutsche Zeitung über die kriminellen Machenschaften der “GoMoPa”

https://immovationag.wordpress.com/2010/09/15/sueddeutsche-de-am-virtuellen-pranger/

Opfer fordern Entzug der Anwaltszulassung für mutmassliche “GoMoPa”-Paten

http://www.victims-opfer.com/?p=14675

Meridian Capital: Klaus Dieter Maurischat „GoMoPa“ in Detention

http://meridiancapital.wordpress.com

Meridian Capital über die Verhaftung von GoMoPa-Chef Klaus Maurischat durch das BKA in Berlin wg. Erpressung, Betruges & Cyberstalking

http://meridiancapital.wordpress.com/

Magisterarbeit Bernd Pulch an der Universität Mainz

http://www.kepplinger.de/node/50

Handelsblatt über die kriminellen “GoMoPa”-Betrüger

http://www.handelsblatt.com/finanzen/boerse-maerkte/boerse-inside/finanzaufsicht-untersucht-kursachterbahn-bei-wirecard/3406252.html

Neo-STASI-WARNUNG Wie auch Sie GoMoPa-Rufmordopfer werden können-

Stellen Sie sich bitte kurz vor, dass Sie mit einer tollen Geschäftsidee oder einer Geschäftserweiterung zu mehr Geld kommen möchten. Beispielsweise auch Ihr Unternehmen vergrössern oder gar Ihre Waren exportieren wollen.

Sie werben damit natürlich über die Medien….

Da meldet sich bei Ihnen möglicherweise ein Beauftragter des Finanz-Nachrichtendienstes GoMoPa mit der Mitteilung, dass im GoMoPa-Forum sehr negative Forenbeiträge über Ihre Person oder Ihr Vorhaben stünden. Äusserst Schlimmes wird über Sie berichtet. Zum Beispiel, dass Sie bisher schon Ihr Geld mit betrügerischen Machenschaften verdient hätten oder Ihr Sohn als erfolgreicher Sportler nach neuesten Ermittlungen in einem Kokain-Dealer-Ring verwickelt sei.

Ein anonymer User ( Schreiberling) habe dies geschrieben, wird vom GoMoPa-Beauftragten berichtet. Man könne jetzt noch nicht feststellen, ob dies so wahr sei. Man könne aber auch nicht den Beitrag einfach rausnehmen, denn es könne ja auch was Wahres daran sein!

Falls Sie selbst an der Wahrheitsfindung interessiert seien, könnten Sie auch beim ´seriösen Nachrichtendienst` GoMoPa als Gesellschafter oder als Premium-Mitglied einsteigen, dann könne man ja…..usf. …ganz einfach den Beitrag herausnehmen!

So ähnlich könnte es geschehen und glauben Sie mir: ´Dies ist kein böser Traum,-keine Fata Morgana`, sondern schon Zigtausendmal in der fast 10-Jährigen GoMoPa- Geschichte so abgelaufen.

Wir, von der CSA-Agency, wurden selbst aus Wettbewerbsgründen seit 2002 von GoMoPa auf primitivste Weise im Forum diffamiert oder die von uns als seriöse Dienstleister empfohlenen Unternehmungen wurden per Rufmord mit schmutzigsten, unwahren Verleumdungs-Attacken von anonymen Bloggern ( bezahlte Helfershelfer vom GoMoPa) nahezu ruiniert. Nicht nur finanziell , sondern auch gesundheitlich nieder gemacht! Nicht umsonst heisst es RUFMORD.

Der Begriff ´Stalking` ist da noch eine vornehme Bezeichnung.

Auf gut deutsch passt Rufmord besser.

Geschäftlicher und gesundheitlicher RUFMORD gehört auch entsprechend bestraft.

Die Justiz tut sich sehr schwer damit. Vor allem, wenn die Rufmörder mit Ihren Machenschaften mit Gesellschaften wie z.B. ´GoMoPa` als Briefkastenfirma aus dem Ausland agieren. UND zum anderen, weil sich die Stalking-Terror-Experten von GoMoPa sich mit ihren Methoden auch der Justiz und der Medien bedienen.

Frankfurter Allgemeine Zeitung (FAZ) über die Wirtschaftskriminellen der “GoMoPa”

http://www.faz.net/s/RubEC1ACFE1EE274C81BCD3621EF555C83C/Doc~EB5651ECDC72949FF907D2CA89D5AFE72~ATpl~Ecommon~Scontent.html

Die Liste der “GoMoPa”- Opfer

http://www.victims-opfer.com/?page_id=15672

DIE FINANCIAL TIMES über die erfundenen “Goldman, Morgenstern und Partner” alias “GoMoPa”

http://www.victims-opfer.com/?page_id=11764

TOP-SECRET – US talks to Israeli security chief about Arabs and Gaza

Cable dated:2008-05-22T07:57:00

S E C R E T SECTION 01 OF 05 TEL AVIV 001080
SIPDIS
E.O. 12958: DECL: 05/16/2018
TAGS: PREL, PTER, PINR, KPAL, KWBG, EG, IS
SUBJECT: AMBASSADOR’S MEETING WITH SHIN BET CHIEF FOCUSES ON ISRAEL‘S ARABS, THE GAZA STRIP, AND OMAR SOLIMAN’S VISIT
Classified By: Ambassador Richard H. Jones. Reasons: 1.4 (b, d).

——- SUMMARY ——-

1. (S) In a May 13 meeting covering a range of subjects, Israeli Security Agency (ISA, or Shin Bet) Chief Yuval Diskin told Ambassador Jones the following:

— Israel’s Arabs are materially better off than many Arabs in neighboring countries, but increasingly feel disconnected from the State, and tend to identify themselves first as Arabs, and sometimes Muslims, rather than as Israelis. Arab-Israeli Knesset Members are not helping by flirting with enemy regimes in Syria and elsewhere, exploiting their parliamentary immunity. Diskin and the ISA have been advocates within the GOI for doing more to reconnect Israeli-Arabs with Israel. The many ideas Diskin and others have come up with to do this cost money, which the GOI does not have.

— The ISA understands the USG rationale for providing certain types of equipment to the Palestinian Authority Security Forces (PASF), but will approve transfer requests on a case-by-case basis, depending on the capabilities of the equipment, and how the PASF intend to use them. The ISA cannot approve direct transfers of equipment to the PA Presidential Guard (PG) as the PG is XXXXXXXXXXXX as a result of activities by many of its officers during the Second Intifada. If necessary, equipment could be transferred to the PG via a third party.

— Egyptian Intelligence Chief Omar Soliman’s visit opened up a very sensitive period. Israel presented its conditions for a “cooling down”, or cease-fire/tahdiya with Hamas, and now it is Hamas’ turn to respond once Soliman conveys those conditions. They include a complete cessation of terrorist activity in the Gaza Strip. In addition, Israel will not tolerate any direction from the Gaza Strip of terrorist activities in the West Bank. Passages between Israel and the Gaza Strip will be opened gradually as Hamas and the other terrorist groups cease their attacks. Rafah Crossing can be opened, but PA President Abu Mazen must get credit for the opening. Diskin and many in the GOI are skeptical that Hamas will agree to the tahdiya, or that it would last long. Many in the GOI and IDF, including Diskin, believe Israel must re-enter Gaza in force sooner rather than later, to cut back the terrorists’ growing capabilities there.

2. (S) The Ambassador asked Diskin’s assistance in ensuring the ISA’s prompt approval of hundreds of entry permits for participants in the upcoming Bethlehem Conference. Diskin promised ISA would work as quickly as possible and approve as many permits as possible. At the Ambassador’s request, Diskin also promised to help a Palestinian student in the Gaza Strip receive an entry permit so that he could attend his visa interview for college study in the U.S. Diskin also said ISA would issue Palestinian Sheikh Tamimi entry permits for Jerusalem events one day at a time, “as long as he behaves himself.” END SUMMARY.

——————————————— ———–

DISKIN ON ISRAEL’S ARABS — COMPLICATED, GROWING PROBLEM ——————————————— ———–

3. (S) Responding to the Ambassador’s question about Diskin’s current assessment of the Arab-Israeli population — especially in light of an incident May 8 during which an Arab-Israeli MK claimed he had been attacked by an undercover police officer — Diskin initially expressed reluctance and discomfort in answering the question, explaining that how Israel treats its Arab citizens is its own internal affair. Then, opening up, Diskin proceeded to spend the next ten minutes describing his concerns about Israel’s Arab-Israeli population. According to the ISA chief, many of them “take their rights too far,” and the community itself is suffering from an identity crisis. Most, he claimed, want to live in Israel. At the same time, they see themselves first as Arabs, and then as Muslims. (He acknowledged that a small percentage are Christians.) He assessed that the Israeli-Arab political leadership is trying to take the Israel-Palestinian conflict in a new direction and give it a new “national color.” Thankfully, he observed, they are not succeeding, and their efforts are not filtering down to the general public, which is more concerned with daily life. Still, the ISA Chief said his agency is rightly concerned with this. He added that the ISA is also monitoring other

TEL AVIV 00001080 002 OF 005

forms of extremism within Israel’s population, including Jewish extremists. He added that the ISA is also aware that there are problems among Israel’s Bedouin and Druze.

4. (S) Diskin said that the main challenge for the GOI is to figure out how to “connect” these people with the State of Israel. It is complex as it requires them to live their daily lives in contradiction. Most of the time, he allowed, they have been loyal to the State over the previous sixty years — even during the 1967 and 1973 wars and “waves of terror” that followed. The percentage of families that have connections with “bad people on the other side doing bad things” is very low, he said. He claimed that most of the Israeli-Arabs who have caused problems were refugees who were given permits to re-enter Israel in order to reunify with family members already living in Israel. “In these cases,” he said, “they brought their bad ideas with them, and then acted on them.” He continued: “Allowing Palestinians to return over the past few years was foolish. The Bedouin have brought women with them from the Gaza Strip and Jenin and now have many children. We need to manage this immigration in a controlled way. It is hard for us to absorb large quantities of people the way we have been doing these last few years.”

5. (S) Diskin noted that one of the main problems the GOI is facing now is that Arab-Israeli Knesset members are visiting enemy states, exploiting their parliamentary immunity in order to visit countries like Syria and mix with groups like Hizballah. “These people,” he said, “are not spreading the democratic values of Israel. Instead, they are being co-opted by people like Bashar Assad.” Diskin lamented that the ISA has to “deal with them now,” as — in his words — the Israeli National Police have failed to do what they were supposed to do. Pointing to the high-profile case of MK Azmi Bishara, Diskin said, tongue in cheek, that Israel would “welcome his return” from Syria, and that he would likely spend many years in an Israeli prison if he returns.

6. (S) Diskin suggested that the ISA has been a voice for assisting Arab-Israelis constructively over the last several years. He claimed that the ISA has been “constantly pushing and prodding” the GOI to “prevent their issues from falling through the cracks.” While the GOI has come up with many good ideas, Diskin observed, it nevertheless lacks funding to follow through on them. He claimed he and President Peres had recently discussed the need for more high-tech employment opportunities for Arab-Israelis, as well as colleges and training centers. He added that Prime Minister Olmert is “deeply involved,” and noted that Olmert will chair a government-run conference in June on the situation of the Arab-Israeli population. “It will,” he said, “be a good start to making better policy on this issue.”

7. (S) The Ambassador replied that the USG offers a small number of scholarships every year for Arab-Israelis to help them with graduate-level studies in the U.S. He indicated that the embassy would be willing to consider candidates that the ISA brought to its attention. The Ambassador observed that Israel’s Arab and Druze minorities should be viewed as potential “bridges” to Israel’s neighbors. In the future, they could help to change thinking and promote reform in the Arab world.

——————————————–

ISA CONSIDERING EQUIPMENT APPROVALS FOR PASF ——————————————–

8. (S) The Ambassador raised the issue of GOI approvals for equipment the USG is providing to the Palestinian Authority Security Forces (PASF) for their training and use. He noted that to date, the GOI has approved some of the equipment, and denied the provision of other pieces of equipment, including protective equipment like kevlar helmets, and vests. The Ambassador observed that it is likely the USG will be submitting more equipment requests to the GOI in the future. He noted that many equipment requests form packages that are designed to provide specific capabilities that cannot be achieved if the equipment packages are only partially approved. This was also the case with investment proposals. He urged Diskin to look at any investment proposals stemming from the Bethlehem Investment Conference sympathetically, and to take the benefits they would provide into account when deciding whether to approve them.

9. (S) Diskin replied that the ISA also hopes that the Bethlehem Conference will succeed, and that the PA will progress on the economic front, as it would help to secure progress on the political front. Diskin said he is worried

TEL AVIV 00001080 003 OF 005

that we may be asking for too much too quickly on the political front, and that it may lead to disaster in the West Bank. While he agreed that creating better living conditions in the West Bank is a good idea, he stressed that we have to be very careful. He pointed to incidents in the past to explain that arms, ammunition and vests given to the PASF can eventually make their way into Hamas’ hands. In the past, such equipment has included rifles and heavy machines guns that he claimed have been used against IDF helicopters and soldiers. “I do not think that we need more arms in the West Bank,” he stressed, adding, “We have given them too much ammunition already.” As for vests, Diskin said that whether the GOI approves them depends on how the PASF will use them, and the capabilities of the vests themselves. Admitting he did not know the MOD’s position on the vests, Diskin said that the ISA did not object to their provision to the PASF. He noted, however, that the ISA strongly opposes bringing armored vehicles into the West Bank.

10. (S) Diskin stressed that the ISA opposes providing equipment to the Presidential Guard (PG), XXXXXXXXXXXX as a result of its officers’ activities during the Second Intifada. Diskin recounted that he told PM Olmert that “it would not be good” for Israel to transfer arms and weapons to the PG directly. He said he told PM Olmert that such items could be given to a third party, and that they could then turn the items over to the PG. Diskin added, “We can find ways to give it to a third party.”

11. (S) Reiterating the importance of equipping the PASF, the Ambassador stressed that the USG is requesting permission to turn over almost 3,000 vests and helmets for the graduates of U.S. training programs. Diskin responded that the final answer is with the MOD: “ISA has no veto on this. Sometimes the MOD opposes us.” Reviewing USSC Dayton’s request, Diskin said that the ISA agreed with the USSC, although it pointed out the problem of directly transferring equipment to the PG. Diskin said that other pieces of equipment, including water trucks and ladders, are still being reviewed by the ISA, but indicated that he would approve most of them. He added that he will oppose the provision of AK-47 rifles and ammunition to the PASF: “There are too many guns and ammunition in the West Bank already.”

—————————————-

DISKIN ON GAZA AND OMAR SOLIMAN’S VISIT —————————————-

12. (S) Asked about Egyptian Intelligence Chief Omar Soliman’s visit, Diskin noted that he had met with Soliman the day before (May 12). Diskin characterized it as an “interesting meeting — a good atmosphere swirling with many lies — exactly what is to be expected in the Middle East.” The situation now, in the wake of Soliman’s visit, is a sensitive one. Soliman was surprised to hear that Israel was ready for a tahdiya, but only under certain conditions. According to Diskin, ISA played a key role in formulating the conditions. Israel cannot accept a tahdiya without a commitment to stop weapons smuggling into the Gaza Strip. This requires Egypt’s commitment, as it is a sovereign state. While weapons entering the Gaza Strip are coming from Sudan, Eritrea, Yemen and other countries, Egypt is the last place they pass through before they enter the Strip. Diskin cautioned: “We have been too patient about this. We cannot tolerate this anymore.”

13. (S) Diskin added that terrorist attacks from the Gaza Strip and in the West Bank must stop. This includes, he stressed, the directing of terror attacks within the West Bank from the Gaza Strip. Diskin said that the ISA knows that terrorist organizations in the West Bank have contacts with organizations in the Gaza Strip including Hamas, the Popular Resistance Committees, Palestinian Islamic Jihad, and especially the Al Aqsa Martyrs Brigades. He claimed that Israeli security services have often found that terrorist infrastructure in the Gaza Strip provides funding and direction to operatives in the West Bank. Diskin said that he told Soliman that if, under a tahdiya, there is an attack in the West Bank and Israel determines that there was no connection with the Gaza Strip, then Israel will not retaliate against targets in the Gaza Strip. If, however, Israel determines that there is a Gaza Strip connection, then attacks will be carried out against Gaza Strip targets. Without elaborating, Diskin pointed out that, if the tahdiya is to start, Hamas will have to make commitments to Egypt. He said that Soliman seemed to understand the Israeli position. He added that PM Olmert and DefMin Barak also made

TEL AVIV 00001080 004 OF 005

the same points to the Egyptian intelligence chief.

14. (S) Diskin explained how observation of the tahdiya would correlate with opening of the Rafah crossing and passages between the Gaza Strip and Israel. As smuggling and terrorist attacks from the Gaza Strip decline, then the passages can be gradually opened. As for the Rafah crossing, in Israel’s view, it is essential that PA President Abbas be involved in its opening, so that he receives credit for it.

15. (S) Diskin said that Israel does not like the tahdiya — seeing it as a means whereby Hamas and other groups can regroup and re-arm — but also dislikes the current situation. The ISA, he said, believes that the best option now is a large-scale ground incursion into the Gaza Strip that allows the IDF to take over the southern part of the Gaza Strip and to stop smuggling and increase pressure on Hamas. “If you do this, it will cause big problems for Hamas’ survival in the Gaza Strip,” he said. “We can do it,” he added. He continued: “None of us like the idea of a military operation in the Gaza Strip, but we also believe we cannot avoid it. I do not believe in this ‘cooling down’ that the tahdiya would afford. Even if it starts, it will not last long. The way we are now treating the current situation is not effective. It is a waste of time, money and life. A ground invasion may lead to loss of life, but would be more effective. We need to be ready to take over the southern Gaza Strip and hold on to it for as long as necessary. Months and years if need be. Strategically, all of us understand that we cannot avoid the Gaza Strip if there is to be a roadmap and a peace process.” Diskin added, “My job is to tell the inconvenient truth. I am glad that others are finally realizing that the situation in the Gaza Strip is intolerable and getting worse every day. The situation in Lebanon makes it easier for us to make our case. We need to be very tough in dealing with the problem of the Gaza Strip. Egypt will not resolve the problem for us, and Abu Mazen will not and cannot.”

16. (S) Diskin observed that Soliman looks at the Gaza Strip the way any Arab and Egyptian would — with an eye towards kicking it down the road: “I believe his policy is to try to buy more time. It is not to solve a problem, but to see what will happen down the road.” Diskin lamented that there are so many problems in the Middle East that it prevents pursuing and implementing a long-term policy. He concluded, “It is hard to anticipate all the factors when formulating a course of action. Events in other states — things like the price of oil — surprise you. Everyone is surprised all the time. To survive in the Middle East, you have to be like a shark in the water. You have to keep moving forward or you will die.”

——————————————–

DISKIN PROMISES TO ASSIST WITH ENTRY PERMITS ——————————————–

17. (C) The Ambassador requested Diskin’s assistance in ensuring that entry permits for Bethlehem Conference invitees are issued as quickly as possible. While noting our appreciation that more than 200 had been approved, the Ambassador pointed out that over 400 had been requested. He stressed that invitees are anxious and may start canceling participation if they do not receive their permits by the end of the week. Diskin said the ISA would do its best, and that he had told his staff two months ago to treat each request positively, unless an invitee posed a clear threat. Diskin said he would work closely with the MOD on the permits, and asked to be informed if any problems emerged. Diskin reiterated that he had given clear instructions to his staff to approve as many permits as possible.

18. (C) The Ambassador also requested Diskin’s assistance in obtaining an entry permit for Palestinian Sheikh Tamimi so that he could attend a May 27 interfaith meeting in Jerusalem. The Ambassador noted that FM Livni is also invited to attend the meeting. Diskin said Tamimi will receive a permit, but for that day only. The Ambassador undertook to have a U.S. security officer accompany Tamimi while he is in Jerusalem, as had been done during his previous interfaith meeting in Jerusalem.

19. (C) The Ambassador also requested Diskin’s assistance in obtaining an entry permit for a Palestinian student in the Gaza Strip who needs to travel to Jerusalem in order to undergo a May 22 visa interview in connection with his acceptance to MIT. Diskin promised to assist and requested all the information on the student. JONES

TOP-SECRET -Israel – calm before the storm?

S E C R E T SECTION 01 OF 04 TEL AVIV 002473
SIPDIS
DEPARTMENT FOR DEPUTY SECRETARY STEINBERG
E.O. 12958: DECL: 11/12/2019
TAGS: PREL, PGOV, PTER, MOPS, KWBG, IS, IR
SUBJECT: SCENESETTER FOR THE VISIT OF DEPUTY SECRETARY JAMES STEINBERG
Classified By: Deputy Chief of Mission Luis G. Moreno, Reason 1.4 (b) ( d)

1. (S) Summary. Israel is deceptively calm and prosperous. The security situation inside Israel is the best since the outbreak of the Second Intifada, the economy has weathered the storms of the international economic crisis, and Netanyahu’s governing coalition is stable, for the time being at least. Yet outside the storm is gathering and Israelis of many different political outlooks agree on the need to seize the initiative, even while they disagree about what exactly should be done. Israelis see Iran as the primary regional threat, both due to its nuclear program and its projection of power directly into Gaza and southern Lebanon. The Israeli navy’s seizure of a ship loaded with a huge shipment of Iranian arms November 3 has provided tangible proof of Iran’s involvement in arming Hamas and Hizballah. Syrian intentions are also a source of concern, as Israeli analysts see Asad moving closer to Iran and Hizballah even as Syria improves its relations with the West. The sharp decline in Israel’s long- standing strategic relationship with Turkey is adding a new element of instability into the picture. Prime Minister Erdogan’s rhetorical support for Ahmedinejad and his dismissal of the threat posed by Iran’s nuclear program is feeding the sense here of impending crisis, although the robust U.S.-Israeli security relationship is profoundly reassuring to Israeli security officials and the general public alike. Finally, the failure to re-launch Israeli-Palestinian negotiations and the political crisis in the Palestinian Authority is deeply disturbing to Israelis who still believe in a two-state solution. Even GOI skeptics are worried that the lack of a political dialogue and talk of a collapse of the PA are undermining the bottom-up approach they advocate as the alternative to a final-status agreement. Netanyahu insists that he is ready to start negotiations immediately without preconditions, but he will not negotiate on the basis of former PM Olmert’s offer of a year ago. The opposition Kadima Party’s number two, former IDF Chief of Staff and former Minister of Defense Shaul Mofaz, has generated considerable attention with a new peace plan that is based on offering the Palestinians a state with temporary borders in the next year or two, to be followed by intensive final status negotiations. Few here believe the Palestinians will accept this idea, but it may serve to push Netanyahu toward offering a peace initiative of his own. End Summary.

Calm Before the Storm?

———————-

2. (S) Israel in the fall of 2009 is deceptively calm on the surface. Israelis are enjoying the best security situation since the outbreak of the Second Intifada, the result of Israeli intelligence successes in destroying the suicide bombing network in the West Bank as well as good security cooperation with the Palestinian Authority’s security forces. The Israeli economy has successfully weathered the world economic crisis, with only a slight uptick in unemployment and no major impact on the financial system. PM Netanyahu’s center-right coalition is stable, and faces no significant challenge from the opposition Kadima Party. Netanyahu personally enjoys approval ratings over sixty percent, and appears to have benefited politically from the media obsession with reports of frictions with the U.S. Administration. Netanyahu so far has managed the more right wing elements of Likud and other rightist elements in the coalition, although tensions with the far right are likely to reemerge over peace process issues, including a temporary settlement freeze or a decision to make good on Barak’s pledges to evacuate illegal outposts. There are signs of a growing split within the Labor Party, and Foreign Minister Lieberman continues to face the strong possibility of several criminal indictments for money laundering and obstruction of justice, but none of this threatens the stability of the coalition, at least not yet. The latest polls indicate that Likud would gain three seats if elections were held now.

And Looming Threats

——————-

3. (S) Despite this good news for the government, Israelis are even more anxious than normal these days. Sixty-one years after the establishment of the State of Israel, Israelis sense a growing tide in the world challenging not just the occupation of territory seized in 1967, but even against the existence of the Jewish state within any borders. The GOI‘s alarm and outrage over the Goldstone Report was based on their view that the report represented an attempt to deny Israel the right to react military to terrorist threats.

TEL AVIV 00002473 002 OF 004

Security is indeed good and Israel’s borders are generally the quietest they have been in years, but it is common knowledge that Hamas in Gaza and Hizballah in Lebanon both now possess rockets capable of hitting the greater Tel Aviv area, Israel’s main population and economic center. When discussing Iran’s nuclear program, sophisticated Israeli interlocutors note that the issue is not just whether a nuclear-armed Iran would launch nuclear-tipped missiles at Israel – although that possibility cannot be dismissed – but rather the regional nuclear arms race that would ensue and the impact of the resulting uncertainty on Israeli elites and foreign investors alike. Israel’s remarkable high-tech economy is a great achievement, but it also makes Israel exceptionally vulnerable to a host of private decisions to live and invest elsewhere. Growing alienation among Israel’s twenty-percent Arab minority and the increasing domination of Israeli Arab politics by an elite that identifies with Palestinian nationalism further complicates Israel’s internal scene.

4. (S) Painstakingly constructed relations with Israel’s neighbors are also fraying. Even optimists about relations with Egypt and Jordan admit that Israel enjoys peace with both regimes, but not with their people. The transformation of Michel Aoun into Hizballah’s primary Lebanese ally may be the final nail in the coffin of Israel’s decades-old relations with Lebanon’s Maronite Christians. Finally, Israelis are deeply alarmed by the direction of Turkish foreign policy, and see Erdogan and Davutoglu as punishing Israel for the EU’s rejection of Turkey while driving Israel’s erstwhile strategic ally into an alternative strategic partnership with Syria and Iran.

Gaza Dilemmas

————-

5. (S) Gaza poses its own set of dilemmas. The IDF general responsible for Gaza and southern Israel, Major General Yoav Galant, recently commented to us that Israel’s political leadership has not yet made the necessary policy choices among competing priorities: a short-term priority of wanting Hamas to be strong enough to enforce the de facto ceasefire and prevent the firing of rockets and mortars into Israel; a medium-priority of preventing Hamas from consolidating its hold on Gaza; and a longer-term priority of avoiding a return of Israeli control of Gaza and full responsibility for the well-being of Gaza’s civilian population. Israel appears determined to maintain its current policy of allowing only humanitarian supplies and limited commercial goods into Gaza, while sealing the borders into Israel. There are indications of progress in the indirect negotiations with Hamas over the release of Gilad Shalit in return for the release of hundreds of Palestinian prisoners, many of them hardened terrorists,but it is difficult to predict the timing of such a deal. Shalit’s release would likely result in a more lenient Israeli policy toward the Gaza crossings, but a large prisoner exchange would be played by Hamas as a major political achievement and thus further damage the standing of Abu Mazen among Palestinians.

Security Cooperation with the U.S. Reassuring ———————————————

6. (S) Especially given the sense of growing threats from all directions, Israelis from the Prime Minister on down to the average citizen are deeply appreciative of the strong security and mil-mil cooperation with the U.S. The U.S.-Israeli security relationship remains strong, as indicated by the joint U.S.-Israeli missile defense exercise Juniper Cobra 10 in which over 1,400 American personnel tested Israel’s defense – and U.S. support thereof – against ballistic missile threats in the region . The United States remains committed to Israel’s Qualitative Military Edge (QME), and has taken a number of steps to alleviate Israeli concerns over some potential U.S arms sales to the region, including the creation of four new QME working groups to further discuss these arms transfers. These working groups will soon begin deliberations, focusing on previous arms transfer agreements, mitigation measures for the planned U.S. F-15 sale to Saudi Arabia, technical mitigation issues, and intelligence policy.

7. (S) While the United States and Israel may not agree on some U.S. arms transfers to the region, these QME working groups will ensure a transparent process so that Israel is not surprised by any U.S. potential transfer. As it does in assessing all threats, Israel approaches potential U.S. arms sales from a “worst case scenario” perspective in which current moderate Arab nations (Egypt, Saudi Arabia, and

TEL AVIV 00002473 003 OF 004

Jordan) in the region could potentially fall victim to regime change and resume hostilities against Israel. It is primarily for this reason that Israel continues to raise concerns regarding the F-15 sale to Saudi Arabia, especially if the aircraft are based at Tabuk airfield near the Israeli border. We have deflected Israeli requests for additional information regarding the F-15 sale until we receive an official Letter of Request (LOR) from Saudi Arabia.

8. (S) Finally, an argument can be made that Israel has continued to raise concerns over the F-15 sale as leverage in its attempts to modify its purchase of the F-35 Joint Strike Fighter (JSF). Israel remains highly committed to the JSF as a successor to its aging F-16 fleet, although budgetary considerations have raised some doubts how Israel will be able to afford it. Nevertheless, Israel continues to press for the inclusion of an Israeli-made electronic warfare (EW) suite, indigenous maintenance capacity, and a lower cost per aircraft into its JSF purchase plans, and has repeatedly raised these issues with SecDef.

Impasse with the Palestinians

—————————–

9. (C) Polls show that close to seventy percent of Israeli Jews support a two-state solution, but a similar percentage do not believe that a final status agreement can be reached with the Palestinian leadership. Expressed another way, Israelis of varying political views tell us that after Abu Mazen spurned Ehud Olmert’s peace offer one year ago, it became clearer than ever that there is too wide a gap between the maximum offer any Israeli prime minister could make and the minimum terms any Palestinian leader could accept and survive. Sixteen years after Oslo and the Declaration of Principles, there is a widespread conviction here that neither final status negotiations nor unilateral disengagements have worked. While some on the left conclude that the only hope is a U.S.-imposed settlement, a more widely held narrative holds that the Oslo arrangements collapsed in the violence of the Second Intifada after Arafat rejected Barak’s offer at Camp David, while Sharon’s unilateral disengagement from Gaza resulted in the Hamas takeover and a rain of rockets on southern Israel. Netanyahu effectively captured the public mood with his Bar Ilan University speech last June, in which he expressed support for a two-state solution, but only if the Plestinian leadership would accept Israel as the ation-state of the Jewish people and the Palestiian state would be demilitarized (and subject toa number of other security-related restrictions o its sovereignty that he did not spell out in deail in the speech but which are well known in Wahington). Palestinian PM Fayyad has recently temed Netanyahu’s goal a “Mickey Mouse state” due to all the limitations on Palestinian sovereignty that it would appear to entail.

10. (S) Abu Mazen’s stated intent not to seek another term is widely seen here as an effort to put pressure on Washington to put pressure on Israel to meet Palestinian terms for starting negotiations. Abu Mazen’s statements have likely reinforced his image among Israelis as a decent man, and certainly a different breed from Arafat, but a weak and unreliable leader. Yet even some of the Israeli officials, including Avigdor Lieberman and Sylvan Shalom, who have been most skeptical about the prospects for a final status agreement in the near term, are now expressing concern at the lack of engagement with the PA and the prospects of the PA collapsing. Advocates of a bottom-up approach are finally realizing that without a political process, the security cooperation and economic development approach will become unsustainable. Netanyahu has told us that he considers Abu Mazen to be his negotiating partner, and in his latest public statements has stressed that he is not interested in negotiations for their own sake, but rather seeks a far-reaching agreement with the Palestinians, but it remains unclear to us how far Netanyahu is prepared to go. Netanyahu is interested in taking steps to strengthen Abu Mazen, but he will not agree to the total freeze on Israeli construction in the West Bank and East Jerusalem that Abu Mazen insists is a requirement for engaging with Netanyahu.

Israeli Choices —————

11. (C) Former Defense Minister and former IDF Chief of Staff Shaul Mofaz generated a lot of media attention this week when he announced a peace plan that calls for establishing a Palestinian state with temporary borders on sixty percent of the West Bank, then entering final status negotiations.

TEL AVIV 00002473 004 OF 004

Mofaz’ approach is similar to ideas that have been floated quietly over the past few months by Defense Minister Barak and President Peres, and Mofaz claims that both Barak and Peres support his plan. Mofaz’ plan is in part an effort to undermine the political position of his rival for Kadima party leadership, former Foreign Minister Tzipi Livni. Livni, presumably drawing on her experience negotiating with the Palestinians during the Olmert government, says she opposes the idea of an interim solution, but instead supports intensive final status negotiations, perhaps this time with direct U.S. involvement. Livni and Mofaz both stress that they are motivated by a sense of urgency and that time is not on Israel’s side.

12. (C) Netanyahu still holds the political cards here, however, and we see no scenarios in which Livni or Mofaz become prime minister in the near future. As Mofaz told the Ambassador earlier this week, Netanyahu may wait until the Palestinian elections, if they are in fact held in January, but the initiative is in his hands. If the Palestinians continue to refuse to engage on terms that Netanyahu can accept, it is possible that Netanyahu could turn his attention to Syria. Media reports that Netanyahu asked President Sarkozy to deliver a message to Asad may turn out to be accurate, but as with the Palestinians, Netanyahu will not resume talks with Syria where they left off under Olmert, but will insist on negotiations without preconditions. CUNNINGHAM

Die “GoMoPa” – Wirecard Lüge

http://www.usag24-betrug.com/index.php/gomopas-wirecard-behauptungen-zweifelhaft-schuett-hat-keinerlei-behauptungen-zu-wirecard-gemacht/

STERN – Cyberstalking: Wer verfolgt wird, muss sich wehren

http://www.stern.de/…/cyberstalking-wer-verfolgt-wird-muss-sich-wehren-653334.html

FAZ ÜBER CYBERSTALKER A LA GoMoPa- MUTMASSLICHE PARTNER VON “GERD BENNEWIRTZ” UND “PETER EHLERS”

http://www.faz.net/s/Rub77CAECAE94D7431F9EACD163751D4CF/Doc~E70F3E028C8E542D9B0AD6B2A8B1179C3~ATpl~Ecommon~Scontent.html

TOP-SECRET – THE TRUE PICS FROM THE PROTEST-REVOLT IN CHILE


[Image]Riot police hit students with their batons during a 48-hour national strike at Santiago August 25, 2011. Protesters battled police in Chile’s capital on Thursday, the second day of a two-day strike against unpopular President Sebastian Pinera that was marked by sporadic looting but had no impact on the vital mining sector. Reuters
[Image]Workers, students and citizens attend a 48-hour national strike at Santiago August 25, 2011. Protesters scuffled with police in the Chilean capital on Thursday, the second of a two-day strike against unpopular President Sebastian Pinera marked by sporadic looting, though the linchpin mining sector was not affected. Reuters
[Image]A demonstrator is detained by riot policemen during a 48-hour national strike at Santiago August 25, 2011. Protesters scuffled with police in the Chilean capital on Thursday, the second of a two-day strike against unpopular President Sebastian Pinera marked by sporadic looting, though the linchpin mining sector was not affected. Reuters
[Image]Carlos Burgos, who says he was shot at by the Chilean police, shows his wound in the Penalolen neighbourhood in Santiago August 26, 2011, where 16-year-old Manuel Gutierrez was shot dead during a 48-hour national strike against President Sebastian Pinera. Gutierrez died early on Friday after he was shot a day earlier in massive protests in the capital against the unpopular Pinera, the first fatality in months of social unrest. Police said he was shot in the chest as protesters battled them overnight in Santiago, in the aftermath of a 48-hour national strike against Pinera marked by violent clashes and sporadic looting. Reuters
[Image]Students march toward the Chilean consulate in Buenos Aires on August 25, 2011, supporting the Chilean students in their claim for free education and against Chile’s President Sebastian Pinera. Getty
[Image]A demonstrator stands next to a burning barricade on the second day of a national strike in Santiago, Chile, Thursday Aug. 25, 2011. Chileans marched Thursday, demanding profound changes in the country’s heavily centralized and privatized form of government. Union members, students, government workers and Chile’s center-left opposition parties joined the nationwide two-day strike. (Roberto Candia)
[Image]Riot police detain a woman during a protest of public workers and students for the massive layoffs of government employees in Santiago, Chile, Thursday, Aug. 26, 2010. (Aliosha Marquez)
[Image]Police and protesters clash in front of the Gratitud Nacional Church during the second day of a national strike in Santiago, Chile, Thursday Aug. 25, 2011. Chileans marched Thursday, demanding profound changes in the country’s heavily centralized and privatized form of government. Union members, students, government workers and Chile’s center-left opposition parties joined the nationwide two-day strike. (Sebastian Silva)
[Image]
[Image]Riot police detain a protester near La Moneda presidential palace during the second day of a national strike in Santiago, Chile, Thursday Aug. 25, 2011. Chileans are demanding profound changes in the country’s heavily centralized and privatized form of government. Union members, students, government workers and Chile’s center-left opposition parties joined the nationwide two-day strike. (Victor R. Caivano)
[Image]Protesters throw stones at an armored police vehicle spraying tear gas during the second day of a national strike in Santiago, Chile, Thursday Aug. 25, 2011. Chileans marched Thursday, demanding profound changes in the country’s heavily centralized and privatized form of government. Union members, students, government workers and Chile’s center-left opposition parties joined the nationwide two-day strike. (Sebastian Silva)
[Image]A police officer on horseback rides past a bus stop set on fire by demonstrators on the second day of a national strike in Santiago, Chile, Thursday Aug. 25, 2011. Chileans marched Thursday, demanding profound changes in the country’s heavily centralized and privatized form of government. Union members, students, government workers and Chile’s center-left opposition parties joined the nationwide two-day strike. (Luis Hidalgo)
[Image]A protester kicks a tear gas canister during clashes with police in the second day of a national strike in Santiago, Chile, Thursday Aug 25, 2011. Chileans marched Thursday, demanding profound changes in the country’s heavily centralized and privatized form of government. Union members, students, government workers and Chile’s center-left opposition parties joined the nationwide two-day strike. (Jose Miguel Rojas)
[Image]A protester throws stones at an armored police vehicle after clashes broke out during a march on the second day of a national strike in Santiago, Chile, Thursday Aug. 25, 2011. Chileans marched Thursday, demanding profound changes in the country’s heavily centralized and privatized form of government. Union members, students, government workers and Chile’s center-left opposition parties joined the nationwide two-day strike. (Victor R. Caivano)
[Image]
[Image]
[Image]Nearly one million people, including whole families, gathered at the Parque O’Higgins in a demonstration called “Family Sunday for Education”, organised by University students, high schools and the College of Teachers. Chile. 21st August 2011 Demotix

TOP-SECRET-Voice of America Antennas Eyeball


[Image]Source
Sites A (Top Center) and Site B (Bottom Center) Near Greenville and Washington, NChttp://maps.google.com/maps?hl=en&ll=35.583897,-77.100334&spn=0.268322,0.41851&t=h&z=12&vpsrc=6

[Image]

Site A[Image]
Site A[Image]
Site A[Image]
Site A[Image]

[Image]
Source

Site A[Image]

[Image]
Source

Site A[Image]
Site B[Image]
Site B[Image]
Site B[Image]
Site B[Image]
Site B[Image]
Site B[Image]

 

Börse Online über “GoMoPa”-Betrüger und RA Jochen Resch

http://www.graumarktinfo.de/gm/aktuell/diskussion/:Gomopa–Anwaelte-als-Finanzierungsquelle/616477.html

DER BEWEIS – 2000: “INVESTMENT” entsteht auch in Deutschland – da hiess es bei Ehlers noch “Der Fonds”

https://berndpulch.org/2011/05/23/der-beweis-aus-dem-jahr-2000-so-regte-gruner-jahr-tochter-ipv-mich-an-den-titel-investment-zu-lancieren/

Crpytome – Financial Crisis Luxury Architecture


[Image]Sen. John McCain, R-Ariz. is interviewed on Capitol Hill in Washington, Tuesday, Aug. 2, 2011, after the Senate voted to pass debt legislation. (Jacquelyn Martin)
[Image]Madrid’s Stock Exchange is seen on Wednesday Aug. 10, 2011. A risky European Central Bank decision to fight the continent’s debt crisis by buying Spanish and Italian bonds on Monday started pushing down the soaring interest rates threatening those countries with financial disaster.(Daniel Ochoa de Olza)
[Image]In this Feb. 1, 2011 file photo, people queue outside an unemployment office in Madrid. Spain’s Labor Ministry says the number of people filing claims for unemployment benefits fell by 42,059 in July as the summer tourism season provided new jobs. The ministry said Tuesday, Aug. 2, 2011 that July’s fall was the fourth straight monthly decline. It left the number receiving benefits at 4.08 million, down from 4.12 million the previous month. (Arturo Rodriguez, File)
[Image]Lawmakers crowd the Parliament as Italian Premier Silvio Berlusconi addresses the lower chamber on the state of the economy in Rome, Wednesday, Aug. 3, 2011. Berlusconi said economic growth is his government’s key policy aim. After a volatile day on markets, in which Italian borrowing rates touched a record high, Berlusconi told parliament that Italy “has not done little” in response to the crisis, but that it needs to do more. He says Italy needs to promote competitiveness and growth.
[Image]A beggar, his body covered with white paint, walks along a street in Port-au-Prince, Haiti, Saturday, March 5, 2011. (Ramon Espinosa)
[Image]A nearly deserted atrium of the European Council is pictured in Brussels, Monday, Aug. 8, 2011. European have always valued their vacations, and their leaders are no exception. With modern communications, the leaders say they remain constantly in touch. So do their vacations matter? One financial analyst says yes: “It sends a terrible message to the markets … in the middle of a crisis.” (Yves Logghe)
[Image]Pensioners gather in a protest against the government’s austerity measures, Thursday, Aug. 25 2011, outside the prime minister’s official residence in Lisbon. Portugal’s European partners and the International Monetary Fund lent it the money to prevent the country going bankrupt but in return demanded a long list of spending cuts and economic reforms. Poster hanging from the umbrella reads “The government lied to the pensioners”. (Armando Franca)
[Image]French President Nicolas Sarkozy, left, and German Chancellor Angela Merkel, right, attend a meeting at the Elysee Palace, Paris, Tuesday, Aug. 16, 2011. The leaders of Germany and France are meeting Tuesday to discuss Europe’s debt crisis as new figures show their economies stalled even before the latest bout of turmoil struck financial markets. (Patrick Kovarik, Pool)
[Image]A traveller smokes next to a beggar outside a public office in central Athens on Thursday, Aug. 11, 2011. Greece’s Statistical Authority says unemployment in the debt-ridden country jumped to 16.6 percent in May.The number of jobless stands at 822,719 in the country of about 11 million people. The graffiti reads “pigs, murderes” and “burn the parliament”. (Dimitri Messinis)
[Image]French President Nicolas Sarkozy, left, speaks during a special meeting on the financial crisis with head of the French Central Bank Christian Noyer, right, Finance Minister Francois Baroin, second from right, and Prime Minister Francois Fillon, third from right, at the Elysee Palace in Paris, Wednesday Aug. 10, 2011. Sarkozy is interrupted his vacation to hold an emergency government meeting about the uncertainty on world financial markets. (Denis/Pool)
[Image][Image]A view of Milan’s stock exchange headquarters is seen, Monday, July 11, 2011. Finance ministers gathered in Brussels are debating how to secure a private-sector contribution to a new Greek package and how to prevent the debt crisis spreading to bigger countries, including Italy. (Antonio Calanni)
[Image]E.U. and Stock Exchange’s flags fly outside the building of the Greek Stock Exchange in Athens, Friday, Aug. 5, 2011. The eurozone’s debt crisis battered markets once again Friday, challenging vacationing European leaders to find a way to keep the turmoil from pushing Spain and Italy to a financial collapse that would hit an already-waning global recovery. (Thanassis Stavrakis)
[Image]A woman holding a handkerchief to her face to protect herself from lingering tear gas passes by an elderly beggar while, in the background, two workers replace broken hotel windows in central Athens on Thursday, June 30, 2011. Rioters caused extensive property damage during anti-government protests Wednesday while police riposted with heavy use of chemicals. (Dimitri Messinis)
[Image]A tourist with her luggage enters a luxury hotel in central Athens as protesters demonstrate on Tuesday, Aug. 23, 2011. Dozens of protesters have been picketing the entrance to three luxury hotels on Athens’ main Syntagma Square as part of a 24-hour strike by hotel employees objecting to plans to cut their entitlement to early retirement. The banner on the left reads in Greek “Hands off” the ‘arduous and unhealthy’ classification of professions. (Petros Giannakouris)
[Image]Federal Reserve Board, Washington, DCSource
[Image]The Federal Reserve Bank of New York, where high level meetings were held in a last attempt to save Lehman Brothers, is photographed August 25, 2009. A failed plan to rescue Lehman Brothers was followed Sunday by more seismic shocks from Wall Street, including an apparent government-brokered takeover of Merrill Lynch by the Bank of America. (Cryptome) Below, Board Room of the Federal Reserve Bank of New York.[Image]

Source

[Image]Greek Prime Minister George Papandreou, left, talks with Greek President Karolos Papoulias during their meeting in Athens, on Friday, July 22, 2011. Eurozone countries and the International Monetary Fund pledged Thursday to give Greece a euro 109 billion ($155 billion) worth of rescue funds, on top of the euro 110 billion granted more than a year ago. (Petros Giannakouris)
[Image]People walk past a prostrate beggar at the entrance to the Syntagma Square metro station in central Athens, Thursday, Aug. 11, 2011. Greece’s Statistical Authority says unemployment in the debt-ridden country jumped to 16.6 percent in May.The number of jobless stands at 822,719 in the country of about 11 million people. (Dimitri Messinis)
[Image]Pedestrians walk past the New York Stock Exchange on Friday, Aug. 5, 2011 in New York. Fears that the economy might dip back into recession helped send the Dow Jones industrial average down 513 points on Thursday. European leaders are struggling to contain that region’s debt problems, prompting comparisons to the 2008 financial crisis. Markets tumbled from Tokyo to London Friday as overseas traders reacted to the selloff. (Jin Lee)
[Image]Political protest at the New York Stock Exchange, August 20, 2007. (Cryptome)
[Image]Rep. Jason Chaffetz, R-Utah, sponsor of the “Cut, Cap and Balance” deficit reduction plan that was passed in the GOP-controlled House, walks through the Capitol to get an update from the Senate on debt negotiations, in Washington, Sunday, July 31, 2011. (J. Scott Applewhite)
[Image]A beggar boy and a beggar rest near an entrance of a pedestrian underpass near Beijing’s Central Business District, China, Thursday, April 28, 2011. (Alexander F. Yuan)
[Image]A launching ceremony of the Severodvinsk nuclear-powered submarine is held at a defense shipyard in the Arctic port of Severodvinsk, Russia, Tuesday, June 15, 2010. Russian President Dmitry Medvedev attended the ceremony in Severodvinsk. (RIA-Novosti, Vladimir Rodionov, Presidential Press Service)
[Image]A beggar asks for donations in front of the synagogue in Novi Sad, some 80 kilometers (50 miles) north of Belgrade, Serbia, Tuesday, May 18, 2011. (Darko Vojinovic)
[Image]Citigroup Center, New York, NY. (Cryptome)[Image]

TOP-SECRET – CB Megadeath Horrors From Dugway Proving Ground-Sampling of Reports Available

The Desert West Technical Information Center, at Dugway Proving Ground in Utah, holds more than 65,000 reports on biological and chemical warfare, including many as far back as World War One.

See a report of interest, just send a request letter to this location:

FOIA Office
FOIA & Privacy Officer/Paralegal Specialist
US Army Dugway Proving Ground
Command Judge Advocate: TEDT-DP-JA
5450 Doolittle Avenue
Dugway, UT 84022
PH:   435 831-3333
FAX:  435 831-3390

In addition to requesting individual reports, it is also possible to ask for a printout of all reports at the Desert West Technical Information Center created between any two dates, such as 1946 through 1955.

The reports below are selected from those originated during the years between 1918 and 1945.

====

Physical Properties and Aerosol Dissemination Characteristics of P. oryzae Spores, No date

Defoliation Project Mayaguez, Puerto Rico, 1943

Arpa-Supported Research on Brush Control and Chemical Defoliation Crops Protection Research Branch, 1943.

Dispersion of Chemicals by Bombs, July 1935

Soviet Report on CW and BW Preparations and Capabilities, March 1945

Supplementary Test of Tactics and Techniques of Chemical Spray (Jungle Phase), July 1945

Project Strange Man, Logistic Trial Test, AB-45Y-1, Simulant Fills Spray Tanks, no date

Research on Tularemia in the Soviet Union During the Last 25 Years, July 1945

Development of Tactics and Techniques for Dissemination of Chemicals From Aircraft for Crop Destruction, June 1945

Adaptation of Chemical Spray Tanks to Fighter Aircraft, June 1945

Development of Offensive Tactics Versus Japanese Fortifications, April 1944

Tactics and Techniques for Employment of Toxic Gas Bombs by the Army Air Forces, October 1945

Physicochemical Properties of XA Toxin, November 1945

Additional Studies on the Development of U1 as an Offensive Biological Warfare Agent, December 1945

Development of Defensive Measures Against US, October 1945

Development of N for Offensive Use in Biological Warfare, July 1945

Characteristics of Some BW Agents for Plants, August 1944

Test of Plasticized White Phosphorus Filled M47A2 Bombs, June 1945

Development of UL for Offensive Use in Biological Warfare, June 1944

The Present Status of the Offensive Development of US, September 1945

Investigations concerned with the Development of Phytophtora Infestans as a Potential Agent for Biological Warfare, October 1945

Development of X for Offensive Use in Biological Warfare, November 1945

The Development of E as an Agent for Biological Warfare, November 1945

The Development of E as an Agent for Biological Warfare, November 1945

Studies of the Virus Agents of the SI Group, November 1945

The Development of IR as a Biological Warfare Agent, January 1945

A Pilot Plant for the Production of Plant Pathogens, November 1945

The Development of C for Offensive Use in Biological Warfare, November 1945

Cloud Chamber Studies, 1, Methods Developed at Camp Detrick for Production and Study of Clouds of Highly Infective Agents, October 1945

Immunization of Man with Fluid Type a X Toxoid, May 1945

Immunization Against N, January 1945

The Purification of XA Toxin, September 1945

The Physiology of X Toxin, November 1945

The Offensive Phase of the SI Project, November 1945

Studies on the Nutrition, Growth and Virulence of OC, December 1945

Studies of Toxin and Toxoid Production of X Types C and D, October 1945

Etiology of Epizootic Encephalitis of the Rabbit, January 1924

Letter of completion for Dugway Proving Ground Test Plan DGPTP 496, Final

Engineering Testing of the E-20 Little John Warhead, GB Agent, no date

The Report of G

The Report of Q

A Study of short Interval Exposures of Goats to CG, CK and AC, November 1945

The Evaluation of the 4.2 inch Chemical Mortar Shell Filled with HD or HT when Fired into Open Terrain, 1945

400-lb, 1000-lb, 2000-lb and 4000-lb Bombs Filled with Nonpersistent Agents, June 1944

Florida Forest Field Trials of Non-Persistent and Persistent Agents, Part 1 Non-Persistent Agents, May 1944

The Behavior of Non-Persistent Gas Clouds Released from Bombs in the Targhee National Forest, December 1943

Micrometeorology of Woods and Open Areas within the Withlachoochee Land Use Project, Florida, 1944

The Assessment of HN1 when dispersed in Open Terrain under Semi-Tropical Conditions and a Comparison of HN1, H and HN3 under these Conditions, December 1945

Low Altitude Spray, March 1945

Toxicity of Goat Lung Exudates, December 1942

Production of X, April 1944

Penetration of the AN-M69 and M69X Incendiary Bombs into Japanese Structures When Released from Aimable Clusters, December 1944.

Attack against Cave-type Fortifications, October 1945

Studies of the Toxicity and Dispersibility of W in Munitions, July 1945

Anti-Psittacosis Protection, May 1944

Immunization Against UL, May 1944

Immunization Against US, May 1945

Immunization Against N, May 1944

Comparison of Anti-Personnel Effects of Plasticized WP and Solid WP in 4.2 inch Chemical Mortar Shells, June 1944

The Assessment of the M47A2 and M70 Bomb Filled with Levinstein Mustard, Parts A, B, C and D, 1945

Test No. W-20-1944, M2, 4.2-inch Chemical Mortar Shell, Plasticized WP-filled, July 1944

Use of the E5 Incendiary Bomb against Light Structures, July 1944

Immunization Against N, March 1944

Immunization Against UL, March 1944

Immunization Against N, December 1943

Immunization Against UL, December 1943

A Thumb-Nail Sketch of the Development of Biological Warfare, November 1942

Immunization Against UL, June 1944

Anti-Psittacosis Project, June 1944

Immunization Against US, June 1944

Pathogenesis of LA, June 1944

Hirsch Report: Soviet Report on CW and BW Preparations and Capabilities, Volumes 1, 2 and 3, March 1945

Chemical Methods for Use in Observational Program, USARDO, Fort Clayton, Canal Zone, no date

Standardization of Persistent Agent HT, March 1945

Hydrocynamic Acid.  The Toxicity and Speed of Action on Man, November 1942

Properties of War Gases:  Volume III, Vomiting and Choking Gases and Lacrimators, December 1944

Chemical Land Mines, 1905

Thickened Vesicants:  Thickening Purified H with Poliymethyl Methacrylate (MM), July 1944

Shellfish Poison, Monthly Reports 1 through 12, 1944-1945

Estimate of HS Persistency When Disseminated From Various Munitions, October 1937

Lewisite:  Dispersion as Airplane Chemical Spray, November 1942

The Construction and Operation of A Gassing Chamber for Human Tests, July 1945

A Study of the residual Effects of Phosgene Poisoning in Human Subjects, August 1945

A Review of the Insecticide Hexachlorocyclohexane ­ 666, September 1945

Gassing Chamber for Human Tests:  Construction and Operation, October 1944

Toxicity Determinations, Methods in Use in Medical Research Division, Edgewood Arsenal, July 1943

Toxic Dusts:  The Penetration of Protective Clothing by Sesqui HS, March 1941

Physical Constants of Products Used for the Flame Projectors, March 1918

Medical Division Status Summaries, October 1943 ­ April 1944, August 1944

Casualty and Incendiary Effects of Small Particles of WP, January 1940

Airplane Chemical Handling Equipment, 1941 Plan, February 1941

The Vesicant Action of Sesquimustard and Certain Sesquimustard-type Compounds, June 1943

Minutes of the Chemical Warfare Technical Committee, Numbers 1, 2 and 3, 1944

Summary and Discussion of Available Mustard Gas Data From Field Tests conducted Prior to 1928, April 1928

Biological Warfare:  An Annotated Bibliography, Appendix 1, December 1942

Report of the Joint Chemical Spray Project Sub-committee of the United States Chemical Warfare Committee, Sections 1, 2 and 3, 1944

A System for the Ultimate Analysis of Chemical Warfare Agents, August 1944

The Residual Effects of Warfare Gases, III:  Phosgene, IV:  Arsenical Compounds, 1933

Memorandum for Chief, CWS, Visit to Bushnell Florida, December 1943

Joint Chemical Spray Project, May 1944

Preparation and Properties of Derivatives of CW Agents, June 1944

Status Report on Technique of High Altitude Spray, April 1944

Toxicity of Chemical Warfare Agents, Informal Monthly Progress Reports, 1944-1945

Chemical Equipment for Use in Jungle Assault Operations, November 1943

101st Airborne Division Chemical Activities Summary CY 1968, 1969

Chronology of BW, 1945

Detection of BW Agents, May 1944

Constants and Physiological Action of Chemical Warfare Agents, July 1931

Review of the Research Activities of the Chemical Division, Edgewood Arsenal, 1919-1928, circa 1931

History of Gas Attacks Upon the American Expeditionary Forces During the World War, Parts 1, 2 and 3, February 1928

Resume of Recent Knowledge on the Technical Aspects of Chemical Warfare in the Field, May 1945

Munitions for Biological Warfare, Volume 2, September 1945

Pathogenesis of LA and HI, Comprehensive Report, November 1945

Final Report, Physical Properties of AB-1 Fermentor Cultures, no date

Camp Detrick ­ History of BW, no date

Methods of Estimating Lethal Dose for Man, no date

Wind-tunnel Studies of Gas Diffusion in a Typical Japanese Urban District, June 1945

Final Report:  A Study of Rickettsiae and Virus Combinations, no date

Final Report of Work Done Under Contract W-18-064-CWS-43 at the University of Kansas, June 1945

Sixth and Final Report on Contract Number W-266-CWS-246 Between the War Department and the Long Island Biological Associations, Inc., March 1943

Psychological Studies on the Effects of CW Agents, no date

Chamber Tests with Human Subjects, 13 reports, various dates

Transport, Dispersion and Deposition of Aerial Sprays, no date

Proposal to provide a Level of Effort Study to Determine the Feasibility of High Altitude Release of BW Agents over North America, NUS Corp, Rockville, MD, no date

Biological Warfare, An Annotated Bibliography, January 1942

The Chemistry of Certain Arsenical Chemical Warfare Agents as Water Contaminants, June 1944

The Deposition of Nonvolatile Aerosol Clouds in Open and Forested Areas, March 1944

Present Status of Development of Toxic Gases, December 1942

Report on Scientific Intelligence Survey in Japan:  September and October 1945, Volume 5:  Biological Warfare

Anthrax Project, Parke Davis and Co., no date

“SPIEGEL” über die STASI-Connection des mutmasslichen “GoMoPa”-Chefs Jochen Resch

http://www.spiegel.de/spiegel/print/d-65717414.html

“DIE WELT” ÜBER DIE DIFFAMIERUNGSMETHODEN DER STASI – VORBILD FÜR “GoMoPa”

http://www.welt.de/print-wams/article145822/Wie_die_Stasi_Strauss_diffamierte.html

EHRE WEM EHRE GEBUEHRT: “DIE PISSNELKEN DES JAHRZEHNTS – GoMoPa UND PARTNER”

VORSICHT SATIRE –

Liebe Leser,

normalerweise bin ich kein Freund von “starken Worten und Auszeichnungen”.

Doch diesmal muss es sein.

Eindeutig zu den “Pisssnelken des Jahrzehnts” haben sich die selbsternannten “Scheisshausfliegen” von dem selbsternannten “Nachrichtendienst” “GoMoPa” und deren mutmassliche Auftraggeber “RA Resch, RA SchulteSchulte, Gerd Bennewirtz und Peter Ehlers” durchgekämpft.

Der “Pissnelken – Jahrzehnt-Preis”  vorher ging an Erich Mielke und Erich Honecker.

Im Jahrzehnt davor an “Mao”.

Meine herzliche Gratulation an die aktuellen “Pissnelken des Jahrzehnts”

Die Preise werden übrigens in SAN QUENTIN verliehen – in Form eines “Goldenen Strahls auf die Preisträger ”

Herzlichst Ihr

Bernd Pulch, Magister Artium

VORSICHT SATIRE –

TOP-SECRET – Saudi defence minister explains targeting of Yemeni rebels with air strikes

247619

S E C R E T RIYADH 000159

NOFORN

SIPDIS

FOR NEA/ARP: JHARRIS

E.O. 12958: DECL: 02/17/2025 U

TAGS: PREL, PINR, SA, YM

SUBJECT: (S) SAUDI ARABIA: RENEWED ASSURANCES ON SATELLITE

IMAGERY

REF: SECSTATE 8892

Classified By: Amb. James B. Smith for reasons 1.4 (b, c and d)

SUMMARY

——–

1. (S/NF) Ambassador met with Assistant Minister of Defense and Aviation Prince Khaled bin Sultan to relay U.S. concerns about sharing USG imagery with Saudi Arabia in light of evidence that Saudi aircraft may have struck civilian targets during its fighting with the Houthis in northern Yemen.

Prince Khaled described the targeting decision-making process and while not denying that civilian targets might have been hit, gave unequivocal assurances that Saudi Arabia considered it a priority to avoid strikes against civilian targets. Based on the assurances received from Prince Khaled, the Ambassador has approved, as authorized in reftel, the provision of USG imagery of the Yemeni border area to the Saudi Government. End summary.

USG CONCERNS ABOUT POSSIBLE STRIKES ON CIVILIAN TARGETS

——————————————— ———-

2. (S/NF) Ambassador Smith delivered points in reftel to Prince Khaled on February 6, 2010. The Ambassador highlighted USG concerns about providing Saudi Arabia with satellite imagery of the Yemen border area absent greater certainty that Saudi Arabia was and would remain fully in compliance with the laws of armed conflict during the conduct of military operations, particularly regarding attacks on civilian targets. The Ambassador noted the USG’s specific concern about an apparent Saudi air strike on a building that the U.S. believed to be a Yemeni medical clinic. The Ambassador showed Prince Khaled a satellite image of the bomb-damaged building in question.

IF WE HAD THE PREDATOR, THIS MIGHT NOT HAVE HAPPENED

——————————————— ——-

3. (S/NF) Upon seeing the photograph, Prince Khalid remarked, “This looks familiar,” and added, “if we had the Predator, maybe we would not have this problem.” He noted that Saudi Air Force operations were necessarily being conducted without the desired degree of precision, and recalled that a clinic had been struck, based on information received from Yemen that it was being used as an operational base by the Houthis. Prince Khalid explained the Saudi approach to its fight with the Houthis, emphasizing that the Saudis had to hit the Houthis very hard in order to “bring them to their knees” and compel them to come to terms with the Yemeni government. “However,” he said, “we tried very hard not to hit civilian targets.” The Saudis had 130 deaths and the Yemenis lost as many as one thousand. “Obviously,” Prince Khaled observed, “some civilians died, though we wish that this did not happen.”

HOW THE TARGETS WERE SELECTED

—————————–

4. (S/NF) Prince Khaled gave the Ambassador further background, explaining that the targets given to the Saudi Air Force were studied and recommended by a Saudi-Yemeni joint committee headed by Saudi and Yemeni general officers. That joint committee reported to him, and no targets were struck unless they had clearance from this joint committee. “Did they make mistakes? Possibly.” Prince Khaled also reported that the Saudis had problems with some of the targeting recommendations received from the Yemeni side. For instance, there was one occasion when Saudi pilots aborted a strike, when they sensed something was wrong about the information they received from the Yemenis. It turned out that the site recommended to be hit was the headquarters of General Ali Mohsen Al-Ahmar, the Yemeni northern area military commander, who is regarded as a political opponent to President Saleh. This incident prompted the Saudis to be more cautious about targeting recommendations from the Yemeni government.

CEASEFIRE COMING SOON

———————

5. (S/NF) The Ambassador told Prince Khaled that the USG is looking to Saudi Arabia to help bring an end to the Houthi fighting soon. Prince Khaled responded that Saudi Arabia is “looking for ways to end this conflict in a way that fosters good relations.” He said that he met with President Saleh last Wednesday to discuss Houthi ceasefire terms, and they agreed that, so long as the Houthis deliver on the terms they offered, there should be news about a ceasefire “within a week.” As part of the ceasefire arrangements the Yemeni military will be deployed on the Yemeni side of the border to prevent future Houthi incursions into Saudi Arabia. “Then,” Prince Khaled noted, “we can concentrate on Al-Qaida.”

COMMENT

——

6. (S/NF) Prince Khaled, in addressing the Ambassador’s concerns about possible targeting of civilian sites appeared neither defensive nor evasive. He was unequivocal in his assurance that Saudi military operations had been and would continue to be conducted with priority to avoiding civilian casualties. The Ambassador found this assurance credible, all the more so in light of Prince Khaled’s acknowledgment that mistakes likely happened during the strikes against Houthi targets, of the inability of the Saudi Air Force to operate with adequate precision, and the unreliability of Yemeni targeting recommendations. Based on these assurances, the Ambassador has approved, as authorized in reftel, the provision of USG imagery of the Yemeni border area to the Saudi Government. While the fighting with the Houthis appears to be drawing to a close, the imagery will be of continuing value to the Saudi military to monitor and prevent Houthi incursions across the border as well as enhancing Saudi capabilities against Al-Qaeda activities in this area.

SMITH

TOP-SECRET – US government outlines ‘dilemma’ in event of Iraqi crackdown on Iranian dissidents

195061

S E C R E T SECTION 01 OF 04 BAGHDAD 000553

NOFORN SIPDIS

E.O. 12958: DECL: 02/27/2019 TAGS: PTER, PHUM, PINR, PREF, PREL, IZ, IR, US SUBJECT: MEK/CAMP ASHRAF – THE WAY AHEAD

REF: A. BAGHDAD 442 B. BAGHDAD 420 C. BAGHDAD 405 D. BAGHDAD 287 E. BRUSSELS 101 F. BAGHDAD 113 G. 08 BAGHDAD 2658

Classified By: Political Military Minister Counselor Michael H. Corbin for reasons 1.4 (b) and (d)

1. (S/NF) Summary: The Mujahedin e-Khalq (MEK) faces a difficult position in Iraq as the GOI has made clear it considers the group a terrorist organization and seeks the closure of the Camp Ashraf facility and the departure of all the residents from Iraq. It plans to prosecute some members of the group for crimes it believes the MEK conducted on behalf of Saddam Hussein’s regime against both Shi’a and Kurds. The GOI is pressing other countries to take the rest of the residents. Camp Ashraf is now under the security responsibility of the GOI, with a small U.S. force in a monitoring role. The GOI has provided written assurances of humane treatment for the residents of Camp Ashraf and has said it will not forcibly deport any member to a country where he or she might face persecution. While the GOI is impatient on this issue and faces considerable pressure from Iran, it is learning that there is no easy or quick solution.

In order to break-up the cult-like nature of the organization, the GOI is threatening to separate the leaders of the organization from the rank and file. Unless done over time and according to careful preparation and planning, this act (or the decision to seek to arrest the leaders) will cause a humanitarian crisis. If the GOI acts harshly against the MEK and provokes a reaction (or the MEK provokes the Iraqi Security Forces (ISF)), the USG faces a challenging dilemma: we either protect members of a Foreign Terrorist Organization (FTO) against actions of the ISF and risk violating the U.S.-Iraq Security Agreement, or we decline to protect the MEK in the face of a humanitarian crisis, thus leading to international condemnation of both the USG and the GOI. In consultation with the Commanding General (CG), Multi-National Force-Iraq (MNF-I), our selected course of action is to encourage the GOI to negotiate directly with the MEK, press both sides to exercise restraint, monitor the situation at Camp Ashraf, and further involve international organizations and third country diplomats. End Summary.

———- Background ———-

2. (S/NF) There are currently 3400 individuals, most of them members of the MEK, residing at Camp Ashraf, approximately 90 km Northeast of Baghdad. After being expelled from France, the organization relocated to Iraq in 1986, at the invitation of Saddam Hussein. They established the National Liberation Army (NLA), an approximately 7,000-member force (some estimates suggest it may have been as much as three times larger) who pursued conventional combat against the Iranian regime, sometimes unilaterally, other times in concert with the Iraqi forces, utilizing Iraqi territory as their base. From 1986 until the signing of the Iran-Iraq ceasefire in 1988, the NLA suffered significant casualties, particularly in their last offensive. From that time until 2001, the NLA continued periodic small-scale cross border raids and have defended themselves against corresponding Iranian attacks in Iraqi territory. There are conflicting reports of MEK QIraqi territory. There are conflicting reports of MEK operations conducted against Kurdish factions in the North and Shi’a in the South in the aftermath of Operation DESERT STORM.

3. (SBU) During the invasion of Iraq by Coalition Forces (CF) in Operation Iraqi Freedom, MEK bases in Iraq were bombed. Several MEK members were killed or wounded during the attacks, but the MEK members were ordered not to return fire, and they did not. The MEK/NLA subsequently signed a cease fire letter on April 15, 2003. Heavy weapons and all light arms were confiscated from the MEK, and the membership of the MEK in Iraq was consolidated from several MEK camps to the main camp at Ashraf. Joint Task Force-134 (TF-134) began to provide security protection for Camp Ashraf and its residents upon the construction of the adjoining Forward Operating Base (FOB) Grizzly.

BAGHDAD 00000553 002 OF 004

4. (S/NF) Because of reports that the MEK had participated in putting down the Kurdish and Shi’a uprisings and have had relations with terrorist organizations, they do not enjoy a large following in Iraq. Likewise, because they had fought alongside Iraqi forces against Iranians, their popular support in Iran is low. They have, however, succeeded (sometimes with monetary incentives) in endearing themselves to the surrounding villages in Diyala Province, providing jobs, water, medical services, and other support.

5. (S/NF) Although the GOI had several times since 2003 called for the expulsion of the Camp Ashraf residents (CAR), the situation came to a head in June 2008. After a large-scale anti-Iranian (and some say anti-Iraqi) political rally was held at Camp Ashraf, the GOI struck back. The Council of Ministers issued a decree that labeled the MEK as an FTO and made it illegal for anyone to do business with the camp. It officially called for expulsion of the group from Iraq.

6. (S/NF) Anticipating the expiration of the UN mandate allowing unilateral action by CF in Iraq, and that protected persons status could no longer be offered to the CAR after December 31, 2008, the USG (Embassy/MNF-I) began preparing for and coordinating with the GOI for the transfer of security responsibility for the camp and its residents. The Embassy asked for and received written assurances of humane treatment for the residents (REF G). In summary, the assurances provide that the residents will be treated humanely in accordance with Iraq’s Constitution, laws and international obligations. They also provide that the Government will not transfer residents to any where they may have reason to fear persecution for their political opinions or religious beliefs or where they may be subject to torture.

7. (S/NF) The GOI has presented its official position on the MEK: they are a terrorist organization, but the members will be treated as individuals. They have been given only two options: repatriate willingly to Iran or to a third country of their choosing.

———– The New Era ———–

8. (S) As of January 1, 2009, the USG no longer accords CAR protected persons status under the Fourth Geneva Convention – a policy position reached by OSD in 2004. Currently, however, 200 U.S. soldiers remain posted near Camp Ashraf (at FOB Grizzly) to monitor and report on the situation at the camp. These forces operate at the invitation of the GOI in accordance with the Security Agreement.

9. (S/NF) On January 1, the USG began a coordinated process of turning security of the camp fully over to the GOI. This process, which included training of the Iraqi Army (IA) battalion (BN) stationed at Camp Ashraf and joint manning of the checkpoints leading into the camp, was completed on February 20.

—————————– GOI Plans with Regard to Camp —————————–

10. (S) An inter-ministerial committee was established by the GOI under the direction of National Security Advisor (NSA) Dr. Mowaffaq al-Rubaie. This committee is studying various options for the CAR (REF B), including:

— Arresting leaders. We know there are currently three active GOI arrest warrants for MEK leaders. There are Qactive GOI arrest warrants for MEK leaders. There are reports of up to 54 MEK members wanted by the Iranian Government (it is unclear how many of these 54 are actually at Camp Ashraf).

— Separating leaders from the rank and file. Rubaie noted that one option being considered was to physically separate the “top 50-100” leaders from the rest of the camp, either within the camp or otherwise.

— Relocating residents to diverse locations far from Iran. Rubaie is studying a proposal to relocate CAR to “two or three” other locations in the Western part of Iraq, “away from the possibility of Iranian attack.”

BAGHDAD 00000553 003 OF 004

11. (S/NF) While the third option is least likely, execution of any of the three is likely to cause a humanitarian crisis. A recent defector revealed plans for limited to large-scale immolations, at Camp Ashraf and abroad, and acts of suicide by at least female leaders should GOI enter the camp to arrest leaders. There are also plans for large demonstrations by CAR to protest any extended GOI presence in the camp. These demonstrations, while intended to be peaceful, could easily grow into a violent confrontation with ISF (REF F). MNF-I rules of engagement (ROE) permit forces to respond to situations in which deadly force is used against unarmed persons.

————————– International Resettlement ————————–

12. (S/NF) More than 1000 of the CAR allege ties to third countries other than Iran. France, Germany, Canada, Australia and the UK make up a majority of the claims. The EU recently de-listed the MEK as an FTO (REF E). As such, we have requested that the Department demarche European capitals (REF D) to urge them to repatriate their nationals; to consider, for humanitarian reasons, renewing refugee status claims; and to allow those with family ties to enter their countries for family reunification purposes.

13. (S/NF) The Iranian Embassy in Baghdad has told the Iraqi Minister of Human Rights that it intends to issue valid passports to all 3400 CAR and send them to Turkey (REF C). Contrary to public statements (REF D), the Iranian Ambassador told the Minister that Iran does not want to repatriate any of the MEK defectors to Iran. ICRC officials told us February 5 that they believed Iran would repatriate former MEK members, but noted there have not been any repatriations since April 2008. The ICRC has noted that they have no reports of persecution of the former MEK members who have returned to Iran, but also admits that its capability to monitor in Iran is extremely limited. Without strict international monitoring, it is likely that few of the 3400 CAR would chose to return to Iran.

———————- Way Ahead Here in Iraq ———————-

14. (S) In conjunction with the MNF-I, our plan is to press the GOI to honor its humanitarian assurances (most recently reaffirmed by PM Maliki on Feb 19 (REF A)). PM Maliki responded he would scrupulously respect the assurances. TF-134 will monitor the camp and continue to facilitate coordination between the CAR and the GOI.

15. (S) The 200 U.S. soldiers at FOB Grizzly will continue to observe and record GOI conduct toward the MEK, as will an Embassy team and international organizations, such as ICRC and UNAMI. The CDA and CG MNF-I will personally protest any violations of humanitarian assurances directly to PM Maliki. Our military forces will not interfere with GOI efforts to arrest leaders, but will seek to prevent mistreatment of civilians, in accordance with CENTCOM ROE. Because U.S. military intervention has the potential to precipitate a crisis in our relationship with the GOI, Embassy and MNF-I will coordinate with the highest levels of the GOI in an effort to prevent such a crisis from developing or escalating. Embassy will also immediately consult with the Department in the event of any confrontation between U.S. and QDepartment in the event of any confrontation between U.S. and Iraqi forces.

16. (S) We will continue to encourage international organizations to remain involved in the MEK situation. The ICRC, admitting to a lack of resources, visited the camp once again February 25. Although the ICRC will not establish a permanent presence at Camp Ashraf, officials say they will continue to monitor the humanitarian situation. The UNHCR has noted its intention to interview the two recent MEK defectors in Baghdad regarding their refugee claims. Representatives of the CAR recently traveled to Baghdad, escorted by IA forces, to meet with UNAMI representatives. It is extremely important for these organizations to assist in finding solutions to the MEK situation.

17. (S/NF) As our role in negotiations between the MEK and

BAGHDAD 00000553 004 OF 004

the GOI has diminished, direct interaction between the GOI and the MEK has increased. Upon our recommendation, MEK leaders have begun to address their concerns directly with GOI authorities rather than to us. Tactical coordination between MEK security forces and the IA BN has produced positive results and has increased the confidence of the MEK on the IA providing security for Camp Ashraf.

18. (S/NF) Since Rubaie’s meeting with Western diplomats January 27 (Ref D), we have engaged the French, British, Canadian, Swedish and Australian Embassies regarding CAR who claim to have ties to their countries. While the French Government has noted its intention not to accept any of the CAR, others are consulting with their governments on the prospect. We will provide support to those embassies that wish to visit their nationals and those who claim former refugee status or to have family ties.

19. (S) We believe this measured and evenhanded approach, coupled with extensive senior leader engagement, will defuse a volatile situation. Nevertheless, we cannot be certain of success. It is impossible to entirely eliminate the possibility that (elements of) the GOI, or the MEK, will instigate a confrontation in spite of our efforts. BUTENIS

“BILD”: Studie zum Tatort Internet :Jeder Dritte wurde schon gemobbt

http://www.bild.de/digital/internet/mobbing/jeder-dritte-jugendliche-wird-gemobbt-18298774.bild.html

DIE FRANKFURTER ALLGEMEINE ZEITUNG ÜBER DIE “GoMoPA”-KRIMINELLEN – MUTMASSLICHE PARTNER VON “GERD BENNEWIRTZ UND PETER EHLERS”

http://www.faz.net/s/Rub77CAECAE94D7431F9EACD163751D4CFD/Doc~E70F3E028C8E542D9B0AD6B2A8B1179C3~ATpl~Ecommon~Scontent.html

 

und

 

http://www.faz.net/s/RubEC1ACFE1EE274C81BCD3621EF555C83C/Doc~EB5651ECDC72949FF907D2CA89D5AFE72~ATpl~Ecommon~Scontent.html

NYT: Cables Shine Light Into Secret Diplomatic Channels

WikiLeaks opened its archive to more than a quarter million secret U.S. diplomatic cables.

Wikileaks founder Julian Assange leaving the High Court in central London, on July 13.

 

London (CNN) — WikiLeaks threw open the doors Friday to its archive of more than a quarter million secret U.S. diplomatic cables, unfiltered and unedited, exposing and possibly endangering confidential diplomatic sources.

The website made the controversial decision after losing control of the documents in a series of blunders.

WikiLeaks supporters posted the entire encrypted archive on the internet late last year. Separately, David Leigh, the investigative editor of the Guardian newspaper, formerly one of Wikileaks media partners, published the password to unlock the archive in his book “Inside WikiLeaks: Julian Assange’s War on Secrecy”.

Together, both pieces of information, unlocked the full trove of U.S. diplomatic cables, accessible to anyone on the web.

But WikiLeaks’ decision to open its archive is likely to bring the cables to a much wider audience — and has already sparked criticism that it will put people at risk.

A brief search through the cables shows that documents have not been redacted in any way. The names and other details of confidential diplomatic sources are on full display, despite being labelled with the instruction “strictly protect”, including cables classified as “secret” or “confidential.”

The Guardian, the New York Times, Der Spiegel and El Pais, four of WikiLeaks’ former media partners, condemned the release.

In a joint statement they said: “We deplore the decision of WikiLeaks to publish the unredacted State Department cables, which may put sources at risk.

“Our previous dealings with WikiLeaks were on the clear basis that we would only publish cables which had been subjected to a thorough editing and clearance process.

“We will continue to defend our collaborative publishing endeavour. We cannot defend the needless publication of the complete data — indeed, we are united in condemning it. Today’s decision to publish by Julian Assange was his, and his alone.”

Reporters Without Borders announced late Thursday it was suspending a WikiLeaks “mirror site” because of concerns over potential risks to sources.

In an editorial, it wrote that on launching the mirror site late last year, Reporters Without Borders “said it defended ‘the free flow of information online and the principle of the protection of sources, without which investigative journalism cannot exist.’

“As the protection of sources is now in question, Reporters Without Borders has decided to suspend the site pending further clarification.”

WikiLeaks posted Friday on Twitter: “Shining a light on 45 years of U.S. ‘diplomacy’, it is time to open the archives forever.” The organization also gave full instructions on how to download all 251,287 cables.

WikiLeaks appealed for members of the public to “crowdsource” the cables and publish their findings on Twitter under the hashtag #wlfind. Crowdsourcing is the act of outsourcing tasks to an undefined, large group through an public call — in this case to publish parts of the cables.

The reason, according to a statement posted by WikiLeaks on Twitter: “The entire world press does not have enough resources and there are substantial biases.”

U.S. State Department Spokeswoman Victoria Nuland told CNN Thursday: “WikiLeaks did advise us of the impending release of information and of its intention to continue to release classified documents.

“We have made clear our views and concerns about illegally disclosed classified information and the continuing risk to individuals and national security that such releases cause.

“WikiLeaks has, however, ignored our requests not to release or disseminate any U.S. documents it may possess and has continued its well-established pattern of irresponsible, reckless, and frankly dangerous actions. We are not cooperating with them.”

TOP-SECRET – US embassy cables: Saudi defence minister explains targeting of Yemeni rebels with air strikes

247619

S E C R E T RIYADH 000159

NOFORN

SIPDIS

FOR NEA/ARP: JHARRIS

E.O. 12958: DECL: 02/17/2025 U

TAGS: PREL, PINR, SA, YM

SUBJECT: (S) SAUDI ARABIA: RENEWED ASSURANCES ON SATELLITE

IMAGERY

REF: SECSTATE 8892

Classified By: Amb. James B. Smith for reasons 1.4 (b, c and d)

SUMMARY

——–

1. (S/NF) Ambassador met with Assistant Minister of Defense and Aviation Prince Khaled bin Sultan to relay U.S. concerns about sharing USG imagery with Saudi Arabia in light of evidence that Saudi aircraft may have struck civilian targets during its fighting with the Houthis in northern Yemen.

Prince Khaled described the targeting decision-making process and while not denying that civilian targets might have been hit, gave unequivocal assurances that Saudi Arabia considered it a priority to avoid strikes against civilian targets. Based on the assurances received from Prince Khaled, the Ambassador has approved, as authorized in reftel, the provision of USG imagery of the Yemeni border area to the Saudi Government. End summary.

USG CONCERNS ABOUT POSSIBLE STRIKES ON CIVILIAN TARGETS

——————————————— ———-

2. (S/NF) Ambassador Smith delivered points in reftel to Prince Khaled on February 6, 2010. The Ambassador highlighted USG concerns about providing Saudi Arabia with satellite imagery of the Yemen border area absent greater certainty that Saudi Arabia was and would remain fully in compliance with the laws of armed conflict during the conduct of military operations, particularly regarding attacks on civilian targets. The Ambassador noted the USG’s specific concern about an apparent Saudi air strike on a building that the U.S. believed to be a Yemeni medical clinic. The Ambassador showed Prince Khaled a satellite image of the bomb-damaged building in question.

IF WE HAD THE PREDATOR, THIS MIGHT NOT HAVE HAPPENED

——————————————— ——-

3. (S/NF) Upon seeing the photograph, Prince Khalid remarked, “This looks familiar,” and added, “if we had the Predator, maybe we would not have this problem.” He noted that Saudi Air Force operations were necessarily being conducted without the desired degree of precision, and recalled that a clinic had been struck, based on information received from Yemen that it was being used as an operational base by the Houthis. Prince Khalid explained the Saudi approach to its fight with the Houthis, emphasizing that the Saudis had to hit the Houthis very hard in order to “bring them to their knees” and compel them to come to terms with the Yemeni government. “However,” he said, “we tried very hard not to hit civilian targets.” The Saudis had 130 deaths and the Yemenis lost as many as one thousand. “Obviously,” Prince Khaled observed, “some civilians died, though we wish that this did not happen.”

HOW THE TARGETS WERE SELECTED

—————————–

4. (S/NF) Prince Khaled gave the Ambassador further background, explaining that the targets given to the Saudi Air Force were studied and recommended by a Saudi-Yemeni joint committee headed by Saudi and Yemeni general officers. That joint committee reported to him, and no targets were struck unless they had clearance from this joint committee. “Did they make mistakes? Possibly.” Prince Khaled also reported that the Saudis had problems with some of the targeting recommendations received from the Yemeni side. For instance, there was one occasion when Saudi pilots aborted a strike, when they sensed something was wrong about the information they received from the Yemenis. It turned out that the site recommended to be hit was the headquarters of General Ali Mohsen Al-Ahmar, the Yemeni northern area military commander, who is regarded as a political opponent to President Saleh. This incident prompted the Saudis to be more cautious about targeting recommendations from the Yemeni government.

CEASEFIRE COMING SOON

———————

5. (S/NF) The Ambassador told Prince Khaled that the USG is looking to Saudi Arabia to help bring an end to the Houthi fighting soon. Prince Khaled responded that Saudi Arabia is “looking for ways to end this conflict in a way that fosters good relations.” He said that he met with President Saleh last Wednesday to discuss Houthi ceasefire terms, and they agreed that, so long as the Houthis deliver on the terms they offered, there should be news about a ceasefire “within a week.” As part of the ceasefire arrangements the Yemeni military will be deployed on the Yemeni side of the border to prevent future Houthi incursions into Saudi Arabia. “Then,” Prince Khaled noted, “we can concentrate on Al-Qaida.”

COMMENT

——

6. (S/NF) Prince Khaled, in addressing the Ambassador’s concerns about possible targeting of civilian sites appeared neither defensive nor evasive. He was unequivocal in his assurance that Saudi military operations had been and would continue to be conducted with priority to avoiding civilian casualties. The Ambassador found this assurance credible, all the more so in light of Prince Khaled’s acknowledgment that mistakes likely happened during the strikes against Houthi targets, of the inability of the Saudi Air Force to operate with adequate precision, and the unreliability of Yemeni targeting recommendations. Based on these assurances, the Ambassador has approved, as authorized in reftel, the provision of USG imagery of the Yemeni border area to the Saudi Government. While the fighting with the Houthis appears to be drawing to a close, the imagery will be of continuing value to the Saudi military to monitor and prevent Houthi incursions across the border as well as enhancing Saudi capabilities against Al-Qaeda activities in this area.

SMITH

TOP-SECRET: KEYWORD – WIKILEAKS -INSURANCE – HERE IS THE KEYWORD

Dear Readers,

here is the keyword for the WikiLeaks “Insurance” files

ACollectionOfHistorySince_1966_ToThe_PresentDay#”

You just have to add one change which we know but will never publish

Truly Yours

Bernd Pulch, Magister Artium

BÖRSE ONLINE ÜBER DIE FINGIERTE “GoMoPa” – DIE MUTMASSLICHEN “PARTNER VON GERD BENNEWIRTZ UND PETER EHLERS”

BoerseOnline_Nr38_16.09.2010_Wo_gehobelt_wird

DIE SÜDDEUTSCHE ZEITUNG ÜBER DIE VERBRECHER DER STASI-“GoMoPa”

SZ_03.09.2010_Am_virtuellen_Pranger

TOP-SECRET: America Eyeballs 3

TSA, Post: To get another view of how sprawling Top Secret America has become, just head west on the toll road toward Dulles International Airport.

As a Michaels craft store and a Books-A-Million give way to the military intelligence giants Northrop Grumman and Lockheed Martin, find the off-ramp and turn left. Those two shimmering-blue five-story ice cubes belong to the National Geospatial-Intelligence Agency, which analyzes images and mapping data of the Earth’s geography. A small sign obscured by a boxwood hedge says so.

Cryptome:

National Geospatial Intelligence Agency, 2207 Rockhill Road, Herndon, VA

If NGA is a tenant in the building there is no perimeter security customary for spy agency.
A sign at the entrance, cited by Priest above, is obscured in Google Street view, below, on Innovation Drive.
However, a rental advertisement states there is a SCIF in the facility.

[Image]
Google Street View[Image]
Source[Image]
Source

http://www.bing.com/maps/?v=2&cp=qgtk268jfg0r&lvl=18.820071359356223&dir=6.595352978997362&sty=b&where1=Dulles%20International%20Airport%2C%20VA&form=LMLTCC

[Image]

http://maps.google.com/maps?hl=en&ll=38.964022,-77.419882&spn=0.008017,0.013078&t=h&z=17&vpsrc=0

This is misnamed on Google as the George Mason University Executive Programs.

[Image]

TSA, Post: Across the street, in the chocolate-brown blocks, is Carahsoft, an intelligence agency contractor specializing in mapping, speech analysis and data harvesting. Nearby is the government’s Underground Facility Analysis Center. It identifies overseas underground command centers associated with weapons of mass destruction and terrorist groups, and advises the military on how to destroy them.
Cryptome:http://www.bing.com/maps/?v=2&cp=38.95837031099434~-77.42316203297403&lvl=18&dir=0&sty=h&where1=Dulles%20International%20Airport%2C%20VA&form=LMLTCC[Image]

[Image]

TOP-SECRET: Fukushima Daiichi Nuclear Power Plant 29 August 2011 Inside

Fukushima Daiichi Nuclear Power Plant 29 August 2011

[Image]Dust-sampling Opening of Reactor Building of Unit 1, Fukushima Daiichi Nuclear Power Station pictured on August 28, 2011. Released August 30, 2011 by TEPCO. (Tokyo Electric Power Co.)
[Image]Dust-sampling Opening of Reactor Building of Unit 2, Fukushima Daiichi Nuclear Power Station pictured on August 29, 2011. Released August 30, 2011 by TEPCO. (Tokyo Electric Power Co.)
[Image]Checking inside of the reactor containment vessel of Unit 4, Fukushima Daini Nuclear Power Station. Opening an airlock door for workers. Pictured on August 29, 2011. Released August 30, 2011 by TEPCO. (Tokyo Electric Power Co.)

TOP-SECRET – America Eyeballs 2

“TSA” indicates Top Secret America: The Rise of the New American Security State, a book by Dana Priest and William M. Arkin.


TSA pp. 111-112: NorthCom and its sister command NORAD maintain subterranean backups at the mountain. And just in case everything goes down — command headquarters, the mountain, the nation’s telephone system, and the electrical grid — NorthCom also operates a fleet of six giant eighty-foot-long eighteen-wheel trucks sittting ready on twenty-four-hour allert in a barricaded compound at F.E. Warren Air Force Base, outside Cheyenne, Wyoming. The trucks, officially called the Mobile Consolidated Command Center, could take to the highways at a moment;snotice in a fifty-vehicle security convoy. A super-secret unit created to survice a full-scale nuclear war, they contain everything required — their own generators, SCIFs, a top secret local area network, satellite dishes, codes, and emergency decision handbooks — to direct a response to multiple terrorist attacks, launch American nuclear weapons, or even take over command of the United States government, if necessary.


Cryptome: This appears to be the facility although perimeter security appears lax at the gate. A second perimeter fence is under construction.

Mobile Consolidated Command Center, F.E. Warren Air Force Base, WY

http://www.bing.com/maps/?v=2&cp=41.174371470718384~-104.86352790829812&lvl=18&dir=0&sty=h&where1=Warren%20AFB%2C%20WY&form=LMLTCC



TOP-SECRET – America Eyeballs 1

Essential reading to understand the post-911 top secret putsch by the military-intelligence-industry complex, Top Secret America: The Rise of the New American Security State, a book by Dana Priest and William M. Arkin expands their Washington Post series of the same name, and provides information too threatening to national security for the Post to publish. And the book publisher, no doubt opposing the authors, also failed to publish the specific findings of the wide-ranging investigation, omitting locations of top secret facilities which the master searcher Arkin discovered from open sources over many years and Priest visited for the series and book.

However, the book and the Post series provide vivid, detailed descriptions of the facilities and their occupants with ample clues to the secret locations, some of which Cryptome and others have published.

Cryptome will publish a series on these locations using the descriptions provided in the book, presumably the intent of the authors with their understanding that the Internet will provide sensitive information obsequiously concealed by fearful political leaders and media complicit in cloaking the national security state.

“TSA” indicates Top Secret America: The Rise of the New American Security State, a book by Dana Priest and William M. Arkin.


CIA Workforce Training Facility

TSA, pp 64-65: It had taken me an hour and a half to find the CIA site. … At the entrance, a quaint historic marker announced the origins of the U.S. Army Training Center. … I learned later from people who frequented the facility that the mountaintop range was a training center for the CIA’s rapidly expanding contract workforce of security specialists —  people like Raymond Davis, who would later be briefly jailed in Pakistan inn 2011 after shooting two would-be assassins. The job of these specialists was to hide in foreign countries and discreetly manage security for agency operatives meeting with sources and traveling through risky neighborhoods.

Cryptome: This appears to describe Site B of the CIA’s Warrenton Training Center, a four-site complex — A, B, C and D — near Warrenton, VA. It was originally used by the US Army for training and the identifying signs have been left in place as CIA cover.

http://cryptome.org/eyeball/cia-wtc3/cia-wtc3.htm
http://cryptome.org/eyeball/wtcd/wtcd-eyeball.htm

[Image]

Site B in 2008, below

http://maps.google.com/maps?hl=en&ll=38.736904,-77.824842&spn=0.03217,0.052314&t=h&z=15&vpsrc=0

[Image]


CIA New Office Buildings

TSA, pp 65-66: The gigantic training center was not the only place the expanding CIA had moved into when its ranks began to swell after 9/11. … After the attacks … it had increased its office space by one-third. It took over two newly built large office buildings ner the Smithsonian Air and Space Museum Center abutting Dulles International Airport, built two other complexes in the nearby Virginia cities of Fairfax and McLean, and moved into another in Herdon, VA.

Cryptome: The two newly built large office buildings near Dulles:

http://cryptome.org/eyeball/cia-green/cia-green.htm

http://maps.google.com/maps?hl=en&ll=38.918217,-77.422972&spn=0.016044,0.026157&t=h&z=16&vpsrc=0

[Image]

Fairfax County (Reston):

http://cryptome.org/eyeball/cia-reston/cia-reston.htm
http://cryptome.org/eyeball/cia-sunset/cia-sunset.htm

http://maps.google.com/maps?hl=en&ll=38.955994,-77.356891&spn=0.016035,0.026157&t=h&z=16&vpsrc=0

[Image]

McLean

http://cryptome.org/eyeball/cia-cafes/cia-cafes.htm

http://maps.google.com/maps?hl=en&ll=38.931038,-77.220851&spn=0.00802,0.013078&t=h&z=17&vpsrc=0

[Image]

Herndon:

http://cryptome.org/eyeball/nctc/nctc-birdseye.htm

http://maps.google.com/maps?hl=en&ll=38.964798,-77.37407&spn=0.016033,0.026157&t=h&z=16&vpsrc=0

[Image]



	

DIE DEUTSCHE PRESSE ÜBER DIE KINDER-SEXUALAUFKLÄRER DER “GoMoPa” UND DEREN MUTMASSLICHE “PARTNER GERD BENNEWIRTZ UND PETER EHLERS”

Presseberichterstatung-zu-Maurischat1

 

 

 

TOP-SECRET: WHITE HOUSE HIDES HUNDREDS OF OSAMA BIN LADEN KILLING PHOTOS

wh-hides-obl

Download White House Original Letter by Mouseclick on the Link above

Press Briefing by Senior Administration Officials on the Killing of Osama bin Laden

Via Conference Call
12:03 A.M. EDT

MR. VIETOR:  Thank you, everyone, for joining us, especially so late.  We wanted to get you on the line quickly with some senior administration officials to talk about the operation today regarding Osama bin Laden.  And with that I’ll turn it over to our first senior administration official.

SENIOR ADMINISTRATION OFFICIAL:  Thanks for joining us, everybody, at this late hour.  It’s much appreciated.  From the outset of the administration, the President has placed the highest priority in protecting the nation from the threat of terrorism.  In line with this, we have pursued an intensified, targeted, and global effort to degrade and defeat al Qaeda.  Included in this effort has been a relentless set of steps that we’ve taken to locate and bring Osama bin Laden to justice.  Indeed, in the earliest days of the administration, the President formally instructed the intelligence community and his counterterrorism advisors to make the pursuit of Osama bin Laden, as the leader of al Qaeda, as a top priority.

In the beginning of September of last year, the CIA began to work with the President on a set of assessments that led it to believe that in fact it was possible that Osama bin Laden may be located at a compound in Pakistan.  By mid-February, through a series of intensive meetings at the White House and with the President, we had determined there was a sound intelligence basis for pursuing this in an aggressive way and developing courses of action to pursue Osama bin Laden at this location.

In the middle of March, the President began a series of National Security Council meetings that he chaired to pursue again the intelligence basis and to develop courses of action to bring justice to Osama bin Laden.  Indeed, by my count, the President chaired no fewer than five National Security Council meetings on the topic from the middle of March — March 14th, March 29th, April 12th, April 19th, and April 28th.  And the President gave the final order to pursue the operation that he announced to the nation tonight on the morning — Friday morning of April 29th.

The President mentioned tonight that the pursuit of Osama bin Laden and the defeat of al Qaeda has been a bipartisan exercise in this nation since September 11, 2001, and indeed, this evening before he spoke to the nation, President Obama did speak to President Bush 43 and President Clinton this evening to review with them the events of today and to preview his statement to the nation tonight.

And with that, I’ll turn it over to my colleague to go through some of the details.  Thank you.

SENIOR ADMINISTRATION OFFICIAL:  As you heard, the President ordered a raid earlier today against an al Qaeda compound in Abbottabad, Pakistan.  Based on intelligence collection analysis, a small U.S. team found Osama bin Laden living in a large home on a secured compound in an affluent suburb of Islamabad.  The raid occurred in the early morning hours in Pakistan and accomplished its objective.  Osama bin Laden is now no longer a threat to America.

This remarkable achievement could not have happened without persistent effort and careful planning over many years.  Our national security professionals did a superb job.  They deserve tremendous credit for serving justice to Osama bin Laden.

Bin Laden was a sworn enemy of the United States and a danger to all humanity; a man who called for the murder of any American anywhere on Earth.  His death is central to the President’s goal of disrupting, dismantling, and ultimately defeating al Qaeda and its violent allies.  He was responsible for killing thousands of innocent men and women not only on 9/11, but in the 1998 East Africa embassy bombing, the attack of the USS Cole, and many other acts of brutality.

He was the leader of a violent extremist movement with affiliates across the globe that had taken up arms against the United States and its allies.  Bin Laden’s most influential role has been to designate the United States as al Qaeda’s primary target and to maintain organizational focus on that objective.  This strategic objective, which was first made in a 1996 declaration of jihad against Americans, was the cornerstone of bin Laden’s message.

Since 9/11, multiple agencies within our intelligence community have worked tirelessly to track down bin Laden, knowing that his removal from al Qaeda would strike a crippling blow to the organization and its militant allies.  And last September the President was made aware of a compound in Abbottabad, where a key al Qaeda facilitator appeared to be harboring a high-value target.  He received regular intelligence updates, as was just mentioned, on the compound in September, and he directed that action be taken as soon as he concluded that the intelligence case was sufficiently strong.  A range of options for achieving the mission were developed, and on Friday he authorized the operation.

Now I’ll turn it to my colleagues to go through the intelligence.

SENIOR ADMINISTRATION OFFICIAL:  Thank you.  First I want to point out that today’s success was a team effort.  It was a model of really seamless collaboration across our government.  Since 9/11, this is what the American people have expected of us, and today, in this critical operation, we were able to finally deliver.

The operation itself was the culmination of years of careful and highly advanced intelligence work.  Officers from the CIA, the NGA, the NSA all worked very hard as a team to analyze and pinpoint this compound.  Together they applied their very unique expertise and capabilities to America’s most vexing intelligence problem, where to find bin Laden.

When the case had been made that this was a critical target, we began to prepare this mission in conjunction with the U.S. military.  In the end, it was the matchless skill and courage of these Americans that secured this triumph for our country and the world.  I’m very proud of the entire team that worked on this operation, and am very thankful to the President for the courage that he displayed in making the decision to proceed with this operation.

With that, let me turn to my colleague to give you details on the intelligence background.

SENIOR ADMINISTRATION OFFICIAL:  Thank you.  The bottom line of our collection and our analysis was that we had high confidence that the compound harbored a high-value terrorist target.  The experts who worked this issue for years assessed that there was a strong probability that the terrorist that was hiding there was Osama bin Laden.

What I’d like to do is walk you through the key points in that intelligence trail that led us to that conclusion.  From the time that we first recognized bin Laden as a threat, the CIA gathered leads on individuals in bin Laden’s inner circle, including his personal couriers.  Detainees in the post-9/11 period flagged for us individuals who may have been providing direct support to bin Laden and his deputy, Zawahiri, after their escape from Afghanistan.

One courier in particular had our constant attention.  Detainees gave us his nom de guerre or his nickname and identified him as both a protégé of Khalid Sheikh Mohammed, the mastermind of September 11th, and a trusted assistant of Abu Faraj al-Libbi, the former number three of al Qaeda who was captured in 2005.

Detainees also identified this man as one of the few al Qaeda couriers trusted by bin Laden.  They indicated he might be living with and protecting bin Laden.  But for years, we were unable to identify his true name or his location.

Four years ago, we uncovered his identity, and for operational reasons, I can’t go into details about his name or how we identified him, but about two years ago, after months of persistent effort, we identified areas in Pakistan where the courier and his brother operated.  Still we were unable to pinpoint exactly where they lived, due to extensive operational security on their part.  The fact that they were being so careful reinforced our belief that we were on the right track.

Then in August 2010, we found their residence, a compound in Abbottabad, Pakistan, a town about 35 miles north of Islamabad.  The area is relatively affluent, with lots of retired military.  It’s also insolated from the natural disasters and terrorist attacks that have afflicted other parts of Pakistan.  When we saw the compound where the brothers lived, we were shocked by what we saw — an extraordinarily unique compound.  The compound sits on a large plot of land in an area that was relatively secluded when it was built.  It is roughly eight times larger than the other homes in the area.

When the compound was built in 2005, it was on the outskirts of the town center, at the end of a narrow dirt road.  In the last six years, some residential homes have been built nearby.  The physical security measures of the compound are extraordinary.  It has 12- to 18-foot walls topped with barbed wire.  Internal wall sections — internal walls sectioned off different portions of the compound to provide extra privacy.  Access to the compound is restricted by two security gates, and the residents of the compound burn their trash, unlike their neighbors, who put the trash out for collection.

The main structure, a three-story building, has few windows facing the outside of the compound.  A terrace on the third floor has a seven-foot wall privacy — has a seven-foot privacy wall.

It’s also noteworthy that the property is valued at approximately $1 million but has no telephone or Internet service connected to it.  The brothers had no explainable source of wealth.

Intelligence analysts concluded that this compound was custom built to hide someone of significance.  We soon learned that more people were living at the compound than the two brothers and their families.  A third family lived there — one whose size and whose makeup matched the bin Laden family members that we believed most likely to be with Osama bin Laden.  Our best assessment, based on a large body of reporting from multiple sources, was that bin Laden was living there with several family members, including his youngest wife.

Everything we saw — the extremely elaborate operational security, the brothers’ background and their behavior, and the location and the design of the compound itself was perfectly consistent with what our experts expected bin Laden’s hideout to look like.  Keep in mind that two of bin Laden’s gatekeepers, Khalid Sheikh Mohammed and Abu Faraj al-Libbi, were arrested in the settled areas of Pakistan.

Our analysts looked at this from every angle, considering carefully who other than bin Laden could be at the compound.  We conducted red team exercises and other forms of alternative analysis to check our work.  No other candidate fit the bill as well as bin Laden did.

So the final conclusion, from an intelligence standpoint, was twofold.  We had high confidence that a high-value target was being harbored by the brothers on the compound, and we assessed that there was a strong probability that that person was Osama bin Laden.

Now let me turn it over to my colleague.

SENIOR ADMINISTRATION OFFICIAL:  Thank you.  Earlier this afternoon, a small U.S. team conducted a helicopter raid on the compound.  Considerable planning helped prepare our operators for this very complex mission.  Senior officials have been involved in the decision-making and planning for this operation for months, and briefed the President regularly.  My colleague has already mentioned the unusual characteristics of this compound.  Each of these, including the high walls, security features, suburban location, and proximity to Islamabad made this an especially dangerous operation.

The men who executed this mission accepted this risk, practiced to minimize those risks, and understood the importance of the target to the national security of the United States.

I know you understand that I can’t and won’t get into many details of this mission, but I’ll share what I can.  This operation was a surgical raid by a small team designed to minimize collateral damage and to pose as little risk as possible to non-combatants on the compound or to Pakistani civilians in the neighborhood.

Our team was on the compound for under 40 minutes and did not encounter any local authorities while performing the raid.  In addition to Osama bin Laden, three adult males were killed in the raid.  We believe two were the couriers and the third was bin Laden’s adult son.

There were several women and children at the compound.  One woman was killed when she was used as a shield by a male combatant.  Two other women were injured.

During the raid, we lost one helicopter due to mechanical failure.  The aircraft was destroyed by the crew and the assault force and crew members boarded the remaining aircraft to exit the compound.  All non-combatants were moved safely away from the compound before the detonation.

That’s all I have at this time.  I’ll turn it back to my colleague.

SENIOR ADMINISTRATION OFFICIAL:  We shared our intelligence on this bin Laden compound with no other country, including Pakistan.  That was for one reason and one reason alone:  We believed it was essential to the security of the operation and our personnel.  In fact, only a very small group of people inside our own government knew of this operation in advance.

Shortly after the raid, U.S. officials contacted senior Pakistani leaders to brief them on the intent and the results of the raid.  We have also contacted a number of our close allies and partners throughout the world.

Sine 9/11, the United States has made it clear to Pakistan that we would pursue bin Laden wherever he might be.  Pakistan has long understood that we are at war with al Qaeda.  The United States had a legal and moral obligation to act on the information it had.

And let me emphasize that great care was taken to ensure operational success, minimize the possibility of non-combatant casualties, and to adhere to American and international law in carrying out the mission.

I should note that in the wake of this operation, there may be a heightened threat to the homeland and to U.S. citizens and facilities abroad.  Al Qaeda operatives and sympathizers may try to respond violently to avenge bin Laden’s death, and other terrorist leaders may try to accelerate their efforts to strike the United States.  But the United States is taking every possible precaution to protect Americans here at home and overseas.  The State Department has sent guidance to embassies worldwide and a travel advisory has been issued for Pakistan.

And without a doubt, the United States will continue to face terrorist threats.  The United States will continue to fight those threats.  We have always understood that this fight would be a marathon and not a sprint.

There’s also no doubt that the death of Osama bin Laden marks the single greatest victory in the U.S.-led campaign to disrupt, dismantle, and defeat al Qaeda.  It is a major and essential step in bringing about al Qaeda’s eventual destruction.

Bin Laden was al Qaeda’s only (inaudible) commander in its 22-year history, and was largely responsible for the organization’s mystique, its attraction among violent jihadists, and its focus on America as a terrorist target.  As the only al Qaeda leader whose authority was universally respected, he also maintained his cohesion, and his likely successor, Ayman al-Zawahiri, is far less charismatic and not as well respected within the organization, according to comments from several captured al Qaeda leaders.  He probably will have difficulty maintaining the loyalty of bin Laden’s largely Gulf Arab followers.

Although al Qaeda may not fragment immediately, the loss of bin Laden puts the group on a path of decline that will be difficult to reverse.

And finally, it’s important to note that it is most fitting that bin Laden’s death comes at a time of great movement towards freedom and democracy that is sweeping the Arab world.  He stood in direct opposition to what the greatest men and women throughout the Middle East and North Africa are risking their lives for:  individual rights and human dignity.

MR. VIETOR:  With that we’re ready to take a couple questions.

Q    One question.  You said “a small U.S. team.”  Were these military personnel, can you say, or non-military?

SENIOR ADMINISTRATION OFFICIAL:  Can’t go into further details at this time; just a small U.S. team.

Q    Good morning.  Can you tell us specifically what contact there was with bin Laden at the compound?  You referred to someone using a woman as a shield that was not bin Laden.  But how was he killed?  Where?  What occurred at the compound?

SENIOR ADMINISTRATION OFFICIAL:  As the President said this evening, bin Laden was killed in a firefight as our operators came onto the compound.

Q    Thank you.  Just to go back to what you were talking about with the attacks in response to this operation, are you hearing any specific threats against specific targets?

SENIOR ADMINISTRATION OFFICIAL:  No.  But any type of event like this, it is very prudent for us to take measures so that we can ensure that the security measures that we need to institute here and throughout the world are in place.  This is just something that we normally would do.  We don’t have any specific threats at this time related to this.  But we are ensuring that every possible precaution is taken in advance.

Q    Yes, hey, how are you doing?  My question would be, what was the type of the helicopter that failed?  And what was the nature of that mechanical failure?

SENIOR ADMINISTRATION OFFICIAL:  Can’t go into details at this time.

SENIOR ADMINISTRATION OFFICIAL:  We didn’t say it was mechanical.

Q    Was bin Laden involved in firing himself or defending himself?  And then any chronology of the raid itself?

SENIOR ADMINISTRATION OFFICIAL:  He did resist the assault force.  And he was killed in a firefight.

Q    Thank you.  Thank you for taking this call.  Can you give me a comment on the very fact that Osama bin Laden was just in Islamabad — and has long been (inaudible) Afghanistan (inaudible) also from India, that Osama bin Laden is hiding somewhere near Islamabad?  What does it signify, that?  Does it signify any cooperation or any kind of link that he had with establishments in Pakistan?

SENIOR ADMINISTRATION OFFICIAL:  As the President said, Pakistani cooperation had assisted in this lead, as we pursued it.  So we’re continuing to work this issue right now.  We are very concerned about — that he was inside of Pakistan, but this is something that we’re going to continue to work with the Pakistani government on.

Q    But the very fact you didn’t inform the Pakistani authorities — did you have any suspicion that if you informed them, the information might lead somewhere?

SENIOR ADMINISTRATION OFFICIAL:  An operation like this that is conducted has the utmost operational security attached to it.  I said that we had shared this information with no other country, and that a very, very small group of individuals within the United States government was aware of this.  That is for operational security purposes.

SENIOR ADMINISTRATION OFFICIAL:  I would also just add to that that President Obama, over a period of several years now, has repeatedly made it clear that if we had actionable intelligence about Osama bin Laden’s whereabouts, we would act.  So President Obama has been very clear in delivering that message publicly over a period of years.  And that’s what led President Obama to order this operation.  When he determined that the intelligence was actionable and the intelligence case was sufficient, he gave us high confidence that bin Laden indeed was at the compound.

Q    Thank you.  What is going to happen next?  And what is the U.S. going to do with bin Laden’s body?

SENIOR ADMINISTRATION OFFICIAL:  We are ensuring that it is handled in accordance with Islamic practice and tradition.  This is something that we take very seriously.  And so therefore this is being handled in an appropriate manner.

MR. VIETOR:  Great, thanks.  Just to remind everyone, this call is on background, as senior administration officials.  We have time for one more question, and we’re going to go to bed.

Q    Do you have a sense of the vintage of the compound and how long bin Laden had been there?

SENIOR ADMINISTRATION OFFICIAL:  The compound has been in existence for roughly five years, but we don’t know how long bin Laden lived there.  We assess that the compound was built for the purpose of harboring him.  But again, don’t know how long he’s been there.

MR. VIETOR:  Great, thank you all.  We’ll talk more tomorrow.

END            12:24 A.M. EDT

TOP-SECRET: THE WIKILEAKS “INSURANCE” FILES UNVEILED HERE

Step right up, step right up and grab your WikiLeaks insurance file! #wikileaks #cablegate http://insurance.aes256.orgOnly some people know what this mysterious file is, because it’s been encoded with the AES256 Top Secret encryption software, but they know its name, “INSURANCE”.IT’S ONE POINT FOUR GIGABYTES OF INFORMATION, and the mystery and intrigue deepens with theorist and hacker alike having a stab at guessing the content or slow munching the code breaking chores, respectively.

Several hours since the revelation, and the internet’s sorta lit up just now like a big gormless-looking energy-saving light bulb. The implication is, the key has not been released but you can rest asssured that the people who this is directed at have already applied their Top Secret key to it. They already know what it contains.

And that’s the bit I don’t like, where TRUTH & JUSTICE become yet another bargaining chip in a complex game of cat and mouse between poker players, excuse that all sortsa mixed metaphoria. I’ll obsessively update this post with any findings, or news of any released ENCRYPTION key. Or word from Assange or his team. This, for me, could mean that Assange is in ‘deep negotiation’ with the government somewhere, right now, maybe even under arrest; maybe undergoing rendition.

 

WikiLeaks has lost control of its full, unredacted cache of a quarter-million US State Dept cables, and this time the leaked files are apparently online. The uncensored cables are contained in a 1.73-GB password-protected file named “cables.csv,” which is reportedly circulating somewhere on the internet, according to Steffen Kraft, editor of Der Freitag. Kraft announced last week that his paper had found the file, and easily obtained the password to unlock it. Unlike the cables that WikiLeaks has been publishing piecemeal since last fall, these cables are raw and unredacted, and contain the names of informants and suspected intelligence agents that were blacked out of the official releases. Der Freitag said the documents include the names of suspected agents in Israel, Jordan, Iran and Afghanistan, and noted that interested parties could have already discovered and decrypted the file to uncover the names of informants. Former WikiLeaks staffer Herbert Snorrason of Iceland, who left the organization as part of a staff revolt last year and is now part of the competing site OpenLeaks, confirmed:

The story is that a series of lapses, as far as I can see on behalf of WikiLeaks and its affiliates, has led to the possibility a file becoming generally available which it never should have been available.

Information about the exposed file and password was also confirmed by Der Spiegel. According to that publication, the cables were contained in an encrypted file that Julian Assange had stored on a subdirectory of the organization’s server last year, which wasn’t searchable from the internet by anyone who didn’t already know its location. Assange had reportedly given the password for the file to an “external contact” to access the file’s contents. With both the file and the password now online, the leak is complete. Snorrason said on Monday:

The issue is double: On one hand there is the availability of the encrypted file, and on the other the release of the password to the encrypted file. And those two publications happened separately.

The password leak was done “completely inadvertently,” Snorrason added. He declined to identify the leaker, or the circumstances of the leak, but said it was someone who was with neither WikiLeaks nor OpenLeaks. When Daniel Domscheit-Berg left WikiLeaks, he took the contents of the WikiLeaks server with him, which included the encrypted file. Last December, Domscheit-Berg returned most of what he had taken, including the file containing the cables. Wikileaks subsequently released an archive of the data that Domscheit-Berg had returned. Among the documents was the encrypted file containing the cables. Several months later, the person to whom Assange had provided the password somehow made it public online. Der Spiegel doesn’t elaborate on precisely why or how that person published the password, and Snorrason declined to say more, for fear of guiding people to the password. Snorrason said:

It’s not very obvious how the password was made available, and we’re not keen on making it any more obvious how or why it might have been published.

Both the encrypted file and password went unnoticed until recently. Der Spiegel implies that Domscheit-Berg was responsible for calling Der Freitag’s attention to the file and password. Domscheit-Berg did not respond to an e-mail query on Monday. WikiLeaks abruptly opened the spigot last week on its cable publications, spewing out over 130,000 by Monday afternoon, more than half the total database. WikiLeaks responded to the leak on Twitter on Monday by writing:

There has been no ‘leak at WikiLeaks’. The issue relates to a mainstream media partner and a malicious individual.

 

TOP-SECRET: US embassy cables: Mashaei groomed as possible successor to Ahmadinejad in Iran

Cable dated:2010-01-28T14:32:00
C O N F I D E N T I A L SECTION 01 OF 03 RPO DUBAI 000023
SIPDIS
E.O. 12958: DECL: 2020/01/28
TAGS: PGOV, IR, PREL
SUBJECT: IRAN: Ahmadinejad Ally Mashaei Lightning Rod for Criticism
CLASSIFIED BY: Charles Pennypacker, Consular Officer, DOS, IRPO; REASON: 1.4(B), (D)

1. (C) SUMMARY: President Ahmadinejad’s relationship with his Chief of Staff Esfandiar Rahim Mashaei has become a source of aggravation for Ahmadinejad’s hardline supporters and an easy target for his political opponents. Mashaei has a long history of missteps and provocative comments, most recently a January 10 speech that critics blasted for contravening Islamic principles. In response to this latest affront, critics from across the political spectrum have derided Mashaei’s intrusion into religious matters, and hardliners in particular beseeched the president to dump his oft-beleaguered sidekick – to no avail. Ahmadinejad has defended Mashaei through several contentious episodes dating to his first term, and his refusal to remove Mashaei has inspired confusion and derision. As an IRPO contact recently observed, Ahmadinejad’s attachment to Mashaei may reflect that the president has a very limited number of trusted lieutenants, Mashaei among them. END SUMMARY.

Background

2. (SBU) Esfandiar Rahim Mashaei first became embroiled in controversy during Ahmadinejad’s first term, when he served as Vice President for Cultural Heritage and Tourism and also headed Iran’s Tourism Organization. As part of a 2005 economic conference in Turkey he attended a cultural ceremony featuring female dancers. A video of Mashaei at the ceremony surfaced a year later and was broadcast on state media, sparking criticism that Mashaei violated Islamic principles by watching women dance. Subsequently, in July 2008 Mashaei elicited broad criticism by deeming Iran a friend of the Israeli people. In the face of fierce criticism, Mashaei reiterated his remarks, prompting a campaign to remove him. Ahmadinejad, however, publically backed Mashaei.

3. (SBU) Instead, after his 2009 reelection, Ahmadinejad elevated Mashaei to First Vice President. A mix of Ahmadinejad’s conservative detractors and supporters collectively denounced the promotion, citing Mashaei’s abovementioned transgressions as well as concerns about his unorthodox religious beliefs. Many in Ahmadinejad’s base of support demanded that he retract the order. The opposition to Mashaei, and Ahmadinejad’s refusal to acquiesce, eventually compelled Supreme Leader Khamenei to send a letter to Ahmadinejad demanding Mashaei’s removal. Incredibly, Ahmadinejad relented only after state media publicized the letter several days later amid warnings that Ahmadinejad must heed Khamenei’s wishes. In the face of the Supreme Leader’s opposition to Mashaei, Ahmadinejad made Mashaei his Chief of Staff, prompting official IRGC media organs to castiage Ahmadinejad for ignoring the spirit if not the letter of Khamenei’s guidance.

Biography

4. (SBU) Mashaei was born in 1960 in Ramsar and attended Esfahan Industrial University, where he studied electrical engineering. The origins of his relationship with Ahmadinejad are unclear, though a Fars News Agency account says they met when Ahmadinejad was governor of the city of Khoi in the late 1980s and Mashaei was serving in the Intelligence Ministry. (NOTE: Mashaei’s daughter married Ahmadinejad’s son in 2008. END NOTE.) In addition to his past work in the Intelligence Ministry, Mashaei’s website lists several other official jobs:

– General Manager for Social Affairs, Interior Ministry

– Manager, Payam Radio Station

– Manager, Tehran Radio Station

– Deputy for Social Affairs and Culture, Tehran Municipality

DUBAI 00000023 002 OF 003

– Director, Iran Tourism Organization

5. (SBU) Mashaei’s website also lists the various posts he currently holds in the Ahmadinejad government beyond his role as chief of staff:

– Director, Center for Study of Globalization

– President’s Deputy, Supreme Council for Iranians Abroad

– Member, Government Cultural Committee

– President’s Representative, Council Overseeing IRIB

– Member, Government Economic and Cultural Committee

6. (SBU) Ahmadinejad’s stubborn defense of Mashaei bespeaks his importance as a key advisor for the increasingly isolated president; he also has emerged as a spokesman for the Ahmadinejad administration. Ahmadinejad has even told press that he would gladly serve as Vice-President in a Mashaei administration, prompting many to speculate that Ahmadinejad seeks to have Mashaei replace him in 2013.

A Political Punching Bag

7. (C) Since his installation as Chief of Staff, Mashaei has attracted far more attention for his ‘unofficial’ comments about religion, bearing out the earlier whispers that the opposition to Mashaei stemmed from his unorthodox religious views. An IRPO contact last summer said many clerics were concerned by Mashaei’s belief in the imminent return of the Twelfth Imam and by the intrusion of a layman into religious matters. During Ahmadinejad’s second term Mashaei has repeatedly stoked withering criticism by airing his religious views – and, in doing so, provided great fodder too for the president’s political foes.

8. (C) The criticism of Mashaei, and Ahmadinejad by association, is both real and opportunistic. Ahmadinejad’s hardline backers bristle at Mashaei’s presence in his government and time again beseech him to dump him. Kayhan Newspaper in November responded to a Mashaei assertion that ‘God is not the axis of unity among men’ by arguing that his comments contravene Islam and other religions and suggesting to Ahmadinejad that the government, the people of Iran, and the president himself would all be better off without Mashaie. The IRGC newspaper Sobh-e Sadegh a week later sent Ahmadinejad the same message-that he should abandon Mashaei.

9. (C) On January 10 during a university speech Mashaei invited derision by denigrating past prophets’ management ability. According to BBC Farsi, Mashaei pointed out that the prophet Noah (there are many prophets in Islam) lived for 950 years and even in that time was not able to establish ‘justice,’ thus creating the need for more prophets. A clerical supporter responded by complaining that Mashaei’s presence on the Ahmadinejad government causes much pain for the president’s supporters. Kayhan followed suit and carried an article mocking Mashaei and asking that he stay out of such matters. Ahmadinejad’s brother Davud, the former head of the president’s office of inspection, accused Mashaei of saying “absurd” things to keep the system busy and to prevent progress towards Khomeini’s goals. He mockingly implied that Mashaei’s only ‘accomplishment’ is his friendship with Hooshang Amir Ahmadi. (COMMENT: Davud Ahmadinejad, who resigned his position as in August 2008, reportedly did so due to disagreements with his brother regarding Mashaei. END COMMENT.)

DUBAI 00000023 003 OF 003

10. (SBU) Ahmadinejad’s opponents use the president’s relationship with Mashaei for mockery and to score political points. Numerous IRPO contacts have related well known anecdotes about Mashaei’s religious views and firm belief in the imminent return of the Twelfth Imam. Among them is the political ‘urban myth’ in Tehran that Ahmadinejad’s devotion to Mashaei is said to stem from his belief that Mashaei is in fact in direct contact with the Twelfth Imam. According to these rumors, Mashaei allegedly occasionally enters a trance-like state to communicate with the Twelfth Imam or will sometimes randomly say ‘hello’ to no one at all and then explain that the Twelfth Imam just passed by.

11. (SBU) On January 17 the moderate website ‘Ayande News’ carried an article about a meeting between Ahmadinejad and his supporters in which he defended Mashaei and referred to him as ‘Ohleeah ollah’, a title reserved for Islam’s most revered. Afterwards, the meeting’s organizer compared the relationship of Ahmadinejad and Mashaei to that of a ‘disciple and a mystic master.’ The oppositionist website ‘Rah-e Sabz’ has carried innumerable derogatory stories about Mashaei, among them allegations that Mashaei has assisted in the sale of Iranian antiquities outside of the country and that Mashaei’s family members have received jobs at the state-owned carmaker Saipa.

12. (SBU) The recent attacks on Mashaei seemingly culminated with reports of Mashaei’s resignation. On January 20, for example, the website ‘Khabar Online’ (affiliated with Majlis Speaker Larijani) published rumors that Mashaei would soon resign his position. The report cited a Majlis member who said that he regarded Mashaei as a “spent force.” However, Mashaei that day denied the reports of his resignation and the protests continued. BBC Farsi on January 27 reported that a Majlis faction aligned with traditional conservatives, the ‘Front of the Followers of the Line of the Imam and the Supreme Leader,’ sent Ahmadinejad a letter asking him to remove Mashaei.

13. (C) COMMENT: Mashaei’s presence in the Ahmadinejad government and the criticism he elicits illustrates some of the ongoing factional divisions in Tehran. That Larijani and other more moderate principlists use Mashaei to badger Ahmadinejad is not surpising; these camps have been jockeying for position since the 2005 presidential election campaign. More interesting is the criticism from Ahmadinejad’s hardline supporters. These hardliners still rely on the traditional clergy for a patina of Islamic legitimacy, and the clerical class’ near universal distaste for Mashaei’s version of Islam contributes to the hardline animosity to Ahmadinejad. To date, the criticism of Mashaei has stopped short of attacking Ahmadinejad directly, but his backers seem increasingly weary of Mashaei’s antics and Ahmadinejad’s patience for them. Ahmadinejad, who reportedly believes Mashaei is merely misunderstood, seems doggedly determined to retain his chief of staff even in the face of protests from his base. It was only with Khamenei’s direct intervention that Ahmadinejad grudgingly retracted Mashaei’s elevation to first vice president; it seems that to depose Mashaei, his critics may need to enlist the Supreme Leader once again. END COMMMENT. EYRE

TOP-SECRET: Israel sees Iran’s uranium enrichment as ‘point of no return’

Thursday, 17 March 2005, 14:58
S E C R E T SECTION 01 OF 03 TEL AVIV 001593
SIPDIS
EO 12958 DECL: 03/14/2015
TAGS PARM, PREL, MNUC, KNNP, EU, IR, IS, GOI EXTERNAL
SUBJECT: C-NE4-01083: ISRAELI INTENTIONS REGARDING THE
IRANIAN NUCLEAR PROGRAM
REF: STATE 26053
Classified By: Ambassador Daniel C. Kurtzer; Reasons: 1.4 (B) and (D).

Summary
  1. Israel urges international pressure on Tehran but worries US may move towards a less tough EU position. Israel is aware that it will be harder to destroy Iranian nuclear sites than it was Iraq’s reactor in 1981. Expects Iran to hit back at coalition forces in Iraq and the Gulf and launch terrorist attacks. Key passage highlighted in yellow.
  2. Read related article

1. (S) SUMMARY: Israel sees Iran as the primary threat to its security and sees the enrichment cycle as the “point of no return” for Tehran’s nuclear weapons program. The GOI believes that diplomatic pressure with teeth, such as sanctions, can affect Iranian behavior, and is lobbying the EU-3 and IAEA on details of a permanent suspension agreement. The Israelis support a unified international front but are concerned that the USG may move toward the EU position. Despite the GOI‘s focus on the diplomatic track, public and private speculation about possible Israeli air strikes continues. In weighing the military options, the GOI is aware of significant differences from its successful strike against Iraq’s nuclear program in 1981, including an uncertain and dispersed target set, the presence of coalition forces in Iraq and the Gulf, Iranian capabilities to retaliate through Hizballah and terrorism, and the changed strategic environment. END SUMMARY.

——————————————— ———-

The Iranian Threat, “Point of No Return,” and Timelines

——————————————— ———-

2. (S) PM Sharon calls Iran “the main threat to Israel” and has recently expressed concern that some states are “getting used to” the idea of Iran obtaining nuclear weapons. Other senior Israeli officials echo this, cautioning that Tehran’s nuclear weapons program poses what Mossad Chief Meir Dagan calls an “existential threat” that alters the strategic balance in the region.

3. (C) In a meeting with congressional visitors in December, Defense Minister Shaul Mofaz described operation of the enrichment cycle as the “point of no return” for the Iranian program, a view shared by many senior GOI officials. Mossad Chief Dagan went a step further, saying that the Iranian program will be unstoppable once it no longer requires outside assistance to complete the enrichment process. At the technical level, the director for external affairs at the Israel Atomic Energy Commission (IAEC) told poloff that the critical step would be Iran’s operation of a centrifuge enrichment cascade.

4. (S) GOI officials have given different timelines for when they believe Iran will have full enrichment capability. In February, PM Sharon told the Secretary that he believes there is still time remaining to pressure Iran, but that the window of opportunity is closing quickly. DefMin Mofaz cautioned that Iran is “less than one year away,” while the head of research in military intelligence estimated that Iran would reach this point by early 2007. Technical experts at the IAEC predicted that Iran would have enrichment capability within six months of the end of the suspension agreement. A few GOI officials admitted informally that these estimates need to be taken with caution. The head of the MFA’s strategic affairs division recalled that GOI assessments from 1993 predicted that Iran would possess an atomic bomb by 1998 at the latest.

——————————————–

Focus on Diplomacy and Concern with the EU-3

——————————————–

5. (S) In the near term, Israel is focused on maintaining diplomatic pressure on Iran to cooperate with the IAEA and EU-3. Sharon defines diplomatic pressure to include UNSC sanctions, e.g. on Iran’s airlines and trade, as noted below. President Katsav has said that Tehran is “very conscious of international opinion.” Other MFA and NSC officials point to the current suspension and to Iranian reaction to the Mykonos case as proof that diplomatic pressure can affect decision-making in Tehran.

6. (S) The Israelis often express disappointment with EU-3 efforts, but see no real alternative at this time. PM Sharon told reporters on March 10 that Iran uses the negotiations to “play for time.” In private, Sharon, his Cabinet, and military leaders have all complained that the Europeans are “too soft.” Similarly, President Katsav has cautioned that Iran will “cheat” on any commitments it makes. MFA staff told poloff that they do not believe that the EU-3 effort will be successful in obtaining a permanent suspension or that the Europeans will support effective sanctions against Iran.

7. (C) GOI technical experts said they have been lobbying the Europeans and IAEA on several issues. First, the GOI would like a clearer and more detailed listing of all activities covered by the suspension, along with timelines for each step. Second, they want more robust verification measures and greater focus on Iran’s denial of access to IAEA inspectors. Third, the Israelis insist that any final agreement must be endorsed by the UNSC to ensure that noncompliance will be dealt with at an appropriate level. Fourth, Israel is pushing the EU-3 to define benchmarks that would signal a failure of the process, and to identify the concrete consequences of such failure.

8. (C) According to the IAEC, the GOI has urged the Europeans to examine bilateral or EU sanctions with small, but noticeable, economic impacts. After telling the press on March 10 that “it would probably not be advisable to impose an oil embargo on Iran,” PM Sharon advocated trade and flight restrictions. Lower-level GOI officials said these steps could include restrictions on Iranians studying in Europe, limitations on travel by Iranian scientific personnel, and suspension of landing privileges for Iranian airlines within the EU. The goal, according to the deputy NSA for foreign affairs, is unified pressure from the EU, Russia, and U.S. for a “complete, full, verifiable cessation of the fuel cycle program.” In the short term, this means a full suspension of all enrichment, reprocessing, heavy-water-reactor construction, and related R&D activities.

——————————————— —

Israeli Preference for USG and UNSC Involvement

——————————————— —

9. (C) In light of their uneasiness with EU-3 efforts, the Israelis are hoping for robust U.S. involvement and action by the UNSC. PM Sharon has urged the EU-3 to continue its efforts, but also stressed the importance of preparing to take Iran to the UNSC. In a meeting with a CoDel on December 12, DefMin Mofaz pushed for the U.S. to take the lead with the Europeans and pursue all diplomatic solutions, including sanctions. President Katsav asked the Secretary not to “wait for the Europeans.”

10. (C) This desire for U.S. activity is amplified by the extremely limited options open to Israel on the diplomatic front. The IAEC’s director for non-proliferation admitted that the GOI sees “little we can do” to increase pressure on Iran as long as Tehran abides by the suspension agreement. The MFA’s office director for the Gulf states said that Israel would maintain its low-profile diplomatic activities, such as supplying IAEA members with intelligence material related to the Iranian program. She said the MFA believes that any overt Israeli pressure would backfire, leading to a surge of Arab support for Iran and focusing attention on Israel’s own nuclear activities.

11. (C) Following the recent announcements on Iran by the President and the Secretary, several Israeli officials asked if the USG is shifting its policy on Iran. The deputy NSA for foreign affairs acknowledged that the U.S. move is probably necessary to build international consensus for taking Iran to the UNSC. At the same time, he expressed concern that the USG would be influenced by what he called the EU’s habit of granting concessions to Iran prior to full compliance. Mid-level staffers at the NSC and IAEC were also disquieted by U.S. press reports claiming that the USG is re-examining its position on Hizballah.

——————————————

The Military Option: Bushehr is not Osirak

——————————————

12. (S) Despite frustrations with diplomatic efforts, Israeli officials are understandably reluctant to discuss possible military options. In public, PM Sharon has stressed the importance of the “political and economic” track. During a recent discussion with a visiting USG official, IDF Deputy Chief of Staff (and CoS-designate) Major General Dani Haloutz similarly said “we don’t want to go there.” In February, President Katsav told the Secretary that “the military option is not necessary — bring the issue to the Security Council.”

13. (S) Public speculation about possible military strikes usually focuses on the differences from the Israeli Air Force’s attack on Iraq’s Osirak reactor in 1981. In private, GOI officials have acknowledged that several factors would make any attack against Iran a much more difficult mission. A senior military intelligence official told the Embassy that the GOI does not know where all of the targets are located and said that any attack would only delay, not end, the Iranian program. The MFA’s office director for the Gulf states noted that potential target sites are well dispersed throughout the country, with several located in built-up civilian areas. The IAEC stressed the importance of Russian assistance in restraining Iran’s nuclear ambitions and said that any attack on Bushehr would likely result in Russian casualties and endanger Moscow’s cooperation.

14. (C) MFA contacts said that the distance to the targets and the presence of U.S. forces in Iraq and the Gulf raise additional complications. An Israeli assault would necessitate prior coordination with coalition forces in Iraq, they maintained, leaving the USG open to retaliation throughout the Islamic world, especially in Iraq. MFA and NSC officials acknowledged that any attack would also elicit a strong response from Arab states and the Palestinians, effectively freezing the peace process.

15. (C) The Israelis realize that Iran would use any military strike as an excuse to cease cooperation with the EU-3 and the IAEA. In addition, the GOI is acutely aware of Iran’s ability to retaliate, both militarily and through attacks by its regional surrogates. PM Sharon has claimed that Hizballah has 11,000 rockets (and possibly UAVs) capable of reaching Israel from launching sites in Lebanon. The MFA’s office director for the Gulf states said that she believed that Iran would retaliate by inciting terrorist groups in Israel and the Occupied Territories.

16. (C) Current USG, EU-3, and IAEA focus on Iran also creates a situation that differs from 1981, when the Israelis felt that the international community was ignoring the Iraqi threat. Israelis hope that the others will solve the Iranian problem for them, or as Vice PM Shimon Peres has said, “I do not think that the matter of Iran needs to be turned into an Israeli problem — it is a matter of concern for the whole world.”

——————————————— —

Comment: Diplomatic Solution Preferred, but …

——————————————— —

17. (S) COMMENT: The Israelis are focusing on diplomatic channels in the IAEA and EU-3, and appear to have very real concerns about the feasibility of military strikes against the Iranian nuclear program. Nevertheless, the GOI has shown time and again that it will act militarily if it believes that its security is threatened, and the IDF is most certainly keeping contingency plans up to date. The Israeli press reported that in February PM Sharon’s Security Cabinet had given “initial authorization” for an attack on Iran. The press reports cited an unnamed “Israeli security source,” who claimed that the USG would “authorize” an Israeli attack. Post notes that it may not be possible to detect preparations for any military strike. Air defense operations would pose nearly perfect cover for civil defense and Air Force activities preceding any attack. Due to both the extreme sensitivity of the issue and the GOI‘s near inability to prevent leaks, any attack order would be closely held, probably even from many members of PM Sharon’s Cabinet.

18. (C) COMMENT CONTINUED: The GOI knows that we share its interest in preventing Iran from obtaining nuclear weapons. Nevertheless, we should expect continued Israeli lobbying at the highest levels urging the USG to ensure that the EU-3 effort is on track and backed by a solid international front. We will also hear Israeli concerns that the U.S. position may move toward the EU stance. At the same time, we should recognize that Israeli intelligence briefings will understandably focus on worst-case scenarios and may not match current USG assessments.

********************************************* ******************** Visit Embassy Tel Aviv’s Classified Website: http://www.state.sgov.gov/p/nea/telaviv

You can also access this site through the State Department’s Classified SIPRNET website. ********************************************* ******************** KURTZER

East German Communist Intelligence, STASI…Sponsored the Baader-Meinhof Gang

Except for all-out-war, the greatest threats against US Army Europe (USAREUR)
were deadly terrorist’s attacks and spies.
The major terrorist group we faced was theRed Army Faction (RAF). They were
violent, lethal and used bombings to try to intimidate us and our government. The
Red Army Faction, also known as the Baader-Meinhof Gang was one of the most
dangerousterrorist groups in the Cold War. They launched approximately 24 anti-
Western attacks (mostly bombings), killed about 30 people and wounded from 65 to
70 people.
National defense expert Scott O’Connell saysthe RAF did pin down scarce CI
assets that we could have used more effectively used to root out spies. Even
more curious…a lot of it tapered off and died down when the wall came down

//

//
‘/>
raising the credibility of those who felt the east bloc was behind or at least
lent material support to them.
Another defense expert, LTC (Ret) Ken Krantz, former USAREUR
Counterintelligence Chief of Analysis reportsthe relationship between the East
German Stasi and the RAF was confirmed after 1990. The Stasi gave
financial and identity support as well as sanctuary to the RAF.
Another terrorist group was the Red Brigades (Brigate Rosse). They were a
Marxist-Leninist terrorist group in Italy formed in 1970 and lasted until the late
1980’s. They encouraged Italy’s separation from NATO by kidnapping and murder.
Italian law enforcement helped break up the group.
The below terrorist accounts are real and are told by the Generals personally
involved! Names, units and locations are factual.



General Kroesen, Major General Burns and Major General Dozier tell their 2008
first hand stories of battling the terrorist back during the Cold War.

//

//
This is a file from theWikimedia Commons. The copyright holder of this work allows anyone to use it for any purpose
including unrestricted redistribution, commercial use, and modification.
THE TERRORIST ATTACK ON GENERAL KROESEN
– Rote Armee Faktion
– SEDAN SHOT BY A GRENADE!
GENERAL KROESEN TELLS US…
On the morning of September 15, 1981 at about 7AM, my wife, Rowene, and I were
enroute from our quarters in Schlierbach to USAREUR headquarters in
Heidelberg. We were riding in a Baden-Wuerttemburg armored state police car
because they, the police, had been warned that I was a terrorist target.

//

//
We were accompanied by a German police officer/driver and my American aide de
camp, Major Phillip Bodine. We were led by another state police car and followed
by Heidelberg police and US Army military police. At a routine traffic light stop, a
Russian rocket-propelled grenade (RPG-7) was fired at the car from a hillside
position approximately 100 meters to the left rear. The warhead penetrated the
trunk and exited through the right rear fender. My wife and I were both injured
by flying glass as the explosion destroyed the rear window. A second round landed
in the street just behind the car and a machine gun strafed the left side.
Our driver was told to drive on if the car was still operable and he did so, but not
before my wife observed an interested female pedestrian spectator who had not
run for cover when all others scattered from the area. It was an important
sighting as she was later able to identify one of the principal members of the
Baader-Meinhof gang during the police investigation that followed.
The driver delivered us to the US Army 130th Station Hospital where our wounds
were treated before we continued with our scheduled activities for the day.

//

//
The perpetrators had camped on the hillside for some time before they found the
opportunity to attack, and they departed immediately, abandoning their camping
equipment and a third RPG round. They were not apprehended for two or more
years, but they were caught, tried and sentenced to long prison terms. One, the
gunner, remains in jail today.
My subsequent travels on that day took me to a field maneuver headquarters
where, at a hastily assembled news conference, I was able to assure my German
friends that I assigned them no fault for the incident. I was also able to express
appreciation that the gang members were not equipped with an American weapon
and to remind everyone that it was not the first time a German had shot at me and
missed.FJK – Aug 2008
The Birmingham News – Saturday, 20 December 2008
Red Army Faction Member Released
BERLIN – Christian Klar, one of the last members of the terrorist Red Army
Faction to remain in prison, was released Friday after serving 26 years of a life
sentence, according to the Justice Ministry in the German state of Baden-
Wuerttemberg.

//

//
RAF RPG entered trunk and exited right side panel.This is a Stars & Stripes Front Page Photo
by Stephanie James. Used with permission and no fee granted from Stars and Stripes in a
letter dated September 8, 2008. © 2008 Stars and Stripes
***
THE TERRORIST ATTACK ON THE 42D FIELD
ARTILLERY BRIGADE – Rote Armee Faktion
– DEPOT ATTACKED!
General Burns tells us…

//

//
In January 1977 I was a brigade commander as well as the Giessen-North Sub-
community commander in Giessen, about thirty miles northwest of Frankfurt. At
that time, there was an incident at the Giessen Army Depot during which there was
a minor explosion and fire at a fuel storage tank adjacent to the Depot. This tank
was
used
to
store
fuel
under
NATO
control
and was almost empty at the time. Apparently, a group of terrorists later
identified as probably Red Army Faction attempted to destroy the tank, cause a
major conflagration, and possibly damage the Giessen Depot. The depot housed the
headquarters of the 42d Field Artillery Brigade, a major storage facility for the
Army/Air
Force
Exchange
System
in
Europe,
the
Giessen Sub-community headquarters, and some ancillary facilities.
The incident was a failure for the RAF for two reasons: first, the attack on the
tank was based on the assumption that the tank was almost full, but the attackers
misread the gauge and the explosive charge went off above the fuel level. Thus,
the explosion was relatively minor, the tank did not rupture, and the fuel in the
tank
did
not
burn
to
any
degree.
Second,
the
response of the soldiers on guard was superb — detailed plans had been made to
thwart just such an incident and coordination with the local German police had been
planned. Several perpetrators were later arrested — I’m not sure whether the

//

//
German policy arrested any that night or the next day, however.
Whether the RAF element intended only to destroy the fuel storage tanks or
whether they also intended to damage the Giessen Army Depot proper is not clear.
The fact that there was a classified facility within the Depot may or may not have
been known to them. In any event, troops on security duty within the Depot
responded to small arms fire; there was no hostile penetration of the Depot. The
security plan called for reinforcements from the 3rd Armored Division located
nearby, and these additional troops arrived well within the time limits specified,
further
securing
the
area.
Interestingly, about two years later two alleged members of the RAF were on trial
in Dusseldorf for terrorist acts including the Giessen incident. One of their
defenses was that “small arms firing that night in Giessen was caused by US
military police chasing US Army deserters in the woods near the Depot.” I was
asked to testify to the facts — units in Giessen had no deserters or soldiers
absent without leave at the time in question. Because of the sensitive nature of the
area and status of forces agreements that pertained, I was assured that the
defense counsels for the accused would not be able to press the issue of what kind
of facilities were located at Giessen — and they did not. (I don’t even remember
the
names
of
the
accused
at
this
point.)

//

//
During this period, terrorists had attacked several NATO/US facilities and
individuals and the entire European Command was under heightened alert against
this threat. It put a strain on already overcommitted resources, but my command
was able to accomplish its various missions throughout the period. Thus, if the
RAF’s
objective
was
to
reduce
the
US
Army’s
combat
effectiveness in Europe, it failed.
William
F.
Burns
5
August
2008
Major
General,
US
Army,
Retired
Former
Commander
(as
Colonel,
Field
Artillery)
42d Field Artillery Brigade, Giessen, FRG
***
The Kidnapping of Brigadier General James Dozier in
Italy -Red Brigades
Brigate Rosse

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

window.docManagerIEAdded = true;
if (document.observe) {
document.observe(‘dom:loaded’, function () {
docManager.allPagesAdded();
});
} else {
window.attachEvent(‘onload’, function () {
docManager.allPagesAdded();
});
}

//

East German Communist Intelligence, Stasi…Sponsored the Baader-Meinhof Gang

East German (communist) Intelligence Stasi….Sponsored the Baader-Meinhof Gang…(AKA Red Army Faction, RAF)…Except for all-out-war, the greates… (More) East German (communist) Intelligence Stasi….Sponsored the Baader-Meinhof Gang…(AKA Red Army Faction, RAF)…Except for all-out-war, the greatest threats against US Army Europe (USAREUR) were deadly terrorist’s attacks and spies.
The major terrorist group we faced was the Red Army Faction (RAF). They were violent, lethal and used bombings to try to intimidate us and our government. The Red Army Faction, also known as the Baader-Meinhof Gang was one of the most dangerous terrorist groups in the Co

TOP-SECRET – OIG Report on CIA Accountability With Respect to the 9/11 Attacks

The Office of the Inspector General (OIG) of the United States Central Intelligence Agency (CIA) was asked to prepare a report of the accountability of CIA officers for performance failures in countering the terror attacks of September 11, 2001, as revealed by earlier congressional hearings. The report was prepared in 2005, but kept secret until August 21 2007.

Responding to congressional pressure, the CIA released a bowdlerized executive summary only, which does not name responsible persons. CIA Director General Hayden and others objected to the release of the report, and Hayden also objects to the report’s recommendation that an Accountability Review Board should be set up to judge the persons responsible for the failures.

A report in searchable text form is here: OIG Report on CIA Accountability With Respect to the 9/11 Attacks. Actually the report itself, or what we can see of it, is pretty mild, considering the magnitude and inexplicability of many of the failures. While the report focuses on “little issues” like poor CIA-FBI cooperation and various tactical failures, it doesn’t consider the larger question of why radical Islamist terrorism in general, and Al-Qaeda in particular, was not ringing alarm bells everywhere. The report does ask why CIA Director Tenet didn’t formulate a plan to eliminate Al-Qaeda. A better question is why neither Tenet or nor anyone in the executive office of two administrations was not treating the threat as a war. After all, Bin-Laden had threatened to destroy the United States in his Fatwas, and Al-Qaeda had already carried out attacks in the SS Cole and on US embassies. Here was a clearly hostile enemy who was not making empty threats. The problem could be seen by anyone who looked, without the need for special intelligence information. Yet the issue was shunted aside.

The great failure perhaps was not the failure of George Tenet. A CIA director is not supposed to formulate policy. The great failure was the failure of the executive branch, which failed to identify a clear and present danger, and to put into operation an emergency plan to deal with it.

Read the full report and draw your own conclusions:

This document describing the unreadiness of the CIA for the attacks of 9-11 was prepared in June of 2005 by the Office of the Inspector General (OIG) of the CIA . The CIA decided to keep the document secret. At length in August of 2007, the executive report portion of the document was released.

An article by Mark Mazetti in the The New York Times of August 21, summarized some of the findings:

A report released Tuesday by the Central Intelligence Agency includes new details of the agency’s missteps before the Sept. 11 attacks, outlining what the report says were failures to grasp the role being played by the terror mastermind Khalid Sheikh Mohammed and to assess fully the threats streaming into the C.I.A. in the summer of 2001.

The 19-page report, prepared by the agency’s inspector general, also says 50 to 60 C.I.A. officers knew of intelligence reports in 2000 that two of the Sept. 11 hijackers, Nawaf al-Hamzi and Khalid al-Mihdhar, may have been in the United States. But none of those officers thought to notify the Federal Bureau of Investigation about the potential domestic threat, the report says, evidence of what it calls a systemic failure.

The inspector general recommended that several top agency officials, including former director George J. Tenet, be held accountable for their failure to put in place a strategy to dismantle Al Qaeda in the years before Sept. 11, 2001. Gen. Michael V. Hayden, the current C.I.A. director, and his predecessor, Porter J. Goss, have declined to seek disciplinary action against Mr. Tenet  and others named in the report.

The report was not a spontaneous review initiated by the CIA. It begins “

The Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence requested that the CIA’s Office of Inspector General (OIG) review the findings of their Joint Inquiry (JI) Report and undertake whatever additional investigations were necessary to determine whether any Agency employees were deserving of awards for outstanding service provided before the attacks of September 11, 2001 (9/11), or should be held accountable for failure to perform their responsibilities in a satisfactory manner.

In other words, the legislative bodies had found problems in the functioning of the CIA, and requested the CIA to take appropriate corrective measures. The refusal to seek disciplinary action against CIA officers by the head of the CIA is therefore significant.

The summary also notes that “

(U) The Accountability Review Team assembled by the Inspector General (IG) focused exclusively on the issues identified by the JI. The IG was not asked by the Congress to conduct a comprehensive review of the capabilities and functioning of the Agency’s many components involved with counterterrorism programs, and the Team did not do so. As a result, this account does not document the many successes of the Agency and its officers at all levels (including many whose actions are discussed in this report) in the war on terrorism, both before and after 9/11.

(U) Similarly, because this report was designed to address accountability issues, it does not include recommendations relating to the systemic problems that were identified. Such systemic recommendations as were appropriate to draw from this review of the events of the pre-9/11 period have been forwarded separately to senior Agency managers. In its regular program of audits, investigations, and inspections, the OIG continues to review the counterterrorism programs and operations of the Agency, identifying processes that work well and those that might be improved.

The team notes that it used a “reasonable person” approach, that is, to determine if actions taken were responsible or negligent based on what a reasonable person would do. The results of this approach are sometimes peculiar. For example, the Team decided, in contradiction to congress, that the use of foreign liaison and walk-in (volunteer) “assets” by the CIA was not excessive. But then they decide that the CIA officials were not to blame for failures, because the failures were due to the lack of cooperation or limited operation provided by such assets and liaisons.

The problems that allowed 9-11 to happen would seem to be much deeper than personal failures, or even “systemic failures” related to CIA-FBI cooperation. The FBI and the CIA had been tracking Al-Qaeda for years. Inexplicably, they failed to do so at the crucial time. They are also indicative of a larger conceptual failure in understanding the Middle East, and in allocating the necessary intelligence and diplomatic resources. (See comment on the role of the CIA and FBI in the 9-11 failure).

An important recommendation of the report:

Concerning certain issues, the Team concluded that the Agency and its officers did not discharge their responsibilities in a satisfactory manner. As a result, the Inspector General recommends that the Director, Central Intelligence Agency establish an Accountability Board made up of individuals who are not employees of the Agency to review the performance of some individuals and assess their potential accountability.

General Hayden objects to creation of such a board. No agency likes to have external oversight.

The first page of the released report is numbered Roman Numeral v. We have tried to keep the formatting as close to the original as reasonably possible. The report has numerous areas that were whited out by the censor. These are indicated herein by XXXXXXXXXX. They include names of operatives, foreign liaisons, amounts of money and other information.

Ami Isseroff

9-11 Project at MidEastWeb9-11 Commission Report: Whitewash as a public service 9-11 commission report OIG Report on CIA Accountability With Respect to the 9/11 Attack Osama Bin Laden Fatwa of 1998 Osama Bin Laden Statement on Afghanistan War  Inside Al-Qaeda Who is Osama Bin Laden? – Fatwa of 1996 (Declaration of war) Terrorist threat greater than before 9-11


Notice – Copyright

This introduction is copyright 2007 by MidEastWeb Middle East http://www.mideastweb.org  and the author. Please tell your friends about MidEastWeb and link to this page. Please do not copy this page to your Web site. You may print this page out for classroom use provided that this notice is appended, and you may cite this material in the usual way. Other uses by permission only.  The source material below is placed in the public domain  and is free of copy restrictions. Source: https://www.cia.gov/library/reports/Executive%20Summary_OIG%20Report.pdf


TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


(U) EXECUTIVE SUMMARY

(U) The Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence requested that the CIA’s Office of Inspector General (OIG) review the findings of their Joint Inquiry (JI) Report and undertake whatever additional investigations were necessary to determine whether any Agency employees were deserving of awards for outstanding service provided before the attacks of September 11, 2001 (9/11), or should be held accountable for failure to perform their responsibilities in a satisfactory manner.

(U) The Accountability Review Team assembled by the Inspector General (IG) focused exclusively on the issues identified by the JI. The IG was not asked by the Congress to conduct a comprehensive review of the capabilities and functioning of the Agency’s many components involved with counterterrorism programs, and the Team did not do so. As a result, this account does not document the many successes of the Agency and its officers at all levels

(including many whose actions are discussed in this report) in the war on terrorism, both before and after 9/11.

(U) Similarly, because this report was designed to address accountability issues, it does not include recommendations relating to the systemic problems that were identified. Such systemic recommendations as were appropriate to draw from this review of the events of the pre-9/11 period have been forwarded separately to senior Agency managers. In its regular program of audits, investigations, and inspections, the OIG continues to review the counterterrorism programs and operations of the Agency, identifying processes that work well and those that might be improved.

(U) After conducting its review, the Inspector General Team reports that, while its findings differ from those of the JI on a number of matters, it reaches the same overall conclusions on most of the important issues.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 v

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


Concerning certain issues, the Team concluded that the Agency and its officers did not discharge their responsibilities in a satisfactory manner. As a result, the Inspector General recommends that the Director, Central Intelligence Agency establish an Accountability Board made up of individuals who are not employees of the Agency to review the performance of some individuals and assess their potential accountability.

(U) In its deliberations, the Team used “reasonable person” approach and relied on Agency regulations-which are subjective-concerning standards of accountability. A discussion of those regulations is included in the Foreword. While the Team found that many officers performed their responsibilities in an exemplary fashion, it did not recommend individuals for additional recognition because these officers already have been rewarded.

(U) The Team found no instance in which an employee violated the law, and none of the errors discussed herein involves misconduct. Rather, the review focuses on areas where individuals did not perform their duties in a satisfactory manner; that is, they did not-with regard to the specific issue or issues discussed-act “in accordance with a reasonable level of professionalism, skill, and diligence,” as required by Agency regulation. On occasion, the Team has found that a specific officer was responsible for a particular action or lack of action, but has not recommended that an Accountability Board review the officer’s performance. Such a conclusion reflects the Team’s view that extenuating circumstances mitigate the case.

(U) The findings of greatest concern are those that identify systemic problems where the Agency’s programs or processes did not work as they should have, and concerning which a number of persons were involved or aware, or should have been. Where the Team found systemic failures, it has recommended that an Accountability Board assess the performance and accountability of those managers who, by virtue of their position and authorities, might reasonably have been expected to oversee and correct the process. In general, the fact that failures were systemic should not absolve responsible officials from accountability.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 vi

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


(U) The Review Team found that Agency officers from the top down worked hard against the al-Qa’ida and Usama Bin Ladin (UBL) targets. They did not always work effectively and cooperatively, however. The Team found neither a “single point of failure” nor a “silver bullet” that would have enabled the Intelligence Community (IC) to predict or prevent the 9/11 attacks. The Team did find, however, failures to implement and manage important processes, to follow through with operations, and to properly share and analyze critical data. If IC officers had been able to view and analyze the full range of information available before 11 September 2001, they could have developed a more informed context in which to assess the threat reporting of the spring and summer that year.

(U) This review focuses only on those findings of the Joint Inquiry that relate to the Central Intelligence Agency. The Team cooperated with the Department of Justice Inspector General and the Kean Commission as they pursued their separate inquiries. For this report, the Team interviewed officers from other agencies who had been detailed to the CIA in the period before 9/11, but did not undertake to interview systematically other officers outside CIA and the IC Management Staff. This report reaches no conclusions about the performance of other agencies or their personnel.

(U) Senior Leadership and Management of the Counterterrorism Effort

(U) The JI concluded that, before 9/11, neither the US Government nor the IC had a comprehensive strategy for combating al-Qa’ida. It charged that the Director of Central Intelligence (DCI) was either unwilling or unable to marshal the full range of IC resources necessary to combat the growing threat to the United States. The OIG Team also found that the IC did not have a documented, comprehensive approach to al-Qa’ida and that the DCI did not use all of his authorities in leading the IC’s strategic effort against UBL.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 vii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


(C) The Team found that the DCI was actively and forcefully engaged in the counterterrorism efforts of the CIA. Beginning in 1999, he received regular updates, often daily, on efforts to track and disrupt UBL. He was personally engaged in sounding the alarm about the threat to many different audiences in the policy community, military, Congress, and public, and he worked directly and personally with foreign counterparts to encourage their cooperation.

(S//NF) In December 1998, the DCI signed a memorandum in which he declared: “We are at war.” In addition to directives related to collection programs and other matters, this memorandum stated that the Deputy Director for Central Intelligence (DDCI) would chair an interagency group to formulate an integrated, interagency plan to counter the terrorist challenge posed by Usama Bin Ladin. The DCI wrote that he wanted “…no resources or people spared in this effort, either inside CIA or the Community.”

(S//NF) The Team found that neither the DCI nor the DDCI followed up these warnings and admonitions by creating a documented, comprehensive plan to guide the counterterrorism effort at the Intelligence Community level. The DDCI chaired at least one meeting in response to the DCI directive, but the forum soon devolved into one of tactical and operational, rather than strategic, discussions. These subsequent meetings were chaired by the Executive Director of the CIA and included few if any officers from other IC agencies. While CIA and other agencies had individual plans and important initiatives underway, senior officers in the Agency and Community told the Team that no comprehensive strategic plan for the IC to counter UBL was created in response to the DCI’s memorandum, or at any time prior to 9/11.

(S//NF) The DCI Counterterrorist Center (CTC) was not used effectively as a strategic coordinator of the IC’s counterterrorism efforts. CTC’s stated mission includes the production of all-source intelligence and the coordination of the IC’s counterterrorism efforts. Before 9/11, however, the Center’s focus was primarily operational and tactical. While

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 viii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


focusing on operations is critically important and does not necessarily mean that other elements of mission will be ignored, the Team found that this nearly exclusive focus-which resulted in many operational successes-had a negative impact on CTC’s effectiveness as a coordinator of IC counterterrorism strategy. The Team found that the most effective interagency effort against UBL was that of the Assistant DCI for Collection, who, from the early months of 1998 to 9/11, worked with representatives of several intelligence agencies to stimulate collection.

(S//NF)  In the years leading up to 9/11, the DCI worked hard and with some success, at the most senior levels of government, to secure additional budgetary resources to rebuild the CIA and the IC. At the same time, the Team found that he did not use his senior position and unique authorities to work with the National Security Council to elevate the relative standing of counterterrorism in the formal ranking of intelligence priorities, or to alter the deployment of human and financial resources across agencies in a coordinated approach to the terrorism target. While the nature of the IC makes the mission of managing it problematic and difficult, the DCI at the time had some authority to move manpower and funds among agencies. The Team found that, in the five years prior to 9/11, the DCI on six occasions used these authorities to move almost XXXXXX

in funds from other agencies to the CIA for a number of important purposes XXXXXX

XXXXXX  One of these transfers helped fund a middle East program that was terrorism-related, but none supported programs designed to counter UBL or al-Qa’ida. Nor were DCI authorities used to transfer any personnel into these programs in the five years prior to 9/11.

The Team notes that the former DCI recognized the need for an integrated, interagency plan, and believes that such a plan was needed to mobilize all of the operational, analytic, and resource capabilities of the IC to enable the several agencies of the Community to work cooperatively and with maximum effectiveness against al-Qa’ida. At the same time, the Team concludes that the former DCI, by virtue of his position, bears ultimate responsibility for the fact that no such strategic plan was

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 ix

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


ever created, despite his specific direction that this should be done.

(S//NF) The JI report discussed a persistent strain in relations between CIA and the National Security Agency (NSA) that impeded collaboration between the two agencies in dealing with the terrorist challenge from al-Qa’ida. The Team, likewise, found that significant differences existed between CIA and NSA over their respective authorities. The Team did not document in detail or take a position on the merits of this disagreement, but notes that the differences remained unresolved well into 2001 in spite of the fact that considerable management attention was devoted to the issue, including at the level of the Agency’s Deputy Executive Director. Senior officers of the CIA and the IC Management Staff stated that these interagency differences had a negative impact on the IC’s ability to perform its mission and that only the DCI’s vigorous personal involvement could have led to a timely resolution of the matter.

(C)The Team recommends that an Accountability Board review the performance of the former DCI for failing to act personally to resolve the differences between CIA and NSA in an effective and timely manner.

(U) See the Team’s discussions of Systemic Findings 2 (The DCI’s Role); 4 (Application of Technology); and 7 (Computer Exploitation) for discussion of these issues.

(U) Management of CIA’s Resources for Counterterrorism

(C) Funding for the Agency’s counterterrorism programs increased significantly from Fiscal Year (FY)1998 to FY 2001 as a result of supplemental appropriations. These funds were appropriated, in part, because of the efforts of the CIA’s Director and senior leaders to convince the Administration and Congress that the Agency was short of resources for counterterrorism and other key programs. The Team preparing this report did not attempt to reach a

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 x

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


counterterrorism programs.

(S) The Team did find, however, that during the same period they were appealing the shortage of resources, senior officials were not effectively managing the Agency’s counterterrorism funds. In particular, Agency managers moved funds from the base budgets of the Counterterrorist Center and other counterterrorism programs to meet other corporate and Directorate of Operations (DO) needs. The Team found that from FY 1997 to FY 2001 (as of 9/11),XXXXX XXXXXXXXXX

was redistributed from counterterrorism programs to other Agency priorities. Some of these funds were used to strengthen the infrastructure of the DO and, thus, indirectly supported counterterrorism efforts; other funds were used to cover nonspecific corporate “taxes” and for a variety of purposes that, based on the Agency’s budgetary definitions, were unrelated to terrorism. Conversely, no resources were reprogrammed from other Agency programs to counterterrorism, even after the DCI’s statement in December 1998 that he wanted no resources spared in the effort. The Team found that the Agency made little use of the Reserve for Contingencies to support its counterterrorism effort. Finally, CTC managers did not spend all of the funds in their base budget, even after it had been reduced by diversions of funds to other programs.

(C) The Team recommends that an Accountability Board review the performance of the Executive Director, the Deputy Director for Operations, and the Chief of CTC during the years prior to 9/11 regarding their management of the Agency’s counterterrorism financial resources, including specifically their redirection of funds from counterterrorism programs to other priorities.

(C)  Concerning human resources, the Team found that the unit within CTC responsible for Usama Bin Ladin, UBL Station, by the accounts of all who worked there, had an excessive workload. Most of its officers did not have the operational experience, expertise, and training necessary to accomplish their mission in an effective manner. Taken together, these weaknesses contributed to performance lapses related to the handling of materials concerning

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xi

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


individuals who were to become the 9/11 hijackers. The Team recommends that an Accountability Board review the performance of the Chiefs of CTC during the period 1997-2001 regarding the manner in which they staffed the UBL component.

(C) The Team found that certain units within CTC did not work effectively together to understand the structure and operations of al-Qa’ida. This situation had a particularly negative impact on performance with respect to Khalid Shaykh Muhammad (KSM), the mastermind of the 9/11 attacks. The Team, like the Joint Inquiry, found that CTC’s assigning principal responsibility for KSM to the Renditions Branch had the consequence that the resources of the Sunni Extremist Group, UBL Station, and CTC analysts were not effectively brought to bear on the problem. CTC considered KSM to be a high-priority target for apprehension and rendition, but did not recognize the significance of reporting from credible sources in 2000 and 2001 that portrayed him as a senior al-Qa’ida lieutenant and thus missed important indicators of terrorist planning. This intelligence reporting was not voluminous and its significance is obviously easier to determine in hindsight, but it was noteworthy even in the pre-9/11 period because it included the allegation that KSM was sending terrorists to the United States to engage in activities on behalf of Bin Ladin.

(C) The evidence indicates that the management approach employed in CTC had the effect of actively reinforcing the separation of responsibilities among the key CTC units working on KSM. The Team recommends that an

Accountability Board review the performance of the XXX

XXXX and XXXXX

for failure to provide proper oversight and guidance to their officers; to coordinate effectively with other units; and to allocate the workload to ensure that KSM was being covered appropriately. The Team also recommends that an Accountability Board review the performance of the Chief of CTC for failure to ensure that CTC units worked in a coordinated, effective manner against KSM. Finally, the Team recommends that an Accountability Board review the performance of the XXXXXX for

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


failure to produce any XXXXXX coverage of Khalid Shaykh Muhammad from 1997 to 20011

  • (U) See the Team’s discussions of Systemic Finding 3 (Counterterrorism Resources) and Factual Finding 5i (Khalid Shaykh Muhammad) for further information on these issues.

(U) Information Sharing

The Team’s findings related to the issue of information sharing are in general accord with the JI’s overall assessment of CIA’s performance. Like the JI, the Team found problems in the functioning of two separate but related processes in the specific case of the Malaysia operation of early 2000: entering the names of suspected al-Qa’ida terrorists on the “watchlist” of the Department of State and providing information to the Federal Bureau of Investigation (FBI) in proper channels. The Team also found that CTC did not forward relevant information to XXXXXX

In regard to broader issues of information sharing, the Team found basic problems with processes designed to facilitate such sharing. In particular, CTC managers did not clarify the roles and responsibilities of officers detailed to CTC by other agencies.

(S//NF)  The Malaysia Operation. Agency officers did not, on a timely basis, recommend to the Department of State the watchlisting of two suspected al-Qa’ida terrorists, Nawaf al-Hazmi and Khalid al-Mihdhar. These individuals, who later were among the hijackers of 9/11, were known by the Agency in early January 2000 to have traveled to Kuala Lumpur, Malaysia, to participate in a meeting of suspected terrorists. From Kuala Lumpur, they traveled to Bangkok. In January 2000, CTC officers received information that one of these suspected terrorists had a US visa; in March 2000,


‘ (U) As a result of a conflict of interest, the Inspector General recused himself from deliberations on the performance of Agency components and individuals relating to the KSM issue and to the strategic analysis issues discussed below. The two successive Deputy Inspectors General did participate in accountability discussions regarding analysis and all other issues.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xiii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


these officers had information that the other had flown from Bangkok to Los Angeles.

(S//NF) In the period January through March 2000, some 50 to 60 individuals read one or more of six Agency cables containing travel information related to these terrorists. These cables originated in four field locations and Headquarters. They were read by overseas officers and Headquarters personnel, operations officers and analysts, managers and junior employees, and CIA staff personnel as well as officers on rotation from NSA and FBI. Over an 18-month period, some of these officers had opportunities to review the information on multiple occasions, when they might have recognized its significance and shared it appropriately with other components and agencies. Ultimately, the two terrorists were watchlisted in late August 2001 as a result of questions raised in May 2001 by a CIA officer on assignment at the FBI.

(S//NF)  In 1998, CTC assumed responsibility for communicating watchlisting guidance in the Agency. As recently as December 1999, less than a month before the events of early January 2000, CTC had sent to all field offices of the CIA a cable reminding them of their obligation to watchlist suspected terrorists and the procedures for doing so. Field components and Headquarters units had obligations related to watchlisting, but they varied widely in their performance. That so many individuals failed to act in this case reflects a systemic breakdown-a breakdown caused by excessive workload, ambiguities about responsibilities, and mismanagement of the program. Basically, there was no coherent, functioning watchlisting program.

(S//NF) The Review Team recommends that an Accountability Board review the performance of the two Chiefs of CTC in the years between 1998 and 2001 concerning their leadership and management oversight of the watchlisting program.

(S//NF) Agency officers also failed to pass the travel information about the two terrorists to the FBI in the prescribed channels. The Team found that an FBI officer

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xiv

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


assigned to CTC on 5 January 2000 drafted a message about the terrorists’ travel that was to be sent from CIA to the FBI in the proper channels. Apparently because it was in the wrong format or needed editing, the message was never sent. On the same date, another CTC officer sent a cable to several Agency addressees reporting that the information and al-Mihdhar’s travel documents had been passed to the FBI. The officer who drafted this cable does not recall how this information was passed. The Team has not been able to confirm that the information was passed, or that it was not passed. Whatever the case, the Team found no indication that anyone in CTC checked to ensure FBI receipt of the information, which, a few UBL Station officers said, should have been routine practice.

(S//NF) addressees cables reporting that al-Hazmi and another al-Qa’ida associate had traveled to the United States. They were clearly identified in the cables as “UBL associates.” The Team has found no evidence, and heard no claim from any party, that this information was shared in any manner with the FBI or that anyone in UBL . Station took other appropriate operational action at that time.

(S//NF) In the months following the Malaysia operation, the CIA missed several additional opportunities to nominate al-Hazmi and al-Mihdhar for watchlisting; to inform the FBI about their intended or actual travel to the United States; and to take appropriate operational action. These included a few occasions identified by the Joint Inquiry as well as several others.

(S//NF)   The consequences of the failures to share information and perform proper operational followthrough on these terrorists were potentially significant. Earlier watchlisting of al-Mihdhar could have prevented his re-entry into the United States in July 2001. Informing the FBI and good operational followthrough by CIA and FBI might have resulted in surveillance of both al-Mihdhar and al-Hazmi. Surveillance, in turn, would have had the potential to yield information on flight training, financing, and links to others who were complicit in the 9/11 attacks.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xv

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


The Team recommends that an Accountability Board review the performance ofXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

for failing

to ensure that someone in the Station informed the FBI and took appropriate operational action regarding al-Hazmi in March 2000. In addition, the Team recommends that the Accountability Board assess the performance of the latter three managers for failing to ensure prompt action relevant to al-Hazmi and al-Mihdhar during several later opportunities between March 2000 and August 2001.

(U) Broader Information Sharing Issues. The Joint Inquiry charged that CIA’s information-sharing problems derived from differences among agencies with respect to missions, legal authorities, and cultures. It argued that CIA efforts to protect sources and methods fostered a reluctance to share information and limited disclosures to criminal investigators. The report also alleged that most Agency officers did not focus sufficiently on the domestic terrorism front, viewing this as an FBI mission. The 9/11 Review Team’s findings are similar in many respects, but the Team believes the systemic failures in this case do not lie in reluctance to share. Rather, the basic problems were poor implementation, guidance, and oversight of processes established to foster the exchange of information, including the detailee program.

CTC and UBL Station had on their rosters detailees from many different agencies, including the FBI, NSA, Federal Aviation Administration , and State Department. The manner in which these detailees were managed left many of them unclear about the nature of their responsibilities. Many CIA managers and officers believed the detailees were responsible for conveying information to their home agencies, while most of the detailees maintained that they were working as CTC officers and had neither the time nor the responsibility to serve as links to their home agencies. The Team found, at a minimum, that there were fundamental ambiguities about the responsibilities of the detailees as they related to information sharing, and that these responsibilities were never delineated explicitly or in

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xvi

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


writing. The Team recommends that an Accountability Board review the performance of the two Chiefs of CTC during the years before 9/11 concerning their oversight of the Center’s practices in management of the detailee program.

(U) See the Team’s discussions of Factual Finding 5b (The Watchlisting Failure) and Systemic Findings 9 (Information Sharing Within the IC) and 10 (Information Sharing with Non-IC Members) for elaboration on these issues.

(U) Strategic Analysis

The Team, like the JI , found that the IC’s understanding of al-Qa’ida was hampered by insufficient analytic focus, particularly regarding strategic analysis. The Team asked three individuals who had served as senior intelligence analysts and managers to conduct an independent review of the Agency’s analytic products dealing with UBL and al-Qa’ida for the period from 1998 to 2001 and assess their quality. They found that, while CTC’s tradecraft was generally good, important elements were missing. Discussion of implications was generally weak, for example. Most important, a number of important issues were covered insufficiently or not at all. The Team found:

    • No comprehensive strategic assessment of al-Qa’ida by CTC or any other component.
    • No comprehensive report focusing on UBL since 1993.
    • No examination of the potential for terrorists to use aircraft as weapons, as distinguished from traditional hijackings.
    • Limited analytic focus on the United States as a potential target.
    • No comprehensive analysis that put into context the threats received in the spring and summer of 2001.
APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xvii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


That said, CTC’s analytic component, the Assessments and Information Group (AIG), addressed aspects of these issues in several more narrowly focused strategic papers and other analyticproducts.

J,Sf The personnel resources of AIG were heavily dedicated to policy-support and operational-support activities. Analysts focused primarily on current and tactical issues rather than on strategic analysis. In the two years prior to 9/11, the Directorate of Intelligence’s

raised with CTC managers the need to dedicate some proportion of the analytic work force to strategic analysis, as was the practice in many DI offices. In early 2001, the DCI specifically directed CTC to establish a strategic analysis unit within AIG. The Chief of AIG had for some time been aware of the need to strengthen the analytic work force and was working to do so. The strategic analysis unit was formed in July 2001; as of late July, it was manned by XXXXXX analysts.

(S/NF) he Team found that the National Intelligence Council (NIC) addressed the al-Qa’ida threat to only a limited extent. The NIC produced a National Intelligence Estimate on the terrorist threat to the United States in 1995 and an update in 1997. It did not produce a similar, comprehensive assessment from that point until after 9/11, although preparation of such a product was underway, with a CTC drafter, in the early months of 2001 and was being edited as of 9/11.

(U) See Team discussions of Factual Findings 2 (Signs of an Impending Attack), 3 (The Threat to the United States), and 4 (Aircraft as Weapons) and Systemic Finding 5 (Strategic Analysis) for further information on these topics.

(U) Operations (Unilateral and Liaison)

(S/NF) The Joint Inquiry charges that CIA did not effectively develop and use human resources to penetrate al-Qa’ida’s inner circle, thus significantly limiting the IC’s

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xviii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


ability to acquire actionable intelligence before 9/11. The report argues that this lack of sources resulted from an excessive reliance on foreign liaison services and walk-ins (sources who volunteer); a focus on disruption and capture rather than collection; and adherence to the dirty asset rules (guidelines that restricted the recruitment of sources who had committed certain proscribed acts).

The Review Team did not find that CIA’s reliance on liaison for collection was excessive but did find thatXXXXXX this reliance was not balanced with a strong focus on developing unilateral assets. The Team did not find that CIA reliance on walk-ins was misguided XXXXXXX XXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

‘Although the CIA focused its al-Qa’ida operations on Afghanistan, possibly limiting its ability to focus elsewhere, the Team believes that this approach was reasonable and that its purpose was collection on al-Qa’ida as well as disruption of al-Qa’ida’s activities. While

agreeing that the dirty asset rules may have created a climate that had the effect of inhibiting certain recruitment operations, the Team is unable to confirm or determine the extent of the impact. Finally, the Team found that several operational platforms XXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

were not effectively engaged in the battle against al-Qa’ida. In the case of XXXX this reflected the weakness of the program itself. In the case XXXXX it reflected CTC’s focus on Afghanistan and the priority o its attempts to penetrate al-Qa’ida’s inner circle.

(S//NF) The Team found that the CIA’s relations with foreign liaison services were critical to its ability to disrupt al-Qa’ida and thwart some terrorist attacks on the United States. While the capabilities and cooperation of liaison services were uneven, the program itself did not detract from CIA’s efforts to mount its own unilateral operations. The Team did raise serious questions about whether CTC prior to 9/11 had made the most effective use of  XXXXXXXXX liaison services in its operations against al-Qa’ida. XXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xix

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


XXXXXXXXXXXXXXXX

Nevertheless, the Team observes that the complicated dynamics of liaison relationships, including lack of common goals and counterintelligence problems, suggest that CTC     managers made reasonable judgmentsXXXXXXXXXXXXXXXX

The Joint Inquiry particularly criticized CIA for the conduct of its operational relationship XXXXXXXXXXXXXX

It noted that CIA had unsuccessfully pressed XXXXXX

authorities for additional information on individuals later identified as associates of some of the hijackers. It placed some of the blame for this on CIA’s decisions. XXXXXXXXXXX

XXXXXXXXXXXXXXXXXX The Team also found that CIA was unable to acquire the information cited by the JI but found that it made repeated efforts to do so and that its lack of success was the result of a difficult operating environment and limited cooperation on the part of’ XXXXXX. The Team concluded that the decisions made with respect to XXXXXXXX were reasonable.

(S//NF) The Joint Inquiry also argued that both the FBI and CIA had failed to identify the extent of support from Saudi nationals or groups for terrorist activities globally or within the United States and the extent to which such support, to the extent it existed, was knowing or inadvertent. While most of the JI discussion on the Saudi issue dealt with issues involving the FBI and its domestic operations, the report also XXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXX The Team found that a significant gap existed in the CIA’s understanding of Saudi extremists’ involvement in plotting terrorist attacks. The primary reasons for this gap were the difficulty of the task, the hostile operational environment, and’XXXXXXXXXXXXXXXXX

(S//NF) The Team also found, however, that UBL Station and  XXXXX were hostile to each other and working at cross purposes over a period of years before 9/11. The Team cannot measure the specific impact of this counterproductive behavior. At a minimum, however, the Team found that organizational tensions clearly complicated

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xx

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


and delayed the preparation of Agency approaches XXXXXXXXXXX XXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX(thus negatively affecting the timely and effective functioning of the exchange with  XXXXXXX on terrorism issues.

(U) See the Team’s discussions of Systemic Findings 11 (HUMINT Operations Against Al-Qa’ida) and 15 (Reliance on Foreign Liaison), Factual Finding 5h (The Hijackers’ Associates in Germany), and Related Finding 20 (Issues Relating to Saudi Arabia) for additional information.

(U) Covert Action

(91 The Joint Inquiry charged that US policymakers had wanted Usama Bin Ladin killed as early as August 1998 and believed CIA personnel understood that. However, the government had not removed the ban on assassination and did not provide clear direction or authorization for CIA to kill Bin Ladin or make covert attacks against al-Qa’ida0

The JI said that the CIA was reluctant to Iseek authority to assassinate Bin Ladin and averse to taking advantage of ambiguities in the authorities it did receive that might have allowed it more flexibility. The JI argued that these factors shaped the type of covert action the CIA undertook against Bin Ladin and that, before September 11, covert action had little impact on al-Qa’ida or Bin Ladin.

The findings and conclusions of the Review Team correspond with most but not all of the JI conclusions. The Team believes that the restrictions in the authorities given the CIA with respect to Bin Ladin, while arguably, although ambiguously, relaxed for a period of time in late 1998 and early 1999, limited the range of permissible operations. Given the law, executive order, and past problems with covert action programs, CIA managers refused to take advantage of the ambiguities that did exist. The Team believes this position was reasonable and correct. Ultimately, the Team concludes the failure of the Agency’s covert action against Bin Ladin lay not in the language and interpretation of its authorities, but in the limitations of its covert action capabilities: CIA’s heavy reliance on a single

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xxi

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


group of assets, who were of questionable reliability and had limited capabilities, proved insufficient to mount a credible operation against Bin Ladin. Efforts to develop other options had limited potential prior to 9/11.

XXXXXXXXXXXXXXX The Joint Inquiry states that US military officials were reluctant to use military assets to conduct operations in Afghanistan or to support or participate in CIA operations against al-Qa’ida prior to 9/11. At least in part, this was a result of the IC’s inability to provide the necessary intelligence to support military operations. The findings of the Team match those of the JI as they relate to the CIA. The Agency was unable to satisfy the demands of the US military for the precise, actionable intelligence that the military leadership required in order to deploy US troops on the ground in Afghanistan or launch cruise missile attacks against UBL-related sites beyond the August 1998 retaliatory strikes in Afghanistan and Sudan. Differences between CIA and the Department of Defense over the cost of replacing lost Predators also hampered collaboration over the use of that platform in Afghanistan. The Team concludes, however, that other impediments, including the slow-moving policy process, reduced the importance of these CIA-military differences. The Team believes CIA handled its relationship with the US military responsibly and within the bounds of what was reasonable and possible.

XXXXXXXX The Joint Inquiry charges that the CIA failed to attack UBL’s finances and failed to work cooperatively with the Department of the Treasury to develop leads and establish links to other terrorist funding sources. The Team, likewise, found that CIA failed to attack Bin Ladin’s moneysuccessfully but finds that this was not for lack of effort.  XXXXXXXXXXXXX

XXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXX The Team also agrees that bureaucratic obstacles and legal restrictions inhibited CIA’s partnership with the Department of the Treasury.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xxii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


U) See the Team’s discussions of Systemic Findings 13 (Covert Action), 14 (Collaboration with the Military), and 16 (Strategy to Disrupt Terrorist Funding) for more information on these issues.

(U) Technology

XXXXXXXXXXThe Joint Inquiry charged that

technology had not been fully and effectively applied in support of US counterterrorism efforts. The Team found that significant differences existed between CIA and NSA over several critical issues. One of these involved a dispute over which agency had authorityXXXXXXXXXX

XXXXXXXXXXXXX

This dispute had not yet been resolved in September 2001. The second issue involved NSA’s unwillingness to share raw SIGINT transcripts with CIA; this made it more difficult for CTC to perform its mission against al-Qa’ida. In the late 1990s, however, NSA managers offered to allow a CTC officer to be detailed to NSA to cull the transcripts for useful information. CTC sent one officer to NSA for a brief period of time in 2000, but failed to send others, citing resource constraints. The Team recommends that an Accountability Board review the performance of the Chiefs of CTC for their failure to detail officers to NSA on a consistent, full-time basis to exploit this material in the years before 9/11.

(U) See the Team’s discussions of Systemic Findings 4 (Application of Technology) and 7 (Computer Exploitation) for discussion of the technology issue.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xxiii

TOP-SECRET – BORDABERRY CONDEMNED FOR 1973 COUP

BORDABERRY CONDEMNED FOR 1973 COUP

BECOMES FIRST LATIN AMERICAN PRESIDENT SUCCESSFULLY PROSECUTED FOR ATTACKING THE CONSTITUTION

National Security Archive Posts Declassified Evidence Used in Trial
U.S. Documents Implicated Bordaberry in Repression
National Security Archive Electronic Briefing Book No. 309

 

Washington, DC, September 1, 2011 – For the first time in Latin America, a judge has sent a former head of state to prison for the crime of an “Attack against the Constitution.” In an unprecedented ruling last month in Montevideo, former Uruguayan President Juan María Bordaberry was sentenced to serve 30 years for undermining Uruguay’s constitution through an auto-coup in June 1973, and for his responsibility in nine disappearances and two political assassinations committed by the security forces while he was president between 1972 and 1976.

Hebe Martínez Burlé (reproducida por gentileza de La República)
Walter de León

Declassified U.S. documents provided as evidence in the case by the National Security Archive show that Bordaberry justified his seizure of extra-constitutional powers on June 27, 1973 by telling the U.S. Ambassador that “Uruguay’s democratic traditions and institutions…were themselves the real threat to democracy.” Another U.S. document used in the trial shows that within days after the coup, the police were ordered to launch, in coordination with the military, “intelligence gathering and operations of a ‘special’ nature”—references to death squad actions that ensued.

“These declassified U.S. documents,” said Carlos Osorio, who heads the National Security Archive’s Southern Cone project, “helped the Court open the curtain of secrecy on human rights crimes committed during Bordaberry’s reign of power.”

The ruling by Judge Mariana Motta on February 9, 2010, was based on a case presented by two lawyers, Walter de León and Hebe Martínez Burlé. “No one thought we had a chance to convict Bordaberry,” Ms. Martínez Burlé said. “Even among human rights advocates, some said we were crazy.”

Oscar Destouet, head of the Human Rights Directorate in the Ministry of Education which supported the prosecution, noted that “[t]his is the first time that a head of state is brought to justice for a coup d’état.” Certainly, the case is unprecedented in the Uruguayan judicial system. “The sentence points to a new dawn in Uruguayan jurisprudence,” says Jorge Pan, head of the Institute for Legal Studies of Uruguay [IELSUR].

Bordaberry was elected to the presidency in 1971 amidst social turmoil and the Tupamaro insurgency, which was the most active guerrilla movement in Latin America at the time. In order to crush the militants and quell unrest, he engineered a self coup d’état in June 1973, dissolving Congress and suspending the constitution, and then launched a ruthless counterinsurgency drive during which thousands were imprisoned and tortured and hundreds killed or disappeared. The Uruguayan security forces also coordinated their repressive actions with other Southern Cone countries –in what is known as “Operation Condor”– by tracking down and killing Uruguayan citizens who had taken refuge in other nations, such as Senator Zelmar Michelini and legislator Héctor Gutiérrez Ruiz who were assassinated in Buenos Aires.

The quest for justice for human rights violations committed under the military regime has been blocked by an amnesty ratified in a referendum by 54% of the voters in 1989. In October 2009, another plebiscite to rescind the amnesty fell short with only 48% of support. Nevertheless, in August 2003, the Supreme Court removed Bordaberry’s immunity from prosecution as a former president and ruled that he must stand trial for “Atentado a la Constitución.”

According to Osorio, “U.S. documentation is helping judges to overcome the hurdles of impunity in Uruguay.” In December 2006, Osorio presented his testimony with more than 70 declassified U.S. documents before an investigative magistrate in charge of this historical case.

This briefing book presents eight declassified U.S. documents introduced in the case which identified Bordaberry’s role in the military putsch, his disdain for democratic institutions, and the role of security forces in crimes under his regime. It also includes:

The sentence of Judge Mariana Motta
A summary containing highlights of the case written by lawyer Walter de León
A chronology around the putsch headed by Juan María Bordaberry
A chronology of the trial for “Attack against the Constitution”

 


Documents

July 1, 1973 – Possible Effects of Uruguayan Tortures Charges on the AID Public Safety Program

In a memo to the U.S. Deputy Chief of Mission in Uruguay Frank Ortiz, a representative from the United States Agency for International Development (USAID) expresses his fear that the latest charges of torture against Uruguayan police, as well as the military coup led by President Bordaberry, could endanger U.S. Congressional support for USAID’s police assistance program to Uruguay. The memo discusses allegations of torture by police in the city of Paysandu in addition to numerous allegations in other places across the country that are being investigated by Uruguayan legislators. All of this has contributed to conflict between the Uruguayan Congress and the military and Bordaberry.

Ortiz reports that “[t]he very final act of the Senate in the early hours of June 27 was to vote 16 to 1, an investigation of the Paysandu torture charges. Immediately afterwards the Senate was closed and dissolved by President Bordaberry… to an outside observer… the motivations for closing Congress would be both anger at the failure to prosecute Senator Erro for his Tupamaro ties, and desire by the President and the Armed Forces to prevent Congressional investigation of the tortures in Paysandu and elsewhere.”

July 2, 1973 – The United States and Events in Uruguay

Deputy Chief of Mission Frank Ortiz sends an update to the Department of State regarding the situation in Montevideo after the coup. “A decisive stage has been reached in Uruguay… The executive acting with and at the b[ehest of the armed forces] has now taken steps such as the dissolution of the congress and of the powerful communist-dominated labor confederation (CNT)…” The cable suggests that “there is a disposition to accept the assurances of the president that the illegal measures taken were necessary and temporary and that there will be a return to the traditional democratic forms.”

At the same time, Ortiz reports that “the opposition groups, the leaders of which are in hiding, are in a state of shock over the suddenness and the sweeping nature of the Government’s moves.” According to Amnesty International and many other human rights organizations, between 1973 and 1976, Uruguay became the country with the highest number of jailed and of tortured dissidents in Latin America.

July 25, 1973 Public Safety Division: Police Report

The Chief USAID Public Safety Advisor in Montevideo presents a report of “activities since the recent changes in the Uruguayan Government took place.” The report states that “[a]s of July 10, orders were received at the office of the Chief of Police to reintegrate military operations… coordinated operations have been ordered as of noon on this date… As of 1300 hours July 10 the Montevideo police received new orders which called for increased coordination between the military and the police operations… indications are that this will mostly be intelligence gathering and operations of ‘special’ nature.” The “special” operations highlighted in the document itself meant death squad activities in the counterinsurgency jargon of the security forces in the 1960’s and 1970’s.

November 12, 1973 Uruguay Four Months After Closing Congress

U.S. Ambassador Ernest Siracusa sends a report to the Department of State four months after the coup stating that “[s]ince June 27 the Bordaberry government has closed the Congress, proscribed political activity, imposed censorship to stifle criticism, outlawed the dominant communist controlled labor confederation, temporarily suspended activities of the national university and has plans to outlaw the federation of university students and its affiliated groups. The government’s power base has shifted to the Armed Forces…”

Regarding Bordaberry’s relationship with the military, Siracusa observes that “his characteristics make him comfortable with the military, and the interminable debates as to whether Bordaberry or the military is behind any given move usually miss the key point — that Bordaberry and the military generally are now thinking along the same lines… We believe that Bordaberry initiated the move to close the Congress. In like manner, it was Bordaberry, not the military, who drafted a decree expected to be issued soon outlawing or dissolving the Communist Party (PCU). These steps and others, conceived in terms of patriotism, morality, or more practical considerations, have allied the president frequently with the so-called hard-liners such as first division commander General Esteban Cristi.”

December 26, 1973 – Conversation with President Bordaberry

U.S. Ambassador Siracusa reports on a meeting with Bordaberry where they cover political economic and bilateral affairs. In one section, after expressing his feelings that Uruguayans are happy about the stability reached by the regime following the putsch in June, Siracusa says “I had detected also a certain sadness that Uruguay’s cherished democratic institutions had been to some extent sacrificed or limited as a price.” Bordaberry responds to the Ambassador by explaining that “the situation had truly arrived at the border of chaos and that had drastic action not been taken the country would eventually have been faced with acceptance of chronic anarchy or a truly military takeover as alternative.” Siracusa ends by stating that Bordaberry said “everything they have done has really been an effort to end the stagnation of more than two decades and to save Uruguay’s democratic traditions and institutions rather than do violence to them. In a sense… these institutions, as they operated, were themselves the real threat to democracy in Uruguay.”

August 14, 1975 Deaths and Disappearances of Chilean Extremists: GOA Involvement

Amidst a flurry of suspicious deaths of Chilean guerrillas in Argentina, the U.S. Embassy in Buenos Aires reports to the Department of State that the U.S. “Legatt [Legal Attaché] advises that police and especially the military establishments of Argentina, Uruguay, Paraguay and Chile are well inter-connected… Also, assassination operations are known to be carried out by these governments’ security agencies for one another, though never provable.” The reports by FBI liaison in Argentina, Legal Attaché Robert Scherrer, on the collaboration of the Southern Cone security agencies, will eventually disclose the existence of Operation Condor in 1976.

June 18, 1976 Further Information on Zelmar Michelini and Luis Héctor Gutiérrez

A few weeks after exiled Uruguayan legislators Zelmar Michelini and Héctor Gutiérrez Ruiz are killed by unknown men in Buenos Aires, the U.S. Ambassador in Montevideo, Ernest Siracusa, reports that “according to [a secret source] Michelini was considered by Argentine authorities to be working with the Revolutionary Coordinating Junta (JCR) in Argentina in orchestrating the propaganda campaign against Uruguay. The JCR is the coordinating [sic] up for the terrorist/subversive groups of Chile, Argentina, Uruguay and Bolivia.”

August 3, 1976  – ARA Monthly Report (July) The ‘Third World War’ and South America

Since the beginning of the year, numerous leftist guerrillas and opposition leaders of bordering Southern Cone countries have been killed in Buenos Aires. Among those killed were two Uruguayan legislators, a former Bolivian President, numerous other Chileans, Uruguayans, Bolivians, Brazilians and Paraguayans.

In this finalized analysis for Secretary of State Henry Kissinger, Assistant Secretary of State Harry Shlaudeman states that “the military regimes of the southern cone… are joining forces to eradicate ‘subversion’, which increasingly translates into non-violent dissent from the left and the center left. The security forces of the Southern Cone: now coordinate intelligence activities closely; operate in the territory of one another in pursuit of subversives; have established Operation Condor to find and kill terrorists of the Revolutionary Coordinating Committee [JCR] in their own countries and in Europe… Security cooperation is a fact: There is extensive cooperation between the security/intelligence operations of six governments: Argentina, Brazil, Bolivia, Chile, Paraguay, and Uruguay. Their intelligence services hold formal meetings to plan ‘Operation Condor’…”

Shlaudeman concludes that “the problem begins with the definition of ‘subversion’… [it] has grown to include nearly anyone who opposes government policy… Uruguayan Foreign Minister Blanco… was the first to describe the campaign against terrorists as a ‘Third World War’. The description is interesting for two reasons: it justifies harsh and sweeping ‘wartime’ measures; it emphasizes the international and institutional aspect, thereby justifying the exercise of power beyond national borders.” 


TOP-SECRET: KISSINGER BLOCKED DEMARCHE ON INTERNATIONAL ASSASSINATIONS TO CONDOR STATES

Washington, DC, September 1, 2011 – Only five days before a car bomb planted by agents of the Pinochet regime rocked downtown Washington D.C. on September 21, 1976, Secretary of State Henry Kissinger rescinded instructions sent to, but never implemented by, U.S. ambassadors in the Southern Cone to warn military leaders there against orchestrating “a series of international murders,” declassified documents obtained and posted by the National Security Archive revealed today.

The Secretary “has instructed that no further action be taken on this matter,” stated a September 16, 1976, cable sent from Lusaka (where Kissinger was traveling) to his assistant secretary of state for Inter-American affairs, Harry Shlaudeman. The instructions effectively ended efforts by senior State Department officials to deliver a diplomatic demarche, approved by Kissinger only three weeks earlier, to express “our deep concern” over “plans for the assassination of subversives, politicians, and prominent figures both within the national borders of certain Southern Cone countries and abroad.” Aimed at the heads of state of Chile, Argentina and Uruguay, the demarche was never delivered.

“The September 16th cable is the missing piece of the historical puzzle on Kissinger’s role in the action, and inaction, of the U.S. government after learning of Condor assassination plots,” according to Peter Kornbluh, the Archive’s senior analyst on Chile and author of the book, The Pinochet File: A Declassified Dossier on Atrocity and Accountability. “We know now what happened: The State Department initiated a timely effort to thwart a ‘Murder Inc’ in the Southern Cone, and Kissinger, without explanation, aborted it,” Kornbluh said. “The Kissinger cancellation on warning the Condor nations prevented the delivery of a diplomatic protest that conceivably could have deterred an act of terrorism in Washington D.C.”

Kissinger’s September 16 instructions responded to an August 30, 1976 secret memorandum from Shlaudeman, titled “Operation Condor,” that advised him: “what we are trying to head off is a series of international murders that could do serious damage to the international status and reputation of the countries involved.” After receiving Kissinger’s orders, on September 20, Shlaudeman directed his deputy, William Luers, to “instruct the [U.S.] ambassadors to take no further action noting that there have been no reports in some weeks indicating an intention to activate the Condor scheme.”

The next day, a massive car bomb claimed the life of former Chilean foreign minister Orlando Letelier and his 26-year old American colleague, Ronni Karpen Moffitt, as they drove down Massachusetts Avenue in Washington, D.C. The bombing remains the most infamous attack of “Condor”—a collaboration between the secret police services in Chile, Argentina, Uruguay, Paraguay, Brazil and several other Latin American military dictatorships, to track down and kill opponents of their regimes. Until 9/11, the Letelier-Moffitt assassination was known as the most significant act of international terrorism ever committed in the capital city of the United States.

In the August 30th memorandum Shlaudeman informed Kissinger that the U.S. ambassador to Montevideo, Ernest Siracusa, had resisted delivering the demarche against Condor assassinations to the Uruguayan generals for fear that his life would be endangered, and wanted further instructions. Shlaudeman recommended that Kissinger authorize a telegram to Siracusa “to talk to both [Foreign Minister Juan Carlos] Blanco and [military commander-in-chief] General [Julio César] Vadora” and a “parallel approach” in which Shlaudeman would meet with the Uruguayan ambassador in Washington. He also offered an alternative of having a CIA official meet with his counterpart in Montevideo. (This memo was obtained under the FOIA by Kornbluh.)

Several days earlier, the U.S. Ambassador to Chile, David Popper, had also protested the order to present the demarche to General Augusto Pinochet. “[G]iven Pinochet’s sensitivities,” Popper cabled, “he might well take as an insult any inference that he was connected with such assassination plots.”  Like Siracusa, Popper requested further instructions.

Kissinger did not respond to the Shlaudeman memo for more than two weeks. In his September 16th cable, Kissinger “declined to approve message to Montevideo” and effectively reversed instructions to the U.S. ambassadors in Chile and Argentina to deliver the demarche to General Augusto Pinochet and General Jorge Videla.

The cable was discovered by Archive Southern Cone analyst Carlos Osorio among tens of thousands of routinely declassified State Department cables from 1976.

“We now know that it was Kissinger himself who was responsible,” stated John Dinges, author of The Condor Years, and a National Security Archive associate fellow. “He cancelled his own order; and Chile went ahead with the assassination in Washington.”

Only after the Letelier-Moffitt assassination did a member of the CIA station in Santiago meet with the head of the Chilean secret police, Col. Manuel Contreras, to discuss the demarche. The meeting took place the first week of October. In a secret memorandum from Shlaudeman to Kissinger—also obtained by Kornbluh under the FOIA—he reported that passing U.S. concerns to Contreras “seems to me sufficient action for the time being. The Chileans are the prime movers in Operation Condor.”

The memorandum makes no mention of the CIA pressing Contreras on the issue of the Letelier-Moffitt assassination. Several years later, the FBI identified him as responsible for that atrocity, and the U.S. demanded his extradition, which the Pinochet regime refused. In November 1993, after Pinochet left power, a Chilean court found Contreras guilty for the Condor murders and sentenced him to seven years in a specially-constructed prison.

Henry Kissinger’s role in rescinding the Condor demarche was at the center of a contentious controversy at the prestigious journal, Foreign Affairs (FA), in 2004. In a FA review of Kornbluh’s book, Council on Foreign Relations Senior Fellow Kenneth Maxwell referred to the undelivered demarche, and Shlaudeman’s September 20th instructions to the ambassadors to “take no further action.” In a response, the late William D. Rogers, Kissinger’s close associate, lawyer, and a former assistant secretary of State, stated—incorrectly it is now clear—that “Kissinger had nothing to do with the cable.” When Maxwell responded to the Rogers letter, he reiterated that the demarche was never made in Chile, and that the Letelier-Moffitt assassination “was a tragedy that might have been prevented” if it had.

In response, Kissinger enlisted two wealthy members of the Council to pressure the editor of FA, James Hoge, to allow Rogers to have the last word. In a second letter-to-the-editor, Rogers accused Maxwell of “bias,” and of challenging Shlaudeman’s integrity by suggesting that he had countermanded “a direct, personal instruction from Kissinger” to issue the demarche, “and to do it behind his back” while Kissinger was on a diplomatic mission in Africa. When Hoge refused to publish Maxwell’s response, Maxwell resigned from his positions at FA and the Council.

In the letter that his own employer refused to publish, Maxwell wrote that, to the contrary, “it is hard to believe that Shlaudeman would have sent a cable rescinding the [demarche] without the approval of the Secretary of State who had authorized [it] in the first place.” He called on Kissinger to step forward and clarify the progression of policy decisions leading up to the Letelier-Moffitt assassination, and for the full record to be declassified.

The declassification of Kissinger’s September 16th cable demonstrates that Maxwell was correct. It was Kissinger who ordered an end to diplomatic attempts to deliver the demarche and call a halt to Condor murder operations.


Documents

Document 1 – Department of State, Cable, “Operation Condor”, drafted August 18, 1976 and sent August 23, 1976

This action cable signed by Secretary of State Kissinger reflects a decision by the Latin American bureau in the State Department to try to stop the Condor plans known to be underway, especially those outside of Latin America. Kissinger instructs the ambassadors of Argentina, Chile and Uruguay to meet as soon as possible with the chief of state or the highest appropriate official of their respective countries and to convey a direct message, known in diplomatic language as a “demarche.” The ambassadors are instructed to tell the officials the U.S. government has received information that Operation Condor goes beyond information exchange and may “include plans for the assassination of subversives, politicians and prominent figures both within the national borders of certain Southern Cone countries and abroad.” Further, the ambassadors are to express the U.S. government’s “deep concern,” about the reports and to warn that, if true, they would “create a most serious moral and political problem.”

Document 2 – Department of State, Action Memorandum, Ambassador Harry Schlaudeman to Secretary Kissinger, “Operation Condor,” August 30, 1976

In his memo to Kissinger dated August 30, 1976, Schlaudeman spelled out the U.S. position on Condor assassination plots: “What we are trying to head off is a series of international murders that could do serious damage to the international status and reputation of the countries involved.” Shlaudeman’s memo requests approval from Kissinger to direct U.S. ambassador to Uruguay, Ernest Siracusa, to proceed to meet with high officials in Montevideo and present the Condor demarche.

Document 3 – Department of State, Cable, “Actions Taken,” September 16, 1976

In this cable, sent from Lusaka where Kissinger is traveling, the Secretary of State refuses to authorize sending a telegram to U.S. Ambassador to Uruguay, Ernest Siracusa, instructing him to proceed with the Condor demarche. Kissinger than broadens his instructions to cover the delivery of the demarche in Chile, Argentina and Uruguay: “The Secretary has instructed that no further action be taken on this matter.”  These instructions effectively end the State Department initiative to warn the Condor military regimes not to proceed with international assassination operations, since the demarche has not been delivered in Chile or Argentina.

Document 4 – Department of State, Cable, “Operation Condor,” Septmber 20, 1976

Kissinger’s Assistant Secretary of State for Inter-American Affairs received his instructions on turning off the Condor demarche on September 16th. Three days later, while in Costa Rica, Shlaudeman receives another cable, which remains secret, from his deputy, William Luers, regarding how to proceed on the demarche. At this point, on September 20, Shlaudeman directs Luers, to “instruct the [U.S.] ambassadors to take no further action noting that there have been no reports in some weeks indicating an intention to activate the Condor scheme.”

Condor’s most infamous “scheme” comes to fruition the very next day when a car-bomb planted by agents of the Chilean secret police takes the life of former Chilean diplomat, and leading Pinochet opponent, Orlando Letelier, and his 26-year old American colleague, Ronni Karpen Moffitt, in downtown Washington D.C.

Document 5 – Briefing Memorandum, Ambassador Harry Schlaudeman to Secretary Kissinger, “Operation Condor,” October 8, 1976

In his October 8 memo to Kissinger transmitting a CIA memorandum of conversation with Col. Contreras, Schlaudeman argued that “the approach to Contreras seems to me to be sufficient action for the time being” because “the Chileans are the prime movers in Operation Condor.”