(saeda) subversion & espionage directed against the us army ar 381-12 the threat
TRANSCRIPT
(SAEDA)SUBVERSION & ESPIONAGE
DIRECTED AGAINST THE US ARMYAR 381-12
The Threat
Purpose of this training......
To establish policy, responsibility, and procedures for the recognition and prompt reporting of incidents of
attempted or actual espionage, subversion, sabotage, and terrorism directed at DET 11 and the US ARMY.
Terminal Learning Objective
Action: Receive SAEDA Brief
Condition: Classroom Environment
Standards: IAW OSA CTG
Safety Requirements NONE
Risk Assessment LevelLOW
Environmental Considerations
NONE
Governing RegulationsGoverning Regulations
Dept. of Defense5200.1-R
Dept. of Defense5200.1-R
ARMYARMY
AR 381-12AR 381-12
NAVY
REG 5510.1FREG 5510.1FAIR FORCEAIR FORCE
AFR 205-57AFR 205-57
ApplicabilityArmy Regulation 381-12 applies to all
Department of the Army personnel (Military and Civilian) and members of the Army National Guard and the US Army Reserves
Local National Employees
as governed by SOFA / Treaties
• ESPIONAGE...spying for a foreign government or for anyenemy of our government.
• SUBVERSION...Causing unit members to be disloyal, or mutiny, refusal to perform duties.
• SABOTAGE.....Willful destruction or damage to systems and equipment to prevent mission accomplishment.
• TERRORISM..................
QUICK---- DEFINITIONS
TERRORISM
Uses violence or the threat of violence to attain goals, political, religious, or ideological in nature. This is done through intimidation, coercion, or instilling fear. Terrorism involves a criminal act that is often symbolic in nature and intended to influence an audience beyond the immediate victims.
Involves killing, causing serious bodily harm, kidnapping, or violently destroying property, or an attempt or credible threat to commit such an act.
Appears intended to endanger a protectee of the Secret Service or the Department of State or to further political, social, or economic goals by intimidating or coercing a civilian population or any segment thereof, influencing the policy of a government or international organization by intimidation or coercion, or obtaining widespread publicity for a group or its causes.
FIS is focusing on obtaining info on Army personnel.
The Foreign Intelligence Service (FIS) threat is real!
Non Traditional
ThreatMethods of Operation
•Unsolicited requests for Scientific and Technological information•Outright acquisitions of technology and companies•Using the Internet to identify & target information•Targeting cultural commonalties
• 75% of our weapon systems had countermeasures initiated against them within 3 years of full scale development
• 50% of our weapon systems had countermeasures fielded against them within 3 years of full scale development
Threats to US Technology
Cost of Stolen Technology
It is estimated that the US industry loses about $100 billion in technology each year.
This equates to approximately 6 million jobs.
What does FIS want to know? Military planning & operations Unit Deployments Classified
information
• WHO IS TARGETED?• PERSONNEL WITH ACCESS AND PLACEMENT
• PERSONNEL WITH VULNERABILITIES
• - SEX
• - DRUG/ALCOHOL ABUSE
• - MONEY- GREED/INDEBTEDNESS
• - EGO
• - UNHAPPINESS WITH JOB OR COWORKERS
• CRIMINAL ACTIVITY
• FAMILY / CLOSE FRIENDS IN FOREIGN COUNTRIES
Recruitment CycleRecruitment CycleRecruitment CycleRecruitment Cycle
A S S E S SA S S E S S
S P O TS P O T
R E C R U I TR E C R U I T
Recruitment CycleRecruitment CycleRecruitment CycleRecruitment Cycle
This cycle is three-phased. First you are spotted, meaning, taken notice of as a potential intelligence source. Then through solicitation and other means, a foreign intelligence service agent will “assess” your value. Do you have placement and access to information that he/she is interested in or tasked to collect? Would you be willing to cooperate? Are there any weaknesses that can be exploited or used to blackmail you into cooperating? What would your price be to sell information? Money? Sex? Drugs? Finally, if you are seen as valuable to that foreign agent, he/she will do what it takes to get you to work for their team. It may seem totally innocuous or may be a direct sales pitch. Depends on you and the agent as to what will work best.
THE FIS COLLECTION METHODS ARE MANY......
FROM YOUR COMPUTER AND OVER THE INTERNET DIRECT APPROACH AT WORK , HOME,
OR AT SOCIAL ESTABLISHMENTSOVER THE TELEPHONE
MONITOR MILITARY OPERATIONS, TRAINING, AND RADIO CHATTER
THREATS, BLACKMAILCOERCION, INTIMIDATION
THRU CORRESPONDENCE, OFFICIAL, PEN-PAL
THE LURE AND THE CURE
MONEY IS THE NUMBER #1 REASON FOR COMMITING ESPIONAGE.
=
UCMJLENGTHY PRISON SENTENCE
DEATH PENALTY FOR ESPIONAGECONDUCTED DURING PEACETIME
The passing of any Army document or manual (unclassified or classified) to a foreign nationalis considered espionage.
FIND THE SPY?
A FIS AGENT OR SPY CAN BE ANYONE... A FOREIGN NATIONAL, AN AMERICAN,A SUPERVISOR, A SUBORDINATE, A CO-WORKER, A FRIEND, A NEIGHBOR,....... EVEN A FAMILY MEMBER.
IS THERE A SPY IN DET 11?THINGS TO LOOK FOR..........
UNDUE AFFLUENCE
Taking work home!
EXCESSIVE USE OF COPIER OR PRINTER
SECRET
REPEATEDLY WORKING LATE HOURS FOR NO REASON
AUTHORIZED PERSONNEL ONLY
DET 11 OSA
REQUESTING ACCESS OR INFO WITH NO REAL NEED-TO-KNOW
FREQUENT TRAVEL TO A FOREIGN COUNTRY
Boris SpyinskiRussian Intelligence Service
To: CW3 Carroll (DET 11 OSA)
CORRESPONDING WITH FOREIGN NATIONAL OR BUSINESS
REPEATED INVOLVEMENT INSECURITY VIOLATIONS
I forgot to lock thesafe again. I know thisis the third time!
Security
SPIES BROUGHT TO JUSTICE:•ALDRICH AMES/CIA (RUSSIANS)--LIFE
•SPC ALBERT SOMBOLAY (JORDANIANS)—
34 YRS
•JONATHAN POLLARD (ISRAELIS)-- LIFE
•SGT CLAYTON LONETREE (RUSSIANS)-- 35
•JOHN WALKER (SOVIETS)-- LIFE
Reporting ProceduresReporting Procedures
Recall as many details as possibleDate, time, place, and circumstancesIdentifying data and physical descriptionVehicle license number and descriptionID of any witnessesDetails of conversation or correspondence
Record ASAP after the incident
Do’s
Reporting ProceduresReporting Procedures
Conduct your own investigation Take money or sign anything Divulge any sensitive information Agree or disagree to cooperate Tell family & friends of the incident Put yourself in any dangerous situation
Remain non-committal - “I don’t know if I can get that information.” “Can I get back to you on that?”
Conduct your own investigation Take money or sign anything Divulge any sensitive information Agree or disagree to cooperate Tell family & friends of the incident Put yourself in any dangerous situation
Remain non-committal - “I don’t know if I can get that information.” “Can I get back to you on that?”
Don’t:
• Beware of who you tell!!
• Report the incident immediately!
• Remember details of the incident.
• Don’t investigate (that’s MI’s job).
• Remain non-committed (don’t refuse or agree to cooperate)
• Notify your Chain-of-Command or Call 1-800-CALL SPY
REPORTING PROCEDURES
Fear of InvolvementFear of Involvement Ignorance of ProceduresIgnorance of Procedures Exposure of Past MisdeedsExposure of Past Misdeeds
You are REQUIRED to report. We are not You are REQUIRED to report. We are not interested in what you have done. You are interested in what you have done. You are not the subject of the investigation.not the subject of the investigation.
Failure to Report...Failure to Report...
Criminal PenaltiesCriminal Penalties
Death Penalty-Peacetime EspionageDeath Penalty-Peacetime Espionage UCMJUCMJ Title 18, United States CodeTitle 18, United States Code
SAEDA REPORTING IS A REQUIREMENT
QUESTIONS??