SEADA Briefing - California Cadet Corps

advertisement
CW2 R. MANDELL
UNCLASSIFIED
Goal of the SAEDA
Program
• To secure the assistance of every DA member
in the deterrence and detection of intelligence
and terrorist threats to the Army.
SAEDA Brief Objectives
Describe the foreign intelligence threat
Identify indicators of possible espionage
related activity
Know where to report questionable acts
or attempts by a Foreign Intelligence
Service to collect information.
Governing
Regulations
ARMY
AR 381-12
Dept. of Defense
5200.1-R
NAVY
REG 5510.1F
AIR FORCE
AFR 205-57
Applicability
Army Regulation 381-12 applies to all
Department of the Army personnel
(Military and Civilian) and members of
the Army National Guard and the US
Army Reserves
Local National Employees as
governed by SOFA / Treaties
• SUBVERSION
Advocating, causing, or attempting to
cause insubordination, disloyalty,
mutiny, or refusal of duty by any
member of the armed forces of the
United States or by Department of
Defense civilian personnel with the
intent to interfere with, impair, or
influence the loyalty, morale, or
discipline of such armed forces.
(see 18 USC 2387-88)
• ESPIONAGE
The act of obtaining, delivering,
transmitting, communicating, or
receiving information in respect to
the national defense with an intent or
reason to believe that the information
may be used to the injury of the
United States or to the advantage of
any foreign nation.
(18 USC 792-798 and Article 106a, UCMJ)
• SPYING
In time of war, the act of clandestinely
or under false pretenses collecting or
attempting to collect information with
the intent to convey it to a hostile
party.
(see Article 106, UCMJ)
Foreign Intelligence
Service
An organization that is part of a foreign government
and engages in intelligence activities
FIS
FIS EXPLOITS...
Landbased
Seaborne
Overhead
Diplomatic Personnel
Commercial Visitors
Merchant Ships
Students
Open Source
Aircraft
Satellite
-High Resolution
-Low Resolution
The Army’s
Vulnerability...
• Conception that Foreign governments aren’t
interested in anything I’m doing.
• Volunteer Spy
• Data exchange agreements
• Foreign government’s Increasing need for
technologies
• Americans are very lax with who is listening or
with operational security
Your Vulnerability
• Are You a Lucrative Source ?
– Duties & Position
– Travel
– Access to Information (Classified or
Unclassified)
Persons - Special
Vulnerability
•
•
•
•
•
Frequent official overseas travel
Resided in a foreign country
Relatives in a foreign country
Born/raised in a foreign country
Persons with access to classified defense
information
• Persons having extraordinary financial
difficulty
Countries of Special
Concern
• Director of Central Intelligence Directive
(DCID) number 1/20, Security Policy
Concerning Travel and Assignment of
Personnel with Access to Sensitive
Compartmented Information, dated 29
December 1991. (AR 381-12, 15 Jan 93)
Countries of Special
Concern
Afghanistan
Albania
Bulgaria
PR of China
Colombia
Cuba (exc. US Navy Base)
Estonia
Iran
Iraq
Laos
Latvia
Lebanon
Libya
Lithuania
Myanmar (form. Burma)
Nicaragua
North Korea
Peru
Romania
South Africa
Syria
Vietnam
States-Former USSR
Territory-Former Yugoslavia
Who Is Spying on the
U.S.?
Traditional Adversaries
Former Soviet Union
Hungary
North Korea
Former Republic Yugoslavia
Iraq
Pakistan
Iran
Poland
Czech Republic
China
Cuba
Who Is Spying on the
U.S.?
Non-traditional Adversaries
Israel
France
Germany
Japan
South Korea
India
Saudi Arabia
Taiwan
United Kingdom
All others
Where Do They Collect?
•
•
•
•
•
•
•
R&D Centers
Military Installations
Civilian Contractor Facilities
Universities
Conferences & Symposiums
Technical Exhibitions
Any other place that may be a lucrative
source of information they are seeking
What Do They Want?
• Technology in development of arms and
armament
• Project information on policies and intentions
of DoD Worldwide
• Scientific & Industrial technology
• Readiness Posture
This list is by no means complete!
Recruitment Cycle
ESPIONAGE
Recruitment Cycle
SPOT
Recruitment Cycle
SPOT
ASSESS
Recruitment Cycle
SPOT
ASSESS
RECRUIT
Espionage Recruitment Cycle
SPOT
ASSESS
RECRUIT
Past Cases
•
•
•
•
Indicators
Vulnerabilities
Methods & Techniques
Convictions & Sentences Received
Case Study - POLLARD
• Indicators
1) Excessive photocopying
2) Boasting - Association with Mossad
• Vulnerabilities
1) Swaying ideologies
2) Greed
• Methods & Techniques
1) Sold numerous classified documents
2) Vainly sought asylum at Israeli Embassy
• Conviction & Sentence Received
1) Jonathan - 4 Mar 87 - Life Imprisonment
2) Anne - 4 Mar 87 - 5 years
Case Study - HALL
• Indicators
1) Discovery of Large Sums of Money
2) Living style was far beyond his pay scale
3) Excessive photocopying
• Vulnerabilities
1) Greed
• Methods & Techniques
1) Conduit: Huseyin Yildirim
• Conviction & Sentence Received
1) J. Hall - 9 Mar 89 - 40 yrs / $50,000. / Dish.
2) Yildirim - 20 Jul 89 - Life Imprisonment
Case Study - CONRAD
• Indicators
1) Recruited by Zoltan Szabo
• Vulnerabilities
1) Greed
• Methods & Techniques
1) Took suitcases of doc’s off base
2) Recruited others to collect for him
• Conviction & Sentence Received
1) Conrad - 6 Jun 90 - Treason by German Court
with Life Imprisonment
Case Study - SOMBOLAY
• Indicators
1) Foreign Travel
2) Disgruntled employee
• Vulnerabilities
1) Greed
2) Financially distressed
• Methods & Techniques
1) Stole items from work
2) Contact with embassies outside Germany
• Conviction & Sentence Received
1) Convicted to 34 years hard labor
2) Plea bargained for 19 years
Case Study - AMES
• Indicators
1) Disgruntled employee
2) Living Above Means of Income
• Vulnerabilities
1) Greed
2) Professionally unsatisfied
• Methods & Techniques
1) Contacted Soviet embassy officials in D.C.
2) stole class info. from CIA
• Conviction & Sentence Received
1) Pled guilty to charge of espionage on 28 Apr 94, sentenced
to Life w/out parole.
AR 381-12
Reporting
Requirements
.
415th Military Police Detachment
Criminal Penalties
• Death Penalty has been enacted under the
UCMJ (military) and Title 18 USC (civilians
and military) for peacetime espionage.
U.S. Supreme Court
Failure to Report...
Failure to report a SAEDA incident may be used as
a basis for disciplinary action under the UCMJ and
other authority as applicable.
(Article 92, UCMJ)
When in doubt,
REPORT IT:
Reporting Requirements
• Attempts by unauthorized persons to
obtain DoD information
• Acts of Espionage by Army personnel
• Contacts by DA (Military or Dependent)
Personnel with foreigners that show undue
interest in the service member and their
duties, etc.
• Information concerning international or
domestic terrorism when it threatens the
US
Reporting Requirements
• Attempts to encourage violation of laws,
disobey orders or regulations (Subversion)
• Acts of Treason by Army personnel
• Army persons advocating unconstitutional
Overthrow of US Government (Sedition)
• Unauthorized disclosure of classified
information regardless of the circumstances
Reporting Requirements
• Intrusions into Classified or Unclassified
Automated Information Systems.
Other Matters of Counter
Intelligence Interest
• Discovery of Listening Devices
• Unauthorized absence of persons who have
had access to Top Secret information
• Attempted or actual suicide of DA member
who has had access to classified
• COMSEC insecurities (except administrative)
• Assassinations--attempted/planned
• Defection/attempted defections
• Detention of DA member by foreign
government or entity
Other Matters of CI
Interest
• Impersonation of Army intelligence and/or
unlawful possession of MI badge &
credentials
• Compromise of Intelligence Personnel in a
covert status
• When Foreign countries try to employ US
Nuclear Weapons specialists
When in doubt,
REPORT IT.
Indicators
• Attempts to expand access
• Unauthorized removal of classified
materials from the work area
• Extensive use of automation equipment
• Extra work hours
• Bringing unauthorized electronic
devices into classified data areas (i.e.
Sensitive Compartmented Information
Facility)
Indicators
•
•
•
•
•
•
•
Unexplained/undue affluence
Opening several bank accounts
Frequent unexplained short trips
Unexplained visits to foreign embassies
Repeated Security Violations
Homesteading
Joking or bragging about involvement with
FIS
• Sudden reversal of financial situation
Reporting Procedures
Persons having knowledge of a SAEDA incident:
Nearest supporting CI office
Unit S2/ Security Manager
If assigned or traveling OCONUS and there
is no Army CI element, report to the
nearest:
US Military Authority
US Embassy
Consulate Security Office
Reporting Procedures
Do’s:
• Recall as many details as possible
–
–
–
–
–
Date, time, place, circumstances
I.D. data and physical description
Vehicle license number and description
I.D. of any witnesses
Details of conversation or correspondence
• Record immediately after the incident
Reporting Procedures
Do Not:
•
•
•
•
•
•
Conduct your own investigation
Take Money or Sign anything
Divulge any sensitive information
Agree or Disagree to cooperate
Tell family & friends of the incident
Put yourself in any dangerous situation
TERRORISM
WORLD TRADE CENTER
NEW YORK CITY
FEDERAL BUILDING
OKLAHOMA CITY
. .
RYDER
TERRORISM
Any activity that --
• Uses violence or the threat of
violence to attain goals through
intimidation, coercion, or instilling
fear. Terrorism involves a criminal
act that is often symbolic in nature
and intended to influence an
audience beyond the immediate
victims.
TERRORISM
• THREAT
– Domestic
– International
• Who’s Vulnerable?
– DA Personnel
– Family members
TERRORISM
• Operational Planning Involves
– Target Selection
– Weapons Acquisition
– Target Surveillance
– Attack Rehearsals
General Guidance
(overseas)
• Avoid publicity (demonstrations, etc.)
• Keep a low profile (avoid US specific
apparel)
• Vary your daily routine
• Keep staff and family aware of
itineraries (even your daily itinerary)
• Attract as little attention as possible
• Additional info. can be found in AR
523-13, Antiterrorism
Protect Your
Automobile
Lock Doors & Shut Windows
ZS#$
Look for anything out of the ordinary!
Protect Your Home
•Alarm System
•Dead Bolts
•Thick Doors
•Intimidating Pets
•Windows Locked
USE COMMON SENSE !!!
Travel Security
• Move to secured areas quickly when in a
terminal if something should happen
• Use tourist passport for high risk areas
• Wear uniform only when necessary
• Avoid US-unique apparel
Be Observant !
• Watch others
– If followed, do NOT confront surveillants !!
– Reach safe haven and call police
• Stay in busy thoroughfares or walkways.
• Watch surroundings
– Unattended items--briefcases, pouches, etc.
– Vehicles--actions, unusual characteristics, etc.
• Remember/record details if suspicious.
Questions??
• This concludes
the briefing.
Does anyone
have any
questions?
Download