1 / 43

your name your unit date

. . (SAEDA)SUBVERSION

Gabriel
Download Presentation

your name your unit date

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. YOUR NAMEYOUR UNITDATE

    3. Purpose of this training...... To establish policy, responsibility, and procedures for the recognition and prompt reporting of incidents of attempted or actual espionage, subversion, sabotage, and terrorism directed at the V Corps and the US ARMY.

    4. Governing Regulations GOVERNING AND DIRECTING SAEDA INCIDENTS, SAEDA EDUCATION, AND DUTIES OF EACH INDIVIDUAL HERE TODAY, ARE COVERED BY VARIOUS REGULATIONS DEPENDING UPON THE BRANCH OF SERVICE INVOLVED. AS YOU CAN SEE HERE, ALL REGULATIONS FOR EACH SERVICE ARE DERIVATIVES OF THE DEPARTMENT OF DEFENSE REGULATION 5200.1-R. THEY BASICALLY CONTAIN THE SAME INFORMATION. IF THERE WERE ONLY ONE THING YOU REMEMBERED AFTER THIS BRIEFING, I SINCERELY HOPE THAT IT’S “AR 381-12” Titled SUBVERSION AND ESPIONAGE DIRECTED AGAINST THE ARMY. THE ARMY REGULATION ON SAEDA HAS JUST BEEN UPDATED AND IS DATED 15 JANUARY 1993. IT IS NOT A LARGE REGULATION. THE ACTUAL “MEAT” OF THE REGULATION MINUS APPENDICES, CONSISTS OF ONLY 4 PAGES, BUT GIVES EXACT RESPONSIBILITIES AND REPORTING PROCEDURES YOU SHOULD FOLLOW. GOVERNING AND DIRECTING SAEDA INCIDENTS, SAEDA EDUCATION, AND DUTIES OF EACH INDIVIDUAL HERE TODAY, ARE COVERED BY VARIOUS REGULATIONS DEPENDING UPON THE BRANCH OF SERVICE INVOLVED. AS YOU CAN SEE HERE, ALL REGULATIONS FOR EACH SERVICE ARE DERIVATIVES OF THE DEPARTMENT OF DEFENSE REGULATION 5200.1-R. THEY BASICALLY CONTAIN THE SAME INFORMATION. IF THERE WERE ONLY ONE THING YOU REMEMBERED AFTER THIS BRIEFING, I SINCERELY HOPE THAT IT’S “AR 381-12” Titled SUBVERSION AND ESPIONAGE DIRECTED AGAINST THE ARMY. THE ARMY REGULATION ON SAEDA HAS JUST BEEN UPDATED AND IS DATED 15 JANUARY 1993. IT IS NOT A LARGE REGULATION. THE ACTUAL “MEAT” OF THE REGULATION MINUS APPENDICES, CONSISTS OF ONLY 4 PAGES, BUT GIVES EXACT RESPONSIBILITIES AND REPORTING PROCEDURES YOU SHOULD FOLLOW.

    5. Applicability HOW DOES AR 381-12 APPLY TO YOU ?? THIS SLIDE SHOWS THAT IT DOES APPLY TO ALL OF US INCLUDING ANYONE ELSE ASSOCIATED WITH THE ARMY AS OUTLINED HERE.HOW DOES AR 381-12 APPLY TO YOU ?? THIS SLIDE SHOWS THAT IT DOES APPLY TO ALL OF US INCLUDING ANYONE ELSE ASSOCIATED WITH THE ARMY AS OUTLINED HERE.

    6. ESPIONAGE...spying for a foreign government or for any enemy of our government. SUBVERSION...Causing unit members to be disloyal, or mutiny, refusal to perform duties. SABOTAGE.....Willful destruction or damage to systems and equipment to prevent mission accomplishment. TERRORISM.................. QUICK---- DEFINITIONS

    7. Bottom line - terrorism is a crime perpetrated by those seeking to gain attention for their cause.Bottom line - terrorism is a crime perpetrated by those seeking to gain attention for their cause.

    8. The Foreign Intelligence Service (FIS) threat to V Corps is real!

    9. This slide shows in generic terms what information most foreign intelligence services are seeking. They are trying to gain a technological as well as economic edge over us. The money they can save on R&D through gathering information from us is astronomical. Further, they can develop countermeasures as well as similar systems to ours to compete with us in the global marketplace.This slide shows in generic terms what information most foreign intelligence services are seeking. They are trying to gain a technological as well as economic edge over us. The money they can save on R&D through gathering information from us is astronomical. Further, they can develop countermeasures as well as similar systems to ours to compete with us in the global marketplace.

    10. How do they do it? Legally, illegally, overt, covert, whatever it takes. Some countries (France, Israel) are more aggressive than others. But make no mistake, foreign nations will look for any avenue of approach to gain information.How do they do it? Legally, illegally, overt, covert, whatever it takes. Some countries (France, Israel) are more aggressive than others. But make no mistake, foreign nations will look for any avenue of approach to gain information.

    11. These numbers should shock you as will the next slide. Everyone must do their part to stem this outflow of information. These numbers should shock you as will the next slide. Everyone must do their part to stem this outflow of information.

    13. What does FIS want to know? Military planning & operations Unit Deployments Classified information WHO IS TARGETED? PERSONNEL WITH ACCESS AND PLACEMENT PERSONNEL WITH VULNERABILITIES - SEX - DRUG/ALCOHOL ABUSE - MONEY- GREED/INDEBTEDNESS - EGO - UNHAPPINESS WITH JOB OR COWORKERS CRIMINAL ACTIVITY FAMILY / CLOSE FRIENDS IN FOREIGN COUNTRIES

    14. This cycle is three-phased. First you are spotted, meaning, taken notice of as a potential intelligence source. Then through elicitation and other means, a foreign intelligence service agent will “assess” your value. Do you have placement and access to information that he/she is interested in or tasked to collect? Would you be willing to cooperate? Are there any weaknesses that can be exploited or used to blackmail you into cooperating? What would your price be to sell information? Money? Sex? Drugs? Finally, if you are seen as valuable to that foreign agent, he/she will do what it takes to get you to work for their team. It may seem totally innocuous or may be a direct sales pitch. Depends on you and the agent as to what will work best.This cycle is three-phased. First you are spotted, meaning, taken notice of as a potential intelligence source. Then through elicitation and other means, a foreign intelligence service agent will “assess” your value. Do you have placement and access to information that he/she is interested in or tasked to collect? Would you be willing to cooperate? Are there any weaknesses that can be exploited or used to blackmail you into cooperating? What would your price be to sell information? Money? Sex? Drugs? Finally, if you are seen as valuable to that foreign agent, he/she will do what it takes to get you to work for their team. It may seem totally innocuous or may be a direct sales pitch. Depends on you and the agent as to what will work best.

    15. This cycle is three-phased. First you are spotted, meaning, taken notice of as a potential intelligence source. Then through elicitation and other means, a foreign intelligence service agent will “assess” your value. Do you have placement and access to information that he/she is interested in or tasked to collect? Would you be willing to cooperate? Are there any weaknesses that can be exploited or used to blackmail you into cooperating? What would your price be to sell information? Money? Sex? Drugs? Finally, if you are seen as valuable to that foreign agent, he/she will do what it takes to get you to work for their team. It may seem totally innocuous or may be a direct sales pitch. Depends on you and the agent as to what will work best.This cycle is three-phased. First you are spotted, meaning, taken notice of as a potential intelligence source. Then through elicitation and other means, a foreign intelligence service agent will “assess” your value. Do you have placement and access to information that he/she is interested in or tasked to collect? Would you be willing to cooperate? Are there any weaknesses that can be exploited or used to blackmail you into cooperating? What would your price be to sell information? Money? Sex? Drugs? Finally, if you are seen as valuable to that foreign agent, he/she will do what it takes to get you to work for their team. It may seem totally innocuous or may be a direct sales pitch. Depends on you and the agent as to what will work best.

    16. THE FIS COLLECTION METHODS ARE MANY......

    17. THE LURE AND THE CURE

    18. FIND THE SPY?

    19. IS THERE A SPY IN V CorpsTHINGS TO LOOK FOR..........

    20. UNDUE AFFLUENCE

    21. Taking work home!

    30. Never attempt to investigate on your own - you may be getting in the middle of an ongoing investigation. Your intrusion may harm or hinder our efforts. Remain noncommittal - “I don’t know if I can get that information.” “Can I get back to you on that?” Never attempt to investigate on your own - you may be getting in the middle of an ongoing investigation. Your intrusion may harm or hinder our efforts. Remain noncommittal - “I don’t know if I can get that information.” “Can I get back to you on that?”

    32. Again, you are required to report. We are not interested in what you have done. You are not the subject of the investigation.Again, you are required to report. We are not interested in what you have done. You are not the subject of the investigation.

    36. Terrorism - it’s not just overseas anymore! Look at what has happened in the last few years - World Trade Center bombing, Oklahoma City, Atlanta (Olympics), NY city, threats to the FBI building in West Virginia, and more. Our borders are not as sacred as they once were. That is why we must be even more vigilant and watchful now.Terrorism - it’s not just overseas anymore! Look at what has happened in the last few years - World Trade Center bombing, Oklahoma City, Atlanta (Olympics), NY city, threats to the FBI building in West Virginia, and more. Our borders are not as sacred as they once were. That is why we must be even more vigilant and watchful now.

More Related