SAEDA

Last updated

Subversion and Espionage Directed Against the US Army is a program directed by Army Regulation 381-12 (U). [1] The regulation, published January 15, 1993, has three chapters and two appendices. The SAEDA program was created in order to combat Adversarial Intelligence (ADVINT), Industrial Espionage, and Terrorism during both peace and war.

Contents

Purpose

This regulation establishes policy, responsibilities, and procedures for the recognition and prompt reporting of incidents of attempted or actual espionage, subversion, sabotage, and terrorism directed against the U.S. Army and its personnel; of illegal diversion of technology; unauthorized intrusion into automated information systems; unauthorized disclosure of classified information; and other incidents of a counterintelligence (CI) nature. This regulation establishes the requirement for CI awareness and education. The Army’s program for CI awareness, education, and reporting is known collectively as Subversion and Espionage Directed against the U.S. Army (SAEDA). The goal of the SAEDA program is to secure the assistance of every Department of the Army (DA) member in the deterrence and detection of intelligence and terrorist threats to the Army.

SAEDA applies to all DA personnel (military, civilian, and contractors) and all members of the US National Guard and Reserves.

Indicators of espionage

Punishment

All service members are subject to punishment under the Uniform Code of Military Justice as well as to adverse administrative or other adverse action authorized by applicable provisions of the United States Code or federal regulations.

All non-service members are punishable under Title 18 of the US Code.

Penalties vary from time in jail to death sentences.

Countries of concern

See also

Related Research Articles

<span class="mw-page-title-main">Robert Hanssen</span> American double agent spy (1944–2023)

Robert Philip Hanssen was an American Federal Bureau of Investigation (FBI) agent who spied for Soviet and Russian intelligence services against the United States from 1979 to 2001. His espionage was described by the Department of Justice as "possibly the worst intelligence disaster in U.S. history".

<span class="mw-page-title-main">Counterintelligence</span> Offensive measures using enemy information

Counterintelligence (counter-intelligence) or counterespionage (counter-espionage) is any activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons.

<span class="mw-page-title-main">Classified information</span> Material that government claims requires confidentiality

Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to know. Mishandling of the material can incur criminal penalties.

A security clearance is a status granted to individuals allowing them access to classified information or to restricted areas, after completion of a thorough background check. The term "security clearance" is also sometimes used in private organizations that have a formal process to vet employees for access to sensitive information. A clearance by itself is normally not sufficient to gain access; the organization must also determine that the cleared individual needs to know specific information. No individual is supposed to be granted automatic access to classified information solely because of rank, position, or a security clearance.

<span class="mw-page-title-main">Bureau of Diplomatic Security</span> U.S. State Department security and law enforcement division

The Bureau of Diplomatic Security, commonly known as Diplomatic Security (DS), is the security branch of the United States Department of State. It conducts international investigations, threat analysis, cyber security, counterterrorism, and protection of people, property, and information. Its mission is to provide a safe and secure environment for officials to execute the foreign policy of the United States.

Larry Wu-tai Chin was a Chinese Communist spy who worked for the United States Government for 37 years (1944–1981), including positions at the U.S. Army and the CIA, while secretly being a mole for the Communist Party's intelligence apparatus from the very beginning. He kept passing classified documents and secret information to the People's Republic of China even after his retirement, until he was finally exposed in 1985.

The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic beginning in 1951. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.

Special access programs (SAPs) in the U.S. Federal Government are security protocols that provide highly classified information with safeguards and access restrictions that exceed those for regular (collateral) classified information. SAPs can range from black projects to routine but especially-sensitive operations, such as COMSEC maintenance or presidential transportation support. In addition to collateral controls, a SAP may impose more stringent investigative or adjudicative requirements, specialized nondisclosure agreements, special terminology or markings, exclusion from standard contract investigations (carve-outs), and centralized billet systems. Within the Department of Defense, SAP is better known as "SAR" by the mandatory Special Access Required (SAR) markings.

<span class="mw-page-title-main">Coast Guard Intelligence</span> Military intelligence branch of the US Coast Guard

Coast Guard Intelligence (CGI) is the military intelligence branch of the United States Coast Guard, and a component of the Central Security Service of the United States Department of Defense.

<span class="mw-page-title-main">Harold James Nicholson</span> American spy incarcerated in a US federal prison

Harold James Nicholson is a former Central Intelligence Agency (CIA) officer who was twice convicted of spying for Russia's Foreign Intelligence Service (SVR).

Commercial intelligence is a form of open-source intelligence practiced by diverse international and local businesses. Business Intelligence is a misnomer for data mining and enterprise dashboards that present useful patterns or distillations of internal information to the executive.

National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:

Clandestine HUMINT asset recruiting refers to the recruitment of human agents, commonly known as spies, who work for a foreign government, or within a host country's government or other target of intelligence interest for the gathering of human intelligence. The work of detecting and "doubling" spies who betray their oaths to work on behalf of a foreign intelligence agency is an important part of counterintelligence.

<span class="mw-page-title-main">Department of Defense Whistleblower Program</span>

The Department of Defense Whistleblower Program in the United States is a whistleblower protection program within the U.S. Department of Defense (DoD) whereby DoD personnel are trained on whistleblower rights. The Inspector General's commitment fulfills, in part, the federal mandate to protect whistleblowers. It also administers the Defense Intelligence Community Whistleblower Protection Program (DICWP), as a sub-mission for the intelligence community. The Inspector General's Defense Criminal Investigative Service also conducts criminal investigations which rely, in part, on Qui Tam relators.

<span class="mw-page-title-main">United States Army Counterintelligence</span> Component of United States Army which conducts counterintelligence activities

United States Army Counterintelligence (ACI) is the component of United States Army Military Intelligence which conducts counterintelligence activities to detect, identify, assess, counter, exploit and/or neutralize adversarial, foreign intelligence services, international terrorist organizations, and insider threats to the United States Army and U.S. Department of Defense (DoD).

<span class="mw-page-title-main">Whistleblower protection in the United States</span>

A whistleblower is a person who exposes any kind of information or activity that is deemed illegal, unethical, or not correct within an organization that is either private or public. The Whistleblower Protection Act was made into federal law in the United States in 1989.

Hüseyin Yıldırım is a Turkish-American auto mechanic who was sentenced to life imprisonment in the United States for his courier role in the espionage activities of U.S. serviceman James Hall III during the Cold War era. Yıldırım was later pardoned and extradited to his homeland, where he was sentenced to 17 years in prison but served only one day.

The US Department of Commerce Office of Security is a division of the United States Department of Commerce (DOC) that works to provide security services for facilities of the department. Its aim is to provide policies, programs, and oversight as it collaborates with facility managers to mitigate terrorism risks to DOC personnel and facilities, program managers to mitigate espionage risks to DOC personnel, information, and facilities, and Department and Bureau leadership to increase emergency preparedness for DOC operations.

References

  1. "James Yee Investigation: Documents". The Seattle Times. January 9, 2005. Retrieved 2008-03-04.