IN THE NEWS

 

 

 

 

 

NEWS | Nov. 23, 2020

Command Access Card Safety

Courtesy

Foreign entities and intelligence services may use businesses within the U.S. to collect information on U.S. persons and Service members.

Don’t

  • Don't allow anyone to scan your CAC
  • Don't allow anyone to copy your CAC
  • Don't allow or scan your CAC barcode into any non-government application
  • Don't download or use any application designed to read the barcode, magnetic strip, or integrated circuit chip on your CAC

Do

  • Do use your CAC for access to installation gates
  • Do use your CAC for access to MWR facilities like libraries, pools, golf courses if authorized
  • Do use your CAC for TRICARE military health benefits, if authorized
  • Do use your CAC to shop at any installation commissary or exchange, if authorized
  • Do use your CAC to log into official military/ government websites

SCANNING/PHOTOCOPYING MILITARY GOVERNMENT IDs IS ILLEGAL

Foreign Intelligence Entities may use multiple methods to target U.S. Servicemembers', Civilians', and Contractors' personal and professional information. These methods include photocopying CACs or Army issued identification cards in exchange for commercial discounts on products, services, or online purchases of software. You should not give Personally Identifiable Information (PII) to foreign governments, companies, or any other non-official entity and only share PII via official channels.

PROTECT PII (EXAMPLES)

  • Mother's  maiden name
  • Social Security Number
  • Passport number
  • Drivers license
  • Taxpayer identification number
  • Address (street and email)
  • Biometric data (photo, fingerprints, DNA, etc.)
  • Handwriting
  • Medical history

GENERAL TIPS for MOBILE APPS

  • Before downloading, installing or using any application, read the "About the Developer" disclosure
  • Only install/download official apps from official military/government channels
  • Read other ratings and reviews to identify potential security concerns mentioned
  • Inspect your device's application permissions screen to determine what information/apps will be accessed by the application

FEDERAL LAW

The photocopying of  U.S. Government identification cards is a violation of Title 18, U.S. Code Part I, Chapter 33, Section 701 and punishable by fine and imprisonment.

There are no safeguards in place to insure a government identification card won't be counterfeited or "cloned" based on a photocopy by a commercial establishment. Criminal elements and terrorist organizations place U.S. Government identification as a high value logistical element when planning acts against the U.S. military.

REPORT ANY PERSISTENT REQUEST BY UNOFFICIAL ENTITIES ATTEMPTING TO COPY/SCAN YOUR CAC

WHAT & WHERE TO REPORT TO A U.S. ARMY COUNTERINTELLIGENCE AGENT:

  • Behaviors indicative of Espionage, Sabotage, Subversion, Sedition, International Terrorism, or Extremist Activity
  • Illegal diversion of military technology
  • Unauthorized contact with foreign intelligence
  • Unauthorized intrusions to automated information systems

TO YOUR SECURITY MANAGER:

  • Personnel security violations
  • Improper handling of classified documents
  • Any suspected/known security violations

WHAT & WHERE TO REPORT TO YOUR COMMANDER:

  • Concern for the health and welfare of fellow Soldiers and civilian employees
  • Impediments to the good order and discipline of the unit

TO LAW ENFORCEMENT:

  • Imminent threats to personnel or property, such as bomb threats, active shooters, and terrorist attacks
  • Criminal activity

If you are part of the Command, Security, or Law Enforcement and you identify suspicious behaviors indicative or related to terrorism activities or believe there is a foreign nexus, contact a U.S. Army Counterintelligence Agent. 

Contact Us to Report

  • 1-800-CALL-SPY
  • inscom.army.mil/isalute/

News Search