unclassified cw2 r. mandell. goal of the saeda program to secure the assistance of every da member...

Post on 14-Dec-2015

214 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

UNCLASSIFIED

CW2 R. MANDELLCW2 R. MANDELL

Goal of the SAEDA Goal of the SAEDA Program Program

• To secure the assistance of every DA member To secure the assistance of every DA member in the deterrence and detection of intelligence in the deterrence and detection of intelligence and terrorist threats to the Army.and terrorist threats to the Army.

SAEDA Brief ObjectivesSAEDA Brief ObjectivesSAEDA Brief ObjectivesSAEDA Brief Objectives

Describe the foreign intelligence threatDescribe the foreign intelligence threatIdentify indicators of possible espionage Identify indicators of possible espionage

related activityrelated activityKnow where to report questionable acts Know where to report questionable acts

or attempts by a Foreign Intelligence or attempts by a Foreign Intelligence Service to collect information. Service to collect information.

Governing Governing RegulationsRegulations

Dept. of DefenseDept. of Defense5200.1-R5200.1-R

Dept. of DefenseDept. of Defense5200.1-R5200.1-R

AIR FORCEAIR FORCE

ARMYARMY

AR 381-12AR 381-12AR 381-12AR 381-12

NAVYNAVY

REG 5510.1FREG 5510.1F AFR 205-57AFR 205-57

ApplicabilityApplicability

Local National Employees as Local National Employees as governed by SOFA / Treatiesgoverned by SOFA / Treaties

Army Regulation 381-12 applies to all Army Regulation 381-12 applies to all Department of the Army personnel Department of the Army personnel (Military and Civilian) and members of (Military and Civilian) and members of the Army National Guard and the US the Army National Guard and the US Army ReservesArmy Reserves

• SUBVERSIONSUBVERSION Advocating, causing, or attempting to Advocating, causing, or attempting to

cause insubordination, disloyalty, cause insubordination, disloyalty, mutiny, or refusal of duty by any mutiny, or refusal of duty by any member of the armed forces of the member of the armed forces of the United States or by Department of United States or by Department of Defense civilian personnel with the Defense civilian personnel with the intent to interfere with, impair, or intent to interfere with, impair, or influence the loyalty, morale, or influence the loyalty, morale, or discipline of such armed forces.discipline of such armed forces. (see 18 USC 2387-88)(see 18 USC 2387-88)

• ESPIONAGEESPIONAGE The act of obtaining, delivering, The act of obtaining, delivering,

transmitting, communicating, or transmitting, communicating, or receiving information in respect to the receiving information in respect to the national defense with an intent or national defense with an intent or reason to believe that the information reason to believe that the information may be used to the injury of the United may be used to the injury of the United States or to the advantage of any States or to the advantage of any foreign nation.foreign nation.

(18 USC 792-798 and Article 106a, UCMJ)(18 USC 792-798 and Article 106a, UCMJ)

• SPYINGSPYING In time of war, the act of clandestinely In time of war, the act of clandestinely

or under false pretenses collecting or or under false pretenses collecting or attempting to collect information with attempting to collect information with the intent to convey it to a hostile party.the intent to convey it to a hostile party.

(see Article 106, UCMJ)(see Article 106, UCMJ)

F I S

Foreign Intelligence Foreign Intelligence ServiceService

An organization that is part of a foreign government and engages in intelligence activities

FIS EXPLOITS...FIS EXPLOITS...

LandbasedLandbasedSeaborneSeaborneOverheadOverhead

Diplomatic PersonnelDiplomatic PersonnelCommercial VisitorsCommercial Visitors

Merchant ShipsMerchant ShipsStudentsStudents

Open SourceOpen Source

AircraftAircraftSatelliteSatellite-High Resolution-High Resolution-Low Resolution-Low Resolution

The Army’s The Army’s Vulnerability...Vulnerability...

• Conception that Foreign governments aren’t Conception that Foreign governments aren’t interested in anything I’m doing.interested in anything I’m doing.

• Volunteer SpyVolunteer Spy• Data exchange agreementsData exchange agreements• Foreign government’s Increasing need for Foreign government’s Increasing need for

technologiestechnologies• Americans are very lax with who is listening or with Americans are very lax with who is listening or with

operational securityoperational security

Your VulnerabilityYour Vulnerability

• Are You a Lucrative Source ?Are You a Lucrative Source ?– Duties & PositionDuties & Position– TravelTravel– Access to Information (Classified or Access to Information (Classified or

Unclassified)Unclassified)

Persons - Special Persons - Special VulnerabilityVulnerability

• Frequent official overseas travel

• Resided in a foreign country

• Relatives in a foreign country

• Born/raised in a foreign country

• Persons with access to classified defense information

• Persons having extraordinary financial difficulty

Countries of Special Countries of Special ConcernConcern

• Director of Central Intelligence Directive Director of Central Intelligence Directive (DCID) number 1/20, Security Policy (DCID) number 1/20, Security Policy Concerning Travel and Assignment of Concerning Travel and Assignment of Personnel with Access to Sensitive Personnel with Access to Sensitive Compartmented Information, dated 29 Compartmented Information, dated 29 December 1991. (AR 381-12, 15 Jan 93) December 1991. (AR 381-12, 15 Jan 93)

Countries of Special Countries of Special ConcernConcern

Afghanistan LibyaAlbania LithuaniaBulgaria Myanmar (form. Burma)PR of China NicaraguaColombia North KoreaCuba (exc. US Navy Base) PeruEstonia RomaniaIran South AfricaIraq SyriaLaos VietnamLatvia States-Former USSRLebanon Territory-Former Yugoslavia

Afghanistan LibyaAlbania LithuaniaBulgaria Myanmar (form. Burma)PR of China NicaraguaColombia North KoreaCuba (exc. US Navy Base) PeruEstonia RomaniaIran South AfricaIraq SyriaLaos VietnamLatvia States-Former USSRLebanon Territory-Former Yugoslavia

Former Soviet Union Former Soviet Union Iran IranHungaryHungary Poland PolandNorth KoreaNorth Korea Czech RepublicCzech RepublicFormer Republic Yugoslavia Former Republic Yugoslavia ChinaChinaIraqIraq CubaCubaPakistanPakistan

Who Is Spying on the Who Is Spying on the U.S.?U.S.?

Traditional AdversariesTraditional Adversaries

IsraelIsrael India IndiaFranceFrance Saudi Arabia Saudi ArabiaGermanyGermany Taiwan TaiwanJapanJapan United Kingdom United KingdomSouth KoreaSouth Korea All others All others

Who Is Spying on the Who Is Spying on the U.S.?U.S.?

Non-traditional AdversariesNon-traditional Adversaries

• R&D CentersR&D Centers• Military InstallationsMilitary Installations• Civilian Contractor FacilitiesCivilian Contractor Facilities• UniversitiesUniversities• Conferences & SymposiumsConferences & Symposiums• Technical ExhibitionsTechnical Exhibitions• Any other place that may be a lucrative Any other place that may be a lucrative

source of information they are seekingsource of information they are seeking

Where Do They Collect?Where Do They Collect?

??

• Technology in development of arms and Technology in development of arms and armamentarmament

• Project information on policies and intentions Project information on policies and intentions of DoD Worldwideof DoD Worldwide

• Scientific & Industrial technologyScientific & Industrial technology• Readiness PostureReadiness Posture

What Do They Want?What Do They Want?

This list is by no means complete!This list is by no means complete!

Recruitment CycleRecruitment CycleRecruitment CycleRecruitment Cycle

E S P I O N A G EE S P I O N A G E

Recruitment CycleRecruitment CycleRecruitment CycleRecruitment Cycle

S P O TS P O T

Recruitment CycleRecruitment CycleRecruitment CycleRecruitment Cycle

A S S E S SA S S E S S

S P O TS P O T

Recruitment CycleRecruitment CycleRecruitment CycleRecruitment Cycle

A S S E S SA S S E S S

S P O TS P O T

R E C R U I TR E C R U I T

Espionage Recruitment CycleEspionage Recruitment Cycle

A S S E S SA S S E S S

S P O T S P O T

R E C R U I TR E C R U I T

Past CasesPast CasesPast CasesPast Cases

• IndicatorsIndicators• VulnerabilitiesVulnerabilities• Methods & TechniquesMethods & Techniques• Convictions & Sentences ReceivedConvictions & Sentences Received

Case Study - POLLARDCase Study - POLLARD

• IndicatorsIndicators1) Excessive photocopying1) Excessive photocopying2) Boasting - Association with Mossad2) Boasting - Association with Mossad

• VulnerabilitiesVulnerabilities1) Swaying ideologies1) Swaying ideologies2) Greed2) Greed

• Methods & TechniquesMethods & Techniques1) Sold numerous classified documents1) Sold numerous classified documents2) Vainly sought asylum at Israeli Embassy2) Vainly sought asylum at Israeli Embassy

• Conviction & Sentence ReceivedConviction & Sentence Received1) Jonathan - 4 Mar 87 - Life Imprisonment1) Jonathan - 4 Mar 87 - Life Imprisonment2) Anne - 4 Mar 87 - 5 years2) Anne - 4 Mar 87 - 5 years

Case Study - HALLCase Study - HALL

• IndicatorsIndicators1) Discovery of Large Sums of Money1) Discovery of Large Sums of Money2) Living style was far beyond his pay scale2) Living style was far beyond his pay scale3) Excessive photocopying3) Excessive photocopying

• VulnerabilitiesVulnerabilities1) Greed1) Greed

• Methods & TechniquesMethods & Techniques1) Conduit: Huseyin Yildirim1) Conduit: Huseyin Yildirim

• Conviction & Sentence ReceivedConviction & Sentence Received1) J. Hall - 9 Mar 89 - 40 yrs / $50,000. / Dish.1) J. Hall - 9 Mar 89 - 40 yrs / $50,000. / Dish.2) Yildirim - 20 Jul 89 - Life Imprisonment2) Yildirim - 20 Jul 89 - Life Imprisonment

Case Study - CONRADCase Study - CONRAD

• IndicatorsIndicators1) Recruited by Zoltan Szabo1) Recruited by Zoltan Szabo

• VulnerabilitiesVulnerabilities1) Greed1) Greed

• Methods & TechniquesMethods & Techniques1) Took suitcases of doc’s off base1) Took suitcases of doc’s off base2) Recruited others to collect for him2) Recruited others to collect for him

• Conviction & Sentence ReceivedConviction & Sentence Received1) Conrad - 6 Jun 90 - Treason by German Court 1) Conrad - 6 Jun 90 - Treason by German Court

with Life Imprisonment with Life Imprisonment

Case Study - SOMBOLAYCase Study - SOMBOLAY

• IndicatorsIndicators1) Foreign Travel1) Foreign Travel2) Disgruntled employee2) Disgruntled employee

• VulnerabilitiesVulnerabilities1) Greed1) Greed2) Financially distressed2) Financially distressed

• Methods & TechniquesMethods & Techniques1) Stole items from work1) Stole items from work2) Contact with embassies outside Germany2) Contact with embassies outside Germany

• Conviction & Sentence ReceivedConviction & Sentence Received1) Convicted to 34 years hard labor1) Convicted to 34 years hard labor2) Plea bargained for 19 years2) Plea bargained for 19 years

Case Study - AMESCase Study - AMES

• IndicatorsIndicators1) Disgruntled employee1) Disgruntled employee2) Living Above Means of Income2) Living Above Means of Income

• VulnerabilitiesVulnerabilities1) Greed1) Greed2) Professionally unsatisfied2) Professionally unsatisfied

• Methods & TechniquesMethods & Techniques1) Contacted Soviet embassy officials in D.C.1) Contacted Soviet embassy officials in D.C.2) stole class info. from CIA2) stole class info. from CIA

• Conviction & Sentence ReceivedConviction & Sentence Received1) Pled guilty to charge of espionage on 28 Apr 94, sentenced 1) Pled guilty to charge of espionage on 28 Apr 94, sentenced

to Life w/out parole.to Life w/out parole.

415th Military Police Detachment

.

AR 381-12AR 381-12

Reporting Reporting RequirementsRequirements

• Death Penalty has been enacted under the Death Penalty has been enacted under the UCMJ (military) and Title 18 USC (civilians UCMJ (military) and Title 18 USC (civilians and military) for peacetime espionage. and military) for peacetime espionage.

Criminal PenaltiesCriminal Penalties

U.S. Supreme CourtU.S. Supreme Court

Failure to Report...Failure to Report...

REPORT IT:REPORT IT:

Failure to report a SAEDA incident may be used as Failure to report a SAEDA incident may be used as a basis for disciplinary action under the UCMJ and a basis for disciplinary action under the UCMJ and

other authority as applicable.other authority as applicable.(Article 92, UCMJ)(Article 92, UCMJ)

When in doubt, When in doubt,

Reporting RequirementsReporting Requirements

• Attempts by unauthorized persons to Attempts by unauthorized persons to obtain DoD informationobtain DoD information

• Acts of Espionage by Army personnelActs of Espionage by Army personnel• Contacts by DA (Military or Dependent) Contacts by DA (Military or Dependent)

Personnel with foreigners that show undue Personnel with foreigners that show undue interest in the service member and their interest in the service member and their duties, etc. duties, etc.

• Information concerning international or Information concerning international or domestic terrorism when it threatens the domestic terrorism when it threatens the USUS

Reporting RequirementsReporting Requirements

• Attempts to encourage violation of laws, Attempts to encourage violation of laws, disobey orders or regulations disobey orders or regulations (Subversion)(Subversion)

• Acts of Acts of Treason Treason by Army personnelby Army personnel• Army persons advocating unconstitutional Army persons advocating unconstitutional

Overthrow of US Government Overthrow of US Government (Sedition)(Sedition)• Unauthorized disclosure of classified Unauthorized disclosure of classified

information regardless of the circumstances information regardless of the circumstances

Reporting RequirementsReporting Requirements

• Intrusions into Intrusions into Classified or UnclassifiedClassified or Unclassified Automated Information Systems.Automated Information Systems.

Other Matters of Counter Other Matters of Counter Intelligence InterestIntelligence Interest

• Discovery of Listening DevicesDiscovery of Listening Devices• Unauthorized absence of persons who have Unauthorized absence of persons who have

had access to Top Secret informationhad access to Top Secret information• Attempted or actual suicide of DA member Attempted or actual suicide of DA member

who has had access to classifiedwho has had access to classified• COMSEC insecurities (except administrative)COMSEC insecurities (except administrative)• Assassinations--attempted/plannedAssassinations--attempted/planned• Defection/attempted defectionsDefection/attempted defections• Detention of DA member by foreign Detention of DA member by foreign

government or entitygovernment or entity

Other Matters of CI Other Matters of CI InterestInterest

• Impersonation of Army intelligence and/or Impersonation of Army intelligence and/or unlawful possession of MI badge & credentialsunlawful possession of MI badge & credentials

• Compromise of Intelligence Personnel in a covert Compromise of Intelligence Personnel in a covert statusstatus

• When Foreign countries try to employ US When Foreign countries try to employ US Nuclear Weapons specialistsNuclear Weapons specialists

When in When in doubt, doubt,

REPORT IT.REPORT IT.

IndicatorsIndicators

• Attempts to expand accessAttempts to expand access• Unauthorized removal of classified Unauthorized removal of classified

materials from the work areamaterials from the work area• Extensive use of automation equipmentExtensive use of automation equipment• Extra work hoursExtra work hours• Bringing unauthorized electronic Bringing unauthorized electronic

devices into classified data areas (i.e. devices into classified data areas (i.e. Sensitive Compartmented Information Sensitive Compartmented Information Facility)Facility)

IndicatorsIndicators

• Unexplained/undue affluenceUnexplained/undue affluence• Opening several bank accountsOpening several bank accounts• Frequent unexplained short tripsFrequent unexplained short trips• Unexplained visits to foreign embassiesUnexplained visits to foreign embassies• Repeated Security Violations Repeated Security Violations • HomesteadingHomesteading• Joking or bragging about involvement with Joking or bragging about involvement with

FISFIS• Sudden reversal of financial situationSudden reversal of financial situation

Reporting ProceduresReporting Procedures

Nearest supporting CI officeNearest supporting CI officeUnit S2/ Security ManagerUnit S2/ Security ManagerIf assigned or traveling OCONUS and there If assigned or traveling OCONUS and there

is no Army CI element, report to the is no Army CI element, report to the nearest:nearest:US Military AuthorityUS Military AuthorityUS EmbassyUS EmbassyConsulate Security OfficeConsulate Security Office

Persons having knowledge of a SAEDA incident:Persons having knowledge of a SAEDA incident:

Reporting ProceduresReporting Procedures

• Recall as many details as possibleRecall as many details as possible– Date, time, place, circumstancesDate, time, place, circumstances– I.D. data and physical descriptionI.D. data and physical description– Vehicle license number and descriptionVehicle license number and description– I.D. of any witnessesI.D. of any witnesses– Details of conversation or correspondenceDetails of conversation or correspondence

• Record immediately after the incidentRecord immediately after the incident

Do’s:

Reporting ProceduresReporting Procedures

• Conduct your own investigationConduct your own investigation• Take Money or Sign anythingTake Money or Sign anything• Divulge any sensitive informationDivulge any sensitive information• Agree or Disagree to cooperateAgree or Disagree to cooperate• Tell family & friends of the incidentTell family & friends of the incident• Put yourself in any dangerous situationPut yourself in any dangerous situation

Do Not:

TERRORISMTERRORISMTERRORISMTERRORISM

RYDER

FEDERAL BUILDINGFEDERAL BUILDINGOKLAHOMA CITYOKLAHOMA CITY

WORLD TRADE CENTERWORLD TRADE CENTERNEW YORK CITYNEW YORK CITY

..

TERRORISMTERRORISM

• Uses violence or the threat of Uses violence or the threat of violence to attain goals through violence to attain goals through intimidation, coercion, or instilling intimidation, coercion, or instilling fear. Terrorism involves a criminal fear. Terrorism involves a criminal act that is often symbolic in nature act that is often symbolic in nature and intended to influence an and intended to influence an audience beyond the immediate audience beyond the immediate victims.victims.

Any activity that --

• THREATTHREAT– DomesticDomestic– InternationalInternational

• Who’s Vulnerable?Who’s Vulnerable?– DA PersonnelDA Personnel– Family membersFamily members

• THREATTHREAT– DomesticDomestic– InternationalInternational

• Who’s Vulnerable?Who’s Vulnerable?– DA PersonnelDA Personnel– Family membersFamily members

TERRORISMTERRORISMTERRORISMTERRORISM

• Operational Planning InvolvesOperational Planning Involves– Target SelectionTarget Selection– Weapons AcquisitionWeapons Acquisition– Target SurveillanceTarget Surveillance– Attack RehearsalsAttack Rehearsals

TERRORISMTERRORISMTERRORISMTERRORISM

General Guidance General Guidance (overseas)(overseas)

General Guidance General Guidance (overseas)(overseas)

• Avoid publicity (demonstrations, etc.)Avoid publicity (demonstrations, etc.)• Keep a low profile (avoid US specific Keep a low profile (avoid US specific

apparel)apparel)• Vary your daily routineVary your daily routine• Keep staff and family aware of Keep staff and family aware of

itineraries (even your daily itinerary)itineraries (even your daily itinerary)• Attract as little attention as possibleAttract as little attention as possible• Additional info. can be found in AR Additional info. can be found in AR

523-13, 523-13, AntiterrorismAntiterrorism

Protect Your Protect Your AutomobileAutomobile

Protect Your Protect Your AutomobileAutomobile

Lock Doors & Shut WindowsLock Doors & Shut Windows

Look for Look for anythinganything out of the ordinary! out of the ordinary!Look for Look for anythinganything out of the ordinary! out of the ordinary!

ZS#$

Protect Your HomeProtect Your HomeProtect Your HomeProtect Your Home

•Alarm SystemAlarm System

•Dead BoltsDead Bolts

•Thick DoorsThick Doors

•Windows LockedWindows Locked•Intimidating Pets Intimidating Pets

USE COMMON SENSE !!!USE COMMON SENSE !!!

• Move to secured areas quickly when in a Move to secured areas quickly when in a terminal if something should happenterminal if something should happen

• Use tourist passport for high risk areasUse tourist passport for high risk areas• Wear uniform only when necessaryWear uniform only when necessary• Avoid US-unique apparelAvoid US-unique apparel

Travel SecurityTravel SecurityTravel SecurityTravel Security

Be Observant !Be Observant !Be Observant !Be Observant !

• Watch othersWatch others– If followed, do NOT confront surveillants !!If followed, do NOT confront surveillants !!– Reach safe haven and call policeReach safe haven and call police

• Stay in busy thoroughfares or walkwaysStay in busy thoroughfares or walkways..

• Watch surroundingsWatch surroundings– Unattended items--briefcases, pouches, etc.Unattended items--briefcases, pouches, etc.– Vehicles--actions, unusual characteristics, etc.Vehicles--actions, unusual characteristics, etc.

• Remember/record details if suspicious.Remember/record details if suspicious.

Questions??

• This concludes the briefing. Does anyone have any questions?

top related