Presentation is loading. Please wait.

Presentation is loading. Please wait.

UNCLASSIFIED CW2 R. MANDELL. Goal of the SAEDA Program To secure the assistance of every DA member in the deterrence and detection of intelligence and.

Similar presentations


Presentation on theme: "UNCLASSIFIED CW2 R. MANDELL. Goal of the SAEDA Program To secure the assistance of every DA member in the deterrence and detection of intelligence and."— Presentation transcript:

1 UNCLASSIFIED CW2 R. MANDELL

2 Goal of the SAEDA Program To secure the assistance of every DA member in the deterrence and detection of intelligence and terrorist threats to the Army.To secure the assistance of every DA member in the deterrence and detection of intelligence and terrorist threats to the Army.

3 SAEDA Brief Objectives Describe the foreign intelligence threat Describe the foreign intelligence threat Identify indicators of possible espionage related activity Identify indicators of possible espionage related activity Know where to report questionable acts or attempts by a Foreign Intelligence Service to collect information. Know where to report questionable acts or attempts by a Foreign Intelligence Service to collect information.

4 Governing Regulations Dept. of Defense R R AIR FORCE ARMY AR NAVY REG F AFR

5 Applicability uLocal National Employees as governed by SOFA / Treaties uArmy Regulation applies to all Department of the Army personnel (Military and Civilian) and members of the Army National Guard and the US Army Reserves

6 SUBVERSIONSUBVERSION Advocating, causing, or attempting to cause insubordination, disloyalty, mutiny, or refusal of duty by any member of the armed forces of the United States or by Department of Defense civilian personnel with the intent to interfere with, impair, or influence the loyalty, morale, or discipline of such armed forces. Advocating, causing, or attempting to cause insubordination, disloyalty, mutiny, or refusal of duty by any member of the armed forces of the United States or by Department of Defense civilian personnel with the intent to interfere with, impair, or influence the loyalty, morale, or discipline of such armed forces. (see 18 USC ) (see 18 USC )

7 ESPIONAGEESPIONAGE The act of obtaining, delivering, transmitting, communicating, or receiving information in respect to the national defense with an intent or reason to believe that the information may be used to the injury of the United States or to the advantage of any foreign nation. The act of obtaining, delivering, transmitting, communicating, or receiving information in respect to the national defense with an intent or reason to believe that the information may be used to the injury of the United States or to the advantage of any foreign nation. (18 USC and Article 106a, UCMJ) (18 USC and Article 106a, UCMJ)

8 SPYINGSPYING In time of war, the act of clandestinely or under false pretenses collecting or attempting to collect information with the intent to convey it to a hostile party. In time of war, the act of clandestinely or under false pretenses collecting or attempting to collect information with the intent to convey it to a hostile party. (see Article 106, UCMJ) (see Article 106, UCMJ)

9 F I S Foreign Intelligence Service An organization that is part of a foreign government and engages in intelligence activities

10 FIS EXPLOITS... LandbasedSeaborneOverhead Diplomatic Personnel Commercial Visitors Merchant Ships Students Open Source AircraftSatellite -High Resolution -Low Resolution

11 The Army’s Vulnerability... Conception that Foreign governments aren’t interested in anything I’m doing.Conception that Foreign governments aren’t interested in anything I’m doing. Volunteer SpyVolunteer Spy Data exchange agreementsData exchange agreements Foreign government’s Increasing need for technologiesForeign government’s Increasing need for technologies Americans are very lax with who is listening or with operational securityAmericans are very lax with who is listening or with operational security

12 Your Vulnerability Are You a Lucrative Source ?Are You a Lucrative Source ? –Duties & Position –Travel –Access to Information (Classified or Unclassified)

13 Persons - Special Vulnerability Frequent official overseas travel Resided in a foreign country Relatives in a foreign country Born/raised in a foreign country Persons with access to classified defense information Persons having extraordinary financial difficulty

14 Countries of Special Concern Director of Central Intelligence Directive (DCID) number 1/20, Security Policy Concerning Travel and Assignment of Personnel with Access to Sensitive Compartmented Information, dated 29 December (AR , 15 Jan 93)Director of Central Intelligence Directive (DCID) number 1/20, Security Policy Concerning Travel and Assignment of Personnel with Access to Sensitive Compartmented Information, dated 29 December (AR , 15 Jan 93)

15 Countries of Special Concern AfghanistanLibya AlbaniaLithuania BulgariaMyanmar (form. Burma) PR of ChinaNicaragua ColombiaNorth Korea Cuba (exc. US Navy Base)Peru EstoniaRomania IranSouth Africa IraqSyria LaosVietnam LatviaStates-Former USSR LebanonTerritory-Former Yugoslavia AfghanistanLibya AlbaniaLithuania BulgariaMyanmar (form. Burma) PR of ChinaNicaragua ColombiaNorth Korea Cuba (exc. US Navy Base)Peru EstoniaRomania IranSouth Africa IraqSyria LaosVietnam LatviaStates-Former USSR LebanonTerritory-Former Yugoslavia

16 Former Soviet Union Iran Hungary Poland North Korea Czech Republic Former Republic Yugoslavia China Iraq Cuba Pakistan Who Is Spying on the U.S.? Traditional Adversaries

17 Israel India France Saudi Arabia Germany Taiwan Japan United Kingdom South Korea All others Who Is Spying on the U.S.? Non-traditional Adversaries

18 R&D CentersR&D Centers Military InstallationsMilitary Installations Civilian Contractor FacilitiesCivilian Contractor Facilities UniversitiesUniversities Conferences & SymposiumsConferences & Symposiums Technical ExhibitionsTechnical Exhibitions Any other place that may be a lucrative source of information they are seekingAny other place that may be a lucrative source of information they are seeking Where Do They Collect? ? ?

19 Technology in development of arms and armamentTechnology in development of arms and armament Project information on policies and intentions of DoD WorldwideProject information on policies and intentions of DoD Worldwide Scientific & Industrial technologyScientific & Industrial technology Readiness PostureReadiness Posture What Do They Want? This list is by no means complete!

20 Recruitment Cycle E S P I O N A G E

21 Recruitment Cycle S P O T

22 Recruitment Cycle A S S E S S S P O T

23 Recruitment Cycle A S S E S S S P O T R E C R U I T

24 Espionage Recruitment Cycle A S S E S S S P O T R E C R U I T

25 Past Cases IndicatorsIndicators VulnerabilitiesVulnerabilities Methods & TechniquesMethods & Techniques Convictions & Sentences ReceivedConvictions & Sentences Received

26 Case Study - POLLARD IndicatorsIndicators 1) Excessive photocopying 2) Boasting - Association with Mossad VulnerabilitiesVulnerabilities 1) Swaying ideologies 2) Greed Methods & TechniquesMethods & Techniques 1) Sold numerous classified documents 2) Vainly sought asylum at Israeli Embassy Conviction & Sentence ReceivedConviction & Sentence Received 1) Jonathan - 4 Mar 87 - Life Imprisonment 2) Anne - 4 Mar years

27 Case Study - HALL IndicatorsIndicators 1) Discovery of Large Sums of Money 2) Living style was far beyond his pay scale 3) Excessive photocopying VulnerabilitiesVulnerabilities 1) Greed Methods & TechniquesMethods & Techniques 1) Conduit: Huseyin Yildirim Conviction & Sentence ReceivedConviction & Sentence Received 1) J. Hall - 9 Mar yrs / $50,000. / Dish. 2) Yildirim - 20 Jul 89 - Life Imprisonment

28 Case Study - CONRAD IndicatorsIndicators 1) Recruited by Zoltan Szabo VulnerabilitiesVulnerabilities 1) Greed Methods & TechniquesMethods & Techniques 1) Took suitcases of doc’s off base 2) Recruited others to collect for him Conviction & Sentence ReceivedConviction & Sentence Received 1) Conrad - 6 Jun 90 - Treason by German Court with Life Imprisonment

29 Case Study - SOMBOLAY IndicatorsIndicators 1) Foreign Travel 2) Disgruntled employee VulnerabilitiesVulnerabilities 1) Greed 2) Financially distressed Methods & TechniquesMethods & Techniques 1) Stole items from work 2) Contact with embassies outside Germany Conviction & Sentence ReceivedConviction & Sentence Received 1) Convicted to 34 years hard labor 2) Plea bargained for 19 years

30 Case Study - AMES IndicatorsIndicators 1) Disgruntled employee 2) Living Above Means of Income VulnerabilitiesVulnerabilities 1) Greed 2) Professionally unsatisfied Methods & TechniquesMethods & Techniques 1) Contacted Soviet embassy officials in D.C. 2) stole class info. from CIA Conviction & Sentence ReceivedConviction & Sentence Received 1) Pled guilty to charge of espionage on 28 Apr 94, sentenced to Life w/out parole.

31 415 th Military Police Detachment. AR Reporting Requirements

32 Death Penalty has been enacted under the UCMJ (military) and Title 18 USC (civilians and military) for peacetime espionage.Death Penalty has been enacted under the UCMJ (military) and Title 18 USC (civilians and military) for peacetime espionage. Criminal Penalties U.S. Supreme Court

33 Failure to Report... REPORT IT: Failure to report a SAEDA incident may be used as a basis for disciplinary action under the UCMJ and other authority as applicable. (Article 92, UCMJ) When in doubt,

34 Reporting Requirements Attempts by unauthorized persons to obtain DoD informationAttempts by unauthorized persons to obtain DoD information Acts of Espionage by Army personnelActs of Espionage by Army personnel Contacts by DA (Military or Dependent) Personnel with foreigners that show undue interest in the service member and their duties, etc.Contacts by DA (Military or Dependent) Personnel with foreigners that show undue interest in the service member and their duties, etc. Information concerning international or domestic terrorism when it threatens the USInformation concerning international or domestic terrorism when it threatens the US

35 Reporting Requirements Attempts to encourage violation of laws, disobey orders or regulations (Subversion)Attempts to encourage violation of laws, disobey orders or regulations (Subversion) Acts of Treason by Army personnelActs of Treason by Army personnel Army persons advocating unconstitutional Overthrow of US Government (Sedition)Army persons advocating unconstitutional Overthrow of US Government (Sedition) Unauthorized disclosure of classified information regardless of the circumstancesUnauthorized disclosure of classified information regardless of the circumstances

36 Reporting Requirements Intrusions into Classified or Unclassified Automated Information Systems.Intrusions into Classified or Unclassified Automated Information Systems.

37 Other Matters of Counter Intelligence Interest Discovery of Listening DevicesDiscovery of Listening Devices Unauthorized absence of persons who have had access to Top Secret informationUnauthorized absence of persons who have had access to Top Secret information Attempted or actual suicide of DA member who has had access to classifiedAttempted or actual suicide of DA member who has had access to classified COMSEC insecurities (except administrative)COMSEC insecurities (except administrative) Assassinations--attempted/plannedAssassinations--attempted/planned Defection/attempted defectionsDefection/attempted defections Detention of DA member by foreign government or entityDetention of DA member by foreign government or entity

38 Other Matters of CI Interest Impersonation of Army intelligence and/or unlawful possession of MI badge & credentialsImpersonation of Army intelligence and/or unlawful possession of MI badge & credentials Compromise of Intelligence Personnel in a covert statusCompromise of Intelligence Personnel in a covert status When Foreign countries try to employ US Nuclear Weapons specialistsWhen Foreign countries try to employ US Nuclear Weapons specialists When in doubt, REPORT IT.

39 Indicators Attempts to expand accessAttempts to expand access Unauthorized removal of classified materials from the work areaUnauthorized removal of classified materials from the work area Extensive use of automation equipmentExtensive use of automation equipment Extra work hoursExtra work hours Bringing unauthorized electronic devices into classified data areas (i.e. Sensitive Compartmented Information Facility)Bringing unauthorized electronic devices into classified data areas (i.e. Sensitive Compartmented Information Facility)

40 Indicators Unexplained/undue affluenceUnexplained/undue affluence Opening several bank accountsOpening several bank accounts Frequent unexplained short tripsFrequent unexplained short trips Unexplained visits to foreign embassiesUnexplained visits to foreign embassies Repeated Security ViolationsRepeated Security Violations HomesteadingHomesteading Joking or bragging about involvement with FISJoking or bragging about involvement with FIS Sudden reversal of financial situationSudden reversal of financial situation

41 Reporting Procedures Nearest supporting CI officeNearest supporting CI office Unit S2/ Security ManagerUnit S2/ Security Manager If assigned or traveling OCONUS and there is no Army CI element, report to the nearest:If assigned or traveling OCONUS and there is no Army CI element, report to the nearest: ÞUS Military Authority ÞUS Embassy ÞConsulate Security Office Persons having knowledge of a SAEDA incident:

42 Reporting Procedures Recall as many details as possibleRecall as many details as possible –Date, time, place, circumstances –I.D. data and physical description –Vehicle license number and description –I.D. of any witnesses –Details of conversation or correspondence Record immediately after the incidentRecord immediately after the incident Do’s:

43 Reporting Procedures Conduct your own investigationConduct your own investigation Take Money or Sign anythingTake Money or Sign anything Divulge any sensitive informationDivulge any sensitive information Agree or Disagree to cooperateAgree or Disagree to cooperate Tell family & friends of the incidentTell family & friends of the incident Put yourself in any dangerous situationPut yourself in any dangerous situation Do Not:

44 TERRORISMTERRORISM RYDER FEDERAL BUILDING OKLAHOMA CITY WORLD TRADE CENTER NEW YORK CITY..

45 TERRORISM Uses violence or the threat of violence to attain goals through intimidation, coercion, or instilling fear. Terrorism involves a criminal act that is often symbolic in nature and intended to influence an audience beyond the immediate victims. Uses violence or the threat of violence to attain goals through intimidation, coercion, or instilling fear. Terrorism involves a criminal act that is often symbolic in nature and intended to influence an audience beyond the immediate victims. Any activity that --

46 THREATTHREAT –Domestic –International Who’s Vulnerable?Who’s Vulnerable? –DA Personnel –Family members THREATTHREAT –Domestic –International Who’s Vulnerable?Who’s Vulnerable? –DA Personnel –Family members TERRORISMTERRORISM

47 Operational Planning InvolvesOperational Planning Involves –Target Selection –Weapons Acquisition –Target Surveillance –Attack Rehearsals TERRORISMTERRORISM

48 General Guidance (overseas) Avoid publicity (demonstrations, etc.)Avoid publicity (demonstrations, etc.) Keep a low profile (avoid US specific apparel)Keep a low profile (avoid US specific apparel) Vary your daily routineVary your daily routine Keep staff and family aware of itineraries (even your daily itinerary)Keep staff and family aware of itineraries (even your daily itinerary) Attract as little attention as possibleAttract as little attention as possible Additional info. can be found in AR , AntiterrorismAdditional info. can be found in AR , Antiterrorism

49 Protect Your Automobile Lock Doors & Shut Windows Look for anything out of the ordinary! ZS#$

50 Protect Your Home Alarm System Alarm System Dead Bolts Dead Bolts Thick Doors Thick Doors Windows Locked Windows Locked Intimidating Pets Intimidating Pets USE COMMON SENSE !!!

51 Move to secured areas quickly when in a terminal if something should happenMove to secured areas quickly when in a terminal if something should happen Use tourist passport for high risk areasUse tourist passport for high risk areas Wear uniform only when necessaryWear uniform only when necessary Avoid US-unique apparelAvoid US-unique apparel Travel Security

52 Be Observant ! Watch othersWatch others –If followed, do NOT confront surveillants !! –Reach safe haven and call police Stay in busy thoroughfares or walkways.Stay in busy thoroughfares or walkways. Watch surroundingsWatch surroundings –Unattended items--briefcases, pouches, etc. –Vehicles--actions, unusual characteristics, etc. Remember/record details if suspicious.Remember/record details if suspicious.

53 Questions?? This concludes the briefing. Does anyone have any questions?


Download ppt "UNCLASSIFIED CW2 R. MANDELL. Goal of the SAEDA Program To secure the assistance of every DA member in the deterrence and detection of intelligence and."

Similar presentations


Ads by Google