(SAEDA) - PowerPoint PPT Presentation

1 / 34
About This Presentation
Title:

(SAEDA)

Description:

Title: No Slide Title Author: TRRIP Last modified by: Testbed-1 Created Date: 12/17/1996 4:29:18 PM Document presentation format: On-screen Show Other titles – PowerPoint PPT presentation

Number of Views:21
Avg rating:3.0/5.0
Slides: 35
Provided by: TRR7
Category:
Tags: saeda | chatter

less

Transcript and Presenter's Notes

Title: (SAEDA)


1
(SAEDA) SUBVERSION ESPIONAGE DIRECTED AGAINST
THE US ARMY AR 381-12
The Threat
2
Purpose of this training......
  • To establish policy, responsibility, and
    procedures for the recognition and prompt
    reporting of incidents of attempted or actual
    espionage, subversion, sabotage, and terrorism
    directed at DET 11 and the US ARMY.

3
Terminal Learning Objective
  • Action Receive SAEDA Brief
  • Condition Classroom Environment
  • Standards IAW OSA CTG

4
Safety Requirements NONE Risk Assessment
Level LOW Environmental Considerations NONE
5
Governing Regulations
ARMY
AR 381-12
Dept. of Defense 5200.1-R
6
Applicability
  • Army Regulation 381-12 applies to all Department
    of the Army personnel (Military and Civilian) and
    members of the Army National Guard and the US
    Army Reserves
  • Local National Employees
  • as governed by SOFA / Treaties

7
QUICK---- DEFINITIONS
  • ESPIONAGE...spying for a foreign government or
    for any enemy of our government.
  • SUBVERSION...Causing unit members to be disloyal,
    or mutiny, refusal to perform duties.
  • SABOTAGE.....Willful destruction or damage to
    systems and equipment to prevent mission
    accomplishment.
  • TERRORISM..................

8
TERRORISM
Uses violence or the threat of violence to attain
goals, political, religious, or ideological in
nature. This is done through intimidation,
coercion, or instilling fear. Terrorism involves
a criminal act that is often symbolic in nature
and intended to influence an audience beyond the
immediate victims. Involves killing, causing
serious bodily harm, kidnapping, or violently
destroying property, or an attempt or credible
threat to commit such an act. Appears intended to
endanger a protectee of the Secret Service or the
Department of State or to further political,
social, or economic goals by intimidating or
coercing a civilian population or any segment
thereof, influencing the policy of a government
or international organization by intimidation or
coercion, or obtaining widespread publicity for a
group or its causes.
9
The Foreign Intelligence Service (FIS) threat
is real!
FIS is focusing on obtaining info on Army
personnel.
10
Non Traditional Threat
Methods of Operation
  • Unsolicited requests for Scientific and
    Technological
  • information
  • Outright acquisitions of technology and companies
  • Using the Internet to identify target
    information
  • Targeting cultural commonalties

11
Threats to US Technology
  • 75 of our weapon systems had countermeasures
    initiated against them within 3 years of full
    scale development
  • 50 of our weapon systems had countermeasures
    fielded against them within 3 years of full scale
    development

12
Cost of Stolen Technology
It is estimated that the US industry loses about
100 billion in technology each year. This
equates to approximately 6 million jobs.
13
What does FIS want to know? Military planning
operations Unit Deployments Classified
information
  • WHO IS TARGETED?
  • PERSONNEL WITH ACCESS AND PLACEMENT
  • PERSONNEL WITH VULNERABILITIES
  • - SEX
  • - DRUG/ALCOHOL ABUSE
  • - MONEY- GREED/INDEBTEDNESS
  • - EGO
  • - UNHAPPINESS WITH JOB OR COWORKERS
  • CRIMINAL ACTIVITY
  • FAMILY / CLOSE FRIENDS IN FOREIGN COUNTRIES

14
Recruitment Cycle
S P O T
A S S E S S
R E C R U I T
15
Recruitment Cycle
This cycle is three-phased. First you are
spotted, meaning, taken notice of as a potential
intelligence source. Then through solicitation
and other means, a foreign intelligence service
agent will assess your value. Do you have
placement and access to information that he/she
is interested in or tasked to collect? Would you
be willing to cooperate? Are there any
weaknesses that can be exploited or used to
blackmail you into cooperating? What would your
price be to sell information? Money? Sex?
Drugs? Finally, if you are seen as valuable to
that foreign agent, he/she will do what it takes
to get you to work for their team. It may seem
totally innocuous or may be a direct sales pitch.
Depends on you and the agent as to what will
work best.
16
THE FIS COLLECTION METHODS ARE MANY......
FROM YOUR COMPUTER AND OVER THE INTERNET
DIRECT APPROACH AT WORK , HOME, OR AT SOCIAL
ESTABLISHMENTS
OVER THE TELEPHONE
THRU CORRESPONDENCE, OFFICIAL, PEN-PAL
MONITOR MILITARY OPERATIONS, TRAINING, AND
RADIO CHATTER
THREATS, BLACKMAIL COERCION, INTIMIDATION
17
THE LURE AND THE CURE
The passing of any Army document or manual
(unclassified or classified) to a foreign
national is considered espionage.
18
FIND THE SPY?
A FIS AGENT OR SPY CAN BE ANYONE... A FOREIGN
NATIONAL, AN AMERICAN, A SUPERVISOR, A
SUBORDINATE, A CO-WORKER, A FRIEND, A
NEIGHBOR, ....... EVEN A FAMILY MEMBER.
19
IS THERE A SPY IN DET 11?THINGS TO LOOK
FOR..........
20
UNDUE AFFLUENCE
21
Taking work home!
22
EXCESSIVE USE OF COPIER OR PRINTER
SECRET
23
(No Transcript)
24
(No Transcript)
25
(No Transcript)
26
(No Transcript)
27
I forgot to lock the safe again. I know this is
the third time!
Security
28
  • SPIES BROUGHT TO JUSTICE
  • ALDRICH AMES/CIA (RUSSIANS)--LIFE
  • SPC ALBERT SOMBOLAY (JORDANIANS)
  • 34 YRS
  • JONATHAN POLLARD (ISRAELIS)-- LIFE
  • SGT CLAYTON LONETREE (RUSSIANS)-- 35
  • JOHN WALKER (SOVIETS)-- LIFE

29
Reporting Procedures
Dos
  • Recall as many details as possible
  • Date, time, place, and circumstances
  • Identifying data and physical description
  • Vehicle license number and description
  • ID of any witnesses
  • Details of conversation or correspondence
  • Record ASAP after the incident

30
Reporting Procedures
Dont
  • Conduct your own investigation
  • Take money or sign anything
  • Divulge any sensitive information
  • Agree or disagree to cooperate
  • Tell family friends of the incident
  • Put yourself in any dangerous situation
  • Remain non-committal - I dont know if I can get
    that information. Can I get back to you on
    that?

31
  • Beware of who you tell!!
  • Report the incident immediately!
  • Remember details of the incident.
  • Dont investigate (thats MIs job).
  • Remain non-committed (dont refuse or agree to
    cooperate)
  • Notify your Chain-of-Command or Call 1-800-CALL
    SPY

32
Failure to Report...
  • Fear of Involvement
  • Ignorance of Procedures
  • Exposure of Past Misdeeds
  • You are REQUIRED to report. We are not
    interested in what you have done. You are not
    the subject of the investigation.

33
Criminal Penalties
  • Death Penalty-Peacetime Espionage
  • UCMJ
  • Title 18, United States Code

34
QUESTIONS??
Write a Comment
User Comments (0)
About PowerShow.com