DCIS PRESENTS:

“DCIS:Protecting America’s Warfighters”

VISUAL

 

AUDIO

     

1. BLACK,THEN AS VOICES EMERGE FADE UP ON CHYRON:

DCIS:

PROTECTING AMERICA ’S WARFIGHTERS

 

(FADE UP OVERLAPPING VOICES: 1:15:10 (3 SEC), )

     

2. MS SOLDER DIRECTING AIRCRAFT (29:59:21-30:02:48) DISSOLVE TO SOLDIERS IN FIELD (30:16:21)

 

(FADE OUT VOICES, FADE IN OPENING MUSIC UP THEN UNDER)

NARR (V-O):  Strong, honest, hardworking...these have been the cornerstones of our national character. 

     

3. WTC TOWERS ON FIRE (00:41:07-45:00)

 

But events in recent years have put our nation’s character to the test.  We’ve been attacked...

     

3A. CONTINUE W/CATASTROPHE SHOTS (3:12:07-25:00)

 

Targeted and challenged.   That’s why today, more than ever, defending America means protecting America ’s warfighters.

     

4. DVE: FLIP SCREEN TO GRAPHIC: DCIS LOGO

 

Accepting this mission is DCIS, the Defense Criminal Investigative Service.

     

5. DISSOLVE TO LUCAS FOOTAGE (8:54:21-9:10:44)

 

DCIS was established in 1981 as the criminal investigative arm of the Office of Inspector General, Department of Defense.  As such, the agency focuses on illegal activities critical to our country’s defensive readiness.

     

6. DCIS ACTIVITIES (1:53:08-2:01:58)

 

Specifically, DCIS investigates allegations of criminal, civil and administrative wrongdoing involving the Department of Defense. 

     

7. SHOTS OF DoD STAFF (1:22:22-42:02)

 

At the same time, DCIS also promotes economy, efficiency and effective operations within the DoD.

     

8. CHYRON:

DCIS INVESTIGATIVE AREAS:

  • ANTI-TERRORISM
  • PRODUCT SUBSTITUTION
  • CYBERCRIMES
  • ILLEGAL TECHNOLOGY TRANSFER
  • FINANCIAL CRIMES
  • HEALTH CARE FRAUD
  • ENVIRONMENTAL CRIMES
  • MAJOR THEFT
 

The agency focuses on eight major areas of investigation:

All of these impact America ’s defensive capabilities but none, perhaps, as dramatically as antiterrorism.

     

9. DIP TO BLACK; FADE UP CHYRON:

DCIS AND ANTITERRORISM

 

INTERVIEW (V-O 1:15:10-19:12):  Combatting terrorism is a departure from the traditional DCIS mission...

     

10. DISSOLVE TO INTERVIEW (1:19:13-1:22:56)

 

(SYNC) ...But one, however, that’s clearly needed.

     

11. PENTAGON ON 9/11N (0:23:02-31:00)

 

NARRATOR (V-O):  September 11th, 2001 marked a new era for many federal law enforcement agencies, including DCIS.

     

12. AERIAL OF NYC TO 9/11 CRATER (0:45:24-57:26)

 

In its aftermath, the agency provided immediate investigative assistance.  Since that time DCIS has taken a comprehensive and multifaceted approach to antiterrorism.

     

13. AGENTS IN CHEM SUITS (3:25:04-31:13)

 

This includes taking part in a number of critical investigations, including the successful resolution of a major anthrax case.

     

14. CHEM TECH SHOTS (3:38:44-53:11)

 

DCIS also gathers information on vulnerabilities inherent in DoD and contractor labs - especially those that could lead to terrorists obtaining dangerous biological and chemical agents.

     

15. FROM LOCAL COP TO US MARSHAL (00:58:50-1:02:00)

16. 2-SHOTS OF AGENTS WORKING (1:43:15-51:17)

 

Antiterrorism, however, must be a cooperative effort if it is to root out terrorists before they act. 

Toward that end, the agency participates on Joint Terrorism Task Forces and the National Joint Terrorism Task Force coordinated by the FBI.

     

17. ATTF TASK FORCE SHOTS (2:11:25-27:27)

 

In addition, DCIS serves on Antiterrorism Task Forces sponsored by the Department of Justice.  The goal here is to develop strategies to support investigations of suspected terrorists and prosecutions of known terrorists.

     

18. ADD’L TASK FORCE SHOTS (2:27:28-38:20)

 

Internally, DCIS has established a National Security Staff which coordinates with other agencies to identify and share terrorist threat information.

     

19. MORE CATASTROPHE SCENES (2:49:40-3:06:06)

 

DCIS has also established liaisons with the Department of Energy, the Defense Threat Reduction Agency and the Army Corps of Engineers to respond without delay to terrorist incidents.

     

20. PICKING UP DISKETTE (2:39:01-2:47:18)

20a. COMPUTER POOL

(1:22:22-42:02)

 

On yet another front, the DCIS computer crimes division monitors and responds to potential acts of terrorism aimed at America ’s critical cyber-infrastructure, specifically DoD computer systems and the computer systems of DoD suppliers and contractors.

     

21. POSTER OF 9/11 TERRORISTS (3:54:02-4:06:54)

 

Internationally, DCIS special agents investigate the funding of overseas terrorists through fraudulent businesses and charity organizations.

     

22. WS SOLDIERS ON FIELD (6:01:10-04:48)+ AGENTS W/WRECKAGE

(4:14:03-4:15>28)

 

The agency also conducts DoD-related investigations where U.S. military operations are in progress.

     

23. LONG GUARD AT EXPLOSION SITE (5:05:21)

24. US FLAG ON PENTAGON (4:27:17)

 

Because protecting America means...

Protecting America ’s warfighters.

     
     

25. DIP TO BLACK; FADE UP CHYRON:

DCIS AND PRODUCT SUBSTITUTION

 

INTERVIEW (V-O 5:39:40-44:06):  If you pull the trigger and the gun doesn’t shoot or, worse, the gun blows up in your face...

     

26. CUT TO BOYNE INTERVIEW (5:50:18-5:55:13)

27. MILITARY SHOTS (6:05:14-17:27)

 

(SYNC):  You’ve done the job of your enemy.  You’ve taken your combatant, your warfighter out of the picture.

NARR (V-O):  Product substitution in defense contracts is intolerable and unsafe, and remains a DCIS top priority.

     

28. UNLOADING EQUIPMENT TO BUILD GRAPHIC (6:17:18-6:28:25)

 

The agency’s investigative caseload focuses on three critical areas:

     
   

Counterfeit parts,...

Defective parts,...

And other substituted products.

     

29. CHINOOK FLYING (6:34:58-6:41:24)

 

Particular emphasis has been placed on those cases involving military readiness and safety of flight issues,...

     

30. ANIMATION SEQUENCE (7:56:22-8:07:22)

 

Cases, such as the one against Boeing, in which defective gears were knowingly placed in military helicopters...

     

31. STILLS OF CRASH (7:13:47)

 

With disastrous results.

     

32. BOYNE ON PHONE (8:43:44) + CHINOOK HOVERING (7:49:16)

 

After years of investigation by DCIS and the U. S. Army Criminal Investigation Command, the affected fleet was grounded, the gears replaced, and the government took Boeing to court.  Five years later Boeing settled.

     

33. ROBY W/AGENT (8:14:18)

 

In this case the lead came from a concerned employee.

     

34. GRAPHIC: LEADS

(8:24:34-33:56)

 

But tips can come from a number of sources, including the general public.

     

35. AGENT W/INFORMANT

(10:16:01)

 

DCIS special agents vigorously pursue such tips,...

     

36. DISSOLVE TO GRAPHIC INDICATORS (10:46:11+ 10:59:00)

 

Checking a number of telltale indicators to determine if any illegal activity has occurred.  The effort is as much deterrence as it is detection.

     

37. SOLDIERS EXIT CHOPPER (5:55:20-6:04:03)

 

Because DCIS understands that, for America ’s Warfighters, the proper equipment can mean life or death.

     

38. DIP TO BLACK; FADE UP ON CHYRON:

DCIS AND CYBER CRIMES

 

ZIEGLER (V-O 12:21:23):  The Internet is wide open...

     

39. ZIEGLER INTERVIEW (12:21:23-12:27:29)

 

(SYNC)  ...There are literally thousands of calls that come into law enforcement each day from people that are ripped off on the internet.

     

40. YTCRACKER GRAPHICS (15:01:11-14:50) DISSOLVE TO AGENT AT COMPUTER

(14:54:12)

 

NARRATOR (V-O):  When criminals hack into DoD systems - or the systems of DoD contractors or suppliers, DCIS agents take action.

     

41. PENTAGON AND HACKER HEADLINE

(16:22:50-36:21)

 

There are three basic cyber crimes that DCIS investigates:

First is computer intrusions - when someone exploits a vulnerability in the system and gains unauthorized access.

     

42. WINDOWS SOFTWARE

(12:51:48-57:06)

 

Second is the production of counterfeit computer software, including pirated software.

     

43. AGENT AT COMPUTER

(12:21:04-28:11)

 

Third, and most costly of all, is denial of service attacks in which the hacker blocks or degrades a computer system.

     

44. AGENT AT KEYBOARD

(13:54:01-14:07:00)

 

It’s a constantly evolving crime which requires specialized skills.  That’s why trained intrusion experts are assigned to every DCIS field office.

     

45. AGENT W/COMPUTER PARTS (14:07:01-16:08)

 

They often work side by side with DCIS forensic agents who are trained to properly seize, protect and analyze computer evidence. 

     

46. YTCRACKER AT COMPUTER (14:36:10-42:01)

 

Unfortunately, cyber crime seems to be how some people - especially juveniles - feel important.

     

47. YTCRACKER PHOTO PULL BACK (15:46:09-57:27

48. BUILD GRAPHIC: COMPUTER CRIMES

(16:09:00-22:06)

 

But to DCIS such cases are serious and their perpetrators need to be treated seriously.

DoD computer systems and those of its contractors and suppliers are critical.

Intrusions can threaten national security.

That’s why prosecutions should focus on deterrence as well as security.

     

49. CYBERTERRORISM ON COMPUTER (16:41:29)

 

In a world where the safety of America ’s warfighters depends on the security of its computer systems,...

     

50. CUT HACKER PROFILES PULL BACK TO AGENTS (16:56:00)

 

DCIS can deliver nothing less.

     
     

51. DIP TO BLACK; FADE UP ON CHYRON:

DCIS AND ILLEGAL TECHNOLOGY TRANSFER

 

INTERVIEW (V-O 18:15:20-25:24):  Our Inspector General has stated that the lives of America ’s warfighters could be placed in jeopardy due to the illegal transfer of military components.

     

52. INTERVIEW (18:25:25-37:00)

 

(SYNC)  I believe that sensitive technologies and weapon components and programs in the wrong hands could be used against the United States .

     

53. SHOTS OF LASER TECH AND AGENTS W/EQUIPMENT

(19:49:17-59:24)

 

NARR (V-O):  The DCIS Technology Protection Program investigates cases of illegal transfer or diversion of sensitive technologies, defense articles and munitions.

     

54. NUKE EXPLOSION, CHEMICAL WARFARE

(18:10:05-26:00)

 

It’s a critical issue in a world where terrorism fuels a growing black market for weapons of all kinds, including weapons of mass destruction.

     

55. DISSOLVE TO TANK THEFT (17:42:00)

TANKS IN STORAGE AREA (1&:48:50)

 

DCIS special agents focus on several key areas:

First is economic espionage involving the DoD procurement process.  Most of these cases involve the illegal diversion of property before it is demilitarized...

     

56. TECH SHOTS (23:30:09-47:21)

 

But DCIS also recognizes the threat to national security when sensitive DoD technical data is made available to contractors during the acquisition phase of DoD contracts.

     

57. HEADLINE RE: ILLEGAL ARMS SALES (17:56:13-18:09:58)

 

The theft or diversion of export controlled critical technologies from DoD-funded projects or foreign military sales programs is another concern.

     

58. TECH SHOTS (18:56:19-19:08:44)

 

Finally, dual use technology in which products or systems have private sector use as well as military applications remains a vulnerable area.

     

59. UC FOOTAGE (19:21:50-32:02)

 

DCIS vigorously pursues and actively investigates all leads in these areas.  A major example of such law enforcement efforts is...

     

60. SHIELD AM LOGO (19:32:22)

 

Project Shield America , an industry-outreach program conducted jointly by DCIS and the Bureau of Immigration and Customs Enforcement....

     

61. IRANIAN SHIPMENT HEADLINES, CUSTOMS INTERDICTIONS, BUSINESS MEETING (19:38:24-48:16)

 

Project Shield America yields leads which help agents detect illegal diversions of components and technology necessary to the production of weapons of mass destruction.

     

62. AGENTS CUT OPEN CHAIN (20:05:56-11:10)

63. MISSILE FIRING (20:11:17)

 

For the DCIS Technology Protection Program, the bottom line is safety - for America ...

And for America ’s warfighters.

     
     
     

64. DIP TO BLACK; FADE UP ON CHYRON:

DCIS AND FINANCIAL FRAUD

 

MCINTOSH (V-O 24:40:09-47:25):  Every crime that’s investigated by a DCIS agent involves some type of financial fraud or financial gain...

     

65. MCINTOSH INTERVIEW 24:47:25-50:05

 

(SYNC)  People commit it because they want to make money.

     

66. TRIBUNE NEWSPAPER CLIPPING (25:01:00)

 

NARR (V-O):  When contractors defraud the Department of Defense for profit, DCIS takes action.

     

67. CLIPPING + GRAPHIC (25:07-27)

 

The agency’s Financial Crimes Program investigates significant contract, accounting and financial fraud schemes.

     

68. UC FOOTAGE W/SUPER (25:16:13-38:40)

 

Agents also focus on kickback schemes - particularly since the passage of the Anti-Kickback Act of 1986 which prohibits contractors from offering items of monetary value to government employees in order to win contracts.

     

69. BUILD GRAPHIC FRAUD INDICATORS (25:39:15-56:24)

 

Certain telltale signs alert DCIS to these illegal activities.  They may occur during...

   

.  The contract solicitation phase,...

   

.  The evaluation and award phase,...

   

.  Or during contract negotiations.

   

DCIS also watches out for indications of fraud involving government credit cards,...

     

70. MAN PAYS BAR BILL W/CREDIT (25:58:14-26:04:24)

 

...Such as purchase cards and travel cards.

     

71. AGENTS TAKING OUT CARTONS OF FORMS

(27:57:18-28:04:29)

 

In addition, the agency takes a proactive approach to detecting financial fraud by conducting undercover operations.

     
     

72. PAN OF BAYSHIP HEADLINE (28:49:24-58:21)

 

The DCIS Financial Crimes Program holds contractors...

     

73. MCINTOSH W/WOMAN

(27:04:13-10:00)

 

And DoD employees fully accountable for their actions...

     

74. DIRECTING JET TO TAKE OFF (29:54:26)

 

Because America ’s warfighters must have America ’s confidence.

     
     

75. DIP TO BLACK; FADE UP ON CHYRON:

DCIS AND HEALTH CARE FRAUD

 

LITTERELLE (V-O 31:13:15-16:24):  I compare health care fraud to tax evasion...

     

76. LITTERELLE INTERVIEW 31:16:25-22:20

 

(SYNC) ...It’s the greedy one who are not reporting their income or totally fabricating their information.

     

77. LITTERELLE PICKS UP FORM FROM COPIER

(31:30:03)

 

NARR (V-O):  The DCIS Health Care Fraud Program investigates falsified claims submitted to...

     

78. DISSOLVE TO TRICARE LOGO ON FORM (30:50:16-59:10)

 

...TRICARE, the health insurance company for active or retired military and their dependents.  In most cases, the problems originate with the health care providers - ...

     

79. HANDING OVER $ TO DR. (32:03:22-14:28)

 

...The doctors and hospitals who are fraudulently billing the government and the insurance companies.  Such fraud usually involves billing for services that were either not provided, or were not covered but were disguised as being covered, or just inflating their prices.

     

80. MAN ON STRETCHER

(30:46:28-50:14)

 

One especially reprehensible scheme involves using higher paying codes when billing seriously ill patients who may be too sick to review the charges.

     

81. GRAPHIC: $ RECOVERED

(32:35:27)

 

The numbers are staggering.  In one year, DCIS recovered over 1.3 billion dollars attributed to TRICARE fraud.

     

82. GRAPHIC: BILLING INDICATORS (31:46:11)

 

To uncover these crimes, DCIS agents look for certain billing irregularieties.

     

83. LITTERELLE REVIEWING CHART

(31:51:02-32:02:26)

 

They also consider medical discrepancies, such as a diagnosis or treatment inconsistent with a patient’s age or gender, or services inappropriate to the condition.

     

84. BILLING CODES/TILT DOWN (34:24:09-34:19)

 

Health care fraud assumes patients are either too intimidated or too confused to question their bills.

     

85. AMBULANCE @EMER. ROOM (35:17:19-26:16)

 

It assumes patients don’t care if their insurance gets ripped off - as long as they don’t have to pay.

     

86. DR EXAMINING X-RAYS

(35:27:03-31:57)

 

But, in the end, everyone pays - either in higher premiums or higher taxes.

     

87. ARREST FOOTAGE

(35:59:01-36:06:04)

 

That’s why DCIS continues to vigorously search out and expose health care fraud to protect the TRICARE System, and ultimately...

     

88. CHOPPERS TAKING OFF FROM CARRIER

(36:15:23)

 

The health and well-being of the American warfighter.

     
     

89. DIP TO BLACK; FADE UP ON CHYRON:

DCIS AND ENVIRONMENTAL CRIME

 

CONCHA (V-O 36:44:28-52:00):  The Department of Defense spends a lot of money on environmental cleanups.  Every time we issue a contract to clean up a site and it’s not done right,...

     

90. CONCHA INTERVIEW (36:52:00-59:02)

 

(SYNC)  ...Not only do we have to pay again to have it done right but the damage to the environment becomes even greater.

     

91. CHOPPER BEING FUELED (SMOKE)

36:03:10-37:08:50

 

NARR (V-O):  Preparing America’s warfighters can sometimes adversely affect the environment.

     

92. REMOVING CHEMICAL TANKS (37:14:02-32:37)

 

When this happens the Department of Defense contracts with outside sources to assist in the cleanups.

     

93. SPIN UP DCIS LOGO SUPERIMPOSED OVER ABOVE

 

The DCIS Environmental Crimes Program is responsible for investigating contract fraud at any point in this process,...

     

94. BEGIN GRAPHIC: DCIS INVESTIGATES...

(37:37:06-47:56)

 

Including the removal, transport and disposal of hazardous materials from DoD installations or related sites.

     

95. SPLIT: OTHER AGENCY LOGOS (40:46:19) +

UC FOOTAGE (39:22:16)

 

Special agents work closely with the EPA, as well as other federal and state agencies, to uncover fraudulent actions.

     

96. CONCHA WALKING PAST TANKS

(38:13:01-24:36)

 

They focus on active DoD sites in an effort to uncover vulnerable areas likely to fall prey to fraud from unscrupulous contractors.

     

97. MCU CONCHA TO TANKS (41:12:04-16:34)

 

Leads often come from government inspectors, contractors even competitive companies.

     

98. PULL BACK FROM PENTA. TANKS (39:57:10-40:07:20)

 

But the goal is always the same: to hold contractors accountable for their actions. In the case of Callery Chemical it meant uncovering the illegal storage of...

     

99. CUT TO LS EXPLOSION

(40:39:04-46:10)

 

...Highly explosive and hazardous waste.

     

100. UC FOOTAGE (38:49:40-59:10)

 

With Atlas Pumping, it meant discovering that the company contracted to dispose of military waste and then dumped it elsewhere on the base.

     

101. AGENTS TRAINING IN SUITS (41:24:20-39:06)

 

The DCIS Environmental Crimes Program stands committed to investigating and deterring environmental contract fraud because

     

102. WS MILITARY EXERCISE (42:04:45-12:25)

 

The preparation of America ’s warfighters should also include...protecting America ’s environment.

     
     

103. DIP TO BLACK, FADE UP ON CHYRON:

DCIS AND MAJOR THEFT

 

ADAMS (V-O 43:18:18-29:01):  If you work a major theft case and work it the same way you would a major complex white collar crime by interviewing witnesses, reviewing paperwork,...

     

104. ADAMS INTERVIEW

(43:29:02-34:20)

 

(SYNC)  ...Using investigative tools like consensual monitoring, undercover agents, you’ll build a good solid case.

     

105. EXT. PAN OF STORED EQUIPMENT (42:45:28-52:50)

 

NARR (V-O):  Military equipment has been stored for years throughout this country - either waiting to be used or demilitarized and sold for scrap.

     

106. PAN FROM BLDG TO OLD TANK (43:00:50) +

SWING CAM THRU FENCE (43:06:19)

 

When a major theft of DoD property occurs, DCIS swings into action.

     

107. BUILD “MAJOR THEFT” GRAPHIC (43:07:00-18:01)

 

There are several criteria for what constitutes major theft:

.  Dollar amount - the costs of the stolen     property must be substantial,

.  The critical nature of what was stolen,

.  And where the crime took place.

     

108. AERIAL OF FORT MCCOY EQUIPMENT

(43:35:10-43:07)

 

Operation Breech Block was the largest theft of military equipment in DoD history and is a good example of how DCIS works such cases.

     

109. PAN OF PIATZ IN NEWS CLIPPING (43:44:20-54:10)+PAN TANKS (44:09:23-17:19)

 

Leo Anthony Piatz took vehicles which were to be used as targets on an Army tank range and planned to sell them to collectors for profit.

     

110. MCU ADAMS AT DESK THEN CUT TO OTS ADAMS HOLDING PHOTO (45:17:25-39:18)

 

Working jointly with the FBI, DCIS undercover agents gained Piatz’s confidence.  His inside evidence was enough to send him - and all those who helped him  - to jail.

     

111. PAN TANKS, PULL BACK TO LOCKED CHAIN (44:35:19)

 

The agency vigorously pursues such cases because loss of DoD property costs taxpayers money.

     

112. NIKE MISSILE SHOTS

(48:01:23-08:22)

 

More ominously, major theft of military equipment could - in the wrong hands - be used against America ’s warfighters.

     
     

113. MONTAGE OF AGENT SHOTS (SEE SCENES 32, 45, 62, 73, 83, 97, 110 + 22:33:10)

 

(FADE IN CLOSING THEME)

With such a broad and varied mission, DCIS depends on its talented, dedicated and professional workforce for excellence.

     
     
   

The agency strives for the continued development of its people and the effective use of all applicable resources.

     

114.  FLAG WAVING (5:13:23);  SUPER MOTTO UNDER:

PROTECTING AMERICA ’S WARFIGHTERS

 

For everyone at DCIS working hard to detect and deter crime within the DoD, Protecting America’s Warfighters is more than just a motto - it’s a promise.

     

115. . DISSOLVE TO HOTLINE TAG/GRAPHIC

 

(FADE MUSIC UNDER)

NARR (V-O):  If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. 

Help protect America ’s Warfighters.

     

116. DIP TO BLACK, ROLL CREDITS

 

(FADE MUSIC UP)

     

117. END CREDITS ON DCIS LOGO THEN FADE TO BLACK

 

(BRING MUSIC TO FLOURISH, THEN FADE OUT)

     

“Protecting America ’s Warfighters...
                    (sub) From Product Substitution”

VISUAL

 

AUDIO

     

1. FADE UP ON TAPE 1:53:02 (CHINOOK IN FLIGHT);SUPER UNDER:

DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS:

 

(FADE UP SFX: CHOPPER NOISE):

1A. CONT. ABOVE; SUBSTITUTE SUPER:

PROTECTING

AMERICA ’S WARFIGHTERS

 

(CONT. SFX)

     

1B. CUT TO TAPE 1:54:27 (CHINOOK FLYING AT CAMERA); KEEP TITLE; ADD CHYRON (SUBTITLE):

...FROM PRODUCT SUBSTITUTION

 

(CONT. SFX, FADE UP HIGH)

(ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS)

     

2. DIP TO BLACK; FADE UP ON STOCK FOOTAGE: (MILITARY EXERCISES)

 

[ BOYNE (V-O):.If you pull the trigger and the gun doesn’t shoot, or conversely, you pull the trigger and it blows up in your face, you put a life at stake...

     

3. DISSOLVE TO BOYNE INTERVIEW; SUPER:

KEVIN BOYNE

SPECIAL AGENT, DCIS

 

(SYNC)  That’s serious and that’s what can happen when you substitute the wrong product or provide a defective product.  It ranks, as far as protecting the American Warfighter, right up there with the anti-terrorism effort.]

     

DIP TO BLACK

   
     
     
     
     

4. FADE UP ON LS CONSUMERS IN LARGE STORE

 

(FADE UP OPENING MUSIC- FAST BEAT)

NARR (V-O):  As consumers, we depend on products to do what they’re supposed to.

     

5. CUT TO STOCK FOOTAGE (MILITARY EXERCISE)

 

This is especially critical in military conditions, where equipment failure can have deadly consequences.  For this reason, unauthorized product substitution in Defense contracts remains a DCIS top priority.

     

6. CUT TO GRAPHIC: DCIS LOGO; SUPER:

CASELOAD:

THREE  CRITICAL PRODUCT SUBSTITUTION SCHEMES

 

The agency’s investigative caseload is focused on three critical areas:

     

7. NEWS FOOTAGE TAPE 2:05:6 (COUNTERFEIT PARTS)

 

Counterfeit parts...

     

8. CUT TO TAPE 1:44:17 (DEFECTIVE GEAR)

 

Defective parts...

     

9. CUT TO TAPE 2: 6:28 (OLD GYROSCOPE)

 

And other substituted products.

     

10. CUT TO TAPE 2:6:28 (AIR PRO BLDG)

 

The goal is to deter unscrupulous contractors from engaging in these activities, and if they do...

     

11. CUT TO TAPE 2:10:26 (AIR PRO EXEC IN CUFFS)

 

To detect the crime, vigorously investigate it and prosecute the perpetrators to the full extent of the law.

     

12. CUT TO DoD TAPE 1:20 (SOLDIERS IN GRASS W/RIFLES)

 

Particular emphasis has been placed on those cases involving military readiness...

     

12A  CONTINUE ABOVE FOOTAGE AS C130 PASSES OVER THEM

 

And safety of flight issues.

     
     
     

13. CUT TO BOYNE INTERVIEW

 

[ BOYNE (SYNC):  When an inferior or defective product is placed into a critical component or subsystems, that substitution could result in catastrophic failure.

     

14. CUT TO TAPE 1:19:20 (STILLS OF CHINOOK CRASH)

 

(V-O) If the aircraft crashes, the investigation could fall into the murder category.]

NARR (V-O):  The case against Boeing illustrates how serious these situations can be.

     

15. CUT TO TAPE 1:45:45 (CHINOOK IN FLIGHT)

 

It involved the CH-47D Chinook - one of the workhorses of the military.

     

16. CUT TO TAPE 1:44:17 (DEFECTIVE GEAR)

 

It was alleged that Boeing knowingly placed defective gears in the aircraft, gears that resulted in several incidents,...

     

17. CUT TO TAPE 1: 20:24 (HELMETS OF DEAD SOLDIERS ON STAKES)

 

Including a deadly crash in Honduras that took the lives of five servicemen...

     

18. CUT TO TAPE 1:43:48 (STILLS OF CHINOOK BURNING AND DESTROYED)

 

And another in Saudi Arabia during Operation Desert Shield, in which two soldiers were injured and the helicopter  completely destroyed.

     

19. CUT TO TAPE 1:19:50 (ROBY GETTING INTO CAR)

 

The DCIS case began with information from a former quality engineer with Boeing subcontractor, Speco Corporation.

     

20. CUT TO TAPE 1:19:36 (CU VASCO GEARS)

 

It was the employee’s contention that Boeing wanted gears made from an alloy patented by the corporation.  Unfortunately those gears were defective...

     
     
     

21. CUT TO TAPE 1: 51:29 (ROBY HOLDING PEN, PULL OUT TO SHOW MICROSCOPIC CRACKS IN TEST FILM)

 

The employee went to DCIS with his suspicions. He showed them test results indicating cracks in the metal.  Follow-up tests showed the same faults.

     

22. CUT TO TAPE 1:44:57 (TOWING CHINOOK IN)

 

After years of investigation by DCIS and the U. S. Army Criminal Investigation Command, the Chinook fleet was grounded...

     

23. CUT TO TAPE 1:45:01 (TAKING GEAR OUT)

 

And its gears replaced.

     

24. CUT TO TAPE 1:48:45 (ANIMATION SHOWING WHERE GEARS ARE IN CHINOOK)

 

Backed by evidence uncovered by DCIS, the government took Boeing to court.  The prosecution alleged that the corporation had knowingly sold the U. S. Army more than 140 Chinook helicopters with defective gear.

     

25. CUT TO TAPE 1:43:28 (CBS EVENING NEWS)

 

Five years later Boeing settled...

[DAN RATHER (SYNC):  Boeing today agreed to pay more than 54 million dollars to settle lawsuits over faulty gears in U. S. Army helicopters which caused at least one deadly crash.]

     

CONTINUE ABOVE

 

Information from responsible citizens is just one way in which DCIS finds out about illegal product substitutions.

     

26. DISSOLVE TO GRAPHIC:

DCIS PRODUCT SUBSTITUTION LEADS:

. EMPLOYEES

. HOT LINE

. CONTRACTORS

 

The agency also gets leads from the general public - through the DoD Hot Line - and from contractors dissatisfied with the products supplied to them from their subcontractors.

     

27. WIPE CHYRON LEFT 1/2, ON RT ADD FOOTAGE NARAS TAPE 6:00-15 (AGENTS LUGGING OUT RECORDS), SUPER:

. DCIS-INITIATED INVESTIGATIONS)

 

In addition, DCIS takes a proactive approach to deterring fraud by conducting their own undercover operations.

     

28. CUT TO MS BOYNE GETTING CALL ON PHONE

 

Still, the majority of leads are referred from government or military quality assurance inspectors.  This was the case with Lucas Engineering...

     

29. DISSOLVE TO TAPE 1:29:38 (PAN OF PARTS)

 

Lucas Western manufactured Airframe Mounted Accessory Drives - AMADs - and Azimuth Drive Units or ADUs for the military.

     

30. CUT TO TAPE 1:33:04 (PAN JETS)

 

According to the Defense Contract Management Area Operations, faulty AMAD gear boxes in Navy F-18s were suspected in a number of life-threatening incidents.

     

31. CUT TO TAPE 1:25:22 (WOMAN NAVY REP? SPEAKING)

 

[WOMAN (SYNC):  During a combat mission in the Persian Gulf an AMAD failed, the pilot ejected and the Navy lost an F18.

     

(CONTINUE ABOVE FOOTAGE: LIST OF PROBLEMS)

 

(V-O)  In flight fires precipitated by AMAD failures caused damage to numerous aircraft.  There were over 150 emergency landings and aborted takeoffs.  This caused countless aborted missions and additional aircraft downtime.]

     

32. CUT TO TAPE 1:28:16-28:46

 

NARR (V-O):  DCIS was contacted and an investigation begun...

     

CONTINUE, TAPE 1:28:46-29:04(DCIS SA TALKING)

 

[DCIS SA (SYNC):  The investigation disclosed that Lucas had stamped inspection records as if parts had been inspected when in fact no inspections were ever conducted.  This is a process know as “hot-stamping.”  Additionally, they had certified that parts had passed inspection when Lucas knew the parts had failed.]

     

33. CUT TO TAPE 1:35:09 (MISSILES ON AIRCRAFT)

 

NARR (V-O):  The extent of these failures became evident when a joint Lucas - government teardown of both AMADs and ADUs was conducted. 

     
   

135 F-18 and multiple rocket launch gear boxes were inspected.  100% failed.

     

34. CUT TO TAPE 1:29:49 (CHYRON FAULTS)

 

Each gear contained over 6 class one non-conformances that could have led to a catastrophic failure.

     

35. CUT TO TAPE 1:33:04 (PAN OF JETS)

 

The results of the investigation were so stunning that, at one point, all F-18s were grounded.

     

36. CHYRON:

RESULTS OF PROSECUTION:

. GUILTY 37 COUNTS FALSE

   STATEMENTS

. $18.5 MILLION FINE

. $88 MILLION CIVIL DAMAGES

 

Faced with this evidence the company pled guilty to 37 counts of making false statements.  Consequently, Lucas Western was fined 18.5 million dollars and paid $88 million in civil damages to the DoD.

     

37. CUT TO TAPE 1:40:32 (PROSECUTOR TALKING) [OR CAN HAVE BOYNE SAY DURING INTERVIEW)

 

[PROSECUTOR OR BOYNE (SYNC):  Taxpayer money was recovered in this case but more significantly, life-threatening defective products were removed from the inventory of the Department of Defense, thus potentially saving lives.]

     

38. CUT TO TAPE 1:40:22 (NEWS ARTICLE RE: CASE)

 

NARR (V-O):  In this case, as in almost all product substitution cases, greed overcame ethics.  The company chose to supply inferior parts to fulfill its contract rather than pass up payment. 

     
   

Corporate officials tend to rationalize such behavior in a rather unique way...

     

39. CUT TO BOYNE INTERVIEW

 

[ BOYNE (START V-O, GO TO SYNC):  The thinking goes: these items are so over-engineered that if you have 20 bolts holding something on, it doesn’t matter if a few break because the rest will hold.]

     
    I think that’s a terrible way to think of things because it’s more likely to get someone killed than any other way.
     

40. CUT TO MS BOYNE INTERVIEWING SOMEONE (BLUR INTERVIEWEE FACE)

 

NARR (V-O):  The crime of product substitution - in whatever form it takes - is a grave offense.  That’s why DCIS vigorously investigates each and every allegation.  Agents look for a number of things:

     

41. CHYRON:

INDICATORS:

  • UNAUTHORIZED QUALITY
  • ASSURANCE  PRACTICES
  • HISTORY OF POOR
  • PERFORMANCE
  • NEGATIVE PREAWARD
  • SURVEY
  • UNUSUALLY LOW BIDS
  • FOREIGN MADE PARTS ORMATERIALS
  • MISUSE OF FAST PAY
  • CONTRACTS.
 

Unauthorized quality assurance practices, a history of poor performance by the contractor, a negative pre-award survey, unusually low bids, foreign made parts or materials, and the misuse of fast pay contracts.

     

42. CHANGE CHYRON:

INDICATORS:

  • GOV’T RELIANCE ON
  • COMPANY DOC’S
  • INSUFFICIENT QA PRACTICES
 

Sometimes the problem is obscured by improper government practices such as:

too-heavy reliance on the contractor’s documentation, or insufficient quality assurance practices.

     
     
     

43. CUT BACK TO TAPE 1: 26:18 (TABLE LADEN W/RECORDS)

 

DCIS combs through reams of evidence to identify and investigate these criminal cases.  The effort is as much deterrence as it is detection.

     

44. CUT TO BOYNE INTERVIEW

 

[ BOYNE (SYNC):  If you advertise your results and how you came to the conclusion of the investigation and prosecuted the individuals, hopefully, everyone will see that this particular crime doesn’t pay.]

     

45. STOCK FOOTAGE: MILITARY TAPE: SOLDIER W/WEAPON ( 1:30)

 

NARR (V-O):  When it comes to military service members being able to depend on their equipment...

     

46. STOCK FOOTAGE SHOWING SOLDIERS MOVING (MILITARY TAPE ( 1:35)

 

It may mean the difference between life and death.  Product substitution in defense contracts is intolerable and unsafe...

     

47. CUT TO TAPE 2:10:26 (AIR PRO OWNER IN CUFFS)

 

And DCIS will continue to investigate these cases to their just conclusion.

     

48. CUT TO MILITARY TAPE FOOTAGE PLACING MISSILE ON LAUNCHER ( 2:09)

 

(FADE IN CLOSING MUSIC UNDER)

Because protecting the American Warfighter means guaranteeing their equipment is safe...

     

49. STOCK FOOTAGE MISSILE STRIKE

 

And effective.

     

50. DISSOLVE TO HOTLINE TAG/GRAPHIC

 

(FADE MUSIC UNDER)

NARR (V-O):  If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. 

Help protect America ’s Warfighters.

     

79. DISSOLVE/ROLL CREDITS; FADE TO BLACK

 

(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT)

     

“Protecting America ’s Warfighters...
                    (sub) From Cyber Crime”

VISUAL

 

AUDIO

     

1. FADE UP ON CU REAR ENGINE OF JETFIGHTER (OR ROTOR OF CHOPPER); SUPER UNDER:

DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS:

 

(FADE UP SYNC LOUD)

     

1A. PULL BACK TO SHOW JET OR CHOPPER TAKING OFF; SUBSTITUTE SUPER:

PROTECTING

AMERICA ’S

WARFIGHTERS

 

(CONT. SYNC)

     

1B. AS JET/CHOPPER FLIES OFF FADE OUT BKGD VISUALS; KEEP TITLE; ADD CHYRON (SUBTITLE):

...FROM COMPUTER CRIME

 

(FADE OUT SYNC)

(ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS)

     

2. DIP TO BLACK; FADE UP ON ECU AGENT’S HAND USING MOUSE

 

[ZIEGLER (V-O):  The internet is wide open.

     

2A. PULL BACK, PAN TO SHOW OTS ZIEGLER WORKING AT COMPUTER

 

There are literally thousands of calls that come in to law enforcement each day from people that are ripped off on the internet.

     

3. CUT TO ZIEGLER INTERVIEW; SUPER:

PAUL ZIEGLER

(NEED TITLE: DCIS COMPUTER CRIMES PROGRAM)

 

(SYNC)  Then there are intrusions where people exploit a vulnerability to access a computer system.  Counterfeit cases - such as pirated software.  And, most costly of all, denial of service attacks...When these incidents involve the Department of Defense, DCIS computer forensic agents gets involved.]

     

4. DISSOLVE TO MS OFFICE WORKER TURNING ON COMPUTER, PULL BACK AND BOOM UP TO SHOW LARGE OFFICE W/CUBICLES

 

(FADE UP SYNC, TURNING ON COMPUTER - KEYSTROKES, MICROSOFT WINDOWS OPENING, ETC.)

NARRATOR (V-O):  Like it or not, we live in an electronic world.  Business and industry depend on it. Personal communications depend on it.

     

5. CUT/PAN ARRAY OF COMPUTER SCREENS AT DOD INSTALLATION

 

And the DoD depends on it. 

Computers have become essential to America ’s Warfighters.  Unfortunately new technology brings new risks.

     

6. CUT TO YT CRACKER DEFACEMENT ON DCMA WEB SERVER; SPIN UP DCIS

 

When criminals hack into DOD systems - or commit other computer related crimes - DCIS agents take action.

     

7. MAINTAIN SUPER; FOR BKGD CUT TO MS JIM IVES AT COMPUTER

 

Agents respond immediately to suspected intrusions involving the Defense Information Infrastructure. 

     

8. CUT TO CHYRON:

DCIS COMPUTER CRIMES PROGRAM:

  • INTRUSIONS
  • DENIAL OF SERVICE (DOS)
 

DCIS Agents also conduct investigations into other internet and computer crimes with a DOD nexus - including costly denial of service attacks against DOD contractors.

     

9. CUT TO DIAGRAM OF TYPICAL DOS ATTACK (SEE CERT.ORG)

 

In these cases, perpetrators intentionally degrade or block a computer network - in effect, bringing companies to a standstill.

     
   

DCIS responds to such contractor incidents because it’s in America ’s interests...

     

10. CUT TO ZIEGLER INTERVIEW

 

[ZIEGLER (SYNC):  If a hacker gains access to a contractor’s system, not only is that corporation victimized, the DoD is also victimized.  That’s because there may be proprietary information contained in that network which could be unlawfully accessed.]

     

11. CUT TO PIRATED COPY OF WINDOWS SOFTWARE; SUPER UNDER:

DCIS COMPUTER CRIMES PROGRAM:

  • COMPUTER-RELATED
  • OFFENSES
 

NARR (V-O):  DCIS agents investigate other computer-related crimes as well - such as counterfeit software.

     

12. PAN TILT UP TO SHOW DCIS AGENT HOLDING CD; REPLACE ABOVE BULLET W/:

PROVIDE FORENSIC EXPERTISE IN COMPUTER-FACILITATED CRIMES

 

They also provide forensic expertise to investigations where computers are used to further illegal activity.  These can range from distribution of child pornography to the production of fraudulent documents.

     

13. FADE OUT BKGD; MAINTAIN SUPER, ADD:

  • DEVELOP INTEL TO PROTECT DII
  • HELP ANALYZE, REPORT &CORRECT VULNERABILITIES IN DII
 

DCIS intrusion agents develop intelligence on trends and criminal enterprises likely to threaten the Defense Information Infrastructure.  They also assist in analyzing, reporting and correcting vulnerabilities in the system.

     

14. DISSOLVE TO HIGHLIGHTED CASE REPORT INDICATING COOPERATION W/NASA

 

Finally, DCIS coordinates with the rest of DoD and other government agencies in this technically challenging area. 

     

15. CUT TO CU IVES PEERING AT COMPUTER SCREEN

 

How challenging is it?  Case agent Jim Ives explains...

[IVES (V-O):  Vulnerabilities are constantly being discovered...]

     

16. CUT TO IVES INTERVIEW; SUPER:

JIM IVES

(NEED TITLE)

 

(SYNC)  It’s daunting to try to keep up with every patch.  In reality it’s almost impossible to do that, and hackers take advantage of that.]

     

17. CUT BACK TO IVES AT COMPUTER

 

NARR (V-O):  Such a constantly evolving crime requires specialized skills.  That’s why trained intrusion experts are assigned to every DCIS field office.

     

18. WS OF AGENT IMAGING HARD DRIVE FOR DATA RETRIEVAL; PAN DOWN AND ZOOM IN TO ECU PROCESS

 

In addition, there are DCIS agents in each field office who are trained to properly seize, protect and analyze computer evidence.  These forensic agents work closely with case agents to ensure that no evidence is lost or overlooked.

     

19. CUT TO STOCK FOOTAGE: ECU AGENT(ACTOR) IN WITNESS STAND; PULL BACK TO MS

 

The agents will testify in court as forensic computer experts.

But while the crimes may be technical and complex...

     

20. CUT TO LOGO OF YT CRACKER

 

The motivation of the perpetrators tends to be fairly simple.  Listen to the hacker calling himself YTCracker...

     

21. NEWS FOOTAGE: YTCRACKER (TAPE1:02)

 

[YTCRACKER (SYNC):

. KIDS LIKE HIM RULE THE WORLD

     
     

22. CUT BACK TO NEWS FOOTAGE: YTCRACKER AT COMPUTER

 

[SYNC UNDER]

NARR (V-O):  Cybercrime seems to be how some people - particularly juveniles - feel important. 

     

22A. CONT. NEWS FOOTAGE: SCROLLING COMPUTER TEXT

 

For YTCracker, a 17-year old dropout, this meant compromising and defacing multiple websites.

     

23. CUT TO IVES WORKING AT COMPUTER

 

He came to the attention of DCIS when he illegally accessed a Defense Contract Management Agency web server.

     

24. CUT TO CU YTCRACKER’S GRAPHICS/TEXT (SCROLL DOWN)

 

Once inside, he replaced DCMA information with text and graphics in which he bragged about his exploits.  The pattern was repeated on over 40 web sites - including servers maintained by NASA, the National Aeronautics and Space Administration.

     

25. CUT TO GRAPHIC SCREEN; ADD LOGOS (DCIS, FBI, NASA)

 

Investigators quickly took action.  Agents from DCIS, NASA as well as the FBI began to close in on the juvenile.

     

26. MAINTAIN ABOVE; FADE IN US MAP IN BKGD W/COLORADO HIGHLIGHTED

 

Meanwhile, police in Colorado Springs were conducting their own investigation.  They were tracking down an individual who had hacked into local school records.

     

27. CUT TO PIC OF YTCRACKER **Do not use photo!

 

The minor responsible for the defacements was soon identified and agents began to build their case.

   

YTCracker knew they were on to him...

     

28. CUT TO NEWS FOOTAGE; YTCRACKER TALKING

 

YTCRACKER (SYNC):

. REMARK RE: AMT OF INFO ON HIM

     
     
     
     
     
     

29. FREEZE FRAME ON YTCRACKER; SUPER IN RED: GUILTY

 

NARR (V-O):  The 17-year old suspect eventually confessed to one count of computer crime under Colorado law.  He was placed on 2 years probation and fined $24,000.  It was, in many ways, a typical case.

     

30. CUT TO YTCRACKER LOGO/TEXT

 

YTCracker’s crimes were not malicious.  No sensitive or classified materials were compromised.

     

31. GRAPHIC SHOWING COSTS FOR ANALYZING SITE FOR SECURITY BREACHES, REPAIRING SITE, TIME OFFLINE

 

But the defacements were costly.  Consider the time it took for each site to check the security of its information, repair the damage and get back on-line. 

     

32. CUT TO IVES INTERVIEW (MOS)

 

The youthfulness of these perpetrators and the relatively trivial motive for the attacks may mask their importance.  But to DCIS, cases like these are serious. 

     

ADD SOUND TO ABOVE

 

[IVES (SYNC): 

.  NEED TO TREAT PERPS MORE

   SERIOUSLY

.  SYSTEMS CAN BE CRITICAL

.  INTRUSIONS CAN THREATEN

   NATIONAL SECURITY

.  PROSECUTE FOR DETERRENCE

   AS MUCH AS SECURITY]

     

33A1. CUT TO NEWS ARTICLE RE: CORPORATE RAIDER CASE (IF AVAILABLE, IF NOT USE PRINCETON CASE)

 

NARR (V-O): The sobering fact is not all computer intrusions are youthful joyrides through the electronic world.  Typically, so-called corporate raiders are often typically company employees who break into a competitor’s network for financial gain.

     

33A2. DVE: FLIP AS IF MICROFICHE, NEW ARTICLE ON VIRUS ATTACK

 

And, worldwide, terrorists have already attacked key business systems through the internet.

     
     
     

33B. DVE (SAME AS ABOVE), 2ND ARTICLE ON VIRUSES

 

Indeed, all types of computer crime are on the rise.  And these increasing numbers are stretching thin the limited number of qualified investigators.

     
   

What’s more, system intrusions and other computer attacks tend to present their own peculiar investigative challenges.

     

34. CUT TO CU MONITOR W/HACKER CHAT ROOM SHOWING

 

For example, hackers often socialize with each other online, forming groups to share information. These can range from the benign...

     

35. CUT TO ANGRY HACKER WEB SITE (E.G., S.O.N.)

 

To the predatory.

     

365a. PULL BACK TO SHOW IVES AT COMPUTER

 

For investigators, breaking into these groups can be difficult...

     

376. CUT TO IVES INTERVIEW

 

[IVES (SYNC):  It’s a very close knit group with their own set of rules.  For example, they use their own language in their chat rooms which is a real problem for law enforcement.  You have to break their code so to speak.]

     

38. CUT TO ARTICLE IN ABOVE WEB SITE INDICATING NEW VULNERABILITY OR HACKING TECHNIQUE

 

NARR (V-O):  It also means keeping up with the latest trends in cybercrime.  Hackers frequently publicize newly found vulnerabilities in software or systems.  Or they may share intrusion techniques. One such technique, called dumpster diving, involves individuals searching for access codes.

     

39. CUT TO WEB SITE PROVIDING PASSWORD SNIFFER PROGRAM

 

Some even provide software which allows users to pinpoint passwords that can be used to illegally access computer networks.  Then there’s the sheer length of time it takes to work a computer crime.

     
     

40. CUT TO COMPUTER LOGS, SCROLL DOWN

 

Investigations often take months, even years, to track down the identities of cybercriminals.  It can be particularly frustrating to companies and organizations that fall victim to these attacks.

[IVES (V-O):  Depending on the sophistication of the hacker,...

     

41. CUT TO IVES INTERVIEW

 

(SYNC)  ...He can take you overseas and you’ll have to work with foreign law enforcement entities and court systems, some of whom may not have reciprocal agreements with the United States . 

     

41A. NU ANGLE IVES INTERVIEW

 

DCIS advises - be patient, but try to understand the fact that there are so many hurdles in these kinds of investigations, it can be exceedingly lengthy.]

     

42. DISSOLVE TO EXT. WS OF LARGE DoD CONTRACTOR HQ

 

NARR (V-O):  So what should DoD contractors and employees do when faced with a cyber incident?

     
   

[ZIEGLER (V-O):  Most people don’t realize how vulnerable they are.  They don’t expect to be attacked.>

     

43. DISSOLVE TO ZIEGLER INTERVIEW

 

ZIEGLER (V-O) Most people don’t realize how vulnerable: they are. They don’t expect to be attacked. (SYNC) DCIS recommends that procedures and guidelines be developed to react to an incident - whether its an internal threat or one via the internet. Then , oncean unauthorized access to their system has been identified, and they’ve taken steps to safeguard their information, contact DCIS to investigate.]

     

44. CUT TO SHOW OF ZIEGLER, IVES AND OLMSTEAD MEETING AT COMPUTER STATION

 

NARR (V-O):  DCIS can and will provide a prompt and effective response to all computer crimes that involve the DoD.

     

45. DISSOLVE TO WS OF AIR TRAFFIC MONITORS

 

(FADE IN CLOSING MUSIC)

In an electronic environment...

     

46. SHOT OF JETFIGHTER TAKING OFF

 

- Where the strength and safety of America ’s warfighters depend on the security of its computer systems -

     

47. CUT TO LO ANGLE FACE OF CONTROLLER AT COMPUTER

 

Nothing less is to be expected.

     

48. CUT BACK TO SHOT OF ZIEGLER ET AL, ZOOM IN TO DCIS LOGO OR OTHER ID IN ROOM

 

And nothing less is delivered.

(FADE CLOSING MUSIC UP)

     

49. DISSOLVE TO HOTLINE TAG/GRAPHIC

 

(FADE MUSIC UNDER)

NARR (V-O):  If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. 

Help protect America ’s Warfighters.

     

50. DISSOLVE TO CREDITS

 

(FADE MUSIC UP FULL)

     

51. END CREDITS ON LOGO, FADE TO BLACK

 

(BRING MUSIC TO FLOURISH THEN FADE OUT)

     

“Protecting America ’s Warfighters...
                    (sub) “From Illegal Technology Transfer”

VISUAL

 

AUDIO

     

1. FADE UP CU SHOTS OF SENSITIVE TECHNOLOGY (DCIS TAPE 10:18-22):

DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS:

 

(FADE UP ACCOMPANYING SOUND)

     

1A. QUICK CUT TO MS LAB WORKER (DCIS TAPE 2:15-19)

SUBSTITUTE SUPER:

PROTECTING

AMERICA ’S

WARFIGHTERS

 

(CONT. ABOVE

     

1B. CUT TO CASUALTY (DCIS TAPE 0:018); KEEP TITLE; ADD CHYRON (SUBTITLE):

...FROM ILLEGAL TECHNOLOGY TRANSFER

 

(CONTINUE SOUND FROM 9/11)

(ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS, FADE TO SILENCE)

     

2. DIP TO BLACK; FADE UP ON AERIAL OF PENTAGON DAMAGE (STOCK)

 

[WILLIAMS (V-O):  Our Inspector General has stated that the lives of America ’s warfighters can be placed at direct risk through the illegal transfer of military components.  I believe this.]

     

3. MCU WILLIAMS INTERVIEW

 

(SYNC)  I believe that sensitive technologies and weapons components and programs - in the wrong hands - can be used against the United States , to harm American lives.

     
     
     

4. DIP TO BLACK FADE UP ON MIDEAST VIOLENCE (STOCK FOOTAGE)

 

(FADE UP SOMBER OPENING MUSIC TRACK UNDER)

NARRATOR (V-O):  Terrorism is no longer a regional issue.  One look at a newscast will tell you that.

     

5. RICIN ATTACK FOOTAGE (DCIS VIDEO 1:10-18)

 

Worldwide, terrorist attacks have increased alarmingly...and, with it, has grown a black market for weapons of all kinds, including weapons of mass destruction. (FADE MUSIC OUT)

     

6. CUT TO MASKED LAB WORKERS (DCIS VIDEO 4:20-30); DVE: SPIN  UP TO CENTER DCIS LOGO

 

Keeping the technology necessary to create those weapons of mass destruction, as well as other weapon systems and components, out of the hands of terrorists is the mission of the DCIS Technology Protection Program.

     

7. WS SEAPORT/ LOADING FREIGHT (DCIS VIDEO 8:39-46); SUPER UNDER:

DCIS TECHNOLOGY PROTECTION PROGRAM INVESTIGATES:

. ILLEGAL TRANSFER/ DIVERSION OF SENSITIVE TECHNOLOGY, DEFENSE ARTICLES/MUNITIONS

 

Specifically, DCIS investigates cases of illegal transfer or diversion of sensitive technologies, defense articles and munitions. 

     

8. CUT TO FOOTAGE OF WEAPON LAUNCHERS (FOOTAGE FROM DVD MAJOR THEFT SEGMENT); SUPER:

. ECONOMIC ESPIONAGE RE: DOD PROCUREMENT PROCESS

 

Agents also work cases involving economic espionage involving the Department of Defense procurement process.  The majority of these investigations focus on illegal diversions of property before it is “demilitarized.”

     

9. CUT TO HEADLINE RE: NORMON FOX STEALING DATA (WA POST 11/16/94)

 

Other cases involve theft or diversions of export controlled critical technologies from DOD funded projects or foreign military sales programs.  Since 9/11 this threat has become increasingly real...

     
     
     

10. MCU WILLIAMS INTERVIEW

 

(SYNC)  WILLIAMS:  The events of September 11th opened America ’s eyes.

     

11. CUTAWAY TO UC FOOTAGE OF DEAL GOING DOWN (SHIELD AM VIDEO 7:45-8:06, 8:30-37)

 

(V-O)  We now recognize that biological or chemical agents, the stuff that goes into weapons of mass destruction, can easily be diverted from government funded R&D projects by insiders who have access to the technology.  These people then turn around and sell this technology to the highest bidder.

     

12. CUT BACK TO MCU WILLIAMS

 

(SYNC) It’s our job to make sure that this doesn’t happen, or if it does, to detect the problem and interdict the criminals.

     

13. DISSOLVE TO SHIELD AMERICA LOGO

 

NARR (V-O):  A major example of such law enforcement efforts is Project Shield America .

     

14. CUT TO CUSTOMS INSPECTORS (SHIELD AM VIDEO 1:28-38)

 

Conducted jointly by DCIS and the Bureau of Immigration and Customs Enforcement,...

     

15. CUT TO BUS ADMIN MTG (DCIS VIDEO 7:29-42)

 

This industry outreach program identifies and investigates leads involving...

     

16. CUT TO LASER FOOTAGE (DCIS VIDEO (3:08-15)

 

Weapons of mass destruction components and technology.

     

17. INSPECTORS X-RAYING BOXES, FREIGHT (SHIELD AM VIDEO 13:18-29)

 

It also helps agents detect illegal diversions of export-controlled munitions and defense related technologies.  As such it is one of the primary national law enforcement initiatives for Homeland Security.

     

18. CUT TO BUST FOOTAGE/CUTTING LOCK (SHIELD AM VIDEO 7:23-34)

 

The threat is very real.  Since Project Shield America became operational, authorities have disrupted a number of illegal arms and technology transfers, including...

     
     

19. BUILD 4-WAY (STOCK FOOTAGE OF RADAR DISHES, AK47s, AIRCRAFT ENGINE, SATELLITE)

 

Attempts to send howitzers, radar and unmanned aerial “drone” parts to Pakistan , assault weapons bound for Columbia, military aircraft and engines to Libya and satellite technology to China .

     

20. CUT TO AP HEADLINE RE: IRAN ARMS CASE 7/10/03

 

One such case involved a company called Multicore, a London based front, which supplied military items to Iran

     

21. CUT TO AERIAL WAREHOUSE (DCIS VIDEO 3:00-06), CUT TO SEAPORT LOADING FREIGHT (8:39-46)

 

Its California facility had obtained and was illegally exporting military technology, including spare parts for fighter jets and missile systems.

     

22. USE DCIS POWER POINT GRAPH SHOWING MULTICORE OPERATION (HIGHLIGHT SEGMENTS AS MENTIONED)

 

Typical of these kinds of operations, the set-up involved transshipments through a freight forwarder.  The payments were placed initially in a foreign bank account before finding its way to suppliers in the United States .

     

23. CUT TO WILLIAMS INTERVIEW

 

WILLIAMS (SYNC):  This was a classic case.  According to authorities, Multicore conducted no legitimate business and was receiving military purchasing instructions directly from Iran .

The evidence seems to support that conclusion.  In fact, some of the parts found in the raid on the Bakersfield facility were for the F-14 Tomcat aircraft.

     

24. STOCK FOOTAGE OF F-14s

 

(V-O)  Interestingly, the F-14 is flown by only two military services in the world: the U.S. Navy and the Iranian Air Force.

     

24A. CONT. ABOVE; DISSOLVE TO AERIAL OF OFFICE PARK (DCIS VIDEO 5:57-6:00)

 

NARR (V-O):  Multicore was shut down but not before its offices yielded leads to a number of other U. S. companies engaged in possible illegal transfers of military components.

     
     
     

CONTINUE ABOVE

 

Spin-off cases are often generated by ongoing DCIS investigations.

     

25. DVE: PULL UP CIA AND DOD LOGOS

 

An emerging source of potential leads is coming from the Intelligence community and DoD counterintelligence.

     

26. DISSOLVE TO CUSTOMS OFFICER REVIEWING SHIPPING LISTS (SHIELD AM VIDEO 9:40-50)

 

The bulk of technology protection cases, however, derive from DoD contractors and vendors as a direct result of Shield America .

     

27. CUT TO CUSTOMS OFFICER W/BUSINESS PERSON (SHIELD AM VIDEO 11:07-12)

 

The Project not only enhances public awareness, it also provides for private sector input regarding suspicious transactions.

     

28. CUT TO OTHER SHOT OF AGENTS W/BUSINESS PERSON (3:13-21)

 

It is this sharing of information - between industry and law enforcement and also between intelligence agencies and law enforcement - that is the critical element in the development of Technology Protection cases.

     

29. GRAPHIC: SCROLL VARIOUS SIZED LOGOS OF DoD CONTRACTORS ACROSS SCREEN

 

It is also one of the challenges associated with these kinds of investigations.  Getting industry sources to open up and cooperate is a special skill refined by DCIS agents.

     

30. AIRPORT AERIAL (SHIELD AM VIDEO 5:40-50)

 

Another important skill and challenge involves tracing evidence on both a National and International Level.

     

31. CUT TO AIRBORNE JET TAXIING (9:24-32)

 

Agents need a thorough knowledge of export control laws and regulations.  They also need a practical understanding of the pros and cons of utilizing various evidence collection and presentation techniques to bolster subsequent prosecution.

     

32. CUT TO B-ROLL: WILLIAMS REVIEWING EXPORT LICENSE REPS OR CUSTOMS DECLARATIONS

 

(V-O)  WILLIAMS:  A DCIS agent who works Technology Protection cases has to know how to develop parallel investigations that may involve classified leads from Intelligence sources. A “parallel investigation” is defined as taking the classified lead and developing the same, or similar lead information from parallel “open” sources, i.e. publicly available journal articles, review of Customs declarations, review of export license representations. In other words, they need to know how to use unclassified Government or publicly available information to further develop the leads information without attribution to the classified information.

     

33. CUT BACK TO CU WILLIAMS INTERVIEW

 

(SYNC) But probably the greatest challenge for the criminal investigator in this environment is recognizing when to utilize criminal sanctions in convicting a perpetrator and when to use alternative resolution.  For example, it may be necessary to interdict shipment of a weapon of mass destruction to foil a terrorist plot even though that action could ultimately jeopardize prosecution in a U. S. court.

     

34. DIP TO BLACK; FADE UP ON STOCK NEWS FOOTAGE OF MIDEAST

 

(FADE IN CLOSING MUSIC)

NARR (V-O):  The changing international scene has made obtaining the materials needed to make a weapon of mass destruction easier than ever.

     

35. CUT TO WS CROWDED PORT (DCIS VIDEO 6:08-23)

 

Despite tough export laws, enforcement faces daunting challenges.

     

36. CUT TO LASER SHOTS (DCIS VIDEO 3:30-38)

 

Dual use technology - that which has private sector use as well as military applications - remains a vulnerable area.

     

37. CUT TO UC/STING FOOTAGE (SHIELD AM VIDEO 8:54-9:16)

 

Economic espionage, diversion of controlled critical technology by industry insiders, outright theft - all of these activities pose a threat to national security. The DCIS has recognized the threat to sensitive Department of Defense technical data that is available in to contractors in the acquisition process, especially with regard to research and development contracts. The DCIS has and will continue to pursue thefts of Defense related proprietary information and trade secrets in concert with other Federal law enforcement agencies, i.e. FBI, and BICE.  DCIS agents are committed to preventing and disrupting any illegal transfers or diversions of sensitive technologies, defense articles and munitions. 

     

38. CUT TO MS WILLIAM WALKING IN PORT AREA (B-ROLL)

 

For the Technology Protection Program the bottom line is safety - the safety of our country, the safety of the American people and the safety...

     

39. CUT TO STOCK FOOTAGE FIGHTER TAKING OFF

 

Of the American Warfighter. (FADE MUSIC UP/SYNC ENGINE)

     
     

40. DISSOLVE TO HOTLINE TAG/GRAPHIC

 

(FADE MUSIC UNDER)

NARR (V-O):  If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. 

Help protect America ’s Warfighters.

     
     

41. DISSOLVE/ROLL CREDITS; FADE TO BLACK

 

(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT)

     

“Protecting America ’s Warfighters...
                    (sub) From Financial Crime”

VISUAL

 

AUDIO

     

1. FADE UP ON DCIS SPOOL FOOTAGE 6:45 (LINE OF C130s TAXIING); SUPER UNDER:

DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS:

 

(FADE SYNC FROM TAPE UP - SEE LEFT)

     

1A. CONTINUE ABOVE SUBSTITUTE SUPER:

PROTECTING

AMERICA ’S

WARFIGHTERS

   
     

1B.CUT TO ECU FINGERS USING ADDING MACHINE; ADD CHYRON (SUBTITLE):

...FROM FINANCIAL CRIME

 

(FADE IN SFX: FINGER TAPS ON ADDING MACHINE)

(ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS)

     

2. DIP TO BLACK; FADE UP ON MCINTOSH INTERVIEW; SUPER:

T.C. McINTOSH

(NEED TITLE

 

[MCINTOSH (SYNC):  Every crime investigated by a DCIS agent has some type of financial angle to it.  It’s fraudand people commit fraud for financial gain.]

     

3. DIP TO BLACK; FADE UP ON CNBC FOOTAGE WALL STREET/MARKET CLOSING

 

(FADE UP FOOTAGE OF WALL STREET/MARKET CLOSING)

NARRATOR (V-O):  Some historians contend that America was built on business...

     
     
     

4. DCIS SPOOL FOOTAGE

(JET MID AIR FUELING)

 

Certainly, it takes a robust and ethical economy to support America ’s Warfighters.

     

5. ECU PAN OF “TAP” HEADLINE

 

When contractors defraud the Department of Defense for profit, that’s when DCIS gets involved.

     

6. DISSOLVE TO CHYRON:

DCIS FINANCIAL CRIMES PROGRAM:

  • DEFECTIVE PRICING
  • COST MISCHARGING
  • OTHER CONTRACT ACC’TING FRAUD
 

Specifically, the agency’s financial crimes program investigates significant contract, accounting, and financial fraud schemes.

     

7. CUT TO TAPE 1:03:45 (MAN TAKING CASH)

 

(SYNC VIDEO FOOTAGE UNDER)

Agents also focus on kickback schemes - particularly since the passage of the Anti-Kickback Act of 1986. 

     

7A. CONTINUE ABOVE, ADD SUPER:

ANTI-KICKBACK ACT OF 1986

 

This legislation - which prohibits contractors from offering items of monetary value to government employees in order to win contracts - has resulted in a dramatic increase in cases under investigation.

     

8. CUT TO OTS EMPLOYEE HANDING CLERK TRAVEL CARD

 

Another area of concern is the misuse of government credits cards - such as purchase cards and travel cards. In this respect, at least, DCIS takes on the role of monitor...

     

9. DISSOLVE BACK TO McINTOSH INTERVIEW

 

[McINTOSH (SYNC): DCIS has the authority to look at any external sources that affect the Department, such as misconduct by a contractor or any other entity or person that would perpetrate fraud against the DoD.]

     
     
     

10. CUT TO McINTOSH READING WALL ST. JOURNAL

 

NARR (V-O):  In many cases it’s all about finding the lie...

     
   

[McINTOSH (V-O):  A lot of cases start with an allegation, something’s not quite right.

     

11. CUT BACK TO INTERVIEW

 

(SYNC) What it all boils down to, in the tons of paperwork, you have to find that one false statement. Determine how it was presented to the government and its impact, and then show who knew it wasfalse. That’s basically what a DCIS agent doe’s.]

     

12. CUT TO STOCK FOOTAGE INTERIOR OF LARGE CORPORATION (OFFICES)

 

NARR (V-O):  When it comes to financial crimes, uncovering deceit is often easier than identifying who did it.  Corporations are ideal environments for blurring personal responsiblity

     

13. GRAPHIC: SCALES OF JUSTICE; SUPER:

CRIMINAL INTENT = KNOWINGLY AND WILLFULLY COMMITTING CRIME

 

Yet the law requires that an individual knowingly and willfully committed fraud...and that’s not easy.

     
   

[McINTOSH (V-O): The hardest part of an investigation financial fraud scheme is, to show criminal intent. It’s often referred to as the “it was a business decision” defense.

     

14. CUT BACK TO McINTOSH INTERVIEW

 

(SYNC)  Especially in large corporations, company officials may claim that they didn’t personally gain in a financial way, they were only trying to boost the company’s bottom line or raise earning for the stockholders.]

     

15. CUT TO McINTOSH INTERVIEWING INDIVIDUAL (SEEN FROM REAR)

 

NARR (V-O):  To make the case, agents must delve into a suspect’s motives.  Find out about their backgrounds.  Gather evidence.

     

16. GRAPHIC: FOLLOWING A PAPER TRAIL

 

In a financial investigation that generally means following the paper trail.  But there are other forms of evidence that DCIS agents acquire to build their case.

     
     

17. CHYRON:

HARD EVIDENCE:

·          1ST HAND TESTIMONY

·          DIRECT CONDUCT

·        CONSENSUAL MONITORING

 

Hard evidence - such as first hand testimony, admissions made by suspects to undercover agents and cooperating witnesses – are difficult to dispute.

     

18. ADD TO ABOVE

VS.    DOCUMENTARY

          EVIDENCE

 

Documentary evidence, on the other hand, can be interpreted differently by defense lawyers. 

     

19.  CUT: McINTOSH INTERVIEWING WITNESS (SEE #18)

 

(SFX: CLOCK TICKING)

Timing, however, may be the most important aspect of an investigation...

     

20. CUT TO McINTOSH INTERVIEW

 

[McINTOSH (SYNC):Agents try to acquire as much information beforeserving subpoenas or executing search warrants. In other words, agents will have all of their ducks in a row beforeacting.]

     

21. ECU SCROLL: BAY SHIP CASE HEADLINE

 

NARR (V-O):  This was certainly true in the case involving Bayship Management.

     

22. CUT TO NCIS LOGO

 

Allegations made to the Naval Criminal Investigation Service concerning contract fraud on naval repairs set the ball in motion.

     

ADD DCIS AND FBI LOGOS TO ABOVE

 

DCIS and the FBI soon joined the investigation which included an elaborate undercover operation.

     

23. CUT TO SHOT OF SAWGRASS SIGN

 

Coastal Marine Engineering Group was a shell company set up by the FBI in Ponte Vedra Beach, Florida.

     

24. DISSOLVE: BLDG PIC (NEWSPAPER)

 

It soon expanded to offices in New Orleans, Houston, Norfolk and San Francisco.

     

24A. WIPE BLDG PIC LEFT; ADD CHYRON RIGHT:

COASTAL MARINE ENGINEERING:

PROBE ALLEGATIONS OF FRAUD, KICKBACKS, FALSE CLAIMS

 

Its purpose: to probe allegations of fraud, kickbacks and false claims by companies managing the government’s merchant marine vessels.  The operation lasted four years.

     

25. CUT TO WS OF SHIPYARDS

 

Bidding on subcontracts to Bayship Management, agents uncovered bid-rigging, inflated contracts, bribes and kickbacks.

     

26. DVE: STACK HEADLINES ON CASE

 

As a result, multiple indictments were handed down to managers of several companies.

     

27. DISSOLVE BACK TO MS McINTOSH WORKING IN OFFICE

 

Lengthy investigations are not uncommon when it comes to financial crimes.  Most times, agents prove the allegations within the first six to eight months.  But when the case goes to prosecution, it can drag on for years...

     
   

[McINTOSH (V-O): The investigation continues when litigation starts.  An agent can spend years building additional evidence to support what they found or going back to clarify what they found previously.

     

28. CUT TO McINTOSH INTERVIEW

 

(SYNC):  The most important thing an agent working financial crimes can bring to the table is a basic understanding of accounting, a basic understanding of business and an understanding of human nature - that if there’s an opportunity in the process for someone to circumvent the system for profit, nine times out of ten it’s human nature to do that, especially in the business world.]

     

29. CUT TO HEADLINE RE: TAP/ABBOTT MULTIMILLION DOLLAR SETTLEMENT

 

NARR (V-O):  The DCIS Financial Crimes Program has been racking up significant numbers when it comes to indictments, convictions and recoveries. 

     

30. ECU PHONE RINGS PULL BACK TO SHOW McINTOSH PICKING UP

 

Working off leads from employees, competitive contractors, Hot Line tips and other government agencies, agents are able to effectively investigate even the most complex of cases.  DCIS even self-initates cases based on clear indicators of financial fraud.

     

31. CUT BACK TO INTERVIEW

 

McINTOSH (SYNC): Agent initiative has made DCIS successful.

     

31A. CUTAWAY TO MCU OTS MCINTOSH READING ARTICLES

 

(V-O) Indicators, such as a news article about cost overruns on a particular major contract...Or other publicly available information, combined withinformation from an employee or competitor, may provide the impetus for looking at the issue.

     
   

NARR (V-O):  There are certain telltale signs that that DCIS watches out for.  These include...

     

32. CUT TO CHYRON:

FINANCIAL FRAUD INDICATORS:

·          SOLICITATION PHASE:

      Exclud’g qualified contractors

      Limit’g submission time

      Reveal’g info

      Insufficient # of bidders

     Allow’g a bid change

 

Illegal activities during the contract solicitation phase,...

     

32A. CHANGE CHYRON:

FINANCIAL FRAUD INDICATORS:

·          EVAL & AWARD PHASE:

       Discard/lose bid of outsiders

       Improper disqualifications

      Unauthorized release of info

      Favoritism

       Substantive changes post

        acceptance

 

The evaluation and award phase,...

     
     
     
     

32B. CHANGE CHYRON:

FINANCIAL FRAUD INDICATORS:

·        CONTRACT NEGOTIATIONS:

      Backdated justifications

       False cost/pricing data

       Inadequate evaluation of

       contractor’s present responsibility

 

During contract negotiations,...

     

32C. CHANGE CHYRON:

FINANCIAL FRAUD INDICATORS:

·        RE: GOV’T CREDIT CARDS:

       Unauthorized/illegal purchases

       No documentation

       Usually @ cost/mo./yr limits

       Use of card by others    

 

And indications of fraud involving government credit cards.

     

33.  CUT TO DCIS SPOOL FOOTAGE 55:00 (CHINOOK LANDING ON CARRIER)

 

(FADE UP CLOSING MUSIC)

DCIS takes all these indicators seriously because it knows that financial integrity is critical to a healthy national defense.

     

34. CUT TO SHOT OF BIG DOD CONTRACTOR (NEARBY CORP.)

 

Its Financial Crimes Program holds contractors...

     

35. CUT TO HI ANGLE WSHOT EMPLOYEES AT DESKS

 

As well as DoD employees fully accountable for their actions...

     

36. DISSOLVE TO DCIS SPOOL FOOTAGE 55:30 (CARRIER PERSONNEL AS CHINOOK TAKES OFF)

 

So that America ’s Warfighters have America ’s confidence.  (FADE MUSIC UP)

     

50. FADE UP TO HOTLINE TAG/GRAPHIC

 

(FADE MUSIC UNDER)

NARR (V-O):  If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. 

Help protect America ’s Warfighters.

     

51. . DISSOLVE/ROLL CREDITS; FADE TO BLACK

 

(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT)

     

“Protecting America ’s Warfighters...
                    (sub) From Health Care Fraud”

VISUAL

 

AUDIO

     

1. FADE UP ON FLETC STOCK FOOTAGE: ECU EMERGENCY LIGHTS; SUPER UNDER:

DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS:

 

(FADE UP SFX: AMBULANCE SIREN)

     

1A. CUT TO SHOT OF AMBULANCE RUSHING PAST (FLETC STOCK); SUBSTITUTE SUPER:

PROTECTING

AMERICA ’S WARFIGHTERS

 

(CONT. SFX; ADD AMBIENT SOUND)

     

1B. CUT TO DCIS TAPE 2:13:40 (DR. TAKING $); KEEP TITLE; ADD CHYRON (SUBTITLE):

...FROM HEALTH CARE FRAUD

 

(FADE OUT SFX)

(ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS)

     

DIP TO BLACK

   

2. FADE UP ON HI ANGLE CU PERSON FILLING OUT TRICARE INSURANCE FORM

 

[LITTERELLE (V-O):  I compare it to the tax system.  It’s the greedy ones, the ones not reporting their income or totally fabricating information that get investigated.

     

3. CUT TO LITTERELLE INTERVIEW: SUPER:

MIKE LITTERELLE,

DCIS SPECIAL AGENT

 

(SYNC)  It’s the same thing in this field.  It’s the health care provider whose entire system is set up as a scam that we’re investigating - the ones who are trying to make as much money as possible, as quickly as possible.]

     

4. CUT TO FLETC STOCK FOOTAGE: DR. TREATING PATIENT

 

NARR (V-O):  For most Americans health care is a top priority...and health insurance is a necessity.

     

5. CUT TO ECU TRICARE CARD

 

For those Americans who are active or retired military as well as their dependents, TRICARE is that insurance.,

     

5A. PULL BACK WS TO SHOW DR./CLINIC STAFFER PLACING CARD ON XEROX MACHINE FOR RECORDS

 

Covered claims for medical services and prescription coverage are submitted, in many cases, by civilian providers.

     

6. DISSOLVE TO LITTERELLE WORKING W/STACK OF FILES ON DESK

 

When those claims are falsified, the DCIS Health Care Fraud program steps in...

     

7. CUT BACK TO LITTERELLE INTERVIEW

 

[LITTERELLE (SYNC):  When you think of health care fraud, you usually think of health care providers - a doctor or a health care facility - billing the insurance or the government for services that were either not rendered or that were rendered but are not covered and they try to disguise that fact, or they’re inflating the price of the services they’re providing.

Those are the bulk of our cases.

     

8. CUT BACK TO LITTERELLE IN OFFICE

 

NARR (V-O):  In recent years, fraudulent claims have increased...and, consequently, so have the number of DCIS investigations.

     

9. GRAPHIC SHOWING DCIS HCF CASES (PERCENTAGES AND #’S)

 

Currently over a quarter of the agency’s cases involve health care fraud.  That’s nearly 400 active investigations.  What’s even more remarkable is their success.

     

1O. ADD CASH AMOUNT TO ABOVE

 

In one year, DCIS recovered over 1.3 billion dollars attributed to TRICARE fraud.

     
     

1OA. KEEP DCIS CASH AMOUNT RECOVERIES; ADD FIGURES SHOWING TOTAL FEDERAL HCF RECOVERIES

 

That’s only a fraction of the total amount of money recovered from federal investigations of health care fraud.

     

11. ADD TO ABOVE LOGOS FROM DCIS, FBI, HHS

 

In fact, DCIS works hand in hand with other federal agencies - as well as Health and Human Services and state investigators - to expose health care fraud schemes.

     

12. CUT TO OTS WOMAN LOOKING AT INSURANCE BILL; PULL BACK TO WS AS SHE PICKS UP PHONE

 

In this work, they are oftentimes helped by normal citizens.  Nearly a third of the DCIS cases come from tips received from whistle blowers. 

     

13. DISSOLVE TO GRAPHIC: CONSULTANTS IN NUTRITION SERVICE, INCORPORATED

 

But DCIS also initiates cases based on outside information.

Consultants in Nutrition Service -or CNS - was a weight loss clinic which falsified information in order to obtain reimbursement for its services.

     

14. LS OVERWEIGHT INDIVIDUALS WALKING DOWN SIDEWALK

 

Like most health plans, TRICARE covers weight loss programs only in cases of extreme obesity.

     

15. CUT TO ECU OLD CHAMPUS CLAIM FORM INDICATING CHOLESTEROL PROBLEM

 

CNS would routinely lie about the clients’ conditions, indicating on insurance forms that patients had serious health problems that required their services.  Here’s how they explained it to a DCIS undercover agent posing as a triathlete with no health problems.  Remember TRICARE was formerly called CHAMPUS...

     

16. DISSOLVE TO STILL: WOMAN IN LAB COAT TALKING W/ATHLETIC MAN IN OFFICE;

SUPER:

“...The problem, my concern, is that CHAMPUS will only cover our work with you if you have a medical reason to be here”

 

(AUDIO ONLY

[NC:  We’re not going to do anything to jeopardize your health.  Basically you’re in good health. 

The problem, my concern, is that CHAMPUS will only cover our work with you if you have a medical reason to be here.

     

17. SUBSTITUTE ABOVE SUPER W/:

“...You know we’re on a fishing expedition.”

 

What you would need to do in order for us to even try to file with CHAMPUS is you need to see our doctor for one visit.  And he might indicate what labs he could use.  You know we’re on a fishing expedition; we don’t have anything that we know is going to fly.]

     

18. SPLIT SCREEN: ON LEFT: ECU DRAWING BLOOD; ON RIGHT: CHYRON:

1. UC AGENT SEES DR.

2. BLOOD TESTS

3. 10 COUNSELOR VISITS BILLED AS DR VISITS

 

NARR (V-O):  The DCIS undercover agent saw their doctor and had some blood work done.  His next 10 appointments were with nutrition counselors which NCS billed as doctor visits.  At this time the agent asked about his test results...

     

19. CUT TO B&W STILL I OF AGENT TALKING W/COUNSELOR IN OFFICE; SUPER: “...We’re just using that (LAUGHING) excuse, right, for insurance purposes...”

 

(AUDIO ONLY)

[NC:  Oh yeah, you’re alright.  We’re just using that (LAUGHING) excuse, right, for insurance purposes, but it wouldn’t hurt if your lipids came down a little bit.]

     

20. DVE: SPIN UP TRICARE LOGO, THEN MEDICARE, THEN BLUE CROSS; ADD AS MENTIONED):

6 MOS HOME DETENTION

PROBATION

$109,437 IN RESTITUTION

$230,000 CIVIL SUIT

 

NARR (V-O):  In the end, three employees pled guilty to defrauding not only Tricare but Medicare and Blue Cross as well.  They were sentenced to 6 months home detention and required to make $109,437 in restitution.  A later civil suit garnered an additional $230,000.

     

21. DIP TO BLACK THEN FADE UP ON CU STACKING INSURANCE FORMS

 

NARR (V-O):  Like many of these schemes, Consultants in Nutrition relied on patients to come back again and again - each time allowing the company to file a claim for services.  In the fraud business it’s all about numbers...

     
     

22. CUT TO LITTERELLE INTERVIEW; SUPER:

MIKE LITTERELLE

 

[LITTERELLE (SYNC):  It’s a factory.  Pure volume is what generates the dollars for them.  Of course, they don’t charge the patient the co-pay; that’s part of the scheme.  In most of these cases, they say, “You come in to me and we’ll do all these things for you and we’ll get payment from the insurance company or the government.  You won’t have to pay a dime.”]

     

23. DISSOLVE TO NEWS FOOTAGE (TAPE 2:15:00)

 

NARR (V-O):  Fraudulent billing is the key.  This certainly was the case in New York City where a kickback scheme made news...

     

CONTINUE NEWS FOOTAGE: TAPE 2:15:06 (NEWSCASTER)

 

NEWSCASTER (SYNC):  Eleven doctors and one office manager have been charged with taking part in a nine year Medicare Fraud kickback scheme.  The physicians would refer patients to certain medical companies in exchange for money.  One doctor was accused of pocketing as much as $90,000.

     

24. NEWS FOOTAGE TAPE 2:15:53 (MRI BLDG)

 

NARR (V-O):  Referrals for specialized testing or durable medical equipment are commonplace in today’s health field.

     

25. DISSOLVE TO MRI IMAGE (IF AVAILABLE)

 

MRI’s, radiological devices and other expensive items are critical for those patients who truly need them...and costly to those who don’t.

     

26. NEWS FOOTAGE TAPE 2:15:25 (DR’S IN HANDCUFFS)

 

In this case, however, physicians chose to refer to the highest bidder - rather than based on the patient’s best interest - in exchange for a monetary kickback.

     

27. GRAPHIC SHOWING HOW KICKBACK SCHEME WORKS

 

The payoffs eventually got included in someone’s bill - either the patient’s or the insurance company’s...The more costly the procedure or device, the greater the profit.

     
     

28. UNDERCOVER FOOTAGE TAPE 2:14:57 (OR 13:49) (DR. TAKING MONEY IN HANDS)

 

Because both Medicare and Tricare were involved, the case was a joint FBI/DCIS investigation.  They went undercover and taped some of the doctors actually receiving their kickbacks.

     

29. CUT BACK TO NEWS FOOTAGE OF DRS. IN HANDCUFF (TAPE2: 15:23); FREEZE FRAME

 

As a result, nine physicians were eventually convicted and drew sentences ranging from probation to 30 months confinement.  All paid fines.  It ended a longterm and extremely profitable criminal enterprise...

     

30. CUT TO NEWS FOOTAGE TAPE 2:17:03 (NEWSMAN TALKING)

 

MALE NEWSCASTER (SYNC):  In some cases the alleged fraud could have been going on for as much as 10 years.  And as this investigation continues, it could involve more doctors costing taxpayers hundreds of thousands if not millions of Medicare dollars.

     

31. DIP TO BLACK, FADE UP ON MS LITTERELLE LOOKING THRU MEDICAL TEXT

 

NARR (V-O):  DCIS agents realize it all comes down to money and greed - motivations that fuel any number of schemes.  Keeping up with these variations involves constant training and research...

     

32. CUT TO LITTERELLE INTERVIEW

 

[LITTERELLE (SYNC):  We need to educate ourselves before we even start to investigate and we do this by going to experts in the field - plastic surgeons, neurologists, radiologists, insurance auditors - whatever it takes.  We get familiar with the patient condition and the crime.

     

33. CUT TO WS LITTERELLE WALKING INTO COURT BLDG OR ROOM

 

(V-O)  By the time we present the case to the prosecutors, we have to be well-versed in what the health care provider should have been doing.]

     
     
     
     
     

34. CUT BACK TO LITTERELLE PICKING UP COMPUTER READOUT (RECORDS)

 

NARR (V-O):  DCIS agents look for telltale signs that can indicate health care fraud.  Some involve billing procedures, such as:

     

35. CHYRON (ADD AS MENTIONED):

. EXCESSIVE CHARGES

. HIGH VOLUME OF

  TREATMENTS FOR

  PARTICULAR CONDITION

. OVERLAPPING SERVICES

. RELUCTANCE TO SUBMIT

  RECORDS

. ROUTINE/Y BILLING EVERY

  PATIENT FOR SAME

  PROCEDURE

 

Excessive charges compared to other providers, a high volume of treatments for a particular condition, overlapping services, a reluctance to submit complete records for review and routinely billing every patient for the same procedure.

     

36. CUT BACK TO LITTERELLE CHECKING RECORDS AGAINST TEXT

 

They also consider medical indicators, such as a diagnosis or treatment inconsistent with a patient’s age or gender, or services inappropriate to the condition.

     

37. CUT TO ECU SCAN OF INSURANCE CODES

 

One especially reprehensible fraud involves using higher paying codes when billing for seriously ill patients who may be too sick to review the charges.

     

38. CUT BACK TO LITTERELLE INTERVIEW

 

LITTERELLE (SYNC):  Doctors get away with this stuff because patients think these people are gods.  They trust them, they trust them with their lives - so why wouldn’t they trust them with the billing?

     

39. FLETC STOCK FOOTAGE (PATIENT W/DR)

 

NARR (V-O):  Health care fraud assumes patients are too intimidated or too confused to question their bills.

     

39A. CUT TO CU PATIENT

 

It assumes patients don’t care if their insurance gets ripped off - as long as they don’t have to pay.

     

40. FLETC STOCK FOOTAGE: LS CROWD OF PEOPLE

 

But, in the end, everyone pays - either in higher premiums or higher taxes.  To put a stop to these fraudulent practices, DCIS needs the help of consumers.

     
     
     

41. CHYRON:

PREVENT HEALTH CARE FRAUD:

. MAKE SURE BENEFITS MATCH

  SERVICES RECEIVED

 

They need patients to carefully review their bills, to make sure that benefits match the services received.  They need patients to ask questions and demand answers.

     

41A. ADD TO ABOVE:

. BE A CUSTOMER

 

In short they need patients to become customers.  Only then will the rising tide of health care fraud begin to ebb.

     

42. DISSOLVE TO NEWS FOOTAGE TAPE 2:14:57 (DR. IN HANDCUFFS)

 

(FADE UP CLOSING MUSIC)

DCIS will continue to do its part - to vigorously search out and expose health care fraud.

     

43. DISSOLVE TO UNDERCOVER TAPE 2:12:50 (DR. TAKING CASH)

 

To protect both patients and taxpayers from the greed of unscrupulous providers.

     

44. DISSOLVE TO TRICARE LOGO

 

To protect the TRICARE system, and ultimately...

     

44A. CASCADE DISSOLVE TO WS OF MILITARY EXERCISE (STOCK FOOTAGE)

 

To protect the health and well-being of the American Warfighter.

     

STAY ON FOOTAGE FOR SEVERAL SECONDS; DIP TO BLACK

 

(BRING MUSIC UP FULL)

     

45. DISSOLVE TO HOTLINE TAG/GRAPHIC

 

(FADE MUSIC UNDER)

NARR (V-O):  If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. 

Help protect America ’s Warfighters.

     

46. DISSOLVE/ROLL CREDITS, FADE TO BLACK

 

(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT)

“Protecting America ’s Warfighters...
                    (sub) From Environmental Crime”

VISUAL

 

AUDIO

     

1. FADE UP ON MS OF SIGN: 95TH SUPPLY SQUADRON (TAPE 3 - 00:03) SUPER UNDER:

DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS:

 

(FADE UP SFX: JETS TAKING OFF IN DISTANCE)

     

1A. CUT TO FOOTAGE: WORKERS SECURING CONTAINERS (TAPE 3 - 6:30-8:00; SUBSTITUTE SUPER:

PROTECTING

AMERICA ’S WARFIGHTERS

 

(CONT. SFX; ADD AMBIENT SOUND)

     

1B.CUT TO EXPLOSION (>1 IF NEEDED) TAPE 3- 8:04-8:50; KEEP TITLE; ADD CHYRON (SUBTITLE):

...FROM ENVIRONMENTAL CRIME

 

(CUT IN SFX: EXPLOSION)

(ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS)

     

2. DIP TO BLACK; FADE UP ON MONTAGE OF CALLERY CHEMICAL PICS: CONTAINERS RUSTED, DUMPED BARRELS

 

[CONCHA (V-O):  DoD is spending a lot of money in environmental cleanups.  Every time we issue a contract to clean up a site and it’s done wrong, not only do we have to pay again to get it cleaned up...

     

3. CUT TO CONCHA INTERVIEW; SUPER:

JUAN CONCHA

DCIS SPECIAL AGENT

 

(SYNC)  But the damage to the environment is even greater...That’s when we get involved in environmental crimes.

     
     

4. DISSOLVE TO WS JET ON GROUND BEING FUELED

 

(FADE SYNC IN/UNDER)

NARR (V-O):  The American warfighter doesn’t exist in a vacuum.

     

4A. CUT TO CU SMALL FUEL SPILL ON GROUND

 

The work it takes to build, outfit, prepare and maintain our armed forces sometimes has unfortunate results for the environment.

     

5. CUT TO WS MEN IN ORANGE SUITS MOVE CONTAINERS TO FLABED TRUCK

(CALLERY TAPE 02:30)

 

The Department of Defense is committed to correcting any evironmental damage caused by its activities.

As part of that effort, the government contracts with outside sources to assist in these cleanups.  When fraud is suspected at any point in this process, the DCIS environmental crimes program steps in.

     

6. CHYRON:

DCIS INVESTIGATES CONTRACT FRAUD INVOLVING:

      .  REMOVAL

      .  TRANSPORT

      .  DISPOSAL

OF HAZARDOUS MATERIALS FROM DOD INSTALLATIONS OR RELATED SITES.

 

Its role is very specific.  DCIS is responsible for investigating contract fraud involving the removal, transport and disposal of hazardous materials from DoD installations or related sites.

It’s a job with long-term implications...

     

7. CUT BACK TO CONCHA INTERVIEW

 

[CONCHA (SYNC):  Any environmental problem has what we call a cradle to grave attachment.  That means DoD is responsible for that situation until it’s dealt with properly.  For example:

     

7A. CUTAWAY TO MS WORKERS HANDLING CONTAINER (CALLERY TAPE 0

 

(V-O)  Fuel in stored in underground storage container.  Even if is sold, and then re-sold again.  That’s still DoD’s responsibility.

     

7B. CUT BACK TO CONCHA INTERVIEW

 

(SYNC)  That continues until there’s no longer a hazard.  We can’t adicate these responsiblities.]

     
     
     

8. CUT TO HEADLINE RE: HAZARDOUS WASTE SPILL

 

NARR (V-O):  While waste spills and other hazardous situations continue to be under the jurisdiction of the EPA,..

     

9. DISSOLVE TO SHOT OF CONCHA OR ZIEGLER WALKING NEAR FUEL TANKS/CONTAINERS (OR SIMILAR)

 

DCIS special agents work closely with that agency to investigate environmental contract fraud.

     

9A. CONT. WS AS 2ND PERSON JOINS AGENT

 

A multi-agency Federal and State Environmental Task Force may also get involved.

     

10. DISSOLVE TO SURVEILLANCE FOOTAGE (WS EMPLOYEE WALKING PAST TANKER TO CAB) ATLAS TAPE - 30:00

 

Such was the case with Atlas Portable Services.  Also known as Atlas Pumping, the company had contracted with DoD to dispose of military generated waste at bases in San Diego.

     

11. CUT TO SURVEILLANCE FOOTAGE: ATLAS TAPE 1:21:30 (OPENING SEWER)

 

A tip from a former employee suggested Atlas was illegally dumping its loads. DCIS agents conducted surveillance...

     

(CONTINUE FOOTAGE ABOVE)

 

What they discovered was that the company was collecting then dumping the raw waste in remote areas on military bases.

     

12. ATLAS TAPE 1:52 (ENDING DUMP, PACKING UP HOSE)

 

By doing so Atlas saved itself the costs of pre-treating the waste as well as  discharge fees.  Big money...until the company got caught.

     

13. CUT TO OTHER INCIDENT (ATLAS TAPE: 1:30);

 

Faced with the taped evidence, Atlas Pumping pled guilty to a felony violation of the Clean Water Act.

     

14. ADD SUPER (ADD AS MENTIONED)

ATLAS PUMPING:

. 3 YEARS PROBATION

. $100,000 FINE

. PAY CITY >$10,000 IN COSTS

 

The company was sentenced to three years probation and fined.

     

15. CUT BACK TO SURVEILLANCE FOOTAGE: ATLAS TAPE 27:00 (2 GUYS TALKING WHILE CAR, BIKE GO BY)

 

Such blatant fraud is not unusual.  The lure of making easy money while ignoring regulations is seen by many companies as a risk worth taking.

[CONCHA (V-O):  If what you’re doing doesn’t come to the attention of anyone, you can get away with it for a long time.  Years even.

     

16. CUT BACK TO CONCHA INTERVIEW

 

(SYNC)  That’s why it’s important that DCIS receives notifications from our inspectors and contractors.  Information  can come from different sources including unsuccessful competitors - if they know a business isn’t doing something on the up and up.]

     

17. DISSOLVE TO HAZMAT LOGO; SUPER:

LEADS:

.  CONTRACTORS

.  DEFENCE INSPECTORS

EPA-CID

STATE/LOCAL

    ENVIRONMENTAL QA

 

NARR (V-O):  In fact, many leads do originate from contractors.  Others come from DoD Inspectors managing contracts as well as other environmental agencies on the federal, state and local levels.

     

18. DISSOLVE TO CALLERY PHOTO (CONTAINER INDICATING PENTOBORANE)

 

Yet, with all these sources, environmental fraud continues - in one case, for over 10 years.

     

19. CUT TO OTHER CALLERY PHOTOS (RUSTING BARRELS, STORAGE SHEDS)

 

In the 1960’s, the Callery Chemical Company had produced a rocket engine accelerant - called pentaborane - for the United States Air Force.  When it became obsolete, Callery bought back much of the chemical with the intent of extracting boron from it.

     
     

SLOW DISSOLVE TO BLACK

 

Unfortunately, the market for boron also dried up.  Callery was left with a huge amount of the useless and deadly chemical.  DCIS special agent Juan Concha explains...

     

20. CUT TO CONCHA INTERVIEW

 

[CONCHA (SYNC):  Pentaborane is a very dangerous chemical It is toxic to the central nervous system and can cause organ damage.  It acidifies the blood.  It’s a very dangerous chemical.  It’s also highly explosive.  This stuff ignites upon exposure to air.

     

21. CUT TO CALLERY TAPE: 08:50 (EXPLOSION)

 

(SYNC UNDER SOUND OF EXPLOSION)

NARR (V-O):  Conclusive proof of that danger occurred in Atlanta, Georgia where an explosion during the cleaning process left several people dead.  So when DCIS was informed that Callery was improperly storing pentaborane, they began an immediate investigation.

     

22. DVE: SPIN UP LOGOS:  DCIS, FBI, EPA AND AFOSI

 

The FBI, EPA Criminal Investigations Division and Air Force Office of Special Investigations joined DCIS in the case.

     

23. CASCADE DISSOLVE TO SCALES OF JUSTICE; SUPER:

CALLERY CHEMICAL/MINE SAFETY APPLIANCES PLEADS NO CONTEST TO ILLEGAL STORAGE OF HAZARDOUS WASTE AND IS FINED $350,000

 

NARR (V-O):  After two years of investigation, Callery’s parent company - Mine Safety Appliances - pled no contest to the illegal storage of hazardous waste.  Consequently, the company was fined...

     

24. CUT BACK TO CALLERY TAPE 9:00 (GUYS CLEANING UP AFTER EXPLOSION)

 

And the pentaborane disposed of properly. 

     

25. DIP TO BLACK; FADE UP CONCHA NEAR HAZMAT AREA

 

For DCIS agents, working with hazardous materials is just part of the job. 

     
     
     

26. CUT TO MCU CONCHA LOOKING AT SITE

 

Specialized hazardous waste operations training enables agents to investigate in difficult and dangerous conditions. 

     

27. DISSOLVE TO STOCK FLETC FOOTAGE (SETTING PERIMETER)

 

Instruction focuses on protection and safety,  perimeter security and stabilization of the scene.

     

28. STOCK FLETC FOOTAGE CI TRAINING

 

Additionally, DCIS trains its agents in investigative techniques specific to environmental crime.

     

28A. CONTINUE ABOVE FOOTAGE (STUDYING RECORDS OR OTHER EVIDENCE)

 

The goal is to hold contractors accountable for their actions.  But DCIS also works to prevent environmental contract fraud from happening in the first place.

     

29. GRAPHIC:

DCIS ENVIRONMENTAL CRIMES PROGRAM:

. HELPS PREVENT FRAUD BY

  IDENTIFYING VULNERABLE

  AREAS

 

Specifically, DCIS investigates funtional DoD sites to uncover vulnerable areas likely to fall prey to fraud from unscrupulous contractors.

     

30. CUTAWAY TO CONCHA ENTERING BUILDING

 

Once an area is identified, agents then notify the respective facility of its vulnerability.

     

31. PULL BACK AND WIDEN SHOT TO SHOW OUTSIDE ENVIRONMENT

 

Not only at stake are DoD funds but the environment in which we live.

(FADE UP CLOSING MUSIC)

     

32. DVE: ZOOM UP DCIS LOGO/BADGE TO MID SCREEN

 

The DCIS environmental crimes program stands committed to both investigating and deterring environmental contract fraud because,...

     

33. DISSOLVE TO FLETC STOCK FOOTAGE OF MILITARY TRAINING (IF AVAILABLE)

 

While the effor to prepare and train America ’s Warfighters may sometimes impact their surroundings...

     

34A. PAN OR TILT UP TO SHOW SURROUNDING PANORAMA

 

It is America ’s environment they are protecting. 

(FADE MUSIC UP)

     
     

35. DISSOLVE TO HOTLINE TAG/GRAPHIC

 

(FADE MUSIC UNDER)

NARR (V-O):  If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. 

Help protect America ’s Warfighters.

     

36. DISSOLVE/ROLL CREDITS; FADE TO BLACK

 

(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT))

     

“Protecting America ’s Warfighters...
                    (sub) From Major Theft”

VISUAL

 

AUDIO

     

1. FADE UP ON DCIS SPOOL FOOTAGE TAPE 21:30 (SOLDIERS ENTERING TOW); SUPER UNDER:

DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS:

 

(FADE SYNC FROM TAPE UP - SEE LEFT)

     

1A. CONTINUE ABOVE SUBSTITUTE SUPER:

PROTECTING

AMERICA ’S

WARFIGHTERS

   
     

1B.CUT TO BREECH BLOCK TAPE ( 00:30) (STOLEN TOW W/GUY IN SKI MASK LEAVING IT); ADD CHYRON (SUBTITLE):

...FROM MAJOR THEFT

 

(FADE IN OPENING MUSIC - SOMBER)

(CUT OUT MUSIC; ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS)

     

2. DIP TO BLACK; FADE UP ON BREECH BLOCK TAPE 2:29 (DRIVING TOW THRU WOODS)

 

[ ADAMS (V-O):  We could spend every agent hour this agency has working theft cases...

     

3. CUT TO SCHOENEWEIS INTERVIEW: SUPER UNDER:

JOHN SCHOENEWEIS

(NEED TITLE)

 

(SYNC) It goes back to basically taking a step at a time.  If you work a major theft case as you would any other complex white collar crime - where you go after documents and things like that - you’ll build a good solid case...]

     
     

4. CUT TO DCIS SPOOL FOOTAGE TAPE 12:00 (VARIOUS ARMORED VEHICLE DRIVEN ON DUSTY TERRAIN)

 

(FADE UP SYNC/UNDER)

NARRATOR (V-O):  Outfitting and arming America ’s warfighters is a enormous job...one that’s been going on for over 200 years.

     

5. DISSOLVE TO BREECH BLOCK (BB)TAPE 7:45 (PAN DOWN FT MCCOY STORAGE AREA)

 

Over those years, equipment has been stored throughout the country - either waiting to be used, or demilitarized and sold for scrap.

     

6. CUT TO BB TAPE 5:46 (MIL. VEHICLE PARKED NEXT TO PIATZ’S HOUSE)

 

For some, it’s an irresistable temptation - the opportunity to steal property and make a quick buck.  When a major theft of DoD property occurs, DCIS swings into action.

     

7. BEGIN BUILDING CHYRON/GRAPHIC: MAJOR THEFT:

 

Exactly what constitutes “major theft” is determined by several criteria:

     

(ADD AS MENTIONED)

. $  (SUBSTANTIAL AMOUNT)

. CRITICAL NATURE

. LOCATION

 

Dollar amount - if the costs of the property stolen is a substantial figure,...

The critical nature of what was stolen,...

And where the crime took place - for example, if the theft occurred from a secure facility.

     

8. CUT TO BB TAPE 3:15 (ARMORED PERSONNEL CARRIER BEING DRIVEN AWAY)

 

It’s not a widespread crime - only about 3% of DCIS cases involve major theft -but it can be a critical one. 

     

9. DISSOLVE TO BB TAPE 00:45 (AERIAL OF FT McCOY)

 

In the case of Tony Piatz and Fort McCoy, the costs could have been staggering...

     

10. CUT TO BB TAPE 3:10 (ABC NEWS SEGMENT)

 

Operation Breech Block was the largest theft of military equipment in the DoD’s history.  And it happened right out in the open...

[NEWSCASTER (SYNC - START UNDER THEN UP):  The government has charged men, seven of them, with stealing $17 million worth of military equipment from Fort McCoy, an army base in Wisconsin

     

CONTINUE NEWS SEGMENT 3:18-3:32

 

(V-O UP)  The haul included vehicles and TOW missile launchers - all apparently operational. 

(FADE V-O UNDER NARRATION) There is no evidence the equipment went to local militia or to foreign government, but it was widely distributed from California to Alabama to, among other things, collectors.]

NARR (V-O): Leo Anthony Piatz - Tony to his friends and business associates - had masterminded the two-year scheme.

     

11. PIC OF TONY PIATZ

 

Piatz himself was something of a military equipment buff.

     

12. CUT TO BB TAPE 9:20 (NIKE MISSILE ON LAUNCHER)

 

In fact, he had purchased an old Nike missile base with the intent of renovating it as a museum.

     

CONTINUE ABOVE AS MISSILE IS LOWERED INTO GROUND AND HATCHES CLOSE

 

It was here - in a facility that could be seen only from the air, where he hid his stolen equipment underground.

     

13. CUT TO BB TAPE 00:45 (AERIAL OF FT MCCOY W/STOCKPILED VEHICLES)

 

The plan was simple.  Piatz took vehicles which were to be used as targets on the tank ranges and, instead, sold them to collectors for profit.

     

14. CUT TO BB TAPE 5:30 (VEHICLES INSIDE STORAGE BARN)

 

These included: jeeps, TOW missile carriers, armored personnel carriers, Howitzers, pick-up trucks,...

     
     
     
     

14A. CUT TO BB TAPE 8:30 (TANK)

 

Even a Vietnam era Sheridan tank.

     

15. DISSOLVE TO BB TAPE 3:10 ( FORT McCOY SIGN)

 

In order to do this he had to have inside help.  That help came from Don Crandall, an Army range safety officer.

     

16. GRAPHIC SHOWING HOW THEFT SCHEME WORKED

 

Piatz paid Crandall $20,000.  In return, Crandall allowed Piatz to take vehicles earmarked for the range off of the base, supposedly to strip them of polluting materials, then return them.  In reality, none of the equipment ever came back...

     

17. DISSOLVE TO BB TAPE 6:53 (NEWSCASTER AT TOW MISSILE LAUNCHER)

 

NEWSCASTER (SYNC):  Here’s an example of one of the items that we’re talking about.  This is an armored personnel carrier and on top you can see the racks, the launch tubes, for what they call TOW anti-tank missiles.  Investigators allege 5 vehicles like this were stolen.  Well, you wouldn’t just drive vehicles like this off the base.  You do it through paperwork.  Apparently what happened is they would fake paperwork -it was alleged - that these were going to be taken out to the target range and shot at for practice.  Instead of shooting at them, they were sold for profit.]

     

18. CUT TO BB TAPE 6:10 ( MINNESOTA MUSEUM)

 

NARR (V-O):  To find customers, Piatz used his affiliation with a Minnesota military museum, targeting buyers through its membership rolls.

     

19. CUT TO BB TAPE 00:33-43 (PICS OF STOLEN EQUIPMENT)

 

Piatz even went so far as to publish a catalogue listing some of the stolen equipment.

But while Piatz used the museum to further his criminal enterprise, it this association that led to his eventual downfall...

     
     
     

20. CUT TO ADAMS INTERVIEW; SUPER UNDER:

CRAIG ADAMS

DCIS SPECIAL AGENT

 

[ADAMS (SYNC):  How this case got started was we had a cooperating witness call us and report that: “I’ve heard Tony Piatz paid $20,000 in bribes to an officer at Fort McCoy to take equipment out of there and I’ve seen that equipment and it’s sitting out at his farm and at the Nike base.]

     

21. CUTAWAY TO MS ADAMS IN OFFICE REVIEWING FILE, MAKING CALL

 

NARR (V-O):  DCIS  decided to investigate.  Working jointly with the FBI DCIS introduced an undercover agent to Piatz.

     

22. PIC OF UCA W/PIATZ (AVAILABLE FROM CRAIG ADAMS)

 

The DCIS agent posed as the owner of a Denver company who specialized in getting government contracts for small businesses.  Piatz readily took the bait...

     

23. CUT TO ADAMS INTERVIEW

 

[ ADAMS (SYNC):  According to the undercover agent, Hal, it was like seeing a light go on over Piatz’s head when he heard this guy handled government paperwork.  Because he needed to legitimize his paperwork and wanted somebody to look over the paperwork he’d already gotten from Crandall, how to make it better.]

     

24. CUT TO BB TAPE 8:30 (PAN OF OLD TANKS)

 

NARR (V-O):  At this point, the theft ring had grown to include the range maintenance manager at Fort McCoy who requisitioned vehicles from other installations for use as targets,...

     

25. CUT TO BB TAPE 2:03

 

And Grant Kruger, head of the Military Vehicles and Arms Museum of Minnesota.  Kruger not only helped Piatz transport the stolen vehicles, he also created fake papers to legitimize the equipment and thus facilitate its sale.

     
     

26. BB TAPE 4:06 (LOOKING @ INDICTMENT)

 

KRUGER (V-O):  It all looked legal.  It was all signed by Don Crandall.

     

26A. BB TAPE 3:59 (KRUGER)

 

KRUGER (SYNC):  I really feel as if I’m innocent.  I haven’t done anything wrong.

     

27. CUT TO BB TAPE 5:09 (KRUGER AT HOME)

 

NARR (V-O):  Kruger’s protests proved to be false.

     

28. CUT TO ADAMS INTERVIEW (MOS)

CONTINUE INTERVIEW W/AUDIO

 

DCIS’s undercover agent had obtained all of Piatz’s records and was learning everything about the scheme.

[ ADAMS (SYNC):  You know the undercover agent had gained his confidence over the course of a month or two.  He’d made comments like, “Whatever you need done, I’ll do it for you.  I know how this game works.”

So finally, one evening, on tape Tony tells him, on tape  “Hey I got this equipment and I’m selling some of it.  I paid Crandall to get the equipment out of there.]

     

29. CUT TO BB TAPE 4:00 (VEHICLES DRIVEN AWAY)

 

NARR (V-O):  The undercover agent pretended to find a buyer for one of the stolen vehicles.  That deal concluded, he soon gained Piatz’s confidence and access to all of Piatz’s records.

     

30. CUT TO BB TAPE 4:48-57 (FT. MCCOY SIGN THEN GROUNDS)

 

During the next few weeks, the undercover agent accompanied Piatz on frequent trips to Fort McCoy.  There he also reviewed the fake paperwork created by Crandall.

     

31. CUT TO BB TAPE START OF CHANNEL 9 NEWSCAST ( 00:00-43)

 

[FADE UP/UNDER CHANNEL 9 NEWSCAST INTRO]

NARR (V-O):  It was inside evidence such as this that was presented to prosecutors.  In turn, indictments were handed down for Piatz, Crandall, Dennis Lambert, the range maintenance manager at Fort McCoy and Kruger...all eventually went to jail.

     

32. CUT TO OTS ADAMS LOOKING AT UC PHOTOS OF HAL/PIATZ

 

To Special Agent Adams, the outcome was due in no small part to the expertise of the DCIS undercover agent...

     

33. CUT TO ADAMS INTERVIEW

 

[ ADAMS (SYNC):  After this case was over, not a single person said that they knew anything was wrong with our agentl.  When we told Tony that He had dealt with an undercover agent, he was stunned, absolutely stunned.]

     

34. CUT TO BB TAPE 4:28 (VEHICLES)

 

NARR (V-O):  In the end, all 150 vehicles stolen were recovered.

So why wasn’t the missing equipment ever noticed?  The scheme took advantage of a hole in the system...

     

35. CUT TO BB TAPE 00:53 (AERIAL FOOTAGE OF FORT MCCOY)

 

[ ADAMS (V-O):  This is something a lot of people didn’t think about because once a piece of equipment is out on the range no one is going to want to check it because there might be live ordinance out there. 

     

36. CUT TO ADAMS INTERVIEW

 

(SYNC)  Since then the Army changed it’s range policy to require a visual inspection of the equipment to insure that it is still there or has been destroyed.]

     

37. CUT TO BB TAPE 00:44 (GUARDS ON BASE)

 

NARR (V-O):  The Breech Block case changed the way military bases did business.  All this began with a tip to DCIS from a responsible citizen.

     
     
     

38. DISSOLVE TO MS AGENT ADAMS LISTENING TO PERSON ON STREET

 

And while agents admit that not all investigations stem from insider allegations, they often hinge on information from human sources,...

     

38A. ARC LEFT TO SHOW PERSON TALKING TO AGENT

 

Including other police officers, and anyone out on the street making contact with these criminals.

     

39. DIP TO BLACK, FADE UP ON BB TAPE 7:30 (PAN OF VEHICLES IN STORAGE AREA)

 

(FADE IN CLOSING MUSIC)

The fact is major theft is everyone’s business.  That’s because the loss of DoD property not only costs taxpayers money,...

     

40. CUT TO BB TAPE 10:15 (SHOT OF NIKE MISSILE BEING AIMED)

 

It can pose a threat to society if the stolen items are used to further violence against law-abiding citizens.

     

41. DVE: PULL UP DCIS LOGO SO AS TO BLOCK OUT ABOVE

 

DCIS continues to vigorously investigate major theft cases with every tool at its disposal, because...

     

42. CUT TO DCIS SPOOL FOOTAGE 30:00 (SOLDIERS MOVING IN BARREN AREA)

 

Stealing from America ’s warfighters...

     

43. CUT TO DCIS SPOOL FOOTAGE 56:00 (NAVY JETS LANDING ON CARRIER)

 

Is stealing America ’s security.

     

44. DISSOLVE TO HOTLINE TAG/GRAPHIC

 

(FADE MUSIC UNDER)

NARR (V-O):  If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. 

Help protect America ’s Warfighters.

     

45. DISSOLVE TO/ROLL CREDITS, FADE TO BLACK

 

(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT)

“Protecting America ’s Warfighters...
                    (sub) From Terrorism”

VISUAL

 

AUDIO

     

1. FADE UP ON MONTAGE 9/11 AFTERMATH NEWS REPORTS (STOCK); SUPER UNDER:

DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS:

 

(FADE SYNC FROM TAPE UP - SEE LEFT)

     

1A. CONTINUE ABOVE SUBSTITUTE SUPER:

PROTECTING

AMERICA ’S

WARFIGHTERS

   
     

1B.CUT TO ECU TATTERED AMERICAN FLAG; ADD CHYRON (SUBTITLE):

...FROM TERRORISM

 

(FADE OUT NEWS REPORTS TO SILENCE)

(ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS)

     

2. DIP TO BLACK; FADE UP ON STOCK FOOTAGE 9/11 AFTERMATH

 

DCIS REP (V-O):  The DCIS response to the terrorist attacks on September 11, 2001 was immediate and continuous...

     

3. CUT TO INTERVIEW WITH DCIS REP

 

(SYNC)  Since that time DCIS has seen an upsurge in the investigation of terrorism-related matters.  It is now a critical part of our agency’s mission.

     
     
     
     
     
     

4. DIP TO BLACK, FADE UP ON PICS OF 9/11 TERRORISTS (ADD 1 AT A TIME, IN ROWS)

 

(FADE UP SOUNDTRACK - SOMBER MUSIC)

NARRATOR (V-O): September 11th, 2001 marked a new era for Americans.  The arrival of foreign terrorists on our soil meant the United States had become a target.  It proved that unless our nation responded quickly and proactively we would once again become a victim.

     

5. CUT TO STOCK FOOTAGE: INCREASED SURVEILLANCE AT AIRPORTS, BORDERS

 

(CHANGE MUSIC-STEADY TEMPO)

Law enforcement responded to this shift in urgency.  Federal agencies joined together to develop a strategy of prevention and disruption designed to root out terrorists before they act.

     

6. DISSOLVE TO DCIS-LOGO ON MATERIAL IN DCIS REP OFFICE

 

DCIS is an integral part of this effort

     

6A. PULL BACK TO SHOW DCIS REP TALKING

 

DCIS REP (V-O THEN SYNC):  Combating terrorism is a departure from the traditional role of DCIS - but one that’s clearly necessary.

     
   

We still investigate fraud and abuse cases involving the department of defense.  But now we also investigate terrorism cases with a DoD nexus.

     

6B. PAN OVER TO COMPUTER IN OFFICE

 

That includes threats to the Department’s infrastructure - our computer network and our suppliers’ computer networks.

     

7. CUT TO GRAPHIC (BUILD AS MENTIONED):

DCIS ANTI-TERRORISM PROGRAM:

 

NARRATOR (V-O):  In fact, the DCIS anti-terrorism effort involves a multipronged approach.

     
     
     
     
     

7A. ADD TO GRAPHIC:

. PARTICIPATES IN FBI-LED JTTF’s

 

The agency participates on Joint Terrorism Task Forces and the National Joint Terrorism Task Force which are coordinated by the FBI.  .

7A-1. INSET BOX  UNDERNEATH:  NIGHT SURVEILLANCE IMAGES (FLETC STOCK)

 

As part of this team, special agents conduct interviews, record checks, searches and surveillances involving suspected terrorists.  They also serve subpoenas, assist in special security operations, provide computer forensics support and effect arrests.

     
   

7B. DELETE BOX, ADD TO GRAPHIC:

. PARTICIPATES IN DOJ-SPONSORED ATTF’s

 

Subsequent to 9/11 the agency was also requested to participate in Anti-Terrorism Task Forces sponsored by the Department of Justice.

     

7B-1. ADD INSET BOX BELOW: NEWS FOOTAGE OF MOUSSAUI IN CUSTODY

 

ATTFs develop investigative strategies to support investigations of suspected terrorists and prosecutions of known terrorists.

7C. DELETE BOX,ADD TO GRAPHIC:

. PARTNERED WITH BICE IN PROJECT “SHIELD AMERICA

 

Additionally, Technology Protection is an integral part of the DCIS National Security mission.  DCIS has partnered with the Department of Homeland Security, Bureau of Immigration and Customs Enforcement in Project Shield America .  This partnership is built on a strategy of preventing illegal exporters, targeted foreign countries, terrorist groups, and international criminal organizations from trafficking in, obtaining and illegally exporting DoD based technologies, conventional munitions, and firearms; stolen Government property; and engaging in financial and other transactions which support these activities or which violate U.S. sanctions and embargoes.  This aspect of the DCIS mission is dependent upon cooperation with DoD Components, DoD Investigative Organizations, the DCIS and potentially every DoD contractor

     
     

7C-1. ADD INSET BOX BELOW: STOCK FOOTAGE OF PORT W/CONTAINER FREIGHT

 

This industry-outreach program aims to raise awareness and identify instances involving the export and import of controlled, prohibited or sensitive technologies and materials some of which may pose a national security risk..

     

8. CUT TO OUTLINE OF DCIS LOGO (DoD SHIELD), ADD INSIDE OUTLINE:

. DCIS SO&L STAFF  OBTAINS/SHARES TERRORIST INFO

 

Internally, DCIS has established a National Security Staff which coordinates with other agencies to identify and share terrorism threat information.

     
     
     
     
     

8A. ADD TO GRAPHIC:

. CCD RESPONDS TO CYBER-TERRORISM THREATS

 

The DCIS computer crimes division monitors and responds to potential acts of terrorism aimed at America ’s critical cyber-infrastructure.

     

8B. ADD TO GRAPHIC:

. LIAISONS W/DOE AND DTRA FOR QUICK-REACTION RESPONSES TO WMD INCIDIDENTS

 

DCIS has also established liaisons with the Department of Energy and Defense Threat Reduction Agency to respond without delay to incidents involving weapons of mass destruction.

     

8C. ADD TO GRAPHIC:

. PROVIDES INVESTIGATIVE ASSISTANCE TO ARMY CORPS OF ENGINEERS

 

Finally, DCIS responds to calls for assistance from the Army Corps of Engineers involving the protection of America ’s dams, levees and waterways.

     

9. CUT TO DCIS REP INTERVIEW

 

DCIS REP (SYNC):  I think what’s most striking is the upsurge in the the number of terrorism cases we’re working on.  Before 9/11, we were involved with maybe two or three cases.  Since then, our caseload has increased ten, twenty-fold.  It’s a priority now.

     

10. CUT TO LS OF PENTAGON BURNING (9/11 STOCK FOOTAGE)

 

NARRATOR (V-O): In the aftermath of the September 11th attacks, DCIS provided immediate investigative assistance.  Since that time, the agency has become a key component in our nation’s antiterrorism effort.

     

11. CUT TO NEWS FOOTAGE RE: ANTHRAX ATTACKS

 

For example, DCIS assisted the FBI in its investigation into the anthrax attacks.  The result:

     
   

DCIS had the first successful indictment of an anthrax-related case.

     

12. CUT TO STOCK FOOTAGE SHOWING CHEMICAL PRODUCTION LINE

 

Just as importantly, DCIS continues to gather information on vulnerabilities inherent in DoD and contractor labs - specifically, those that could lead to terrorists obtaining dangerous biological and chemical agents.

     
     

13. CUT TO HEADLINES RE: FL MIDEAST CHARITY INVESTIGATION

 

On an international level, DCIS special agents - as part of the JTTFs - have helped investigate the funding of overseas terrorists through fraudulent businesses and charity organizations. 

     

13A. CUT TO PIC OR FOOTAGE OF IRAQ/BAGHDAD SCENE W/SOLDIERS

 

DCIS has also established overseas offices to conduct DoD related investigations where U. S. military operations are in progress.

     

14. DIP TO BLACK; FADE UP ON SLIDE/PIC OF AL QAIDA SPOKESMAN SULEIMAN ABU GHEITH -6/12/02

 

(FADE UP ABU GHEITH COMMENTS)

...”We have the right to kill 4 million Americans...We have the right to kill 4 million Americans - 2 million of them children...”

     

15. BEGIN MONTAGE OF TERRORIST ACTIONS AGAINST AMERICANS (USS COLE, 9/11, ANTRAX FOOTAGE ETC.)

 

(FADE OUT ABOVE COMMENTS, FADE IN CLOSING MUSIC)

NARRATOR (V-O):  Terrorists have declared war on the United States .  It’s a conflict that has simmered for over 20 years but the battles recently have raged fiercer.

     

16. CUT TO DoD DOCUMENT W/QUOTE (SEE RT) HIGHLIGHTED

 

DCIS has not flinched from its role in America ’s defense. 

In a chillingly prophetic act - a full nine months before the events of September 11th - the Secretary of Defense stated that DCIS would be responsible for criminal investigations involving “substantial and specific danger to the public health and safety involving the Department of Defense.”

     

17. CUT TO SHOTS OF MILITARY INSTALLATIONS, DRILLS (STOCK)

 

Today that mandate is more crucial than ever.  Whether it acts independently or with other federal agencies, DCIS will continue to investigate terrorism cases with a DoD nexus.

     
     
     

18. CUT TO OVERHEAD SHOT OF JETS TAKING OFF

 

In a world where threats come in all shapes and sizes, DCIS is committed to helping America fight war...

     

18A. CUT TO SHOT OF GI’s ON GROUND

 

By protecting America ’s Warfighters.

(FADE MUSIC UP)

     
     

19. DISSOLVE TO HOTLINE TAG/GRAPHIC

 

(FADE MUSIC UNDER)

NARR (V-O):  If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. 

Help protect America ’s Warfighters.

     

20. . DISSOLVE/ROLL CREDITS; FADE TO BLACK

 

(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT)