Presentation is loading. Please wait.

Presentation is loading. Please wait.

SUBVERSION & ESPIONAGE DIRECTED AGAINST THE US ARMY

Similar presentations


Presentation on theme: "SUBVERSION & ESPIONAGE DIRECTED AGAINST THE US ARMY"— Presentation transcript:

1 SUBVERSION & ESPIONAGE DIRECTED AGAINST THE US ARMY
(SAEDA) SUBVERSION & ESPIONAGE DIRECTED AGAINST THE US ARMY AR The Threat

2 Purpose of this training......
To establish policy, responsibility, and procedures for the recognition and prompt reporting of incidents of attempted or actual espionage, subversion, sabotage, and terrorism directed at DET 11 and the US ARMY.

3 Terminal Learning Objective
Action: Receive SAEDA Brief Condition: Classroom Environment Standards: IAW OSA CTG

4 Environmental Considerations
Safety Requirements NONE Risk Assessment Level LOW Environmental Considerations

5 Governing Regulations
ARMY AR Dept. of Defense R GOVERNING AND DIRECTING SAEDA INCIDENTS, SAEDA EDUCATION, AND DUTIES OF EACH INDIVIDUAL HERE TODAY, ARE COVERED BY VARIOUS REGULATIONS DEPENDING UPON THE BRANCH OF SERVICE INVOLVED. AS YOU CAN SEE HERE, ALL REGULATIONS FOR EACH SERVICE ARE DERIVATIVES OF THE DEPARTMENT OF DEFENSE REGULATION R. THEY BASICALLY CONTAIN THE SAME INFORMATION. IF THERE WERE ONLY ONE THING YOU REMEMBERED AFTER THIS BRIEFING, I SINCERELY HOPE THAT IT’S “AR ” Titled SUBVERSION AND ESPIONAGE DIRECTED AGAINST THE ARMY. THE ARMY REGULATION ON SAEDA HAS JUST BEEN UPDATED AND IS DATED 15 JANUARY 1993. IT IS NOT A LARGE REGULATION. THE ACTUAL “MEAT” OF THE REGULATION MINUS APPENDICES, CONSISTS OF ONLY 4 PAGES, BUT GIVES EXACT RESPONSIBILITIES AND REPORTING PROCEDURES YOU SHOULD FOLLOW. NAVY REG F AIR FORCE AFR

6 Applicability Army Regulation applies to all Department of the Army personnel (Military and Civilian) and members of the Army National Guard and the US Army Reserves Local National Employees as governed by SOFA / Treaties HOW DOES AR APPLY TO YOU ?? THIS SLIDE SHOWS THAT IT DOES APPLY TO ALL OF US INCLUDING ANYONE ELSE ASSOCIATED WITH THE ARMY AS OUTLINED HERE.

7 QUICK---- DEFINITIONS
ESPIONAGE...spying for a foreign government or for any enemy of our government. SUBVERSION...Causing unit members to be disloyal, or mutiny, refusal to perform duties. SABOTAGE.....Willful destruction or damage to systems and equipment to prevent mission accomplishment. TERRORISM

8 TERRORISM Uses violence or the threat of violence to attain goals, political, religious, or ideological in nature. This is done through intimidation, coercion, or instilling fear. Terrorism involves a criminal act that is often symbolic in nature and intended to influence an audience beyond the immediate victims. Involves killing, causing serious bodily harm, kidnapping, or violently destroying property, or an attempt or credible threat to commit such an act. Appears intended to endanger a protectee of the Secret Service or the Department of State or to further political, social, or economic goals by intimidating or coercing a civilian population or any segment thereof, influencing the policy of a government or international organization by intimidation or coercion, or obtaining widespread publicity for a group or its causes. Bottom line - terrorism is a crime perpetrated by those seeking to gain attention for their cause.

9 The Foreign Intelligence Service (FIS) threat is real!
FIS is focusing on obtaining info on Army personnel.

10 Non Traditional Threat
Methods of Operation Unsolicited requests for Scientific and Technological information Outright acquisitions of technology and companies Using the Internet to identify & target information Targeting cultural commonalties How do they do it? Legally, illegally, overt, covert, whatever it takes. Some countries (France, Israel) are more aggressive than others. But make no mistake, foreign nations will look for any avenue of approach to gain information.

11 Threats to US Technology
75% of our weapon systems had countermeasures initiated against them within 3 years of full scale development 50% of our weapon systems had countermeasures fielded against them within 3 years of full scale development These numbers should shock you as will the next slide. Everyone must do their part to stem this outflow of information.

12 Cost of Stolen Technology
It is estimated that the US industry loses about $100 billion in technology each year. This equates to approximately 6 million jobs.

13 What does FIS want to know
What does FIS want to know? Military planning & operations Unit Deployments Classified information WHO IS TARGETED? PERSONNEL WITH ACCESS AND PLACEMENT PERSONNEL WITH VULNERABILITIES - SEX - DRUG/ALCOHOL ABUSE - MONEY- GREED/INDEBTEDNESS - EGO - UNHAPPINESS WITH JOB OR COWORKERS CRIMINAL ACTIVITY FAMILY / CLOSE FRIENDS IN FOREIGN COUNTRIES

14 Recruitment Cycle S P O T A S S E S S R E C R U I T
This cycle is three-phased. First you are spotted, meaning, taken notice of as a potential intelligence source. Then through elicitation and other means, a foreign intelligence service agent will “assess” your value. Do you have placement and access to information that he/she is interested in or tasked to collect? Would you be willing to cooperate? Are there any weaknesses that can be exploited or used to blackmail you into cooperating? What would your price be to sell information? Money? Sex? Drugs? Finally, if you are seen as valuable to that foreign agent, he/she will do what it takes to get you to work for their team. It may seem totally innocuous or may be a direct sales pitch. Depends on you and the agent as to what will work best. R E C R U I T

15 Recruitment Cycle This cycle is three-phased. First you are spotted, meaning, taken notice of as a potential intelligence source. Then through solicitation and other means, a foreign intelligence service agent will “assess” your value. Do you have placement and access to information that he/she is interested in or tasked to collect? Would you be willing to cooperate? Are there any weaknesses that can be exploited or used to blackmail you into cooperating? What would your price be to sell information? Money? Sex? Drugs? Finally, if you are seen as valuable to that foreign agent, he/she will do what it takes to get you to work for their team. It may seem totally innocuous or may be a direct sales pitch. Depends on you and the agent as to what will work best. This cycle is three-phased. First you are spotted, meaning, taken notice of as a potential intelligence source. Then through elicitation and other means, a foreign intelligence service agent will “assess” your value. Do you have placement and access to information that he/she is interested in or tasked to collect? Would you be willing to cooperate? Are there any weaknesses that can be exploited or used to blackmail you into cooperating? What would your price be to sell information? Money? Sex? Drugs? Finally, if you are seen as valuable to that foreign agent, he/she will do what it takes to get you to work for their team. It may seem totally innocuous or may be a direct sales pitch. Depends on you and the agent as to what will work best.

16 THE FIS COLLECTION METHODS ARE MANY......
FROM YOUR COMPUTER AND OVER THE INTERNET DIRECT APPROACH AT WORK , HOME, OR AT SOCIAL ESTABLISHMENTS OVER THE TELEPHONE THRU CORRESPONDENCE, OFFICIAL, PEN-PAL MONITOR MILITARY OPERATIONS, TRAINING, AND RADIO CHATTER THREATS, BLACKMAIL COERCION, INTIMIDATION

17 is considered espionage.
THE LURE AND THE CURE MONEY IS THE NUMBER #1 REASON FOR COMMITING ESPIONAGE. = UCMJ LENGTHY PRISON SENTENCE DEATH PENALTY FOR ESPIONAGE CONDUCTED DURING PEACETIME The passing of any Army document or manual (unclassified or classified) to a foreign national is considered espionage.

18 FIND THE SPY? A FIS AGENT OR SPY CAN BE ANYONE... A FOREIGN NATIONAL, AN AMERICAN, A SUPERVISOR, A SUBORDINATE, A CO-WORKER, A FRIEND, A NEIGHBOR, EVEN A FAMILY MEMBER.

19 IS THERE A SPY IN DET 11? THINGS TO LOOK FOR..........

20 UNDUE AFFLUENCE

21 Taking work home!

22 EXCESSIVE USE OF COPIER OR PRINTER
SECRET

23 REPEATEDLY WORKING LATE HOURS
FOR NO REASON

24 REQUESTING ACCESS OR INFO WITH NO
REAL NEED-TO-KNOW AUTHORIZED PERSONNEL ONLY DET 11 OSA

25 FREQUENT TRAVEL TO A FOREIGN COUNTRY

26 FOREIGN NATIONAL OR BUSINESS
CORRESPONDING WITH FOREIGN NATIONAL OR BUSINESS Boris Spyinski Russian Intelligence Service To: CW3 Carroll (DET 11 OSA)

27 REPEATED INVOLVEMENT IN
SECURITY VIOLATIONS I forgot to lock the safe again. I know this is the third time! Security

28 SPIES BROUGHT TO JUSTICE:
ALDRICH AMES/CIA (RUSSIANS)--LIFE SPC ALBERT SOMBOLAY (JORDANIANS)— 34 YRS JONATHAN POLLARD (ISRAELIS)-- LIFE SGT CLAYTON LONETREE (RUSSIANS)-- 35 JOHN WALKER (SOVIETS)-- LIFE

29 Reporting Procedures Do’s Recall as many details as possible
Date, time, place, and circumstances Identifying data and physical description Vehicle license number and description ID of any witnesses Details of conversation or correspondence Record ASAP after the incident

30 Reporting Procedures Don’t: Conduct your own investigation
Take money or sign anything Divulge any sensitive information Agree or disagree to cooperate Tell family & friends of the incident Put yourself in any dangerous situation Remain non-committal - “I don’t know if I can get that information.” “Can I get back to you on that?” Never attempt to investigate on your own - you may be getting in the middle of an ongoing investigation. Your intrusion may harm or hinder our efforts. Remain noncommittal - “I don’t know if I can get that information.” “Can I get back to you on that?”

31 REPORTING PROCEDURES Beware of who you tell!!
Report the incident immediately! Remember details of the incident. Don’t investigate (that’s MI’s job). Remain non-committed (don’t refuse or agree to cooperate) Notify your Chain-of-Command or Call CALL SPY

32 Failure to Report... Fear of Involvement Ignorance of Procedures
Exposure of Past Misdeeds You are REQUIRED to report. We are not interested in what you have done. You are not the subject of the investigation. Again, you are required to report. We are not interested in what you have done. You are not the subject of the investigation.

33 Criminal Penalties Death Penalty-Peacetime Espionage UCMJ
Title 18, United States Code

34 SAEDA REPORTING IS A REQUIREMENT
QUESTIONS??


Download ppt "SUBVERSION & ESPIONAGE DIRECTED AGAINST THE US ARMY"

Similar presentations


Ads by Google