YOUR NAME YOUR UNIT DATE. (SAEDA) SUBVERSION & ESPIONAGE DIRECTED AGAINST THE US ARMY AR 381-12 The threat to V CORPS.

Slides:



Advertisements
Similar presentations
Human Rights Grave Violations
Advertisements

© 2012 Delmar, Cengage Learning Section V Getting the Job Done… Through Others Chapter 13 Deploying Law Enforcement Resources and Improving Productivity.
Banking Elder Abuse and Exploitation. Consider the following when determining whether an older adult may be in jeopardy: Is there more than one person.
Copyright 2010, The World Bank Group. All Rights Reserved. Police Statistics, Crime, Criminals and Resources Part 1 Crime, Justice & Security Statistics.
Chapter 13 Crimes Against the State Joel Samaha, 9th Ed.
Sexual Harassment SECNAVINST D
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
JUNIOR SAILOR ADVANCEMENT WORKSHOP (JSAW) CTO1(SW) Germean Porter NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
Espionage Indicators Briefing 1 U.S. Department of Commerce
SUBVERSION & ESPIONAGE DIRECTED AGAINST THE US ARMY
HUMAN TRAFFICKING AWARENESS COMMUNITY PRESENTATION Strong Families Make a Strong Kansas Presenters Name and date of presentation.
The Language of the Military Profession
SGTM 6: Personal Security Awareness
Defining Terrorism The History of Terrorism as a Strategy of Political Insurgency Section 1 SubmitAndPray.com It takes one to know one! SubmitAndPray.com.
How to Respond. Sgt. Trent Smith Bremen District #24.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Force Protection. **Definition of terrorism “the unlawful use or threatened use of force or violence against individuals or property to coerce,
Military families and Operational Security. Family members are vital to the success of our military. You may not know it, but you play a crucial role.
12 NYCRR PART PUBLIC EMPLOYER WORKPLACE VIOLENCE PREVENTION PROGRAMS.
Work Place Violence Pam Cant IH MS, Industrial Hygienist.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Presented by the 1st Information Operations Command.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Human Trafficking in Maryland Amanda K. Rodriguez, Esq. Manager of DV & Human Trafficking Policy Governor’s Office of Crime Control & Prevention.
Sutton Public Schools Anti-Bullying Law Overview.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Operational Security PCC. VII-F.1.
9 Terrorism as Organized Crime.
© Business & Legal Reports, Inc Alabama Retail is committed to partnering with our members to create and keep safe workplaces. Be sure to check out.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
EMERGING THREATS TO HUMAN SECURITY IN AFRICA
Terrorism. What is Terrorism? Terrorism is a criminal act that influences an audience beyond the immediate victim. The strategy of terrorists is to commit.
Antiterrorism. Learning Topics Introduction Identifying and selecting targets Regions Levels Vigilance Don’t be a target Responding and reporting Detection.
 The job of a police officer is to work in a community to ensure the safety of the community and to maintain law and order. I am interested in this career.
© Business & Legal Reports, Inc Alabama Retail is committed to partnering with our members to create and keep safe workplaces. Be sure to check out.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
5/159 TH AVN REG THE COST OF FREEDOM IS HIGH BUT SOME PEOPLE WILL SELL US OUT FOR NOTHING!! FITZ.
Preparing for Emergencies. Types of Emergencies Health Emergencies Natural Emergencies Political Emergencies Criminal Emergencies.
FORCE PROTECTION Operations SGT Artemis O’Conan Operations Center.
ADVANCEMENT EXAM TRAINING YN1(SW) FANT NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
CJ 499 Unit 9. International Crime and What is it ?
Ngafla Bakayoko Yolanda Alvarez Jimena Galdos.  The political use of violence or intimidation (The American Heritage Dictionary)  “the unlawful use.
Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Copyright © 2006 Pearson Education, Inc., publishing as Benjamin Cummings PowerPoint® Lecture Slide Presentation prepared by Michael Hall Violence and.
Workers Comp Overview & Accident Investigations
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
FY10 Annual Security Briefing Defensive Security for Foreign Travel Prior to Departure Remember, as a cleared person you should report any travel out of.
Osha Workplace Safety MEGAN GOHEEN. Introduction  Prevents workers from being killed or harmed at work  Provides their employees with conditions that.
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
Chapter 17: Foreign Policy and National Defense Section 2.
 War  Guerrilla war  Terrorism  Coups d’état  Assassination  Economic/property damage  Sabotage  Riot Continuum 1.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Insider Threat Awareness
Sutton Public Schools Anti-Bullying Law Overview
Disaster and Emergency Management
Disaster Preparedness
Investigative Applications 29.6
Anti-Terrorism / Force Protection (AT/FP)
Workplace Violence.
Terrorism.
Do Now: How would you define terrorism? Please give examples that demonstrate your definition.
Internet Vulnerabilities & Criminal Activity
Overall Classification of this Briefing is UNCLASSIFIED
Violence in the Workplace
Criminal Investigations
Command Indoctrination Operations Security DD MMM YY
Presentation transcript:

YOUR NAME YOUR UNIT DATE

(SAEDA) SUBVERSION & ESPIONAGE DIRECTED AGAINST THE US ARMY AR The threat to V CORPS

Purpose of this training To establish policy, responsibility, and procedures for the recognition and prompt reporting of incidents of attempted or actual espionage, subversion, sabotage, and terrorism directed at the V Corps and the US ARMY.

Governing Regulations Dept. of Defense R Dept. of Defense R ARMY AR NAVY REG F AIR FORCE AFR

Applicability uArmy Regulation applies to all Department of the Army personnel (Military and Civilian) and members of the Army National Guard and the US Army Reserves uLocal National Employees as governed by SOFA / Treaties

ESPIONAGE...spying for a foreign government or for anyenemy of our government. SUBVERSION...Causing unit members to be disloyal, or mutiny, refusal to perform duties. SABOTAGE.....Willful destruction or damage to systems and equipment to prevent mission accomplishment. TERRORISM QUICK---- DEFINITIONS

TERRORISM Uses violence or the threat of violence to attain goals, political, religious, or ideological in nature. This is done through intimidation, coercion, or instilling fear. Terrorism involves a criminal act that is often symbolic in nature and intended to influence an audience beyond the immediate victims. Involves killing, causing serious bodily harm, kidnapping, or violently destroying property, or an attempt or credible threat to commit such an act. Appears intended to endanger a protectee of the Secret Service or the Department of State or to further political, social, or economic goals by intimidating or coercing a civilian population or any segment thereof, influencing the policy of a government or international organization by intimidation or coercion, or obtaining widespread publicity for a group or its causes.

FIS is focusing on obtaining info on V Corps personnel. The Foreign Intelligence Service (FIS) threat to V Corps is real!

k High Energy Lasers k Kinetic Energy Systems k Tactical Missiles k Ceramics (Reactive Armor) k Radar Technology k Vehicle Survivability What are they looking for? ROther Technologies

Non Traditional Threat Methods of Operation Unsolicited requests for Scientific and Technological information Outright acquisitions of technology and companies Using the Internet to identify & target information Targeting cultural commonalties

75% of our weapon systems had countermeasures initiated against them within 3 years of full scale development 50% of our weapon systems had countermeasures fielded against them within 3 years of full scale development Threats to US Technology

Cost of Stolen Technology It is estimated that the US industry loses about $100 billion in technology each year. This equates to approximately 6 million jobs.

What does FIS want to know? Military planning & operations Unit Deployments Classified information WHO IS TARGETED? PERSONNEL WITH ACCESS AND PLACEMENT PERSONNEL WITH VULNERABILITIES - SEX - DRUG/ALCOHOL ABUSE - MONEY- GREED/INDEBTEDNESS - EGO - UNHAPPINESS WITH JOB OR COWORKERS CRIMINAL ACTIVITY FAMILY / CLOSE FRIENDS IN FOREIGN COUNTRIES

Recruitment Cycle A S S E S S S P O T R E C R U I T

Recruitment Cycle This cycle is three-phased. First you are spotted, meaning, taken notice of as a potential intelligence source. Then through solicitation and other means, a foreign intelligence service agent will “assess” your value. Do you have placement and access to information that he/she is interested in or tasked to collect? Would you be willing to cooperate? Are there any weaknesses that can be exploited or used to blackmail you into cooperating? What would your price be to sell information? Money? Sex? Drugs? Finally, if you are seen as valuable to that foreign agent, he/she will do what it takes to get you to work for their team. It may seem totally innocuous or may be a direct sales pitch. Depends on you and the agent as to what will work best.

THE FIS COLLECTION METHODS ARE MANY FROM YOUR COMPUTER AND OVER THE INTERNET DIRECT APPROACH AT WORK, HOME, OR AT SOCIAL ESTABLISHMENTS OVER THE TELEPHONE MONITOR MILITARY OPERATIONS, TRAINING, AND RADIO CHATTER THREATS, BLACKMAIL COERCION, INTIMIDATION THRU CORRESPONDENCE, OFFICIAL, PEN-PAL

THE LURE AND THE CURE MONEY IS THE NUMBER #1 REASON FOR COMMITING ESPIONAGE. = UCMJ LENGTHY PRISON SENTENCE DEATH PENALTY FOR ESPIONAGE CONDUCTED DURING PEACETIME The passing of any Army document or manual (unclassified or classified) to a foreign national is considered espionage.

FIND THE SPY? A FIS AGENT OR SPY CAN BE ANYONE... A FOREIGN NATIONAL, AN AMERICAN, A SUPERVISOR, A SUBORDINATE, A CO-WORKER, A FRIEND, A NEIGHBOR, EVEN A FAMILY MEMBER.

IS THERE A SPY IN V Corps THINGS TO LOOK FOR

UNDUE AFFLUENCE

Taking work home!

EXCESSIVE USE OF COPIER OR PRINTER SECRET

REPEATEDLY WORKING LATE HOURS FOR NO REASON

AUTHORIZED PERSONNEL ONLY V Corps REQUESTING ACCESS OR INFO WITH NO REAL NEED-TO-KNOW

FREQUENT TRAVEL TO A FOREIGN COUNTRY

Boris Spyinski Russian Intelligence Service To: SGT Joe Cannon (V CORPS) CORRESPONDING WITH FOREIGN NATIONAL OR BUSINESS

REPEATED INVOLVEMENT IN SECURITY VIOLATIONS I forgot to lock the safe again. I know this is the third time! Security

SPIES BROUGHT TO JUSTICE: ALDRICH AMES/CIA (RUSSIANS)--LIFE SPC ALBERT SOMBOLAY (JORDANIANS)— 34 YRS JONATHAN POLLARD (ISRAELIS)-- LIFE SGT CLAYTON LONETREE (RUSSIANS)-- 35 JOHN WALKER (SOVIETS)-- LIFE

Reporting Procedures k Recall as many details as possible ÙDate, time, place, and circumstances ÙIdentifying data and physical description ÙVehicle license number and description ÙID of any witnesses ÙDetails of conversation or correspondence k Record ASAP after the incident Do’s

Reporting Procedures k Conduct your own investigation k Take money or sign anything k Divulge any sensitive information k Agree or disagree to cooperate k Tell family & friends of the incident k Put yourself in any dangerous situation Remain non-committal - “I don’t know if I can get that information.” “Can I get back to you on that?” k Conduct your own investigation k Take money or sign anything k Divulge any sensitive information k Agree or disagree to cooperate k Tell family & friends of the incident k Put yourself in any dangerous situation Remain non-committal - “I don’t know if I can get that information.” “Can I get back to you on that?” Don’t :

Beware of who you tell!! Report the incident immediately! Remember details of the incident. Don’t investigate (that’s MI’s job). Remain non-committed (don’t refuse or agree to cooperate) Call CALL SPY USAREUR SAEDA Hotline Or call the Bamberg MP and ask for the MI duty Agent. REPORTING PROCEDURES

k Fear of Involvement k Ignorance of Procedures k Exposure of Past Misdeeds You are REQUIRED to report. We are not interested in what you have done. You are not the subject of the investigation. Failure to Report...

Criminal Penalties k Death Penalty-Peacetime Espionage k UCMJ k Title 18, United States Code

SAEDA REPORTING IS A REQUIREMENT QUESTIONS??

THE ARMY TERRORISM COUNTERACTION PROGRAM AR

TERRORISMTERRORISM

TERRORISM THE THREAT OR THE USE OF VIOLENCE TO ATTAIN POLITICAL, RELIGIOUS, OR IDEOLOGICAL GOALS. INVOLVES A CRIMINAL ACT THAT IS OFTEN SYMBOLIC AND INTENDED TO INFLUENCE AN AUDIENCE BEYOND THE IMMEDIATE VICTIMS.

TYPES OF TERRORISTS: CRIMINALS CRUSADERS

WHY ARE AMERICANS TARGETED? U.S. POSITION AS WORLD POWER OVER 1 MILLION AMERICANS OVERSEAS AMERICAN MEDIA HAS A LARGE AUDIENCE

CHARACTERISTICS OF TERRORIST ATTACKS CAREFULLY PLANNED AND REHEARSED CONDUCTED BY SMALL ATTACK CELLS AVERAGE 30 DAYS SURVEILLANCE ON TARGET TO IDENTIFY VULNERABILITY PATTERNS AND ROUTINES NORMALLY ATTACK UNDEFENDED TARGETS

TERRORISM COUNTERMEASURES: ALERTNESS AND COMMON SENSE VARY YOUR DAILY ROUTINE AVOID MARCHES AND DEMONSTRATIONS

TACTICAL ANTI-TERRORISM MEASURES : ALTERNATE DAILY MEETING TIMES BE PREPARED FOR ATTACK ANYWHERE, ANYTIME DENY HIGH SPEED AVENUES OF APPROACH MOVE COMMAND POSTS RANDOMLY EXTRA ALERTNESS ON HOLIDAYS AND ANNIVERSARIES

PERSONAL PROTECTIVE MEASURES: KEEP OTHERS INFORMED OF YOUR WHEREABOUTS CARRY IDENTIFICATION VARY SCHEDULES MINIMIZE WEAR OF UNIFORM KEEP LOW PROFILE KEEP HOUSE AND VEHICLES SECURE DRIVE DEFENSIVELY

QUESTIONS?