Post on 01-Jan-2016
5/159TH AVN REG
Subversion And Espionage Directed Against the Army
(SAEDA) AR 381-12
Annual Briefing
CW2 Mandell
5/159TH AVN REG
Purpose of this training......
To establish policy, responsibility, and procedures for the recognition and prompt reporting of incidents of attempted or actual espionage,
subversion, sabotage, and terrorism directed at the US ARMY.
5/159TH AVN REG
Subversion
• Actively encouraging military or civilian personnel of the DoD to violate laws, disobey lawful orders or regulations or disrupt military activities, with the willful intent to interfere with, or impair loyalty, morale, or discipline of the military forces of the United States.
5/159TH AVN REG
Espionage
• The act of obtaining, delivering, transmitting, communicating, or receiving information in respect to the national defense with an intent or reason to believe that the information may be used to injure the United States or to the advantage of any foreign government.
5/159TH AVN REG
Sabotage
• The willful destruction or damage to systems and equipment with an intent on hindering or preventing mission accomplishment.
5/159TH AVN REG
What do FIS want to know? Military planning & operationsUnit DeploymentsClassified information
WHO / WHAT IS TARGETED?• PERSONNEL WITH ACCESS AND PLACEMENT• PERSONNEL WITH VULNERABILITIES• SEX• DRUG/ALCOHOL ABUSE• MONEY- GREED/INDEBTEDNESS• EGO• UNHAPPINESS WITH JOB OR COWORKERS• CRIMINAL ACTIVITY• FAMILY / CLOSE FRIENDS IN FOREIGN COUNTRIES
5/159TH AVN REG
FROM YOUR COMPUTER AND OVER THE INTERNET
DIRECT APPROACH AT WORK , HOME, OR AT SOCIAL ESTABLISHMENTS OVER THE TELEPHONE
MONITOR MILITARY OPERATIONS, TRAINING, AND RADIO CHATTER
THREATS, BLACKMAILCOERCION, INTIMIDATION
THRU CORRESPONDENCE, OFFICIAL, PEN-PAL
How do they do it?
5/159TH AVN REG
What are they doing?
• Spot and assess• Place in compromising position• Aid in personal vulnerabilities• Collect biographic data• Evaluating recruitability
5/159TH AVN REG
REQUESTING ACCESS OR INFO WITH NO REAL NEED-TO-KNOW
S2 Shop
Authorized Personnel Only
5/159TH AVN REG
Boris SpyinskiRussian Intelligence Service
To: SGT Joe Cannon (5 Bn)
CORRESPONDING WITH FOREIGN NATIONAL OR BUSINESS
5/159TH AVN REG
REPEATED INVOLVEMENT INSECURITY VIOLATIONS
I forgot to lock thesafe again. I know thisis the third time!
Security
STEVENS
5/159TH AVN REG
THE LURE AND THE CURE
MONEY IS THE NUMBER #1 REASON FOR COMMITING ESPIONAGE.
=
UCMJLENGTHY PRISON SENTENCE
DEATH PENALTY FOR ESPIONAGECONDUCTED DURING PEACETIME
The passing of any Army document or manual (unclassified or classified) to a foreign national is considered espionage.
5/159TH AVN REG
General Countermeasures
• Understand that ALL information is vulnerable• Use the OPSEC process:
– Identify Essential Elements of Friendly Information
– Assess the threat– Identify vulnerabilities– Assess the risk– Apply countermeasures
5/159TH AVN REG
General Countermeasures
• Promote security education• Maintain liaison with local CI office• Practice good personnel security• Protect unclassified material• Telephone and FAX protocol• Classified information protocol• Computer security
5/159TH AVN REG
How to react if you become a SAEDA target
• Do not investigate on your own.• Do not make any promises or commitments.• Do not discuss the incident with anyone
except counterintelligence personnel.
5/159TH AVN REG
How to react if you become a SAEDA target
• Be observant• Ask for time• Remain non-committal• Report the incident immediately
5/159TH AVN REG
WHY REPORT?
Department of the Army soldiers and civilians are required to report under
AR 381-12.
5/159TH AVN REG
How do I reportSAEDA incidents?
• Contact your Battalion or Company level Security Officer!
• Anonymous reporting:• 1-800-CALL-SPY• 24 hours a day / 365 days per year
5/159TH AVN REG
Learning Objectives
Restated:• Be able to recognize SAEDA incidents.
• Know how to react if you become a SAEDA target.
• Know how to report SAEDA incidents.
5/159TH AVN REG
TERRORISM
THE THREAT OR THE USE OF VIOLENCE
TO ATTAIN POLITICAL, RELIGIOUS, OR
IDEOLOGICAL GOALS. INVOLVES A
CRIMINAL ACT THAT IS OFTEN SYMBOLIC
AND INTENDED TO INFLUENCE AN
AUDIENCE BEYOND THE IMMEDIATE
VICTIMS.
5/159TH AVN REG
COMMON TERRORIST ACTS
• BOMBINGS OR ARSON• THEFT OR ROBBERY• HIJACKINGS• ARMED ASSAULT• KIDNAPPING• ASSASSINATION
5/159TH AVN REG
WHY ARE AMERICANS TARGETED?
• U.S. POSITION AS WORLD POWER
• OVER 1 MILLION AMERICANS OVERSEAS
• AMERICAN MEDIA HAS A LARGE AUDIENCE
5/159TH AVN REG
CHARACTERISTICS OF TERRORIST ATTACKS
• CAREFULLY PLANNED AND REHEARSED• CONDUCTED BY SMALL ATTACK CELLS• AVERAGE 30 DAYS SURVEILLANCE ON TARGET
TO IDENTIFY VULNERABILITY PATTERNS AND ROUTINES
• NORMALLY ATTACK UNDEFENDED TARGETS
5/159TH AVN REG
TERRORISM COUNTERMEASURES
• ALERTNESS AND COMMON SENSE• VARY YOUR DAILY ROUTINE• AVOID MARCHES AND DEMONSTRATIONS
5/159TH AVN REG
TACTICAL ANTI-TERRORISM MEASURES
• ALTERNATE DAILY MEETING TIMES• BE PREPARED FOR ATTACK ANYWHERE,
ANYTIME• DENY HIGH SPEED AVENUES OF APPROACH• MOVE COMMAND POSTS RANDOMLY• EXTRA ALERTNESS ON HOLIDAYS AND
ANNIVERSARIES
5/159TH AVN REG
PERSONAL PROTECTIVE MEASURES
• KEEP OTHERS INFORMED OF YOUR WHEREABOUTS
• CARRY IDENTIFICATION• VARY SCHEDULES• MINIMIZE WEAR OF UNIFORM• KEEP LOW PROFILE• KEEP HOUSE AND VEHICLES SECURE• DRIVE DEFENSIVELY