saeda - FLY OSA

Download Report

Transcript saeda - FLY OSA

(SAEDA)
SUBVERSION & ESPIONAGE
DIRECTED AGAINST THE US ARMY
AR 381-12
The Threat
Purpose of this training......
To establish policy, responsibility, and procedures for the
recognition and prompt reporting of incidents of
attempted or actual espionage, subversion, sabotage,
and terrorism directed at DET 11 and the US ARMY.
Terminal Learning Objective
Action: Receive SAEDA Brief
Condition: Classroom Environment
Standards: IAW OSA CTG
Safety Requirements
NONE
Risk Assessment Level
LOW
Environmental
Considerations
NONE
Governing Regulations
ARMY
AR 381-12
Dept. of Defense
5200.1-R
NAVY
REG 5510.1F
AIR FORCE
AFR 205-57
Applicability
Army Regulation 381-12 applies to all
Department of the Army personnel
(Military and Civilian) and members
of the Army National Guard and the
US Army Reserves
Local National Employees
as governed by SOFA / Treaties
QUICK---- DEFINITIONS
• ESPIONAGE...spying for a foreign government or for
any enemy of our government.
• SUBVERSION...Causing unit members to be disloyal,
or mutiny, refusal to perform duties.
• SABOTAGE.....Willful destruction or damage to
systems and equipment to prevent mission
accomplishment.
• TERRORISM..................
TERRORISM
Uses violence or the threat of violence to attain goals, political,
religious, or ideological in nature. This is done through
intimidation, coercion, or instilling fear. Terrorism involves a
criminal act that is often symbolic in nature and intended to
influence an audience beyond the immediate victims.
Involves killing, causing serious bodily harm, kidnapping, or
violently destroying property, or an attempt or credible threat to
commit such an act.
Appears intended to endanger a protectee of the Secret Service or
the Department of State or to further political, social, or
economic goals by intimidating or coercing a civilian population
or any segment thereof, influencing the policy of a government
or international organization by intimidation or coercion, or
obtaining widespread publicity for a group or its causes.
The Foreign Intelligence Service (FIS) threat
is real!
FIS is focusing on obtaining info on Army personnel.
Non Traditional Threat
Methods of Operation
•Unsolicited requests for Scientific and Technological
information
•Outright acquisitions of technology and companies
•Using the Internet to identify & target information
•Targeting cultural commonalties
Threats to US Technology
• 75% of our weapon systems had
countermeasures initiated against them
within 3 years of full scale development
• 50% of our weapon systems had
countermeasures fielded against them
within 3 years of full scale development
Cost of Stolen
Technology
It is estimated that the US industry loses
about $100 billion in technology each
year.
This equates to approximately 6 million
jobs.
What does FIS want to know?
Military planning & operations Unit Deployments
information
Classified
• WHO IS TARGETED?
• PERSONNEL WITH ACCESS AND PLACEMENT
• PERSONNEL WITH VULNERABILITIES
•
- SEX
•
- DRUG/ALCOHOL ABUSE
•
- MONEY- GREED/INDEBTEDNESS
•
- EGO
•
- UNHAPPINESS WITH JOB OR COWORKERS
• CRIMINAL ACTIVITY
• FAMILY / CLOSE FRIENDS IN FOREIGN COUNTRIES
Recruitment Cycle
SPOT
ASSESS
RECRUIT
Recruitment Cycle
This cycle is three-phased. First you are spotted, meaning,
taken notice of as a potential intelligence source. Then
through solicitation and other means, a foreign intelligence
service agent will “assess” your value. Do you have
placement and access to information that he/she is interested
in or tasked to collect? Would you be willing to cooperate?
Are there any weaknesses that can be exploited or used to
blackmail you into cooperating? What would your price be to
sell information? Money? Sex? Drugs? Finally, if you are
seen as valuable to that foreign agent, he/she will do what it
takes to get you to work for their team. It may seem totally
innocuous or may be a direct sales pitch. Depends on you and
the agent as to what will work best.
THE FIS COLLECTION METHODS ARE MANY......
FROM YOUR COMPUTER
AND OVER THE INTERNET
DIRECT APPROACH AT WORK , HOME,
OR AT SOCIAL ESTABLISHMENTS
MONITOR MILITARY OPERATIONS,
TRAINING, AND RADIO CHATTER
THREATS, BLACKMAIL
COERCION, INTIMIDATION
OVER THE TELEPHONE
THRU CORRESPONDENCE,
OFFICIAL, PEN-PAL
THE LURE AND THE CURE
UCMJ
=
LENGTHY PRISON SENTENCE
DEATH PENALTY FOR ESPIONAGE
CONDUCTED DURING PEACETIME
MONEY IS THE NUMBER #1 REASON
FOR COMMITING ESPIONAGE.
The passing of any Army document or manual (unclassified or classified) to a foreign national
is considered espionage.
FIND THE SPY?
A FIS AGENT OR SPY CAN BE ANYONE... A FOREIGN NATIONAL, AN AMERICAN,
A SUPERVISOR, A SUBORDINATE, A CO-WORKER, A FRIEND, A NEIGHBOR,
....... EVEN A FAMILY MEMBER.
IS THERE A SPY IN DET 11?
THINGS TO LOOK FOR..........
UNDUE AFFLUENCE
Taking work home!
EXCESSIVE USE OF COPIER OR PRINTER
SECRET
REPEATEDLY WORKING LATE HOURS
FOR NO REASON
REQUESTING ACCESS OR INFO WITH NO
REAL NEED-TO-KNOW
DET 11 OSA
AUTHORIZED
PERSONNEL ONLY
FREQUENT TRAVEL TO A
FOREIGN COUNTRY
CORRESPONDING WITH
FOREIGN NATIONAL OR BUSINESS
Boris Spyinski
Russian Intelligence Service
To: CW3 Carroll (DET 11 OSA)
REPEATED INVOLVEMENT IN
SECURITY VIOLATIONS
I forgot to lock the
safe again. I know this
is the third time!
Security
SPIES BROUGHT TO JUSTICE:
•ALDRICH AMES/CIA (RUSSIANS)--LIFE
•SPC ALBERT SOMBOLAY (JORDANIANS)—
34 YRS
•JONATHAN POLLARD (ISRAELIS)-- LIFE
•SGT CLAYTON LONETREE (RUSSIANS)-- 35
•JOHN WALKER (SOVIETS)-- LIFE
Reporting Procedures
Do’s
Recall
as many details as possible
Date, time, place, and circumstances
Identifying data and physical description
Vehicle license number and description
ID of any witnesses
Details of conversation or correspondence
Record ASAP after
the incident
Reporting Procedures
Don’t:
Conduct
your own investigation
Take money or sign anything
Divulge any sensitive information
Agree or disagree to cooperate
Tell family & friends of the incident
Put yourself in any dangerous situation
Remain non-committal - “I don’t know if I can get that
information.” “Can I get back to you on that?”
REPORTING PROCEDURES
•
•
•
•
•
Beware of who you tell!!
Report the incident immediately!
Remember details of the incident.
Don’t investigate (that’s MI’s job).
Remain non-committed (don’t refuse or agree to
cooperate)
• Notify your Chain-of-Command or Call 1-800-CALL
SPY
Failure to Report...
Fear
of Involvement
Ignorance of Procedures
Exposure of Past Misdeeds
You are REQUIRED to report. We are not
interested in what you have done. You are
not the subject of the investigation.
Criminal Penalties
Death
Penalty-Peacetime Espionage
UCMJ
Title 18, United States Code
SAEDA REPORTING IS A REQUIREMENT
QUESTIONS??