Over 41,000 artefacts seized in global operation targeting trafficking of cultural goods

Source: Interpol (news and events)

Headline: Over 41,000 artefacts seized in global operation targeting trafficking of cultural goods

21 February 2018

More than 41,000 objects including coins, furniture, paintings, musical instruments, archaeological pieces and sculptures have been seized in a global operation targeting the trafficking of cultural artefacts.

The seizures were made during the first joint customs and police operation codenamed Athena organized by the World Customs Organization and INTERPOL, and the Europe-focused Operation Pandora II coordinated by the Spanish Guardia Civil and Europol.

Tens of thousands of checks were carried out at airports and border crossing points across 81 countries during the operations which ran from October to December 2017. Auction houses, museums and private houses were also searched, resulting in more than 300 investigations being opened and 101 people arrested.

Online illicit markets

With the Internet becoming an important part of the chain in the illicit trade of cultural goods, law enforcement officers also monitored online market places and sales sites.

This resulted in the seizure more than 7,000 objects, nearly 20 per cent of the total number of artefacts recovered during the operations. In just one investigation in Spain, the Guardia Civil seized more than 2,000 cultural objects, the majority of which were coins from the Roman and other Empires.

Officials also seized 88 pieces of ivory as well as weapons including swords, a crossbow and 39 historical firearms ranging from rifles to pistols.

Operational highlights

·  Argentinean Federal Police recovered the shell of a Glyptodon, an extinct mammal. The shell, estimated to be more than one million years old, was on sale for USD 150,000.

·  Brazilian Customs seized a marble head hidden in a passenger’s suitcase. Verification of the piece’s provenance is ongoing.

·  A painting by Nicolas de Staël worth approximately EUR 500,000 was intercepted by French Customs at the Gare du Nord in Paris as it was being smuggled to London.

·  Searches of a businessman’s two homes and two commercial properties by Greek Police resulted in the recovery of 41 archaeological objects which did not have the necessary license.

Peace and security threat

“The results of the Operations Athena and Pandora II speak for themselves: cooperation between Customs and Police can yield excellent results and should be promoted and sustained at all levels. The fight against illicit trafficking of cultural objects has been long neglected by law enforcement agencies, however, we cannot turn a blind eye to it,” said WCO Secretary General Kunio Mikuriya.

While we lose our common history and identity, the proceeds of trafficking fuel terrorism, conflicts and other criminal activities. We will keep working in this area of enforcement and will soon deploy the first specialized global training curriculum for Customs administrations – a very concrete and hands-on outcome of our common work,” he added.

INTERPOL Secretary General Jürgen Stock said the Operations struck a blow against the illicit trafficking of cultural goods which poses a threat to international peace and security.

“For criminals, the black market in works of art is becoming just as lucrative as for drugs, weapons and counterfeit goods. Ancient artefacts also represent a potential source of great wealth for terrorist groups,” said Secretary General Stock.

“To know what has been stolen and from where is the first step in any investigation, which is why INTERPOL is continuing to encourage the creation of specialized national unit and databases,” added the INTERPOL Chief.

International coordination

Given the global nature of Operation Athena, a 24-hour Operational Coordination Unit was jointly run by the WCO and INTERPOL. In addition to assisting information exchanges and issuing alerts, the unit also carried out checks against various international and national databases, such as INTERPOL’s database of Stolen Works of Art.

At the European level, Operation Pandora II was conducted with the use of the SIENA information exchange tool involving Europol’s 24/7 Operations Centre to cross-check personal data.

Over 41 000 artefacts seized in global operation targeting the illicit trafficking of cultural goods

Source: Europol

Headline: Over 41 000 artefacts seized in global operation targeting the illicit trafficking of cultural goods

Over 41 000 cultural goods such as coins, paintings and drawings, furniture and musical instruments, porcelain, archaeological and paleontological objects, books and manuscripts and sculptures were seized all over the world as a result of coordinated law enforcement actions. These seizures were made during the first Global Global Customs-Police Operation, codenamed ATHENA and organised by the World Customs Organisation (WCO) in cooperation with INTERPOL, and during the regional Europe-focused Operation PANDORA II, coordinated by the Spanish Guardia Civil and Europol.

Both operations took place from October to early December 2017, with a common action phase from 20 to 30 November 2017, and saw the involvement of customs and police forces from 81 countries. Both, ATHENA and PANDORA II, focused on the illicit trafficking of cultural objects, theft, looting as well as internet sales. Most of the actions were developed and coordinated jointly between Customs and Police on the national level with the support and participation of the experts from the Ministries of Culture and other relevant institutions and law enforcement agencies.

Apart from seizures, there have been tens of thousands of checks and controls in various airports, ports, other border crossing points, as well as in the auction houses, museums and private houses. As a result, more than 200 investigations were opened and 53 persons arrested.

Given the global nature of this crime, operation coordination units working 24/7 were established by Europol on one side, and the WCO and INTERPOL on the other, to support the exchange of information as well as disseminate alerts, warnings and perform cross- checks in different international and national databases.

Internet as a facilitator for the illicit trafficking of cultural goods

Internet has changed, as in many other fields of our society, the traditional chains of the illicit trade of cultural goods. It is a new challenge for law enforcement authorities especially for the specialized cultural goods crime units. Now the criminals can reach the collector’s (anywhere in the world) without any intermediate, and out of the traditional channels.

Facing this threat, the involved law enforcement agencies monitored thousands of market places, internet announcement has in order to detect and seize looted or stolen cultural goods. Only in this area, 63 new criminal investigations have been opened and more than 6 000 cultural objects have been seized.

In a single successful investigation in Spain, Guardia Civil seized more than 2 000 cultural objects. Most of them were coins from Roman and other Empires and archaeological objects made of ceramic, metal and stone. In addition, 88 pieces of ivory were seized during the searches, including a carving of Christ valued at EUR 6 000 , and 39 firearms of different classification, from historical weapons, such as rifles and shotguns, swords, swords, katanas and a crossbow, revolvers and pistols. The investigation started with the checks of various internet pages dedicated to the sale and purchase of objects of historical value, and is still ongoing.

The Hellenic Police conducted a fruitful investigation in the framework of PANDORA II: during the searches in two residences and in two businesses of a national entrepreneur, they found 41 archaeological objects, for which the collector did not have a corresponding license. Additionally, from a legal collection of 1 133 coins of silver, bronze and gold of the 2nd century B.C. until 200 A.C., 15 coins were missing, and from a legal collection of 105 ancient objects, 26 objects were missing. All the possessed objects of archaeological and cultural value were confiscated, namely 1 252 cultural goods.

February 2018 Puzzle Periodical – A Plethora of Penguins

Source: National Security Agency NSA

Headline: February 2018 Puzzle Periodical – A Plethora of Penguins

Mama Penguin and Papa Penguin have 100 baby penguins. To help keep track of them all, they have written a (unique) number on each baby’s belly, from 1 to 100. In preparation for dinner time, Mama Penguin put the baby penguins along the sides of their iceberg, where they will catch fish. The penguins numbered from 1 to 50 like the fish on the west side of the iceberg, and those numbered from 51 to 100 like the fish on the east side of the iceberg. However, due to a miscommunication, Mama Penguin placed the odd-numbered penguins on the west side, and the even-numbered penguins on the east side. Papa Penguin wants to sort them out, with these restrictions:

Will Papa Penguin be able to sort out all his babies, so those numbered from 1 to 50 finish on the west side, while those numbered 51-100 finish on the east side?

Did you determine if Papa Penguin can sort his Baby Penguins?

Solution

Yes, it is possible for Papa Penguin to sort all of his babies! We will present an algorithm which he can follow that is guaranteed to sort them (though it is possible that a faster algorithm exists).

Suppose we sort babies ranging from m to n, where m is odd and n is even. In the original problem, m=1 and n=100. If we can repeatedly increase m and decrease n until m=n, we will have completely sorted all the babies. Our goal is to run up through all the babies from m to n-1 and back down from n-1 to m+2, so that by the end of each up-and-down pass, the state is exactly the same as it was at the start of the pass, except with babies m and m+1 on the west side, and babies n and n-1 on the east side, so that we can then do another up-and-down pass, setting m=m+2 and n=n-2. We can repeat this process until m and n are close enough that the problem is trivial.

To do an up-and-down pass: Move baby m+2 to the east side, m+1 to the west side, m+4 to east, m+3 to west, …, n-3 to east, n-4 to west, n-1 to east, n-2 to west (this is the “up” half). At this point, babies m and m+1 are on the west (where we want them), babies n-1 and n are on the east (also where we want them), and of the babies between m+1 and n-1, the odd babies are on the east and the evens are on the west (the opposite of how they were before all the swapping). To do the “down” half, move baby n-4 to the east (this is legal since our last move was n-2 to the west), then n-5 to west, n-2 to east, n-3 to west, n-6 to east, n-7 to west, n-8 to east, n-9 to west, …, m+6 to west, m+5 to east, m+4 to west, m+3 to east, m+2 to west. After setting down baby m+2, we now have babies m, m+1, and m+2 on the west (where we want them), and babies n, n-1, and n-2 on the east (also where we want them), and of the babies between m+2 and n-2, the odds are on the west and the evens are on the east (as in the original problem). We are also in a position to move baby m+4 next, so we can now do another iteration of the up-and-down pass, setting our new boundaries to m+2 and n-2, effectively reducing the problem size by 4.

We can simply repeat this process until m=49 and n=52. At this point, we will have babies 1-49 on the west (where they should be), 52-100 on the east (also where they should be), and 51 on the west and 50 on the east. Now we just need to move 51 (our most recent baby put down was 49, so this is legal). Then move baby 50 and we have sorted all of the baby penguins.

A visual illustration of an up-and-down pass, starting with odd penguins from m through n-1 on the west, and even penguins from m+1 through n on the east:

The “up” half of one iteration:

10 circles (representing 10 penguins) are shown, divided into two rows of 5 each. The top row is labeled “west”, and the bottom row is labeled “east”. The first three circles in the top row (west) are labeled “m”, “m+2”, and “m+4”. Between these three circles and the last two circles in this row is an ellipsis, indicating the omission of many more penguins. The last two circles in this row are labeled “n-3” and “n-1”. On the bottom row (east), the first three circles are labeled “m+1”, “m+3”, and “m+5”; and the last two are labeled “n-2” and “n”. Arrows indicate the movements of these circles between the two rows. An arrow labeled “first move” points from the m+2 circle to the east side; an arrow labeled “second move” points from the m+1 circle to the west side; an arrow labeled “third move” points from the m+4 circle to the east side; an arrow labeled “fourth move” points from the m+3 circle to the west side; an arrow labeled “sixth move” points from the m+5 circle to the west side; an arrow labeled “fourth-last move” points from the n-3 circle to the east side; an arrow labeled “second-last move” points from the n-1 circle to the east side; and an arrow labeled “last move” points from the n-2 circle to the west side. The arrows, circles, and text on the bottom row (east side) are colored in red to distinguish them from the black arrows, circles, and text on the top row (west side).

(Note that the 5th move is not shown, since the 5th move is to move m+6, which is somewhere in the …, to the east. Likewise, the 3rd-last move is not shown, since the 3rd-last move is to move n-4, which is in the …, to the east. All moves between the 6th move and the 4th-last move are moving penguins represented by the …’s, so they are not shown.)

The “down” half of one iteration:

14 circles (representing 14 penguins) are shown, divided into two rows of 7 each. The top row is labeled “west”, and the bottom row is labeled “east”. The first three circles in the top row (west) are labeled “m”, “m+1”, and “m+3”. Between these three circles and the last four circles in this row is an ellipsis, indicating the omission of many more penguins. The last four circles in this row are labeled “n-8”, “n-6”, “n-4”, and “n-2”. On the bottom row (east), the first three circles are labeled “m+2”, “m+4”, and “m+6”; and the last four are labeled “n-5”, “n-3”, “n-1”, and “n”. Arrows indicate the movements of these circles between the two rows. An arrow labeled “first move” points from the n-4 circle to the east side; an arrow labeled “second move” points from the n-5 circle to the west side; an arrow labeled “third move” points from the n-2 circle to the east side; an arrow labeled “fourth move” points from the n-3 circle to the west side; an arrow labeled “fifth move” points from the n-6 circle to the east side; an arrow labeled “seventh move” points from the n-8 circle to the east side; an arrow labeled “fifth-last” points from the m+6 circle to the west side; an arrow labeled “third-last” points from the m+4 circle to the west side; an arrow labeled “second-last” points from the m+3 circle to the east side; and an arrow labeled “last move” points from the m+2 circle to the west side. The arrows, circles, and text on the bottom row (east side) are colored in red to distinguish them from the black arrows, circles, and text on the top row (west side).

(Note that the 6th move and the 4th-last move are not shown, because they are moving n-7 and m+5, respectively, which are in the …’s. All moves between the 7th move and the 5th-last move are moving penguins represented by the …’s, so they are not shown.)

State after a one full up-and-down pass:

15 circles (representing 15 penguins) are shown, divided into two rows, with 7 circles in the top row and 8 circles in the bottom row. The top row is labeled “west”, and the bottom row is labeled “east”. The first five circles in the top row (west) are labeled “m”, “m+1”, “m+2”, “m+4”, “m+6”; then there is an ellipsis to represent the omission of many more penguins; and then the last two circles in this row are labeled “n-5” and “n-3”. The first two circles in the bottom row (east) are labeled “m+3” and “m+5”; then there is an ellipsis to represent the omission of many more penguins; and then the last six circles are labeled “n-8”, “n-6”, “n-4”, “n-2”, “n-1”, and “n”.

EU AND ISRAELI POLICE JOIN FORCES AGAINST SOCIAL ENGINEERING

Source: Europol

Headline: EU AND ISRAELI POLICE JOIN FORCES AGAINST SOCIAL ENGINEERING

Last week EU and the Israeli Police organised an EU expert workshop on social engineering. Experts from Austria, Belgium, Denmark, France and Germany took part in the event with the aim of improving future information exchange between Israeli law enforcement and EU Member States.

The main activities covered at the event included comparing business email compromise attacks (BEC – also known as CEO fraud) both in EU Member States and Israel; examining best practice for cross-border investigations; and discussing new methods to counteract CEO/BEC fraud1. The workshop also looked at policing methods for network-based crime through networked organisations; improving capabilities in combatting CEO fraud; and enhancing cooperation in the field of CEO/BEC fraud between Europol and other law enforcement agencies in EU Member States.

These kinds of cases started in early 2010 with MTIC fraud (Missing Trader Intra-Community, also called missing trader fraud) with carbon credits. CEO fraud cases came soon after, followed by binary options fraud2 or FOREX scams3. EU law enforcement agencies, together with the Israeli Police, have since succeeded in arresting the money mules responsible. Investigators, EU experts and Israeli authorities arranged this event to find quicker ways of exchanging information and to build on achievements so far.

1 CEO/BEC fraud involves criminals impersonating company executives and tricking other employees into carrying out unauthorised wire transfers.

2 Binary options fraud is a fictitious short-term investment fraud.

3 FOREX scams are trading schemes used to defraud traders by convincing them to expect a high profit by trading in the foreign exchange market.

Counterfeit euro print shop dismantled in Portugal with support of Europol

Source: Europol

Headline: Counterfeit euro print shop dismantled in Portugal with support of Europol

On 15 February, the Portuguese Judiciary Police, in cooperation with the Spanish National Police and Europol, detained two men and one woman, aged between 21 and 55 years, suspected of producing counterfeit euro currency.

In the course of the investigation, which started about six months ago, it was found that this group was responsible for producing thousands of banknotes, mainly EUR 20 and EUR 50, with the distribution particularly affecting Portugal and Spain. These counterfeits were detected in 8 other European countries: Germany, France, Italy, Austria, Belgium, Estonia, the Netherlands and Switzerland.

As part of this operation, 9 house searches were carried out, with 1 131 banknotes of EUR 20, 401 banknotes of EUR 50, 49 banknotes of EUR 500 with a total face value of EUR 67 170, as well as 14 banknotes of 10 000 francs from Central African Republic.

A complete illegal print shop was dismantled which included the seizure of guillotines, press dies, holographic tape rolls, computer and printers. Computer files related to this illegal activity were also identified.

Europol is the European Union’s Central Office for Combating Euro Counterfeiting. Our agency facilitates the exchange of information and provides expertise, criminal and forensic analysis, training, financial and technical support to law enforcement agencies inside and outside the European Union.

Studies in Intelligence Vol.61, No.1 — Central Intelligence Agency

Source: Central Intelligence Agency CIA

Headline: Studies in Intelligence Vol.61, No.1 — Central Intelligence Agency

The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA).

We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us.


Contact Information

Submit questions or comments online

By postal mail:
Central Intelligence Agency
Office of Public Affairs
Washington, D.C. 20505

By phone:
(703) 482-0623
Open during normal business hours.

By fax:
(571) 204-3800
(please include a phone number where we may call you)

Contact the Office of Privacy and Civil Liberties

Contact the Office of Inspector General

Contact the Employment Verification Office


Before contacting us:

  • Please check our site map, search feature, or our site navigation on the left to locate the information you seek. We do not routinely respond to questions for which answers are found within this Web site.
  • Employment: We do not routinely answer questions about employment beyond the information on this Web site, and we do not routinely answer inquiries about the status of job applications. Recruiting will contact applicants within 45 days if their qualifications meet our needs.

    Because of safety concerns for the prospective applicant, as well as security and communication issues, the CIA Recruitment Center does not accept resumes, nor can we return phone calls, e-mails or other forms of communication, from US citizens living outside of the US. When you return permanently to the US (not on vacation or leave), please visit the CIA Careers page and apply online for the position of interest.

    To verify an employee’s employment, please contact the Employment Verification Office.

  • Solicitations to transfer large sums of money to your bank account: If you receive a solicitation to transfer a large amount of money from an African nation to your bank account in exchange for a payment of millions of dollars, go to the US Secret Service Web site for information about the Nigerian Advance Fee Fraud or “4-1-9” Fraud scheme.
  • If you have information which you believe might be of interest to the CIA in pursuit of the CIA’s foreign intelligence mission, you may use our e-mail form. We will carefully protect all information you provide, including your identity. The CIA, as a foreign intelligence agency, does not engage in US domestic law enforcement.
  • If you have information relating to Iraq which you believe might be of interest to the US Government, please contact us through the Iraqi Rewards Program

Chiefs of State and Cabinet Members of Foreign Governments

Source: Central Intelligence Agency CIA

Headline: Chiefs of State and Cabinet Members of Foreign Governments

The Central Intelligence Agency publishes and updates the online directory of Chiefs of State and Cabinet Members of Foreign Governments weekly. The directory is intended to be used primarily as a reference aid and includes as many governments of the world as is considered practical, some of them not officially recognized by the United States. Regimes with which the United States has no diplomatic exchanges are indicated by the initials NDE.

Governments are listed in alphabetical order according to the most commonly used version of each country’s name. The spelling of the personal names in this directory follows transliteration systems generally agreed upon by US Government agencies, except in the cases in which officials have stated a preference for alternate spellings of their names.

NOTE: Although the head of the central bank is listed for each country, in most cases he or she is not a Cabinet member. Ambassadors to the United States and Permanent Representatives to the UN, New York, have also been included.

CIA and the Wars in Southeast Asia, 1947–75 — Central Intelligence Agency

Source: Central Intelligence Agency CIA

Headline: CIA and the Wars in Southeast Asia, 1947–75 — Central Intelligence Agency

CIA and the Wars in Southeast Asia, 1947–75

A Studies in Intelligence Anthology

Selections, introduction, and summaries by Clayton D. Laurie, CIA Historian, and Andres Vaart, Managing Editor

September 2016

Purpose. This digitally interactive and hyperlinked anthology was prepared as a contribution to Department of Defense-led interagency efforts to commemorate the passing of 50 years since the large-scale engagement of the military forces of the United States and other countries in defending the Republic of Vietnam (South Vietnam) against communist guerrilla, mainforce, and North Vietnamese Army units. For CIA, and many members of the US military, engagement in South Vietnam began well before what is marked as the beginning of the 50th anniversary commemoration, 1965. As the 41 articles selected by CIA historian Clayton Laurie for this anthology will show, Southeast Asia was the focus of CIA activity as long ago as the early 1950s, when it was directed to provide support to French efforts to maintain control of its colony of Indochina.

Dedication. This volume is dedicated to the men and women of the United States, Allied nations, and peoples of the region with whom US intelligence worked to thwart the advance the advance of communism in Southeast Asia. Among the more than fifty-eight thousand Americans who gave their lives were eighteen members of the Central Intelligence Agency, their sacrifices marked by stars carved into CIA’s Memorial Wall.

About the digital interactive PDF

Upon entry into the PDF, readers will be able to navigate within the PDF and to the 41 articles in the anthology, as well as to additional CIA and Intelligence Community-produced resources.

Download Interactive digital PDF. [PDF 6.0MB*]

A print-only version is also available.

Download print PDF. [PDF 12.4MB*]

Additional information about the United States of America Vietnam War Commemoration can be found at http://www.vietnamwar50th.com/

The site includes an interactive timeline of war-related events. The timeline includes intelligence events provided by CIA’s History Staff.

*Adobe® Reader® is needed to view Adobe PDF files. If you don’t already have Adobe Reader installed, you may download the current version at www.adobe.com (opens in a new window). [external link disclaimer]

[Top of page]


All statements of fact, opinion, or analysis expressed in this journal are those of the authors. Nothing in any of the articles should be construed as asserting or implying US government endorsement of their factual statements and interpretations. Articles by non-US government employees are copyrighted.

Delivering Intelligence to Nixon and Ford — Central Intelligence Agency

Source: Central Intelligence Agency CIA

Headline: Delivering Intelligence to Nixon and Ford — Central Intelligence Agency

On August 24, 2016, the Agency released roughly 2,500 previously classified President’s Daily Briefs (PDBs) from the Richard Nixon and Gerald Ford administrations at a public symposium at the Richard Nixon Presidential Library and Museum in Yorba Linda, California, titled The President’s Daily Brief: Delivering Intelligence to Nixon and Ford. This 40-page color booklet describes the documents and the PDB process during this period.

The PDB contains intelligence analysis on key national security issues for the President and other senior policymakers. Only the President, the Vice President, and a select group of senior officials designated by the President receive the briefing, which represents the Intelligence Community’s best insights on issues the President must confront when dealing with threats as well as opportunities related to our national security.

For several years, CIA information management officers have worked with their counterparts at the National Security Council and the Office of the Director of National Intelligence on the review and declassification of these documents. Roughly 85 percent of the collection has been declassified and is being made available to the public.

For more information on the event, view the press release.

The document collection can be viewed on the CIA FOIA website at: https://www.cia.gov/library/readingroom/presidents-daily-brief.

This collection was assembled as part of the CIA’s Historical Review Program, which identifies, reviews, and declassifies documents on historically significant events or topics.

Studies in Intelligence Vol.60, No.2 — Central Intelligence Agency

Source: Central Intelligence Agency CIA

Headline: Studies in Intelligence Vol.60, No.2 — Central Intelligence Agency

The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA).

We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us.


Contact Information

Submit questions or comments online

By postal mail:
Central Intelligence Agency
Office of Public Affairs
Washington, D.C. 20505

By phone:
(703) 482-0623
Open during normal business hours.

By fax:
(571) 204-3800
(please include a phone number where we may call you)

Contact the Office of Privacy and Civil Liberties

Contact the Office of Inspector General

Contact the Employment Verification Office


Before contacting us:

  • Please check our site map, search feature, or our site navigation on the left to locate the information you seek. We do not routinely respond to questions for which answers are found within this Web site.
  • Employment: We do not routinely answer questions about employment beyond the information on this Web site, and we do not routinely answer inquiries about the status of job applications. Recruiting will contact applicants within 45 days if their qualifications meet our needs.

    Because of safety concerns for the prospective applicant, as well as security and communication issues, the CIA Recruitment Center does not accept resumes, nor can we return phone calls, e-mails or other forms of communication, from US citizens living outside of the US. When you return permanently to the US (not on vacation or leave), please visit the CIA Careers page and apply online for the position of interest.

    To verify an employee’s employment, please contact the Employment Verification Office.

  • Solicitations to transfer large sums of money to your bank account: If you receive a solicitation to transfer a large amount of money from an African nation to your bank account in exchange for a payment of millions of dollars, go to the US Secret Service Web site for information about the Nigerian Advance Fee Fraud or “4-1-9” Fraud scheme.
  • If you have information which you believe might be of interest to the CIA in pursuit of the CIA’s foreign intelligence mission, you may use our e-mail form. We will carefully protect all information you provide, including your identity. The CIA, as a foreign intelligence agency, does not engage in US domestic law enforcement.
  • If you have information relating to Iraq which you believe might be of interest to the US Government, please contact us through the Iraqi Rewards Program