(SAEDA)
Download
1 / 34

No Slide Title - PowerPoint PPT Presentation


  • 277 Views
  • Uploaded on

(SAEDA) SUBVERSION & ESPIONAGE DIRECTED AGAINST THE US ARMY AR 381-12. The Threat. Purpose of this training.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'No Slide Title' - Mia_John


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

(SAEDA)

SUBVERSION & ESPIONAGE

DIRECTED AGAINST THE US ARMY

AR 381-12

The Threat


Purpose of this training
Purpose of this training......

To establish policy, responsibility, and procedures for the recognition and prompt reporting of incidents of attempted or actual espionage, subversion, sabotage, and terrorism directed at DET 11 and the US ARMY.


Terminal learning objective
Terminal Learning Objective

Action: Receive SAEDA Brief

Condition: Classroom Environment

Standards: IAW OSA CTG


Safety Requirements

NONE

Risk Assessment Level

LOW

Environmental Considerations

NONE


Governing regulations

NAVY

AIR FORCE

REG 5510.1F

AFR 205-57

Governing Regulations

ARMY

AR 381-12

Dept. of Defense

5200.1-R


Applicability
Applicability

  • Army Regulation 381-12 applies to all Department of the Army personnel (Military and Civilian) and members of the Army National Guard and the US Army Reserves

  • Local National Employees

  • as governed by SOFA / Treaties


Quick definitions
QUICK---- DEFINITIONS

  • ESPIONAGE...spying for a foreign government or for any enemy of our government.

  • SUBVERSION...Causing unit members to be disloyal, or mutiny, refusal to perform duties.

  • SABOTAGE.....Willful destruction or damage to systems and equipment to prevent mission accomplishment.

  • TERRORISM..................


TERRORISM

Uses violence or the threat of violence to attain goals, political, religious, or ideological in nature. This is done through intimidation, coercion, or instilling fear. Terrorism involves a criminal act that is often symbolic in nature and intended to influence an audience beyond the immediate victims.

Involves killing, causing serious bodily harm, kidnapping, or violently destroying property, or an attempt or credible threat to commit such an act.

Appears intended to endanger a protectee of the Secret Service or the Department of State or to further political, social, or economic goals by intimidating or coercing a civilian population or any segment thereof, influencing the policy of a government or international organization by intimidation or coercion, or obtaining widespread publicity for a group or its causes.


The foreign intelligence service fis threat is real
The Foreign Intelligence Service (FIS) threat is real!

FIS is focusing on obtaining info on Army personnel.


Non Traditional Threat

Methods of Operation

  • Unsolicited requests for Scientific and Technological

  • information

  • Outright acquisitions of technology and companies

  • Using the Internet to identify & target information

  • Targeting cultural commonalties


Threats to US Technology

  • 75% of our weapon systems had countermeasures initiated against them within 3 years of full scale development

  • 50% of our weapon systems had countermeasures fielded against them within 3 years of full scale development


Cost of Stolen Technology

It is estimated that the US industry loses about $100 billion in technology each year.

This equates to approximately 6 million jobs.


What does fis want to know m ilitary planning operations unit deployments classified information
What does FIS want to know?Military planning & operations Unit Deployments Classified information

  • WHO IS TARGETED?

    • PERSONNEL WITH ACCESS AND PLACEMENT

    • PERSONNEL WITH VULNERABILITIES

    • - SEX

    • - DRUG/ALCOHOL ABUSE

    • - MONEY- GREED/INDEBTEDNESS

    • - EGO

    • - UNHAPPINESS WITH JOB OR COWORKERS

    • CRIMINAL ACTIVITY

    • FAMILY / CLOSE FRIENDS IN FOREIGN COUNTRIES


Recruitment Cycle

S P O T

A S S E S S

R E C R U I T


Recruitment Cycle

This cycle is three-phased. First you are spotted, meaning, taken notice of as a potential intelligence source. Then through solicitation and other means, a foreign intelligence service agent will “assess” your value. Do you have placement and access to information that he/she is interested in or tasked to collect? Would you be willing to cooperate? Are there any weaknesses that can be exploited or used to blackmail you into cooperating? What would your price be to sell information? Money? Sex? Drugs? Finally, if you are seen as valuable to that foreign agent, he/she will do what it takes to get you to work for their team. It may seem totally innocuous or may be a direct sales pitch. Depends on you and the agent as to what will work best.


The fis collection methods are many
THE FIS COLLECTION METHODS ARE MANY......

FROM YOUR COMPUTER

AND OVER THE INTERNET

DIRECT APPROACH AT WORK , HOME,

OR AT SOCIAL ESTABLISHMENTS

OVER THE TELEPHONE

THRU CORRESPONDENCE,

OFFICIAL, PEN-PAL

MONITOR MILITARY OPERATIONS,

TRAINING, AND RADIO CHATTER

THREATS, BLACKMAIL

COERCION, INTIMIDATION


The lure and the cure

UCMJ

=

LENGTHY PRISON SENTENCE

DEATH PENALTY FOR ESPIONAGE

CONDUCTED DURING PEACETIME

MONEY IS THE NUMBER #1 REASON

FOR COMMITING ESPIONAGE.

THE LURE AND THE CURE

The passing of any Army document or manual (unclassified or classified) to a foreign national

is considered espionage.


Find the spy
FIND THE SPY?

A FIS AGENT OR SPY CAN BE ANYONE... A FOREIGN NATIONAL, AN AMERICAN,

A SUPERVISOR, A SUBORDINATE, A CO-WORKER, A FRIEND, A NEIGHBOR,

....... EVEN A FAMILY MEMBER.


Is there a spy in det 11 things to look for
IS THERE A SPY IN DET 11?THINGS TO LOOK FOR..........






REQUESTING ACCESS OR INFO WITH NO

REAL NEED-TO-KNOW

DET 11 OSA

AUTHORIZED

PERSONNEL ONLY


FREQUENT TRAVEL TO A

FOREIGN COUNTRY


CORRESPONDING WITH

FOREIGN NATIONAL OR BUSINESS

Boris Spyinski

Russian Intelligence Service

To: CW3 Carroll (DET 11 OSA)


REPEATED INVOLVEMENT IN

SECURITY VIOLATIONS

I forgot to lock the

safe again. I know this

is the third time!

Security


  • SPIES BROUGHT TO JUSTICE:

    • ALDRICH AMES/CIA (RUSSIANS)--LIFE

    • SPC ALBERT SOMBOLAY (JORDANIANS)—

    • 34 YRS

    • JONATHAN POLLARD (ISRAELIS)-- LIFE

    • SGT CLAYTON LONETREE (RUSSIANS)-- 35

    • JOHN WALKER (SOVIETS)-- LIFE


Reporting Procedures

Do’s

  • Recall as many details as possible

    • Date, time, place, and circumstances

    • Identifying data and physical description

    • Vehicle license number and description

    • ID of any witnesses

    • Details of conversation or correspondence

  • Record ASAP after the incident


Reporting Procedures

Don’t:

  • Conduct your own investigation

  • Take money or sign anything

  • Divulge any sensitive information

  • Agree or disagree to cooperate

  • Tell family & friends of the incident

  • Put yourself in any dangerous situation

    Remain non-committal - “I don’t know if I can get that information.” “Can I get back to you on that?”


REPORTING PROCEDURES

  • Beware of who you tell!!

  • Report the incident immediately!

  • Remember details of the incident.

  • Don’t investigate (that’s MI’s job).

  • Remain non-committed (don’t refuse or agree to cooperate)

  • Notify your Chain-of-Command or Call 1-800-CALL SPY


Failure to Report...

  • Fear of Involvement

  • Ignorance of Procedures

  • Exposure of Past Misdeeds

    You are REQUIRED to report. We are not interested in what you have done. You are not the subject of the investigation.


Criminal Penalties

  • Death Penalty-Peacetime Espionage

  • UCMJ

  • Title 18, United States Code



ad