JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE Archives

CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE  2006

CYBER-SOCIETY-LIVE 2006

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

[CSL]: INTELLIGENCE: 476

From:

J Armitage <[log in to unmask]>

Reply-To:

Interdisciplinary academic study of Cyber Society <[log in to unmask]>

Date:

Thu, 30 Mar 2006 07:24:16 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (318 lines)

From: INT-ADI [mailto:[log in to unmask]] 
Sent: 29 March 2006 20:10
To: INT
Subject: INT 476

INT n. 476 summary
INTELLIGENCE                                ISSN 1245-2122
N. 476, 27 March 2006
Every Two to Three Weeks
Next issue, 10 April 2006
Publishing since 1980

Editor
Olivier Schmidt
([log in to unmask];
http://perso.wanadoo.fr/intelligence-adi)

A one year subscription (19 issues with article index) is 330 euros. Reduced
rates for personal subscriptions.
Payment by credit card possible.

TABLE OF CONTENTS, N. 476, 27 March 2006

FRONT PAGE

IRAQ - THIRD ANNIVERSARY "WORSE THAN 'NORMAL BAD NEWS'" p.1

TECHNOLOGY AND TECHNIQUES

TIMELINE FROM 10 MARCH TO 23 MARCH p.2
ARMOR, THE RPG AND THE ANTI-RPG p.3
DATA MINING DIGS ITS WAY OUT OF SIGHT p.4 RECENT BOOKS & REPORTS p.5

PEOPLE

USA - Doug Hoelscher. p.6
    - Claude Allen. p.7
GREAT BRITAIN - MALCOLM KENDALL-SMITH p.8 GREAT BRITAIN/ISRAEL - DANIEL
BETHLEHEM p.9

AGENDA

COMING EVENTS THROUGH 31 MAY 2006 p.10

INTELLIGENCE AROUND THE WORLD

USA - HALLMARKS OF CHEATING, CRONYISM & BULLYING p.11
    - TORTURE NEWS p.12
    - FBI VIOLATIONS MAKE THE NEWS p.13
    - MONEY TALKS AT THE PENTAGON & GET'S IT WRONG p.14
    - "SNOOPGATE" AT CONGRESS, THE COURTS & THE FBI p.15
    - CIA HIDES PUBLIC INFO & KNEW NO IRAQI WMD EXISTED p.16
    - BUSH'S "PORT DEAL" FAR FROM OVER AND DONE p.17
    - "PLAMEGATE" SLOWLY CREEKS FORWARD p.18
    - US MEDIA IN THE MIRROR OF THE IRAQ "SUCCESS" p.19
    - Lobbying Business As Usual. p.20
GREAT BRITAIN - SIR IAN'S ACCUMULATION OF ERRORS p.21
              - THE "IAN BLAIR OUT" PROJECT p.22
              - FACILITATING THE CIA p.23 WESTERN EUROPE - BRITAIN, FRANCE,
SPAIN & THE UN p.24 EASTERN EUROPE - Chechnya, Milosevic, Russia & Belarus.
p.25 LATIN AMERICA - Chavez, Bush, Venezuela & Mexico. p.26 ISRAEL/GREAT
BRITAIN - HELPING TO BUILD THE A-BOMB p.27 ISRAEL/PALESTINE - Olmert
Offensive & US Warning. p.28 IRAQ - BRIT MEMOS, US ALL WRONG FROM THE
BEGINNING p.29 IRAN - CLANDESTINE & PUBLIC POLICY UNDER WAY p.30
     - GOING UNDERGROUND p.31
CHINA - HONG KONG'S NEW "GOP" SURVEILLANCE LEGISLATION p.32 ASIA -
Afghanistan, Philippines & North Korea. p.33

---------------------------------------------

Intelligence, N. 476, 27 March 2006, p. 1


IRAQ

THIRD ANNIVERSARY "WORSE THAN 'NORMAL BAD NEWS'"


Some many things are going wrong in Iraq under the US occupation that it's
difficult to organize available information and give an overview instead of
simply listing the topics of the "worst than normal bad news". The last
fortnight has witnessed the third anniversary of the Bush White House's
invasion of Iraq and generated a series of "record card"
reports and projections concerning the future of the Iraq war.
The wave of violence, which began with the bombing of the Golden Dome in
Samarra (see "Iraq - Golden Dome & US Credibility Destroyed", INT, n. 475
28), continues unabated and has even spread to the Kurds. The US military
and its recent actions has also become a major topic with reports of
massacres by US troops. The chronic problems of corruption and
mismanagement, by both Iraqi and US authorities, also continue to be a major
topic.
(cut...)
---------------------------------------------

Intelligence, N. 476, 27 March 2006, p. 2


TIMELINE FROM 10 MARCH TO 23 MARCH


Although all the Bush White House scandals continue, the Iraq war has
clearly dominated all other intelligence and security topics in the past
forthnight's press reports. What the media has been calling "Sectarian
Fighting" may be nothing more than a deliberate Baathist and/or Qaida tactic
to discredit the US and its local allies in Iraq (see Iraq - Golden Dome &
US Credibility Destroys in our previous issue; INT n. 475 28) who also
discredited themselves with Operation Swarmer and recent reports of US troop
"revenge killings" including elderly people, women and children.

On the home front, Bush White House faithfuls are trying to shorn up the
failing regime by making warrantless surveillance of the general public
(snoopgate) legal, watering down legislation to control lobbying and
blocking investigations of Katrina mismanagement and political corruption.

In our two preceding issue, we noted that: "Although the Bush White House is
plagued with numerous scandals and crises, the three current major ones are
Iran and its nuclear program, the 'domestic' NSA spying scandal, and the
series of reports on US torture/abuse and calls for the closure of
Guantanamo ... And on the home front, things aren't getting any better. The
Plame case continues and seems to be getting closer to Vice President
Cheney, the Abramoff corruption case seems to be getting closer to President
Bush, the Katrina incompetence case is tearing apart the administration, and
now the US port sales scandal pits the Bush White House against even
conservative Republicans." All these topics are now in the background as the
third anniversary of the Bush White House invasion of Iraq took place.
(cut...)
---------------------------------------------


AGENDA


Intelligence, N. 476, 27 March 2006, p. 10


COMING EVENTS THROUGH 31 MAY 2006


Call for proposals for the Data Surveillance and Privacy Protection CRCS
Workshop 2006 on 3 June 3 2006 at Harvard University's Center for Research
on Computation and Society, Cambridge, Massachusets,
[log in to unmask], [log in to unmask], eecs.harvard.edu/crcs/.

27 March, Amman, Jordan, SOFEX Conference, [log in to unmask]

27-28 March, Las Vegas, Nevada, TTC, Future Air Warfare Conference,
ttcus.com.

27-28 March, Tysons Corner, Virginia, DSCA Worldwide Conference on Security
Cooperation.

30-31 March, London, Saab, Air Weapons Integration, defenceiq.com/2628a.

31 March, deadline for papers for the 34th Research Conference on
Communication, Information, and Internet Policy - Telecommunications Policy
Research Conference, tprc.org/TPRC06/call06.htm.

31 March, deadline for presentations at the 11th European Symposium On
Research In Computer Security at Hamburg, Germany, on 18-20 September 2006,
esorics06.tu-harburg.de/ and softconf.com/starts/ESORICS06/submit.html.

2 April, deadline for proposals for the 6th European Dependable Computing
Conference on 18-20 October 2006 in Coimbra, Portugal,
edcc.dependability.org.

3-6 April, Colorado Springs, Colorado, National Space Symposium.

4-5 April, Hampton, Virginia, USJFCOM Symposium & Exhibit.

4-6 April, Washington, Sea-Air-Space 2006.

5-6 April, Camp Lejeune, North Carolina, Marine South 2006.

9-12 April, Nashville, Tennessee, AAAA 2006.

18-19 April, Arlington, Virginia, Precision Strike Annual Programs Review,
precisionstrike.org.

19-20 April, York, England, University of York, Third International
Conference on Security in Pervasive Computing,
cs.york.ac.uk/security/spc-2006.html.

20 April, Vienna, Austria, Vienna University of Technology, First
International Conference on Availability, Reliability and Security,
ifs.tuwien.ac.at/ares2006/.

20 April, Fourth Workshop on Link Analysis, Counterterrorism and Security,
Web mining and text mining applied to security and counterterrorism,
cs.rit.edu/~amt/linkanalysis06/.

22-23 April, Montreal, Quebec, UC Irvine Institute for Software Research and
the National Science Foundation, CHI 2006 Workshop on Privacy-Enhanced
Personalization, isr.uci.edu/pep06/.

24-25 April, Boston, Massachusetts, 11th Search Engine Meeting,
infonortics.com/searchengines/.

24-28 April, Tarn, France, Cryptography and Information Security Workshop,
in French, laas.fr/crypto-sec/.

27-28 April, Arlington, Virginia, Cruise Missile & IED Defense Conference,
defensenews.com/conferences/CMD.

30 April-2 May, Hamburg, Germany, First International Conference on Legal,
Security and Privacy Issues in IT (LSPI) CompLex, kierkegaard.co.uk/.

1-5 May, Indianapolis, Indiana, Global Demilitarization Meeting.

2-5 May, Washington, Association for Computing Machinery, Computers,
Freedom, and Privacy Conference (CFP 2006), cfp2006.org/.

8-11 May, Montreal, Canada, RCMP, in partnership with the US Drug
Enforcement Administration (DEA), International Drug Enforcement Conference
(IDEC XXIV) with Pierre Yves Bourduas
(President) and Karen P. Tandy (Co-President). This annual conference brings
together high-ranking drug law enforcement officials from over 70 countries
to share drug-related information and to develop a coordinated approach to
combat global drug issues, dea.gov/programs/idec.htm.

9-11 May, Phoenix, Arizona, American Helicopter Society (AHS), 62nd Annual
Meeting, vtol.org.

10 May, deadline for proposals for the National Institute of Justice (NIJ)
project, "Social Science Research on Terrorism"
which will inform national criminal justice policy and practice,
ncjrs.gov/pdffiles1/nij/sl000744.pdf.

16-18 May, London, ITEC 2006.

16-21 May, Berlin, ILA Air Show.

21-24 May, Berkeley, California, IEEE Symposium on Security and Privacy,
with sessions on Signature Generation, Detection, Privacy, Formal Methods,
Analyzing and Enforcing Policy, Analyzing Code, Authentication, Attacks, and
Systems, ieee- security.org/TC/SP2006/oakland06.html.

24-25 May, London, RUSI Air Power Conference.

29 May-1 June, Melbourne, Australia, SimTect 2006.

31 May-2 June 2006, Rennes, France, Symposium on the Security of Information
and Communications Technologies (SSTIC 06), www.sstic.org.

---------------------------------------------

Intelligence, N. 476, 27 March 2006, p. 27


ISRAEL/GREAT BRITAIN

HELPING TO BUILD THE A-BOMB


Britain's complicity in Israel's clandestine nuclear program was far more
extensive than the secret shipment of 20 tons of heavy water in the late
1950s which helped start up the nuclear reactor at Dimona (INT, n. 464 21).
According to documents obtained by the BBC under the Freedom of Information
Act, the UK also made hundreds of shipments of materials, in the mid- 1960s,
which were used to develop Israel's nuclear weapons arsenal, including
plutonium, uranium, lithium, beryllium and tritium. The documents reveal
that in 1966 the Labour government of Prime Minister Harold Wilson agreed to
sell supply 10mg of plutonium to Israel, despite a warning by British
Military Intelligence that the amount -- well short of the 5kg required to
build an atomic bomb -- still had "significant military value" and would
enable Israel to carry out experimental work which would speed up its
nuclear weapons program.
(cut...)
---------------------------------------------

Intelligence, N. 476, 27 March 2006, p. 30


IRAN

CLANDESTINE & PUBLIC POLICY UNDER WAY


There is both a clandestine and a public side to the ongoing Iranian nuclear
development crisis. In our previous issue (INT, n. 475), we mentioned two
reports dealing with the clandestine US side: 0223 FT, US Marines Probe
Tensions among Iran's Minorities; 0302 Progress Report, Iran - New "Office
of Iranian Affairs" Outlined in State Department Cable. We also mentioned
that "domestic" Iranian problems could be related to this clandestine US
effort: 0227 ERRI, Bomb Blasts Hit Iran Oil Cities. This clandestine US
campaign has been confirmed by another recent report:
(cut...)
---------------------------------------------
<END OF FILE>



--
This message has been scanned for viruses and dangerous content by the
NorMAN MailScanner Service and is believed to be clean.

The NorMAN MailScanner Service is operated by Information Systems and
Services, University of Newcastle upon Tyne.


====
This e-mail is intended solely for the addressee. It may contain private and
confidential information. If you are not the intended addressee, please take
no action based on it nor show a copy to anyone. Please reply to this e-mail
to highlight the error. You should also be aware that all electronic mail
from, to, or within Northumbria University may be the subject of a request
under the Freedom of Information Act 2000 and related legislation, and
therefore may be required to be disclosed to third parties.
This e-mail and attachments have been scanned for viruses prior to leaving
Northumbria University. Northumbria University will not be liable for any
losses as a result of any viruses being passed on.

************************************************************************************
Distributed through Cyber-Society-Live [CSL]: CSL is a moderated discussion
list made up of people who are interested in the interdisciplinary academic
study of Cyber Society in all its manifestations.To join the list please visit:
http://www.jiscmail.ac.uk/lists/cyber-society-live.html
*************************************************************************************

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

May 2024
April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
June 2022
May 2022
March 2022
February 2022
October 2021
July 2021
June 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
July 2020
June 2020
May 2020
April 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager