VISUAL |
AUDIO |
|
1. BLACK,THEN AS VOICES EMERGE FADE UP ON CHYRON: DCIS: PROTECTING
|
(FADE UP OVERLAPPING VOICES: 1:15:10 (3 SEC), ) |
|
2. MS SOLDER DIRECTING AIRCRAFT (29:59:21-30:02:48) DISSOLVE TO SOLDIERS IN FIELD (30:16:21) |
(FADE OUT VOICES, FADE IN OPENING MUSIC UP THEN UNDER) NARR (V-O): Strong, honest, hardworking...these have been the cornerstones of our national character. |
|
3.
|
But events in recent years have put our nation’s character to the test. We’ve been attacked... |
|
3A. CONTINUE W/CATASTROPHE SHOTS (3:12:07-25:00) |
Targeted
and challenged. That’s
why today, more than ever, defending
|
|
4. DVE: FLIP SCREEN TO GRAPHIC: DCIS LOGO |
Accepting this mission is DCIS, the Defense Criminal Investigative Service. |
|
5. DISSOLVE TO LUCAS FOOTAGE (8:54:21-9:10:44) |
DCIS was established in 1981 as the criminal investigative arm of the Office of Inspector General, Department of Defense. As such, the agency focuses on illegal activities critical to our country’s defensive readiness. |
|
6. DCIS ACTIVITIES (1:53:08-2:01:58) |
Specifically, DCIS investigates allegations of criminal, civil and administrative wrongdoing involving the Department of Defense. |
|
7. SHOTS OF DoD STAFF (1:22:22-42:02) |
At the same time, DCIS also promotes economy, efficiency and effective operations within the DoD. |
|
8. CHYRON: DCIS INVESTIGATIVE AREAS:
|
The agency focuses on eight major areas of investigation: All of
these impact
|
|
9. DIP TO BLACK; FADE UP CHYRON: DCIS AND ANTITERRORISM |
INTERVIEW (V-O 1:15:10-19:12): Combatting terrorism is a departure from the traditional DCIS mission... |
|
10. DISSOLVE TO INTERVIEW (1:19:13-1:22:56) |
(SYNC) ...But one, however, that’s clearly needed. |
|
11. PENTAGON ON 9/11N (0:23:02-31:00) |
NARRATOR (V-O): September 11th, 2001 marked a new era for many federal law enforcement agencies, including DCIS. |
|
12. AERIAL OF NYC TO 9/11 CRATER (0:45:24-57:26) |
In its aftermath, the agency provided immediate investigative assistance. Since that time DCIS has taken a comprehensive and multifaceted approach to antiterrorism. |
|
13. AGENTS IN CHEM SUITS (3:25:04-31:13) |
This includes taking part in a number of critical investigations, including the successful resolution of a major anthrax case. |
|
14. CHEM TECH SHOTS (3:38:44-53:11) |
DCIS also gathers information on vulnerabilities inherent in DoD and contractor labs - especially those that could lead to terrorists obtaining dangerous biological and chemical agents. |
|
15. FROM LOCAL COP TO US MARSHAL (00:58:50-1:02:00) 16. 2-SHOTS OF AGENTS WORKING (1:43:15-51:17) |
Antiterrorism, however, must be a cooperative effort if it is to root out terrorists before they act. Toward that end, the agency participates on Joint Terrorism Task Forces and the National Joint Terrorism Task Force coordinated by the FBI. |
|
17. ATTF TASK FORCE SHOTS (2:11:25-27:27) |
In addition, DCIS serves on Antiterrorism Task Forces sponsored by the Department of Justice. The goal here is to develop strategies to support investigations of suspected terrorists and prosecutions of known terrorists. |
|
18. ADD’L TASK FORCE SHOTS (2:27:28-38:20) |
Internally, DCIS has established a National Security Staff which coordinates with other agencies to identify and share terrorist threat information. |
|
19. MORE CATASTROPHE SCENES (2:49:40-3:06:06) |
DCIS has also established liaisons with the Department of Energy, the Defense Threat Reduction Agency and the Army Corps of Engineers to respond without delay to terrorist incidents. |
|
20. PICKING UP DISKETTE (2:39:01-2:47:18) 20a. COMPUTER POOL (1:22:22-42:02) |
On yet
another front, the DCIS computer crimes division monitors and responds to
potential acts of terrorism aimed at
|
|
21. POSTER OF 9/11 TERRORISTS (3:54:02-4:06:54) |
Internationally, DCIS special agents investigate the funding of overseas terrorists through fraudulent businesses and charity organizations. |
|
22. WS SOLDIERS ON FIELD (6:01:10-04:48)+ AGENTS W/WRECKAGE (4:14:03-4:15>28) |
The
agency also conducts DoD-related investigations
where
|
|
23. LONG GUARD AT EXPLOSION SITE (5:05:21) 24. US FLAG ON PENTAGON (4:27:17) |
Because
protecting
Protecting
|
|
25. DIP TO BLACK; FADE UP CHYRON: DCIS AND PRODUCT SUBSTITUTION |
INTERVIEW (V-O 5:39:40-44:06): If you pull the trigger and the gun doesn’t shoot or, worse, the gun blows up in your face... |
|
26. CUT
TO
27. MILITARY SHOTS (6:05:14-17:27) |
(SYNC): You’ve done the job of your enemy. You’ve taken your combatant, your warfighter out of the picture. NARR (V-O): Product substitution in defense contracts is intolerable and unsafe, and remains a DCIS top priority. |
|
28. UNLOADING EQUIPMENT TO BUILD GRAPHIC (6:17:18-6:28:25) |
The agency’s investigative caseload focuses on three critical areas: |
|
Counterfeit parts,... Defective parts,... And other substituted products. |
||
29. CHINOOK FLYING (6:34:58-6:41:24) |
Particular emphasis has been placed on those cases involving military readiness and safety of flight issues,... |
|
30. ANIMATION SEQUENCE (7:56:22-8:07:22) |
Cases, such as the one against Boeing, in which defective gears were knowingly placed in military helicopters... |
|
31. STILLS OF CRASH (7:13:47) |
With disastrous results. |
|
32.
|
After years of investigation by DCIS and the U. S. Army Criminal Investigation Command, the affected fleet was grounded, the gears replaced, and the government took Boeing to court. Five years later Boeing settled. |
|
33. ROBY W/AGENT (8:14:18) |
In this case the lead came from a concerned employee. |
|
34. GRAPHIC: LEADS (8:24:34-33:56) |
But tips can come from a number of sources, including the general public. |
|
35. AGENT W/INFORMANT (10:16:01) |
DCIS special agents vigorously pursue such tips,... |
|
36. DISSOLVE TO GRAPHIC INDICATORS (10:46:11+ 10:59:00) |
Checking a number of telltale indicators to determine if any illegal activity has occurred. The effort is as much deterrence as it is detection. |
|
37. SOLDIERS EXIT CHOPPER (5:55:20-6:04:03) |
Because
DCIS understands that, for
|
|
38. DIP TO BLACK; FADE UP ON CHYRON: DCIS AND CYBER CRIMES |
ZIEGLER (V-O 12:21:23): The Internet is wide open... |
|
39. ZIEGLER INTERVIEW (12:21:23-12:27:29) |
(SYNC) ...There are literally thousands of calls that come into law enforcement each day from people that are ripped off on the internet. |
|
40. YTCRACKER GRAPHICS (15:01:11-14:50) DISSOLVE TO AGENT AT COMPUTER (14:54:12) |
NARRATOR (V-O): When criminals hack into DoD systems - or the systems of DoD contractors or suppliers, DCIS agents take action. |
|
41. PENTAGON AND HACKER HEADLINE (16:22:50-36:21) |
There are three basic cyber crimes that DCIS investigates: First is computer intrusions - when someone exploits a vulnerability in the system and gains unauthorized access. |
|
42. WINDOWS SOFTWARE (12:51:48-57:06) |
Second is the production of counterfeit computer software, including pirated software. |
|
43. AGENT AT COMPUTER (12:21:04-28:11) |
Third, and most costly of all, is denial of service attacks in which the hacker blocks or degrades a computer system. |
|
44. AGENT AT KEYBOARD (13:54:01-14:07:00) |
It’s a constantly evolving crime which requires specialized skills. That’s why trained intrusion experts are assigned to every DCIS field office. |
|
45. AGENT W/COMPUTER PARTS (14:07:01-16:08) |
They often work side by side with DCIS forensic agents who are trained to properly seize, protect and analyze computer evidence. |
|
46. YTCRACKER AT COMPUTER (14:36:10-42:01) |
Unfortunately, cyber crime seems to be how some people - especially juveniles - feel important. |
|
47. YTCRACKER PHOTO PULL BACK (15:46:09-57:27 48. BUILD GRAPHIC: COMPUTER CRIMES (16:09:00-22:06) |
But to DCIS such cases are serious and their perpetrators need to be treated seriously. DoD computer systems and those of its contractors and suppliers are critical. Intrusions can threaten national security. That’s why prosecutions should focus on deterrence as well as security. |
|
49. CYBERTERRORISM ON COMPUTER (16:41:29) |
In a
world where the safety of
|
|
50. CUT HACKER PROFILES PULL BACK TO AGENTS (16:56:00) |
DCIS can deliver nothing less. |
|
51. DIP TO BLACK; FADE UP ON CHYRON: DCIS AND ILLEGAL TECHNOLOGY TRANSFER |
INTERVIEW
(V-O 18:15:20-25:24): Our
Inspector General has stated that the lives of
|
|
52. INTERVIEW (18:25:25-37:00) |
(SYNC) I believe that sensitive
technologies and weapon components and programs in the wrong hands could
be used against the
|
|
53. SHOTS OF LASER TECH AND AGENTS W/EQUIPMENT (19:49:17-59:24) |
NARR (V-O): The DCIS Technology Protection Program investigates cases of illegal transfer or diversion of sensitive technologies, defense articles and munitions. |
|
54. NUKE EXPLOSION, CHEMICAL WARFARE (18:10:05-26:00) |
It’s a critical issue in a world where terrorism fuels a growing black market for weapons of all kinds, including weapons of mass destruction. |
|
55. DISSOLVE TO TANK THEFT (17:42:00) TANKS IN STORAGE AREA (1&:48:50) |
DCIS special agents focus on several key areas: First is economic espionage involving the DoD procurement process. Most of these cases involve the illegal diversion of property before it is demilitarized... |
|
56. TECH SHOTS (23:30:09-47:21) |
But DCIS also recognizes the threat to national security when sensitive DoD technical data is made available to contractors during the acquisition phase of DoD contracts. |
|
57. HEADLINE RE: ILLEGAL ARMS SALES (17:56:13-18:09:58) |
The theft or diversion of export controlled critical technologies from DoD-funded projects or foreign military sales programs is another concern. |
|
58. TECH SHOTS (18:56:19-19:08:44) |
Finally, dual use technology in which products or systems have private sector use as well as military applications remains a vulnerable area. |
|
59. UC FOOTAGE (19:21:50-32:02) |
DCIS vigorously pursues and actively investigates all leads in these areas. A major example of such law enforcement efforts is... |
|
60. SHIELD AM LOGO (19:32:22) |
Project
Shield
|
|
61. IRANIAN SHIPMENT HEADLINES, CUSTOMS INTERDICTIONS, BUSINESS MEETING (19:38:24-48:16) |
Project
Shield
|
|
62. AGENTS CUT OPEN CHAIN (20:05:56-11:10) 63. MISSILE FIRING (20:11:17) |
For the
DCIS Technology Protection Program, the bottom line is safety - for
And for
|
|
64. DIP TO BLACK; FADE UP ON CHYRON: DCIS AND FINANCIAL FRAUD |
MCINTOSH (V-O 24:40:09-47:25): Every crime that’s investigated by a DCIS agent involves some type of financial fraud or financial gain... |
|
65. MCINTOSH INTERVIEW 24:47:25-50:05 |
(SYNC) People commit it because they want to make money. |
|
66. TRIBUNE NEWSPAPER CLIPPING (25:01:00) |
NARR (V-O): When contractors defraud the Department of Defense for profit, DCIS takes action. |
|
67. CLIPPING + GRAPHIC (25:07-27) |
The agency’s Financial Crimes Program investigates significant contract, accounting and financial fraud schemes. |
|
68. UC FOOTAGE W/SUPER (25:16:13-38:40) |
Agents also focus on kickback schemes - particularly since the passage of the Anti-Kickback Act of 1986 which prohibits contractors from offering items of monetary value to government employees in order to win contracts. |
|
69. BUILD GRAPHIC FRAUD INDICATORS (25:39:15-56:24) |
Certain telltale signs alert DCIS to these illegal activities. They may occur during... |
|
. The contract solicitation phase,... |
||
. The evaluation and award phase,... |
||
. Or during contract negotiations. |
||
DCIS also watches out for indications of fraud involving government credit cards,... |
||
70. MAN PAYS BAR BILL W/CREDIT (25:58:14-26:04:24) |
...Such as purchase cards and travel cards. |
|
71. AGENTS TAKING OUT CARTONS OF FORMS (27:57:18-28:04:29) |
In addition, the agency takes a proactive approach to detecting financial fraud by conducting undercover operations. |
|
72. PAN OF BAYSHIP HEADLINE (28:49:24-58:21) |
The DCIS Financial Crimes Program holds contractors... |
|
73. MCINTOSH W/WOMAN (27:04:13-10:00) |
And DoD employees fully accountable for their actions... |
|
74. DIRECTING JET TO TAKE OFF (29:54:26) |
Because
|
|
75. DIP TO BLACK; FADE UP ON CHYRON: DCIS AND HEALTH CARE FRAUD |
LITTERELLE (V-O 31:13:15-16:24): I compare health care fraud to tax evasion... |
|
76. LITTERELLE INTERVIEW 31:16:25-22:20 |
(SYNC) ...It’s the greedy one who are not reporting their income or totally fabricating their information. |
|
77. LITTERELLE PICKS UP FORM FROM COPIER (31:30:03) |
NARR (V-O): The DCIS Health Care Fraud Program investigates falsified claims submitted to... |
|
78. DISSOLVE TO TRICARE LOGO ON FORM (30:50:16-59:10) |
...TRICARE, the health insurance company for active or retired military and their dependents. In most cases, the problems originate with the health care providers - ... |
|
79. HANDING OVER $ TO DR. (32:03:22-14:28) |
...The doctors and hospitals who are fraudulently billing the government and the insurance companies. Such fraud usually involves billing for services that were either not provided, or were not covered but were disguised as being covered, or just inflating their prices. |
|
80. MAN ON STRETCHER (30:46:28-50:14) |
One especially reprehensible scheme involves using higher paying codes when billing seriously ill patients who may be too sick to review the charges. |
|
81. GRAPHIC: $ RECOVERED (32:35:27) |
The numbers are staggering. In one year, DCIS recovered over 1.3 billion dollars attributed to TRICARE fraud. |
|
82. GRAPHIC: BILLING INDICATORS (31:46:11) |
To uncover these crimes, DCIS agents look for certain billing irregularieties. |
|
83. LITTERELLE REVIEWING CHART (31:51:02-32:02:26) |
They also consider medical discrepancies, such as a diagnosis or treatment inconsistent with a patient’s age or gender, or services inappropriate to the condition. |
|
84. BILLING CODES/TILT DOWN (34:24:09-34:19) |
Health care fraud assumes patients are either too intimidated or too confused to question their bills. |
|
85. AMBULANCE @EMER. ROOM (35:17:19-26:16) |
It assumes patients don’t care if their insurance gets ripped off - as long as they don’t have to pay. |
|
86. DR EXAMINING X-RAYS (35:27:03-31:57) |
But, in the end, everyone pays - either in higher premiums or higher taxes. |
|
87. ARREST FOOTAGE (35:59:01-36:06:04) |
That’s why DCIS continues to vigorously search out and expose health care fraud to protect the TRICARE System, and ultimately... |
|
88. CHOPPERS TAKING OFF FROM CARRIER (36:15:23) |
The health and well-being of the American warfighter. |
|
89. DIP TO BLACK; FADE UP ON CHYRON: DCIS AND ENVIRONMENTAL CRIME |
CONCHA (V-O 36:44:28-52:00): The Department of Defense spends a lot of money on environmental cleanups. Every time we issue a contract to clean up a site and it’s not done right,... |
|
90. CONCHA INTERVIEW (36:52:00-59:02) |
(SYNC) ...Not only do we have to pay again to have it done right but the damage to the environment becomes even greater. |
|
91. CHOPPER BEING FUELED (SMOKE) 36:03:10-37:08:50 |
NARR (V-O): Preparing America’s warfighters can sometimes adversely affect the environment. |
|
92. REMOVING CHEMICAL TANKS (37:14:02-32:37) |
When this happens the Department of Defense contracts with outside sources to assist in the cleanups. |
|
93. SPIN UP DCIS LOGO SUPERIMPOSED OVER ABOVE |
The DCIS Environmental Crimes Program is responsible for investigating contract fraud at any point in this process,... |
|
94. BEGIN GRAPHIC: DCIS INVESTIGATES... (37:37:06-47:56) |
Including the removal, transport and disposal of hazardous materials from DoD installations or related sites. |
|
95.
UC FOOTAGE (39:22:16) |
Special agents work closely with the EPA, as well as other federal and state agencies, to uncover fraudulent actions. |
|
96. CONCHA WALKING PAST TANKS (38:13:01-24:36) |
They focus on active DoD sites in an effort to uncover vulnerable areas likely to fall prey to fraud from unscrupulous contractors. |
|
97. MCU CONCHA TO TANKS (41:12:04-16:34) |
Leads often come from government inspectors, contractors even competitive companies. |
|
98. PULL BACK FROM PENTA. TANKS (39:57:10-40:07:20) |
But the goal is always the same: to hold contractors accountable for their actions. In the case of Callery Chemical it meant uncovering the illegal storage of... |
|
99. CUT TO LS EXPLOSION (40:39:04-46:10) |
...Highly explosive and hazardous waste. |
|
100. UC FOOTAGE (38:49:40-59:10) |
With Atlas Pumping, it meant discovering that the company contracted to dispose of military waste and then dumped it elsewhere on the base. |
|
101. AGENTS TRAINING IN SUITS (41:24:20-39:06) |
The DCIS Environmental Crimes Program stands committed to investigating and deterring environmental contract fraud because |
|
102. WS MILITARY EXERCISE (42:04:45-12:25) |
The
preparation of
|
|
103. DIP TO BLACK, FADE UP ON CHYRON: DCIS AND MAJOR THEFT |
ADAMS (V-O 43:18:18-29:01): If you work a major theft case and work it the same way you would a major complex white collar crime by interviewing witnesses, reviewing paperwork,... |
|
104.
(43:29:02-34:20) |
(SYNC) ...Using investigative tools like consensual monitoring, undercover agents, you’ll build a good solid case. |
|
105. EXT. PAN OF STORED EQUIPMENT (42:45:28-52:50) |
NARR (V-O): Military equipment has been stored for years throughout this country - either waiting to be used or demilitarized and sold for scrap. |
|
106. PAN FROM BLDG TO OLD TANK (43:00:50) + SWING
|
When a major theft of DoD property occurs, DCIS swings into action. |
|
107. BUILD “MAJOR THEFT” GRAPHIC (43:07:00-18:01) |
There are several criteria for what constitutes major theft: . Dollar amount - the costs of the stolen property must be substantial, . The critical nature of what was stolen, . And where the crime took place. |
|
108. AERIAL OF FORT MCCOY EQUIPMENT (43:35:10-43:07) |
Operation Breech Block was the largest theft of military equipment in DoD history and is a good example of how DCIS works such cases. |
|
109. PAN OF PIATZ IN NEWS CLIPPING (43:44:20-54:10)+PAN TANKS (44:09:23-17:19) |
Leo Anthony Piatz took vehicles which were to be used as targets on an Army tank range and planned to sell them to collectors for profit. |
|
110. MCU
ADAMS AT DESK THEN CUT TO OTS
|
Working jointly with the FBI, DCIS undercover agents gained Piatz’s confidence. His inside evidence was enough to send him - and all those who helped him - to jail. |
|
111. PAN TANKS, PULL BACK TO LOCKED CHAIN (44:35:19) |
The agency vigorously pursues such cases because loss of DoD property costs taxpayers money. |
|
112. NIKE MISSILE SHOTS (48:01:23-08:22) |
More
ominously, major theft of military equipment could - in the wrong hands -
be used against
|
|
113. MONTAGE OF AGENT SHOTS (SEE SCENES 32, 45, 62, 73, 83, 97, 110 + 22:33:10) |
(FADE IN CLOSING THEME) With such a broad and varied mission, DCIS depends on its talented, dedicated and professional workforce for excellence. |
|
The agency strives for the continued development of its people and the effective use of all applicable resources. |
||
114. FLAG WAVING (5:13:23); SUPER MOTTO UNDER: PROTECTING
|
For everyone at DCIS working hard to detect and deter crime within the DoD, Protecting America’s Warfighters is more than just a motto - it’s a promise. |
|
115. . DISSOLVE TO HOTLINE TAG/GRAPHIC |
(FADE MUSIC UNDER) NARR (V-O): If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. Help
protect
|
|
116. DIP TO BLACK, ROLL CREDITS |
(FADE MUSIC UP) |
|
117. END CREDITS ON DCIS LOGO THEN FADE TO BLACK |
(BRING MUSIC TO FLOURISH, THEN FADE OUT) |
|
VISUAL |
AUDIO |
|
1. FADE
UP ON TAPE
DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS: |
(FADE UP SFX: CHOPPER NOISE): |
|
1A. CONT. ABOVE; SUBSTITUTE SUPER: PROTECTING
|
(CONT. SFX) |
|
1B. CUT
TO TAPE
...FROM PRODUCT SUBSTITUTION |
(CONT. SFX, FADE UP HIGH) (ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS) |
|
2. DIP TO BLACK; FADE UP ON STOCK FOOTAGE: (MILITARY EXERCISES) |
[
|
|
3.
DISSOLVE TO
KEVIN
SPECIAL AGENT, DCIS |
(SYNC) That’s serious and that’s what can happen when you substitute the wrong product or provide a defective product. It ranks, as far as protecting the American Warfighter, right up there with the anti-terrorism effort.] |
|
DIP TO BLACK |
||
4. FADE UP ON LS CONSUMERS IN LARGE STORE |
(FADE UP OPENING MUSIC- FAST BEAT) NARR (V-O): As consumers, we depend on products to do what they’re supposed to. |
|
5. CUT TO STOCK FOOTAGE (MILITARY EXERCISE) |
This is especially critical in military conditions, where equipment failure can have deadly consequences. For this reason, unauthorized product substitution in Defense contracts remains a DCIS top priority. |
|
6. CUT TO GRAPHIC: DCIS LOGO; SUPER: CASELOAD: THREE CRITICAL PRODUCT SUBSTITUTION SCHEMES |
The agency’s investigative caseload is focused on three critical areas: |
|
7. NEWS FOOTAGE TAPE 2:05:6 (COUNTERFEIT PARTS) |
Counterfeit parts... |
|
8. CUT
TO TAPE
|
Defective parts... |
|
9. CUT
TO TAPE 2:
|
And other substituted products. |
|
10. CUT TO TAPE 2:6:28 (AIR PRO BLDG) |
The goal is to deter unscrupulous contractors from engaging in these activities, and if they do... |
|
11. CUT
TO TAPE
|
To detect the crime, vigorously investigate it and prosecute the perpetrators to the full extent of the law. |
|
12. CUT
TO DoD TAPE
|
Particular emphasis has been placed on those cases involving military readiness... |
|
12A CONTINUE ABOVE FOOTAGE AS C130 PASSES OVER THEM |
And safety of flight issues. |
|
13. CUT
TO
|
[
|
|
14. CUT
TO TAPE
|
(V-O) If the aircraft crashes, the investigation could fall into the murder category.] NARR (V-O): The case against Boeing illustrates how serious these situations can be. |
|
15. CUT
TO TAPE
|
It involved the CH-47D Chinook - one of the workhorses of the military. |
|
16. CUT
TO TAPE
|
It was alleged that Boeing knowingly placed defective gears in the aircraft, gears that resulted in several incidents,... |
|
17. CUT
TO TAPE
|
Including
a deadly crash in
|
|
18. CUT
TO TAPE
|
And
another in
|
|
19. CUT
TO TAPE
|
The DCIS case began with information from a former quality engineer with Boeing subcontractor, Speco Corporation. |
|
20. CUT
TO TAPE
|
It was the employee’s contention that Boeing wanted gears made from an alloy patented by the corporation. Unfortunately those gears were defective... |
|
21. CUT
TO TAPE
|
The employee went to DCIS with his suspicions. He showed them test results indicating cracks in the metal. Follow-up tests showed the same faults. |
|
22. CUT
TO TAPE
|
After years of investigation by DCIS and the U. S. Army Criminal Investigation Command, the Chinook fleet was grounded... |
|
23. CUT
TO TAPE
|
And its gears replaced. |
|
24. CUT
TO TAPE
|
Backed by evidence uncovered by DCIS, the government took Boeing to court. The prosecution alleged that the corporation had knowingly sold the U. S. Army more than 140 Chinook helicopters with defective gear. |
|
25. CUT
TO TAPE
|
Five years later Boeing settled... [DAN
RATHER (SYNC): Boeing today
agreed to pay more than 54 million dollars to settle lawsuits over faulty
gears in
|
|
CONTINUE ABOVE |
Information from responsible citizens is just one way in which DCIS finds out about illegal product substitutions. |
|
26. DISSOLVE TO GRAPHIC: DCIS PRODUCT SUBSTITUTION LEADS: . EMPLOYEES . HOT LINE . CONTRACTORS |
The agency also gets leads from the general public - through the DoD Hot Line - and from contractors dissatisfied with the products supplied to them from their subcontractors. |
|
27. WIPE
CHYRON LEFT 1/2, ON RT ADD FOOTAGE NARAS TAPE
. DCIS-INITIATED INVESTIGATIONS) |
In addition, DCIS takes a proactive approach to deterring fraud by conducting their own undercover operations. |
|
28. CUT TO MS BOYNE GETTING CALL ON PHONE |
Still, the majority of leads are referred from government or military quality assurance inspectors. This was the case with Lucas Engineering... |
|
29. DISSOLVE TO TAPE
|
Lucas Western manufactured Airframe Mounted Accessory Drives - AMADs - and Azimuth Drive Units or ADUs for the military. |
|
30. CUT
TO TAPE
|
According to the Defense Contract Management Area Operations, faulty AMAD gear boxes in Navy F-18s were suspected in a number of life-threatening incidents. |
|
31. CUT
TO TAPE
|
[WOMAN
(SYNC): During a combat
mission in the
|
|
(CONTINUE ABOVE FOOTAGE: LIST OF PROBLEMS) |
(V-O) In flight fires precipitated by AMAD failures caused damage to numerous aircraft. There were over 150 emergency landings and aborted takeoffs. This caused countless aborted missions and additional aircraft downtime.] |
|
32. CUT
TO TAPE
|
NARR (V-O): DCIS was contacted and an investigation begun... |
|
CONTINUE,
TAPE
|
[DCIS SA (SYNC): The investigation disclosed that Lucas had stamped inspection records as if parts had been inspected when in fact no inspections were ever conducted. This is a process know as “hot-stamping.” Additionally, they had certified that parts had passed inspection when Lucas knew the parts had failed.] |
|
33. CUT
TO TAPE
|
NARR (V-O): The extent of these failures became evident when a joint Lucas - government teardown of both AMADs and ADUs was conducted. |
|
135 F-18 and multiple rocket launch gear boxes were inspected. 100% failed. |
||
34. CUT
TO TAPE
|
Each gear contained over 6 class one non-conformances that could have led to a catastrophic failure. |
|
35. CUT TO TAPE
|
The results of the investigation were so stunning that, at one point, all F-18s were grounded. |
|
36. CHYRON: RESULTS OF PROSECUTION: . GUILTY 37 COUNTS FALSE STATEMENTS . $18.5 MILLION FINE . $88 MILLION CIVIL DAMAGES |
Faced with this evidence the company pled guilty to 37 counts of making false statements. Consequently, Lucas Western was fined 18.5 million dollars and paid $88 million in civil damages to the DoD. |
|
37. CUT
TO TAPE
|
[PROSECUTOR
OR
|
|
38. CUT
TO TAPE
|
NARR (V-O): In this case, as in almost all product substitution cases, greed overcame ethics. The company chose to supply inferior parts to fulfill its contract rather than pass up payment. |
|
Corporate officials tend to rationalize such behavior in a rather unique way... |
||
39. CUT TO
|
[
|
|
I think that’s a terrible way to think of things because it’s more likely to get someone killed than any other way. | ||
40. CUT TO MS BOYNE INTERVIEWING SOMEONE (BLUR INTERVIEWEE FACE) |
NARR (V-O): The crime of product substitution - in whatever form it takes - is a grave offense. That’s why DCIS vigorously investigates each and every allegation. Agents look for a number of things: |
|
41. CHYRON: INDICATORS:
|
Unauthorized quality assurance practices, a history of poor performance by the contractor, a negative pre-award survey, unusually low bids, foreign made parts or materials, and the misuse of fast pay contracts. |
|
42. CHANGE CHYRON: INDICATORS:
|
Sometimes the problem is obscured by improper government practices such as: too-heavy reliance on the contractor’s documentation, or insufficient quality assurance practices. |
|
43. CUT
BACK TO TAPE
|
DCIS combs through reams of evidence to identify and investigate these criminal cases. The effort is as much deterrence as it is detection. |
|
44. CUT
TO
|
[
|
|
45.
STOCK FOOTAGE: MILITARY TAPE: SOLDIER W/WEAPON (
|
NARR (V-O): When it comes to military service members being able to depend on their equipment... |
|
46.
STOCK FOOTAGE SHOWING SOLDIERS MOVING (MILITARY TAPE (
|
It may mean the difference between life and death. Product substitution in defense contracts is intolerable and unsafe... |
|
47. CUT
TO TAPE
|
And DCIS will continue to investigate these cases to their just conclusion. |
|
48. CUT
TO MILITARY TAPE FOOTAGE PLACING MISSILE ON LAUNCHER (
|
(FADE IN CLOSING MUSIC UNDER) Because protecting the American Warfighter means guaranteeing their equipment is safe... |
|
49. STOCK FOOTAGE MISSILE STRIKE |
And effective. |
|
50. DISSOLVE TO HOTLINE TAG/GRAPHIC |
(FADE MUSIC UNDER) NARR (V-O): If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. Help
protect
|
|
79. DISSOLVE/ROLL CREDITS; FADE TO BLACK |
(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT) |
|
VISUAL |
AUDIO |
|
1. FADE UP ON CU REAR ENGINE OF JETFIGHTER (OR ROTOR OF CHOPPER); SUPER UNDER: DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS: |
(FADE UP SYNC LOUD) |
|
1A. PULL BACK TO SHOW JET OR CHOPPER TAKING OFF; SUBSTITUTE SUPER: PROTECTING
WARFIGHTERS |
(CONT. SYNC) |
|
1B. AS JET/CHOPPER FLIES OFF FADE OUT BKGD VISUALS; KEEP TITLE; ADD CHYRON (SUBTITLE): ...FROM COMPUTER CRIME |
(FADE OUT SYNC) (ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS) |
|
2. DIP TO BLACK; FADE UP ON ECU AGENT’S HAND USING MOUSE |
[ZIEGLER (V-O): The internet is wide open. |
|
2A. PULL BACK, PAN TO SHOW OTS ZIEGLER WORKING AT COMPUTER |
There are literally thousands of calls that come in to law enforcement each day from people that are ripped off on the internet. |
|
3. CUT TO ZIEGLER INTERVIEW; SUPER: PAUL ZIEGLER (NEED TITLE: DCIS COMPUTER CRIMES PROGRAM) |
(SYNC) Then there are intrusions where people exploit a vulnerability to access a computer system. Counterfeit cases - such as pirated software. And, most costly of all, denial of service attacks...When these incidents involve the Department of Defense, DCIS computer forensic agents gets involved.] |
|
4. DISSOLVE TO MS OFFICE WORKER TURNING ON COMPUTER, PULL BACK AND BOOM UP TO SHOW LARGE OFFICE W/CUBICLES |
(FADE UP SYNC, TURNING ON COMPUTER - KEYSTROKES, MICROSOFT WINDOWS OPENING, ETC.) NARRATOR (V-O): Like it or not, we live in an electronic world. Business and industry depend on it. Personal communications depend on it. |
|
5. CUT/PAN ARRAY OF COMPUTER SCREENS AT DOD INSTALLATION |
And the DoD depends on it. Computers
have become essential to
|
|
6. CUT TO YT CRACKER DEFACEMENT ON DCMA WEB SERVER; SPIN UP DCIS |
When criminals hack into DOD systems - or commit other computer related crimes - DCIS agents take action. |
|
7. MAINTAIN SUPER; FOR BKGD CUT TO MS JIM IVES AT COMPUTER |
Agents respond immediately to suspected intrusions involving the Defense Information Infrastructure. |
|
8. CUT TO CHYRON: DCIS COMPUTER CRIMES PROGRAM:
|
DCIS Agents also conduct investigations into other internet and computer crimes with a DOD nexus - including costly denial of service attacks against DOD contractors. |
|
9. CUT TO DIAGRAM OF TYPICAL DOS ATTACK (SEE CERT.ORG) |
In these cases, perpetrators intentionally degrade or block a computer network - in effect, bringing companies to a standstill. |
|
DCIS
responds to such contractor incidents because it’s in
|
||
10. CUT TO ZIEGLER INTERVIEW |
[ZIEGLER (SYNC): If a hacker gains access to a contractor’s system, not only is that corporation victimized, the DoD is also victimized. That’s because there may be proprietary information contained in that network which could be unlawfully accessed.] |
|
11. CUT TO PIRATED COPY OF WINDOWS SOFTWARE; SUPER UNDER: DCIS COMPUTER CRIMES PROGRAM:
|
NARR (V-O): DCIS agents investigate other computer-related crimes as well - such as counterfeit software. |
|
12. PAN TILT UP TO SHOW DCIS AGENT HOLDING CD; REPLACE ABOVE BULLET W/: PROVIDE FORENSIC EXPERTISE IN COMPUTER-FACILITATED CRIMES |
They also provide forensic expertise to investigations where computers are used to further illegal activity. These can range from distribution of child pornography to the production of fraudulent documents. |
|
13. FADE OUT BKGD; MAINTAIN SUPER, ADD:
|
DCIS intrusion agents develop intelligence on trends and criminal enterprises likely to threaten the Defense Information Infrastructure. They also assist in analyzing, reporting and correcting vulnerabilities in the system. |
|
14. DISSOLVE TO HIGHLIGHTED CASE REPORT INDICATING COOPERATION W/NASA |
Finally, DCIS coordinates with the rest of DoD and other government agencies in this technically challenging area. |
|
15. CUT TO CU IVES PEERING AT COMPUTER SCREEN |
How challenging is it? Case agent Jim Ives explains... [IVES (V-O): Vulnerabilities are constantly being discovered...] |
|
16. CUT TO IVES INTERVIEW; SUPER: JIM IVES (NEED TITLE) |
(SYNC) It’s daunting to try to keep up with every patch. In reality it’s almost impossible to do that, and hackers take advantage of that.] |
|
17. CUT BACK TO IVES AT COMPUTER |
NARR (V-O): Such a constantly evolving crime requires specialized skills. That’s why trained intrusion experts are assigned to every DCIS field office. |
|
18. WS OF AGENT IMAGING HARD DRIVE FOR DATA RETRIEVAL; PAN DOWN AND ZOOM IN TO ECU PROCESS |
In addition, there are DCIS agents in each field office who are trained to properly seize, protect and analyze computer evidence. These forensic agents work closely with case agents to ensure that no evidence is lost or overlooked. |
|
19. CUT TO STOCK FOOTAGE: ECU AGENT(ACTOR) IN WITNESS STAND; PULL BACK TO MS |
The agents will testify in court as forensic computer experts. But while the crimes may be technical and complex... |
|
20. CUT TO LOGO OF YT CRACKER |
The motivation of the perpetrators tends to be fairly simple. Listen to the hacker calling himself YTCracker... |
|
21. NEWS FOOTAGE: YTCRACKER (TAPE1:02) |
[YTCRACKER (SYNC): . KIDS LIKE HIM RULE THE WORLD |
|
22. CUT BACK TO NEWS FOOTAGE: YTCRACKER AT COMPUTER |
[SYNC UNDER] NARR (V-O): Cybercrime seems to be how some people - particularly juveniles - feel important. |
|
22A. CONT. NEWS FOOTAGE: SCROLLING COMPUTER TEXT |
For YTCracker, a 17-year old dropout, this meant compromising and defacing multiple websites. |
|
23. CUT TO IVES WORKING AT COMPUTER |
He came to the attention of DCIS when he illegally accessed a Defense Contract Management Agency web server. |
|
24. CUT TO CU YTCRACKER’S GRAPHICS/TEXT (SCROLL DOWN) |
Once inside, he replaced DCMA information with text and graphics in which he bragged about his exploits. The pattern was repeated on over 40 web sites - including servers maintained by NASA, the National Aeronautics and Space Administration. |
|
25. CUT TO GRAPHIC SCREEN; ADD LOGOS (DCIS, FBI, NASA) |
Investigators quickly took action. Agents from DCIS, NASA as well as the FBI began to close in on the juvenile. |
|
26.
MAINTAIN ABOVE; FADE IN
|
Meanwhile,
police in
|
|
27. CUT TO PIC OF YTCRACKER **Do not use photo! |
The minor responsible for the defacements was soon identified and agents began to build their case. |
|
YTCracker knew they were on to him... |
||
28. CUT TO NEWS FOOTAGE; YTCRACKER TALKING |
YTCRACKER (SYNC): . REMARK RE: AMT OF INFO ON HIM |
|
29. FREEZE FRAME ON YTCRACKER; SUPER IN RED: GUILTY |
NARR
(V-O): The 17-year old
suspect eventually confessed to one count of computer crime under
|
|
30. CUT TO YTCRACKER LOGO/TEXT |
YTCracker’s crimes were not malicious. No sensitive or classified materials were compromised. |
|
31. GRAPHIC SHOWING COSTS FOR ANALYZING SITE FOR SECURITY BREACHES, REPAIRING SITE, TIME OFFLINE |
But the defacements were costly. Consider the time it took for each site to check the security of its information, repair the damage and get back on-line. |
|
32. CUT TO IVES INTERVIEW (MOS) |
The youthfulness of these perpetrators and the relatively trivial motive for the attacks may mask their importance. But to DCIS, cases like these are serious. |
|
ADD SOUND TO ABOVE |
[IVES (SYNC): . NEED TO TREAT PERPS MORE SERIOUSLY . SYSTEMS CAN BE CRITICAL . INTRUSIONS CAN THREATEN NATIONAL SECURITY . PROSECUTE FOR DETERRENCE AS MUCH AS SECURITY] |
|
33A1. CUT TO NEWS ARTICLE RE:
CORPORATE RAIDER CASE (IF AVAILABLE, IF NOT USE
|
NARR (V-O): The sobering fact is not all computer intrusions are youthful joyrides through the electronic world. Typically, so-called corporate raiders are often typically company employees who break into a competitor’s network for financial gain. |
|
33A2. DVE: FLIP AS IF MICROFICHE, NEW ARTICLE ON VIRUS ATTACK |
And, worldwide, terrorists have already attacked key business systems through the internet. |
|
33B. DVE (SAME AS ABOVE), 2ND ARTICLE ON VIRUSES |
Indeed, all types of computer crime are on the rise. And these increasing numbers are stretching thin the limited number of qualified investigators. |
|
What’s more, system intrusions and other computer attacks tend to present their own peculiar investigative challenges. |
||
34. CUT TO CU MONITOR W/HACKER CHAT ROOM SHOWING |
For example, hackers often socialize with each other online, forming groups to share information. These can range from the benign... |
|
35. CUT TO ANGRY HACKER WEB SITE (E.G., S.O.N.) |
To the predatory. |
|
3 |
For investigators, breaking into these groups can be difficult... |
|
3 |
[IVES (SYNC): It’s a very close knit group with their own set of rules. For example, they use their own language in their chat rooms which is a real problem for law enforcement. You have to break their code so to speak.] |
|
38. CUT TO ARTICLE IN ABOVE WEB SITE INDICATING NEW VULNERABILITY OR HACKING TECHNIQUE |
NARR (V-O): It also means keeping up with the latest trends in cybercrime. Hackers frequently publicize newly found vulnerabilities in software or systems. Or they may share intrusion techniques. One such technique, called dumpster diving, involves individuals searching for access codes. |
|
39. CUT TO WEB SITE PROVIDING PASSWORD SNIFFER PROGRAM |
Some even provide software which allows users to pinpoint passwords that can be used to illegally access computer networks. Then there’s the sheer length of time it takes to work a computer crime. |
|
40. CUT TO COMPUTER LOGS, SCROLL DOWN |
Investigations often take months, even years, to track down the identities of cybercriminals. It can be particularly frustrating to companies and organizations that fall victim to these attacks. [IVES (V-O): Depending on the sophistication of the hacker,... |
|
41. CUT TO IVES INTERVIEW |
(SYNC) ...He can take you
overseas and you’ll have to work with foreign law enforcement entities and
court systems, some of whom may not have reciprocal agreements with the
|
|
41A. NU ANGLE IVES INTERVIEW |
DCIS advises - be patient, but try to understand the fact that there are so many hurdles in these kinds of investigations, it can be exceedingly lengthy.] |
|
42. DISSOLVE TO EXT. WS OF LARGE DoD CONTRACTOR HQ |
NARR (V-O): So what should DoD contractors and employees do when faced with a cyber incident? |
|
[ZIEGLER (V-O): Most people don’t realize how vulnerable they are. They don’t expect to be attacked.> |
||
43. DISSOLVE TO ZIEGLER INTERVIEW |
ZIEGLER (V-O) Most people don’t realize how vulnerable: they are. They don’t expect to be attacked. (SYNC) DCIS recommends that procedures and guidelines be developed to react to an incident - whether its an internal threat or one via the internet. Then , oncean unauthorized access to their system has been identified, and they’ve taken steps to safeguard their information, contact DCIS to investigate.] |
|
44. CUT TO SHOW OF ZIEGLER, IVES AND OLMSTEAD MEETING AT COMPUTER STATION |
NARR (V-O): DCIS can and will provide a prompt and effective response to all computer crimes that involve the DoD. |
|
45. DISSOLVE TO WS OF AIR TRAFFIC MONITORS |
(FADE IN CLOSING MUSIC) In an electronic environment... |
|
46. SHOT OF JETFIGHTER TAKING OFF |
- Where
the strength and safety of
|
|
47. CUT TO LO ANGLE FACE OF CONTROLLER AT COMPUTER |
Nothing less is to be expected. |
|
48. CUT BACK TO SHOT OF ZIEGLER ET AL, ZOOM IN TO DCIS LOGO OR OTHER ID IN ROOM |
And nothing less is delivered. (FADE CLOSING MUSIC UP) |
|
49. DISSOLVE TO HOTLINE TAG/GRAPHIC |
(FADE MUSIC UNDER) NARR (V-O): If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. Help
protect
|
|
50. DISSOLVE TO CREDITS |
(FADE MUSIC UP FULL) |
|
51. END CREDITS ON LOGO, FADE TO BLACK |
(BRING MUSIC TO FLOURISH THEN FADE OUT) |
|
VISUAL |
AUDIO |
|
1. FADE UP CU SHOTS OF SENSITIVE TECHNOLOGY (DCIS TAPE 10:18-22): DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS: |
(FADE UP ACCOMPANYING SOUND) |
|
1A. QUICK CUT TO MS LAB WORKER (DCIS TAPE 2:15-19) SUBSTITUTE SUPER: PROTECTING
WARFIGHTERS |
(CONT. ABOVE |
|
1B. CUT TO CASUALTY (DCIS TAPE 0:018); KEEP TITLE; ADD CHYRON (SUBTITLE): ...FROM ILLEGAL TECHNOLOGY TRANSFER |
(CONTINUE SOUND FROM 9/11) (ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS, FADE TO SILENCE) |
|
2. DIP TO BLACK; FADE UP ON AERIAL OF PENTAGON DAMAGE (STOCK) |
[WILLIAMS
(V-O): Our
Inspector General has stated that the lives of
|
|
3. MCU WILLIAMS INTERVIEW |
(SYNC) I believe that sensitive
technologies and weapons components and programs - in the wrong hands -
can be used against the
|
|
4. DIP
TO BLACK FADE UP ON
|
(FADE UP SOMBER OPENING MUSIC TRACK UNDER) NARRATOR (V-O): Terrorism is no longer a regional issue. One look at a newscast will tell you that. |
|
5. RICIN ATTACK FOOTAGE (DCIS VIDEO 1:10-18) |
Worldwide, terrorist attacks have increased alarmingly...and, with it, has grown a black market for weapons of all kinds, including weapons of mass destruction. (FADE MUSIC OUT) |
|
6. CUT TO MASKED LAB WORKERS (DCIS VIDEO 4:20-30); DVE: SPIN UP TO CENTER DCIS LOGO |
Keeping the technology necessary to create those weapons of mass destruction, as well as other weapon systems and components, out of the hands of terrorists is the mission of the DCIS Technology Protection Program. |
|
7. WS SEAPORT/ LOADING FREIGHT (DCIS VIDEO 8:39-46); SUPER UNDER: DCIS TECHNOLOGY PROTECTION PROGRAM INVESTIGATES: . ILLEGAL TRANSFER/ DIVERSION OF SENSITIVE TECHNOLOGY, DEFENSE ARTICLES/MUNITIONS |
Specifically, DCIS investigates cases of illegal transfer or diversion of sensitive technologies, defense articles and munitions. |
|
8. CUT TO FOOTAGE OF WEAPON LAUNCHERS (FOOTAGE FROM DVD MAJOR THEFT SEGMENT); SUPER: . ECONOMIC ESPIONAGE RE: DOD PROCUREMENT PROCESS |
Agents also work cases involving economic espionage involving the Department of Defense procurement process. The majority of these investigations focus on illegal diversions of property before it is “demilitarized.” |
|
9. CUT TO HEADLINE RE: NORMON FOX STEALING DATA (WA POST 11/16/94) |
Other cases involve theft or diversions of export controlled critical technologies from DOD funded projects or foreign military sales programs. Since 9/11 this threat has become increasingly real... |
|
10. MCU WILLIAMS INTERVIEW |
(SYNC) WILLIAMS: The events of September 11th
opened
|
|
11. CUTAWAY TO UC FOOTAGE OF DEAL GOING DOWN (SHIELD AM VIDEO 7:45-8:06, 8:30-37) |
(V-O) We now recognize that biological or chemical agents, the stuff that goes into weapons of mass destruction, can easily be diverted from government funded R&D projects by insiders who have access to the technology. These people then turn around and sell this technology to the highest bidder. |
|
12. CUT BACK TO MCU WILLIAMS |
(SYNC) It’s our job to make sure that this doesn’t happen, or if it does, to detect the problem and interdict the criminals. |
|
13.
DISSOLVE TO SHIELD
|
NARR
(V-O): A major example of
such law enforcement efforts is Project Shield
|
|
14. CUT TO CUSTOMS INSPECTORS (SHIELD AM VIDEO 1:28-38) |
Conducted jointly by DCIS and the Bureau of Immigration and Customs Enforcement,... |
|
15. CUT TO BUS ADMIN MTG (DCIS VIDEO 7:29-42) |
This industry outreach program identifies and investigates leads involving... |
|
16. CUT TO LASER FOOTAGE (DCIS VIDEO (3:08-15) |
Weapons of mass destruction components and technology. |
|
17. INSPECTORS X-RAYING BOXES, FREIGHT (SHIELD AM VIDEO 13:18-29) |
It also helps agents detect illegal diversions of export-controlled munitions and defense related technologies. As such it is one of the primary national law enforcement initiatives for Homeland Security. |
|
18. CUT TO BUST FOOTAGE/CUTTING LOCK (SHIELD AM VIDEO 7:23-34) |
The
threat is very real. Since
Project Shield
|
|
19. BUILD 4-WAY (STOCK FOOTAGE OF RADAR DISHES, AK47s, AIRCRAFT ENGINE, SATELLITE) |
Attempts
to send howitzers, radar and unmanned aerial “drone” parts to
|
|
20. CUT
TO AP HEADLINE RE:
|
One such
case involved a company called Multicore, a
|
|
21. CUT TO AERIAL WAREHOUSE (DCIS VIDEO 3:00-06), CUT TO SEAPORT LOADING FREIGHT (8:39-46) |
Its
|
|
22. USE DCIS POWER POINT GRAPH SHOWING MULTICORE OPERATION (HIGHLIGHT SEGMENTS AS MENTIONED) |
Typical
of these kinds of operations, the set-up involved transshipments through a
freight forwarder. The
payments were placed initially in a foreign bank account before finding
its way to suppliers in the
|
|
23. CUT TO WILLIAMS INTERVIEW |
WILLIAMS
(SYNC): This was a classic
case. According to
authorities, Multicore conducted no legitimate business and was receiving military purchasing
instructions directly from
The
evidence seems to support that conclusion. In fact, some of the parts found
in the raid on the
|
|
24. STOCK FOOTAGE OF F-14s |
(V-O) Interestingly, the F-14 is flown
by only two military services in the world: the
|
|
24A. CONT. ABOVE; DISSOLVE TO AERIAL OF OFFICE PARK (DCIS VIDEO 5:57-6:00) |
NARR
(V-O): Multicore was shut down but not before its offices
yielded leads to a number of other
|
|
CONTINUE ABOVE |
Spin-off cases are often generated by ongoing DCIS investigations. |
|
25. DVE: PULL UP CIA AND DOD LOGOS |
An emerging source of potential leads is coming from the Intelligence community and DoD counterintelligence. |
|
26. DISSOLVE TO CUSTOMS OFFICER REVIEWING SHIPPING LISTS (SHIELD AM VIDEO 9:40-50) |
The bulk
of technology protection cases, however, derive from DoD contractors and vendors as a direct result of
Shield
|
|
27. CUT TO CUSTOMS OFFICER W/BUSINESS PERSON (SHIELD AM VIDEO 11:07-12) |
The Project not only enhances public awareness, it also provides for private sector input regarding suspicious transactions. |
|
28. CUT TO OTHER SHOT OF AGENTS W/BUSINESS PERSON (3:13-21) |
It is this sharing of information - between industry and law enforcement and also between intelligence agencies and law enforcement - that is the critical element in the development of Technology Protection cases. |
|
29. GRAPHIC: SCROLL VARIOUS SIZED LOGOS OF DoD CONTRACTORS ACROSS SCREEN |
It is also one of the challenges associated with these kinds of investigations. Getting industry sources to open up and cooperate is a special skill refined by DCIS agents. |
|
30. AIRPORT AERIAL (SHIELD AM VIDEO 5:40-50) |
Another important skill and challenge involves tracing evidence on both a National and International Level. |
|
31. CUT TO AIRBORNE JET TAXIING (9:24-32) |
Agents need a thorough knowledge of export control laws and regulations. They also need a practical understanding of the pros and cons of utilizing various evidence collection and presentation techniques to bolster subsequent prosecution. |
|
32. CUT TO B-ROLL: WILLIAMS REVIEWING EXPORT LICENSE REPS OR CUSTOMS DECLARATIONS |
(V-O) WILLIAMS: A DCIS agent who works Technology Protection cases has to know how to develop parallel investigations that may involve classified leads from Intelligence sources. A “parallel investigation” is defined as taking the classified lead and developing the same, or similar lead information from parallel “open” sources, i.e. publicly available journal articles, review of Customs declarations, review of export license representations. In other words, they need to know how to use unclassified Government or publicly available information to further develop the leads information without attribution to the classified information. |
|
33. CUT BACK TO CU WILLIAMS INTERVIEW |
(SYNC)
But probably the greatest challenge for the criminal investigator in this
environment is recognizing when to utilize criminal sanctions in
convicting a perpetrator and when to use alternative resolution. For example, it may be necessary
to interdict shipment of a weapon of mass destruction to foil a terrorist
plot even though that action could ultimately jeopardize prosecution in a
|
|
34. DIP
TO BLACK; FADE UP ON STOCK NEWS FOOTAGE OF
|
(FADE IN CLOSING MUSIC) NARR (V-O): The changing international scene has made obtaining the materials needed to make a weapon of mass destruction easier than ever. |
|
35. CUT TO WS CROWDED PORT (DCIS VIDEO 6:08-23) |
Despite tough export laws, enforcement faces daunting challenges. |
|
36. CUT TO LASER SHOTS (DCIS VIDEO 3:30-38) |
Dual use technology - that which has private sector use as well as military applications - remains a vulnerable area. |
|
37. CUT TO UC/STING FOOTAGE (SHIELD AM VIDEO 8:54-9:16) |
Economic espionage, diversion of controlled critical technology by industry insiders, outright theft - all of these activities pose a threat to national security. The DCIS has recognized the threat to sensitive Department of Defense technical data that is available in to contractors in the acquisition process, especially with regard to research and development contracts. The DCIS has and will continue to pursue thefts of Defense related proprietary information and trade secrets in concert with other Federal law enforcement agencies, i.e. FBI, and BICE. DCIS agents are committed to preventing and disrupting any illegal transfers or diversions of sensitive technologies, defense articles and munitions. |
|
38. CUT TO MS WILLIAM WALKING IN PORT AREA (B-ROLL) |
For the Technology Protection Program the bottom line is safety - the safety of our country, the safety of the American people and the safety... |
|
39. CUT TO STOCK FOOTAGE FIGHTER TAKING OFF |
Of the American Warfighter. (FADE MUSIC UP/SYNC ENGINE) |
|
40. DISSOLVE TO HOTLINE TAG/GRAPHIC |
(FADE MUSIC UNDER) NARR (V-O): If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. Help
protect
|
|
41. DISSOLVE/ROLL CREDITS; FADE TO BLACK |
(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT) |
|
VISUAL |
AUDIO |
|||
1. FADE
UP ON DCIS SPOOL FOOTAGE
DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS: |
(FADE SYNC FROM TAPE UP - SEE LEFT) |
|||
1A. CONTINUE ABOVE SUBSTITUTE SUPER: PROTECTING
WARFIGHTERS |
||||
1B.CUT TO ECU FINGERS USING ADDING MACHINE; ADD CHYRON (SUBTITLE): ...FROM FINANCIAL CRIME |
(FADE IN SFX: FINGER TAPS ON ADDING MACHINE) (ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS) |
|||
2. DIP TO BLACK; FADE UP ON MCINTOSH INTERVIEW; SUPER: T.C. McINTOSH (NEED TITLE |
[MCINTOSH (SYNC): Every crime investigated by a DCIS agent has some type of financial angle to it. It’s fraudand people commit fraud for financial gain.] |
|||
3. DIP
TO BLACK;
|
(FADE UP
FOOTAGE OF
NARRATOR
(V-O): Some historians
contend that
|
|||
4. DCIS SPOOL FOOTAGE (JET MID AIR FUELING) |
Certainly, it takes a robust and ethical economy to support America ’s Warfighters. |
|||
5. ECU PAN OF “TAP” HEADLINE |
When contractors defraud the Department of Defense for profit, that’s when DCIS gets involved. |
|||
6. DISSOLVE TO CHYRON: DCIS FINANCIAL CRIMES PROGRAM:
|
Specifically, the agency’s financial crimes program investigates significant contract, accounting, and financial fraud schemes. |
|||
7. CUT
TO TAPE
|
(SYNC VIDEO FOOTAGE UNDER) Agents also focus on kickback schemes - particularly since the passage of the Anti-Kickback Act of 1986. |
|||
7A. CONTINUE ABOVE, ADD SUPER: ANTI-KICKBACK ACT OF 1986 |
This legislation - which prohibits contractors from offering items of monetary value to government employees in order to win contracts - has resulted in a dramatic increase in cases under investigation. |
|||
8. CUT TO OTS EMPLOYEE HANDING CLERK TRAVEL CARD |
Another area of concern is the misuse of government credits cards - such as purchase cards and travel cards. In this respect, at least, DCIS takes on the role of monitor... |
|||
9. DISSOLVE BACK TO McINTOSH INTERVIEW |
[McINTOSH (SYNC): DCIS has the authority to look at any external sources that affect the Department, such as misconduct by a contractor or any other entity or person that would perpetrate fraud against the DoD.] |
|||
10. CUT
TO
|
NARR (V-O): In many cases it’s all about finding the lie... |
|||
[McINTOSH (V-O): A lot of cases start with an allegation, something’s not quite right. |
||||
11. CUT BACK TO INTERVIEW |
(SYNC) What it all boils down to, in the tons of paperwork, you have to find that one false statement. Determine how it was presented to the government and its impact, and then show who knew it wasfalse. That’s basically what a DCIS agent doe’s.] |
|||
12. CUT TO STOCK FOOTAGE INTERIOR OF LARGE CORPORATION (OFFICES) |
NARR (V-O): When it comes to financial crimes, uncovering deceit is often easier than identifying who did it. Corporations are ideal environments for blurring personal responsiblity |
|||
13. GRAPHIC: SCALES OF JUSTICE; SUPER: CRIMINAL INTENT = KNOWINGLY AND WILLFULLY COMMITTING CRIME |
Yet the law requires that an individual knowingly and willfully committed fraud...and that’s not easy. |
|||
[McINTOSH (V-O): The hardest part of an investigation financial fraud scheme is, to show criminal intent. It’s often referred to as the “it was a business decision” defense. |
||||
14. CUT BACK TO McINTOSH INTERVIEW |
(SYNC) Especially in large corporations, company officials may claim that they didn’t personally gain in a financial way, they were only trying to boost the company’s bottom line or raise earning for the stockholders.] |
|||
15. CUT TO McINTOSH INTERVIEWING INDIVIDUAL (SEEN FROM REAR) |
NARR (V-O): To make the case, agents must delve into a suspect’s motives. Find out about their backgrounds. Gather evidence. |
|||
16. GRAPHIC: FOLLOWING A PAPER TRAIL |
In a financial investigation that generally means following the paper trail. But there are other forms of evidence that DCIS agents acquire to build their case. |
|||
17. CHYRON: HARD EVIDENCE: · 1ST HAND TESTIMONY · DIRECT CONDUCT · CONSENSUAL MONITORING |
Hard evidence - such as first hand testimony, admissions made by suspects to undercover agents and cooperating witnesses – are difficult to dispute. |
|||
18. ADD TO ABOVE VS. DOCUMENTARY EVIDENCE |
Documentary evidence, on the other hand, can be interpreted differently by defense lawyers. |
|||
19. CUT: McINTOSH INTERVIEWING WITNESS (SEE #18) |
(SFX: CLOCK TICKING) Timing, however, may be the most important aspect of an investigation... |
|||
20. CUT TO McINTOSH INTERVIEW |
[McINTOSH (SYNC):Agents try to acquire as much information beforeserving subpoenas or executing search warrants. In other words, agents will have all of their ducks in a row beforeacting.] |
|||
21. ECU SCROLL: BAY SHIP CASE HEADLINE |
NARR (V-O): This was certainly true in the case involving Bayship Management. |
|||
22. CUT TO NCIS LOGO |
Allegations made to the Naval Criminal Investigation Service concerning contract fraud on naval repairs set the ball in motion. |
|||
ADD DCIS AND FBI LOGOS TO ABOVE |
DCIS and the FBI soon joined the investigation which included an elaborate undercover operation. |
|||
23. CUT TO SHOT OF SAWGRASS SIGN |
Coastal
Marine Engineering Group was a shell company set up by the FBI in
|
|||
24. DISSOLVE: BLDG PIC (NEWSPAPER) |
It soon
expanded to offices in
|
|||
24A. WIPE BLDG PIC LEFT; ADD CHYRON RIGHT: COASTAL MARINE ENGINEERING: PROBE ALLEGATIONS OF FRAUD, KICKBACKS, FALSE CLAIMS |
Its purpose: to probe allegations of fraud, kickbacks and false claims by companies managing the government’s merchant marine vessels. The operation lasted four years. |
|||
25. CUT TO WS OF SHIPYARDS |
Bidding on subcontracts to Bayship Management, agents uncovered bid-rigging, inflated contracts, bribes and kickbacks. |
|||
26. DVE: STACK HEADLINES ON CASE |
As a result, multiple indictments were handed down to managers of several companies. |
|||
27. DISSOLVE BACK TO MS McINTOSH WORKING IN OFFICE |
Lengthy investigations are not uncommon when it comes to financial crimes. Most times, agents prove the allegations within the first six to eight months. But when the case goes to prosecution, it can drag on for years... |
|||
[McINTOSH (V-O): The investigation continues when litigation starts. An agent can spend years building additional evidence to support what they found or going back to clarify what they found previously. |
||||
28. CUT TO McINTOSH INTERVIEW |
(SYNC): The most important thing an agent working financial crimes can bring to the table is a basic understanding of accounting, a basic understanding of business and an understanding of human nature - that if there’s an opportunity in the process for someone to circumvent the system for profit, nine times out of ten it’s human nature to do that, especially in the business world.] |
|||
29. CUT TO HEADLINE RE: TAP/ABBOTT MULTIMILLION DOLLAR SETTLEMENT |
NARR (V-O): The DCIS Financial Crimes Program has been racking up significant numbers when it comes to indictments, convictions and recoveries. |
|||
30. ECU PHONE RINGS PULL BACK TO SHOW McINTOSH PICKING UP |
Working off leads from employees, competitive contractors, Hot Line tips and other government agencies, agents are able to effectively investigate even the most complex of cases. DCIS even self-initates cases based on clear indicators of financial fraud. |
|||
31. CUT BACK TO INTERVIEW |
McINTOSH (SYNC): Agent initiative has made DCIS successful. |
|||
31A. CUTAWAY TO MCU OTS MCINTOSH READING ARTICLES |
(V-O) Indicators, such as a news article about cost overruns on a particular major contract...Or other publicly available information, combined withinformation from an employee or competitor, may provide the impetus for looking at the issue. |
|||
NARR (V-O): There are certain telltale signs that that DCIS watches out for. These include... |
||||
32. CUT TO CHYRON: FINANCIAL FRAUD INDICATORS: · SOLICITATION PHASE: Exclud’g qualified contractors Limit’g submission time Reveal’g info Insufficient # of bidders Allow’g a bid change |
Illegal activities during the contract solicitation phase,... |
|||
32A. CHANGE CHYRON: FINANCIAL FRAUD INDICATORS: · EVAL & AWARD PHASE: Discard/lose bid of outsiders Improper disqualifications Unauthorized release of info Favoritism Substantive changes post acceptance |
The evaluation and award phase,... |
|||
32B. CHANGE CHYRON: FINANCIAL FRAUD INDICATORS: · CONTRACT NEGOTIATIONS: Backdated justifications False cost/pricing data Inadequate evaluation of contractor’s present responsibility |
During contract negotiations,... |
|||
32C. CHANGE CHYRON: FINANCIAL FRAUD INDICATORS: · RE: GOV’T CREDIT CARDS: Unauthorized/illegal purchases No documentation Usually @ cost/mo./yr limits Use of card by others |
And indications of fraud involving government credit cards. |
|||
33. CUT TO DCIS SPOOL FOOTAGE 55:00 (CHINOOK LANDING ON CARRIER) |
(FADE UP CLOSING MUSIC) DCIS takes all these indicators seriously because it knows that financial integrity is critical to a healthy national defense. |
|||
34. CUT TO SHOT OF BIG DOD CONTRACTOR (NEARBY CORP.) |
Its Financial Crimes Program holds contractors... |
|||
35. CUT TO HI ANGLE WSHOT EMPLOYEES AT DESKS |
As well as DoD employees fully accountable for their actions... |
|||
36. DISSOLVE TO DCIS SPOOL FOOTAGE 55:30 (CARRIER PERSONNEL AS CHINOOK TAKES OFF) |
So that
|
|||
50. FADE UP TO HOTLINE TAG/GRAPHIC |
(FADE MUSIC UNDER) NARR (V-O): If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. Help
protect
|
|||
51. . DISSOLVE/ROLL CREDITS; FADE TO BLACK |
(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT) |
|||
VISUAL |
AUDIO |
|
1. FADE UP ON FLETC STOCK FOOTAGE: ECU EMERGENCY LIGHTS; SUPER UNDER: DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS: |
(FADE UP SFX: AMBULANCE SIREN) |
|
1A. CUT TO SHOT OF AMBULANCE RUSHING PAST (FLETC STOCK); SUBSTITUTE SUPER: PROTECTING
|
(CONT. SFX; ADD AMBIENT SOUND) |
|
1B. CUT
TO DCIS TAPE
...FROM HEALTH CARE FRAUD |
(FADE OUT SFX) (ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS) |
|
DIP TO BLACK |
||
2. FADE UP ON HI ANGLE CU PERSON FILLING OUT TRICARE INSURANCE FORM |
[LITTERELLE (V-O): I compare it to the tax system. It’s the greedy ones, the ones not reporting their income or totally fabricating information that get investigated. |
|
3. CUT TO LITTERELLE INTERVIEW: SUPER: MIKE LITTERELLE, DCIS SPECIAL AGENT |
(SYNC) It’s the same thing in this field. It’s the health care provider whose entire system is set up as a scam that we’re investigating - the ones who are trying to make as much money as possible, as quickly as possible.] |
|
4. CUT TO FLETC STOCK FOOTAGE: DR. TREATING PATIENT |
NARR (V-O): For most Americans health care is a top priority...and health insurance is a necessity. |
|
5. CUT TO ECU TRICARE CARD |
For those Americans who are active or retired military as well as their dependents, TRICARE is that insurance., |
|
5A. PULL
BACK WS TO
|
Covered claims for medical services and prescription coverage are submitted, in many cases, by civilian providers. |
|
6. DISSOLVE TO LITTERELLE WORKING W/STACK OF FILES ON DESK |
When those claims are falsified, the DCIS Health Care Fraud program steps in... |
|
7. CUT BACK TO LITTERELLE INTERVIEW |
[LITTERELLE (SYNC): When you think of health care fraud, you usually think of health care providers - a doctor or a health care facility - billing the insurance or the government for services that were either not rendered or that were rendered but are not covered and they try to disguise that fact, or they’re inflating the price of the services they’re providing. Those are the bulk of our cases. |
|
8. CUT BACK TO LITTERELLE IN OFFICE |
NARR (V-O): In recent years, fraudulent claims have increased...and, consequently, so have the number of DCIS investigations. |
|
9. GRAPHIC SHOWING DCIS HCF CASES (PERCENTAGES AND #’S) |
Currently over a quarter of the agency’s cases involve health care fraud. That’s nearly 400 active investigations. What’s even more remarkable is their success. |
|
1O. ADD CASH AMOUNT TO ABOVE |
In one year, DCIS recovered over 1.3 billion dollars attributed to TRICARE fraud. |
|
1OA. KEEP DCIS CASH AMOUNT RECOVERIES; ADD FIGURES SHOWING TOTAL FEDERAL HCF RECOVERIES |
That’s only a fraction of the total amount of money recovered from federal investigations of health care fraud. |
|
11. ADD TO ABOVE LOGOS FROM DCIS, FBI, HHS |
In fact, DCIS works hand in hand with other federal agencies - as well as Health and Human Services and state investigators - to expose health care fraud schemes. |
|
12. CUT TO OTS WOMAN LOOKING AT INSURANCE BILL; PULL BACK TO WS AS SHE PICKS UP PHONE |
In this work, they are oftentimes helped by normal citizens. Nearly a third of the DCIS cases come from tips received from whistle blowers. |
|
13. DISSOLVE TO GRAPHIC: CONSULTANTS IN NUTRITION SERVICE, INCORPORATED |
But DCIS also initiates cases based on outside information. Consultants in Nutrition Service -or CNS - was a weight loss clinic which falsified information in order to obtain reimbursement for its services. |
|
14. LS OVERWEIGHT INDIVIDUALS WALKING DOWN SIDEWALK |
Like most health plans, TRICARE covers weight loss programs only in cases of extreme obesity. |
|
15. CUT TO ECU OLD CHAMPUS CLAIM FORM INDICATING CHOLESTEROL PROBLEM |
CNS would routinely lie about the clients’ conditions, indicating on insurance forms that patients had serious health problems that required their services. Here’s how they explained it to a DCIS undercover agent posing as a triathlete with no health problems. Remember TRICARE was formerly called CHAMPUS... |
|
16. DISSOLVE TO STILL: WOMAN IN LAB COAT TALKING W/ATHLETIC MAN IN OFFICE; SUPER: “...The problem, my concern, is that CHAMPUS will only cover our work with you if you have a medical reason to be here” |
(AUDIO ONLY [NC: We’re not going to do anything to jeopardize your health. Basically you’re in good health. The problem, my concern, is that CHAMPUS will only cover our work with you if you have a medical reason to be here. |
|
17. SUBSTITUTE ABOVE SUPER W/: “...You know we’re on a fishing expedition.” |
What you would need to do in order for us to even try to file with CHAMPUS is you need to see our doctor for one visit. And he might indicate what labs he could use. You know we’re on a fishing expedition; we don’t have anything that we know is going to fly.] |
|
18. SPLIT SCREEN: ON LEFT: ECU DRAWING BLOOD; ON RIGHT: CHYRON: 1. UC AGENT SEES DR. 2. BLOOD TESTS 3. 10 COUNSELOR VISITS BILLED AS DR VISITS |
NARR (V-O): The DCIS undercover agent saw their doctor and had some blood work done. His next 10 appointments were with nutrition counselors which NCS billed as doctor visits. At this time the agent asked about his test results... |
|
19. CUT TO B&W STILL I OF AGENT TALKING W/COUNSELOR IN OFFICE; SUPER: “...We’re just using that (LAUGHING) excuse, right, for insurance purposes...” |
(AUDIO ONLY) [NC: Oh yeah, you’re alright. We’re just using that (LAUGHING) excuse, right, for insurance purposes, but it wouldn’t hurt if your lipids came down a little bit.] |
|
20. DVE: SPIN UP TRICARE LOGO, THEN MEDICARE, THEN BLUE CROSS; ADD AS MENTIONED): 6 MOS HOME DETENTION PROBATION $109,437 IN RESTITUTION $230,000 CIVIL SUIT |
NARR (V-O): In the end, three employees pled guilty to defrauding not only Tricare but Medicare and Blue Cross as well. They were sentenced to 6 months home detention and required to make $109,437 in restitution. A later civil suit garnered an additional $230,000. |
|
21. DIP TO BLACK THEN FADE UP ON CU STACKING INSURANCE FORMS |
NARR (V-O): Like many of these schemes, Consultants in Nutrition relied on patients to come back again and again - each time allowing the company to file a claim for services. In the fraud business it’s all about numbers... |
|
22. CUT TO LITTERELLE INTERVIEW; SUPER: MIKE LITTERELLE |
[LITTERELLE (SYNC): It’s a factory. Pure volume is what generates the dollars for them. Of course, they don’t charge the patient the co-pay; that’s part of the scheme. In most of these cases, they say, “You come in to me and we’ll do all these things for you and we’ll get payment from the insurance company or the government. You won’t have to pay a dime.”] |
|
23.
DISSOLVE TO NEWS FOOTAGE (TAPE
|
NARR
(V-O): Fraudulent billing is
the key. This certainly was
the case in
|
|
CONTINUE
NEWS FOOTAGE: TAPE
|
NEWSCASTER (SYNC): Eleven doctors and one office manager have been charged with taking part in a nine year Medicare Fraud kickback scheme. The physicians would refer patients to certain medical companies in exchange for money. One doctor was accused of pocketing as much as $90,000. |
|
24. NEWS
FOOTAGE TAPE
|
NARR (V-O): Referrals for specialized testing or durable medical equipment are commonplace in today’s health field. |
|
25. DISSOLVE TO MRI IMAGE (IF AVAILABLE) |
MRI’s, radiological devices and other expensive items are critical for those patients who truly need them...and costly to those who don’t. |
|
26. NEWS
FOOTAGE TAPE
|
In this case, however, physicians chose to refer to the highest bidder - rather than based on the patient’s best interest - in exchange for a monetary kickback. |
|
27. GRAPHIC SHOWING HOW KICKBACK SCHEME WORKS |
The payoffs eventually got included in someone’s bill - either the patient’s or the insurance company’s...The more costly the procedure or device, the greater the profit. |
|
28.
UNDERCOVER FOOTAGE TAPE
|
Because both Medicare and Tricare were involved, the case was a joint FBI/DCIS investigation. They went undercover and taped some of the doctors actually receiving their kickbacks. |
|
29. CUT
BACK TO NEWS FOOTAGE OF DRS. IN HANDCUFF (TAPE2:
|
As a result, nine physicians were eventually convicted and drew sentences ranging from probation to 30 months confinement. All paid fines. It ended a longterm and extremely profitable criminal enterprise... |
|
30. CUT
TO NEWS FOOTAGE TAPE
|
MALE NEWSCASTER (SYNC): In some cases the alleged fraud could have been going on for as much as 10 years. And as this investigation continues, it could involve more doctors costing taxpayers hundreds of thousands if not millions of Medicare dollars. |
|
31. DIP TO BLACK, FADE UP ON MS LITTERELLE LOOKING THRU MEDICAL TEXT |
NARR (V-O): DCIS agents realize it all comes down to money and greed - motivations that fuel any number of schemes. Keeping up with these variations involves constant training and research... |
|
32. CUT TO LITTERELLE INTERVIEW |
[LITTERELLE (SYNC): We need to educate ourselves before we even start to investigate and we do this by going to experts in the field - plastic surgeons, neurologists, radiologists, insurance auditors - whatever it takes. We get familiar with the patient condition and the crime. |
|
33. CUT TO WS LITTERELLE WALKING INTO COURT BLDG OR ROOM |
(V-O) By the time we present the case to the prosecutors, we have to be well-versed in what the health care provider should have been doing.] |
|
34. CUT BACK TO LITTERELLE PICKING UP COMPUTER READOUT (RECORDS) |
NARR (V-O): DCIS agents look for telltale signs that can indicate health care fraud. Some involve billing procedures, such as: |
|
35. CHYRON (ADD AS MENTIONED): . EXCESSIVE CHARGES . HIGH VOLUME OF TREATMENTS FOR PARTICULAR CONDITION . OVERLAPPING SERVICES . RELUCTANCE TO SUBMIT RECORDS . ROUTINE/Y BILLING EVERY PATIENT FOR SAME PROCEDURE |
Excessive charges compared to other providers, a high volume of treatments for a particular condition, overlapping services, a reluctance to submit complete records for review and routinely billing every patient for the same procedure. |
|
36. CUT BACK TO LITTERELLE CHECKING RECORDS AGAINST TEXT |
They also consider medical indicators, such as a diagnosis or treatment inconsistent with a patient’s age or gender, or services inappropriate to the condition. |
|
37. CUT TO ECU SCAN OF INSURANCE CODES |
One especially reprehensible fraud involves using higher paying codes when billing for seriously ill patients who may be too sick to review the charges. |
|
38. CUT BACK TO LITTERELLE INTERVIEW |
LITTERELLE (SYNC): Doctors get away with this stuff because patients think these people are gods. They trust them, they trust them with their lives - so why wouldn’t they trust them with the billing? |
|
39. FLETC STOCK FOOTAGE (PATIENT W/DR) |
NARR (V-O): Health care fraud assumes patients are too intimidated or too confused to question their bills. |
|
39A. CUT TO CU PATIENT |
It assumes patients don’t care if their insurance gets ripped off - as long as they don’t have to pay. |
|
40. FLETC STOCK FOOTAGE: LS CROWD OF PEOPLE |
But, in the end, everyone pays - either in higher premiums or higher taxes. To put a stop to these fraudulent practices, DCIS needs the help of consumers. |
|
41. CHYRON: PREVENT HEALTH CARE FRAUD: . MAKE SURE BENEFITS MATCH SERVICES RECEIVED |
They need patients to carefully review their bills, to make sure that benefits match the services received. They need patients to ask questions and demand answers. |
|
41A. ADD TO ABOVE: . BE A CUSTOMER |
In short they need patients to become customers. Only then will the rising tide of health care fraud begin to ebb. |
|
42.
DISSOLVE TO NEWS FOOTAGE TAPE
|
(FADE UP CLOSING MUSIC) DCIS will continue to do its part - to vigorously search out and expose health care fraud. |
|
43.
DISSOLVE TO UNDERCOVER TAPE
|
To protect both patients and taxpayers from the greed of unscrupulous providers. |
|
44. DISSOLVE TO TRICARE LOGO |
To protect the TRICARE system, and ultimately... |
|
44A. CASCADE DISSOLVE TO WS OF MILITARY EXERCISE (STOCK FOOTAGE) |
To protect the health and well-being of the American Warfighter. |
|
STAY ON FOOTAGE FOR SEVERAL SECONDS; DIP TO BLACK |
(BRING MUSIC UP FULL) |
|
45. DISSOLVE TO HOTLINE TAG/GRAPHIC |
(FADE MUSIC UNDER) NARR (V-O): If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. Help
protect
|
|
46. DISSOLVE/ROLL CREDITS, FADE TO BLACK |
(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT) |
VISUAL |
AUDIO |
|
1. FADE
UP ON MS OF SIGN: 95TH SUPPLY SQUADRON (TAPE 3 -
DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS: |
(FADE UP SFX: JETS TAKING OFF IN DISTANCE) |
|
1A. CUT TO FOOTAGE: WORKERS SECURING CONTAINERS (TAPE 3 - 6:30-8:00; SUBSTITUTE SUPER: PROTECTING
|
(CONT. SFX; ADD AMBIENT SOUND) |
|
1B.CUT TO EXPLOSION (>1 IF NEEDED) TAPE 3- 8:04-8:50; KEEP TITLE; ADD CHYRON (SUBTITLE): ...FROM ENVIRONMENTAL CRIME |
(CUT IN SFX: EXPLOSION) (ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS) |
|
2. DIP TO BLACK; FADE UP ON MONTAGE OF CALLERY CHEMICAL PICS: CONTAINERS RUSTED, DUMPED BARRELS |
[CONCHA (V-O): DoD is spending a lot of money in environmental cleanups. Every time we issue a contract to clean up a site and it’s done wrong, not only do we have to pay again to get it cleaned up... |
|
3. CUT TO CONCHA INTERVIEW; SUPER: JUAN CONCHA DCIS SPECIAL AGENT |
(SYNC) But the damage to the environment is even greater...That’s when we get involved in environmental crimes. |
|
4. DISSOLVE TO WS JET ON GROUND BEING FUELED |
(FADE SYNC IN/UNDER) NARR (V-O): The American warfighter doesn’t exist in a vacuum. |
|
4A. CUT TO CU SMALL FUEL SPILL ON GROUND |
The work it takes to build, outfit, prepare and maintain our armed forces sometimes has unfortunate results for the environment. |
|
5. CUT
TO WS MEN IN
(CALLERY TAPE 02:30) |
The Department of Defense is committed to correcting any evironmental damage caused by its activities. As part of that effort, the government contracts with outside sources to assist in these cleanups. When fraud is suspected at any point in this process, the DCIS environmental crimes program steps in. |
|
6. CHYRON: DCIS INVESTIGATES CONTRACT FRAUD INVOLVING: . REMOVAL . TRANSPORT . DISPOSAL OF HAZARDOUS MATERIALS FROM DOD INSTALLATIONS OR RELATED SITES. |
Its role is very specific. DCIS is responsible for investigating contract fraud involving the removal, transport and disposal of hazardous materials from DoD installations or related sites. It’s a job with long-term implications... |
|
7. CUT BACK TO CONCHA INTERVIEW |
[CONCHA (SYNC): Any environmental problem has what we call a cradle to grave attachment. That means DoD is responsible for that situation until it’s dealt with properly. For example: |
|
7A. CUTAWAY TO MS WORKERS HANDLING CONTAINER (CALLERY TAPE 0 |
(V-O) Fuel in stored in underground storage container. Even if is sold, and then re-sold again. That’s still DoD’s responsibility. |
|
7B. CUT BACK TO CONCHA INTERVIEW |
(SYNC) That continues until there’s no longer a hazard. We can’t adicate these responsiblities.] |
|
8. CUT TO HEADLINE RE: HAZARDOUS WASTE SPILL |
NARR (V-O): While waste spills and other hazardous situations continue to be under the jurisdiction of the EPA,.. |
|
9. DISSOLVE TO SHOT OF CONCHA OR ZIEGLER WALKING NEAR FUEL TANKS/CONTAINERS (OR SIMILAR) |
DCIS special agents work closely with that agency to investigate environmental contract fraud. |
|
9A. CONT. WS AS 2ND PERSON JOINS AGENT |
A multi-agency Federal and State Environmental Task Force may also get involved. |
|
10. DISSOLVE TO SURVEILLANCE FOOTAGE (WS EMPLOYEE WALKING PAST TANKER TO CAB) ATLAS TAPE - 30:00 |
Such was
the case with Atlas Portable Services. Also known as Atlas Pumping, the
company had contracted with DoD to dispose of
military generated waste at bases in
|
|
11. CUT
TO SURVEILLANCE FOOTAGE: ATLAS TAPE
|
A tip from a former employee suggested Atlas was illegally dumping its loads. DCIS agents conducted surveillance... |
|
(CONTINUE FOOTAGE ABOVE) |
What they discovered was that the company was collecting then dumping the raw waste in remote areas on military bases. |
|
12.
ATLAS TAPE
|
By doing so Atlas saved itself the costs of pre-treating the waste as well as discharge fees. Big money...until the company got caught. |
|
13. CUT
TO OTHER INCIDENT (ATLAS TAPE:
|
Faced with the taped evidence, Atlas Pumping pled guilty to a felony violation of the Clean Water Act. |
|
14. ADD SUPER (ADD AS MENTIONED) ATLAS PUMPING: . 3 YEARS PROBATION . $100,000 FINE .
|
The company was sentenced to three years probation and fined. |
|
15. CUT BACK TO SURVEILLANCE FOOTAGE: ATLAS TAPE 27:00 (2 GUYS TALKING WHILE CAR, BIKE GO BY) |
Such blatant fraud is not unusual. The lure of making easy money while ignoring regulations is seen by many companies as a risk worth taking. [CONCHA (V-O): If what you’re doing doesn’t come to the attention of anyone, you can get away with it for a long time. Years even. |
|
16. CUT BACK TO CONCHA INTERVIEW |
(SYNC) That’s why it’s important that DCIS receives notifications from our inspectors and contractors. Information can come from different sources including unsuccessful competitors - if they know a business isn’t doing something on the up and up.] |
|
17. DISSOLVE TO HAZMAT LOGO; SUPER: LEADS: . CONTRACTORS . DEFENCE INSPECTORS . EPA-CID . STATE/LOCAL ENVIRONMENTAL QA |
NARR (V-O): In fact, many leads do originate from contractors. Others come from DoD Inspectors managing contracts as well as other environmental agencies on the federal, state and local levels. |
|
18. DISSOLVE TO CALLERY PHOTO (CONTAINER INDICATING PENTOBORANE) |
Yet, with all these sources, environmental fraud continues - in one case, for over 10 years. |
|
19. CUT TO OTHER CALLERY PHOTOS (RUSTING BARRELS, STORAGE SHEDS) |
In the 1960’s, the Callery Chemical Company had produced a rocket engine accelerant - called pentaborane - for the United States Air Force. When it became obsolete, Callery bought back much of the chemical with the intent of extracting boron from it. |
|
SLOW DISSOLVE TO BLACK |
Unfortunately, the market for boron also dried up. Callery was left with a huge amount of the useless and deadly chemical. DCIS special agent Juan Concha explains... |
|
20. CUT TO CONCHA INTERVIEW |
[CONCHA (SYNC): Pentaborane is a very dangerous chemical It is toxic to the central nervous system and can cause organ damage. It acidifies the blood. It’s a very dangerous chemical. It’s also highly explosive. This stuff ignites upon exposure to air. |
|
21. CUT
TO CALLERY TAPE:
|
(SYNC UNDER SOUND OF EXPLOSION) NARR
(V-O): Conclusive proof of
that danger occurred in
|
|
22. DVE: SPIN UP LOGOS: DCIS, FBI, EPA AND AFOSI |
The FBI, EPA Criminal Investigations Division and Air Force Office of Special Investigations joined DCIS in the case. |
|
23. CASCADE DISSOLVE TO SCALES OF JUSTICE; SUPER: CALLERY CHEMICAL/MINE SAFETY APPLIANCES PLEADS NO CONTEST TO ILLEGAL STORAGE OF HAZARDOUS WASTE AND IS FINED $350,000 |
NARR (V-O): After two years of investigation, Callery’s parent company - Mine Safety Appliances - pled no contest to the illegal storage of hazardous waste. Consequently, the company was fined... |
|
24. CUT
BACK TO CALLERY TAPE
|
And the pentaborane disposed of properly. |
|
25. DIP TO BLACK; FADE UP CONCHA NEAR HAZMAT AREA |
For DCIS agents, working with hazardous materials is just part of the job. |
|
26. CUT TO MCU CONCHA LOOKING AT SITE |
Specialized hazardous waste operations training enables agents to investigate in difficult and dangerous conditions. |
|
27. DISSOLVE TO STOCK FLETC FOOTAGE (SETTING PERIMETER) |
Instruction focuses on protection and safety, perimeter security and stabilization of the scene. |
|
28. STOCK FLETC FOOTAGE CI TRAINING |
Additionally, DCIS trains its agents in investigative techniques specific to environmental crime. |
|
28A. CONTINUE ABOVE FOOTAGE (STUDYING RECORDS OR OTHER EVIDENCE) |
The goal is to hold contractors accountable for their actions. But DCIS also works to prevent environmental contract fraud from happening in the first place. |
|
29. GRAPHIC: DCIS ENVIRONMENTAL CRIMES PROGRAM: . HELPS PREVENT FRAUD BY IDENTIFYING VULNERABLE AREAS |
Specifically, DCIS investigates funtional DoD sites to uncover vulnerable areas likely to fall prey to fraud from unscrupulous contractors. |
|
30. CUTAWAY TO CONCHA ENTERING BUILDING |
Once an area is identified, agents then notify the respective facility of its vulnerability. |
|
31. PULL BACK AND WIDEN SHOT TO SHOW OUTSIDE ENVIRONMENT |
Not only at stake are DoD funds but the environment in which we live. (FADE UP CLOSING MUSIC) |
|
32. DVE: ZOOM UP DCIS LOGO/BADGE TO MID SCREEN |
The DCIS environmental crimes program stands committed to both investigating and deterring environmental contract fraud because,... |
|
33. DISSOLVE TO FLETC STOCK FOOTAGE OF MILITARY TRAINING (IF AVAILABLE) |
While
the effor to prepare and train
|
|
34A. PAN OR TILT UP TO SHOW SURROUNDING PANORAMA |
It is
(FADE MUSIC UP) |
|
35. DISSOLVE TO HOTLINE TAG/GRAPHIC |
(FADE MUSIC UNDER) NARR (V-O): If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. Help
protect
|
|
36. DISSOLVE/ROLL CREDITS; FADE TO BLACK |
(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT)) |
|
VISUAL |
AUDIO |
|
1. FADE
UP ON DCIS SPOOL FOOTAGE TAPE
DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS: |
(FADE SYNC FROM TAPE UP - SEE LEFT) |
|
1A. CONTINUE ABOVE SUBSTITUTE SUPER: PROTECTING
WARFIGHTERS |
||
1B.CUT
TO BREECH BLOCK TAPE (
...FROM MAJOR THEFT |
(FADE IN OPENING MUSIC - SOMBER) (CUT OUT MUSIC; ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS) |
|
2. DIP
TO BLACK; FADE UP ON BREECH BLOCK TAPE
|
[
|
|
3. CUT TO SCHOENEWEIS INTERVIEW: SUPER UNDER: JOHN SCHOENEWEIS (NEED TITLE) |
(SYNC) It goes back to basically taking a step at a time. If you work a major theft case as you would any other complex white collar crime - where you go after documents and things like that - you’ll build a good solid case...] |
|
4. CUT
TO DCIS SPOOL FOOTAGE TAPE
|
(FADE UP SYNC/UNDER) NARRATOR
(V-O): Outfitting and arming
|
|
5.
DISSOLVE TO BREECH BLOCK (BB)TAPE
|
Over those years, equipment has been stored throughout the country - either waiting to be used, or demilitarized and sold for scrap. |
|
6. CUT
TO BB TAPE
|
For some, it’s an irresistable temptation - the opportunity to steal property and make a quick buck. When a major theft of DoD property occurs, DCIS swings into action. |
|
7.
|
Exactly what constitutes “major theft” is determined by several criteria: |
|
(ADD AS MENTIONED) . $ (SUBSTANTIAL AMOUNT) . CRITICAL NATURE . LOCATION |
Dollar amount - if the costs of the property stolen is a substantial figure,... The critical nature of what was stolen,... And where the crime took place - for example, if the theft occurred from a secure facility. |
|
8. CUT
TO BB TAPE
|
It’s not a widespread crime - only about 3% of DCIS cases involve major theft -but it can be a critical one. |
|
9.
DISSOLVE TO BB TAPE
|
In the
case of Tony Piatz and
|
|
10. CUT
TO BB TAPE
|
Operation Breech Block was the largest theft of military equipment in the DoD’s history. And it happened right out in the open... [NEWSCASTER (SYNC - START UNDER THEN UP): The government has charged men, seven of them, with stealing $17 million worth of military equipment from Fort McCoy, an army base in Wisconsin |
|
CONTINUE NEWS SEGMENT 3:18-3:32 |
(V-O UP) The haul included vehicles and TOW missile launchers - all apparently operational. (FADE
V-O UNDER NARRATION) There is no evidence the equipment went to local
militia or to foreign government, but it was widely distributed from
NARR (V-O): Leo Anthony Piatz - Tony to his friends and business associates - had masterminded the two-year scheme. |
|
11. PIC OF TONY PIATZ |
Piatz himself was something of a military equipment buff. |
|
12. CUT
TO BB TAPE
|
In fact, he had purchased an old Nike missile base with the intent of renovating it as a museum. |
|
CONTINUE ABOVE AS MISSILE IS LOWERED INTO GROUND AND HATCHES CLOSE |
It was here - in a facility that could be seen only from the air, where he hid his stolen equipment underground. |
|
13. CUT
TO BB TAPE
|
The plan was simple. Piatz took vehicles which were to be used as targets on the tank ranges and, instead, sold them to collectors for profit. |
|
14. CUT
TO BB TAPE
|
These included: jeeps, TOW missile carriers, armored personnel carriers, Howitzers, pick-up trucks,... |
|
14A. CUT
TO BB TAPE
|
Even a
|
|
15.
DISSOLVE TO BB TAPE
|
In order to do this he had to have inside help. That help came from Don Crandall, an Army range safety officer. |
|
16. GRAPHIC SHOWING HOW THEFT SCHEME WORKED |
Piatz paid Crandall $20,000. In return, Crandall allowed Piatz to take vehicles earmarked for the range off of the base, supposedly to strip them of polluting materials, then return them. In reality, none of the equipment ever came back... |
|
17.
DISSOLVE TO BB TAPE
|
NEWSCASTER (SYNC): Here’s an example of one of the items that we’re talking about. This is an armored personnel carrier and on top you can see the racks, the launch tubes, for what they call TOW anti-tank missiles. Investigators allege 5 vehicles like this were stolen. Well, you wouldn’t just drive vehicles like this off the base. You do it through paperwork. Apparently what happened is they would fake paperwork -it was alleged - that these were going to be taken out to the target range and shot at for practice. Instead of shooting at them, they were sold for profit.] |
|
18. CUT
TO BB TAPE
|
NARR
(V-O): To find customers, Piatz used his affiliation with a
|
|
19. CUT TO BB TAPE 00:33-43 (PICS OF STOLEN EQUIPMENT) |
Piatz even went so far as to publish a catalogue listing some of the stolen equipment. But while Piatz used the museum to further his criminal enterprise, it this association that led to his eventual downfall... |
|
20. CUT
TO
CRAIG ADAMS DCIS SPECIAL AGENT |
[ADAMS
(SYNC): How this case got started was we
had a cooperating witness call us and report that: “I’ve heard Tony Piatz paid $20,000 in bribes to an officer at
|
|
21. CUTAWAY TO MS ADAMS IN OFFICE REVIEWING FILE, MAKING CALL |
NARR (V-O): DCIS decided to investigate. Working jointly with the FBI DCIS introduced an undercover agent to Piatz. |
|
22. PIC OF UCA W/PIATZ (AVAILABLE FROM CRAIG ADAMS) |
The DCIS
agent posed as the owner of a
|
|
23. CUT
TO
|
[
|
|
24. CUT
TO BB TAPE
|
NARR
(V-O): At this point, the
theft ring had grown to include the range maintenance manager at
|
|
25. CUT TO BB TAPE 2:03 |
And Grant Kruger, head of the Military Vehicles and Arms Museum of Minnesota. Kruger not only helped Piatz transport the stolen vehicles, he also created fake papers to legitimize the equipment and thus facilitate its sale. |
|
26. BB
TAPE
|
KRUGER (V-O): It all looked legal. It was all signed by Don Crandall. |
|
26A. BB
TAPE
|
KRUGER (SYNC): I really feel as if I’m innocent. I haven’t done anything wrong. |
|
27. CUT
TO BB TAPE
|
NARR (V-O): Kruger’s protests proved to be false. |
|
28. CUT
TO
CONTINUE INTERVIEW W/AUDIO |
DCIS’s undercover agent had obtained all of Piatz’s records and was learning everything about the scheme. [
So finally, one evening, on tape Tony tells him, on tape “Hey I got this equipment and I’m selling some of it. I paid Crandall to get the equipment out of there.] |
|
29. CUT
TO BB TAPE
|
NARR (V-O): The undercover agent pretended to find a buyer for one of the stolen vehicles. That deal concluded, he soon gained Piatz’s confidence and access to all of Piatz’s records. |
|
30. CUT TO BB TAPE 4:48-57 (FT. MCCOY SIGN THEN GROUNDS) |
During
the next few weeks, the undercover agent accompanied Piatz on frequent trips to
|
|
31. CUT
TO BB TAPE START OF CHANNEL 9 NEWSCAST (
|
[FADE UP/UNDER CHANNEL 9 NEWSCAST INTRO] NARR
(V-O): It was inside evidence
such as this that was presented to prosecutors. In turn, indictments were handed
down for Piatz, Crandall, Dennis Lambert, the
range maintenance manager at
|
|
32. CUT
TO OTS
|
To Special Agent Adams, the outcome was due in no small part to the expertise of the DCIS undercover agent... |
|
33. CUT
TO
|
[
|
|
34. CUT
TO BB TAPE
|
NARR (V-O): In the end, all 150 vehicles stolen were recovered. So why wasn’t the missing equipment ever noticed? The scheme took advantage of a hole in the system... |
|
35. CUT
TO BB TAPE
|
[
|
|
36. CUT
TO
|
(SYNC) Since then the Army changed it’s range policy to require a visual inspection of the equipment to insure that it is still there or has been destroyed.] |
|
37. CUT
TO BB TAPE
|
NARR (V-O): The Breech Block case changed the way military bases did business. All this began with a tip to DCIS from a responsible citizen. |
|
38.
DISSOLVE TO MS AGENT
|
And while agents admit that not all investigations stem from insider allegations, they often hinge on information from human sources,... |
|
38A. ARC LEFT TO SHOW PERSON TALKING TO AGENT |
Including other police officers, and anyone out on the street making contact with these criminals. |
|
39. DIP
TO BLACK, FADE UP ON BB TAPE
|
(FADE IN CLOSING MUSIC) The fact is major theft is everyone’s business. That’s because the loss of DoD property not only costs taxpayers money,... |
|
40. CUT
TO BB TAPE
|
It can pose a threat to society if the stolen items are used to further violence against law-abiding citizens. |
|
41. DVE: PULL UP DCIS LOGO SO AS TO BLOCK OUT ABOVE |
DCIS continues to vigorously investigate major theft cases with every tool at its disposal, because... |
|
42. CUT TO DCIS SPOOL FOOTAGE 30:00 (SOLDIERS MOVING IN BARREN AREA) |
Stealing
from
|
|
43. CUT TO DCIS SPOOL FOOTAGE 56:00 (NAVY JETS LANDING ON CARRIER) |
Is
stealing
|
|
44. DISSOLVE TO HOTLINE TAG/GRAPHIC |
(FADE MUSIC UNDER) NARR (V-O): If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. Help
protect
|
|
45. DISSOLVE TO/ROLL CREDITS, FADE TO BLACK |
(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT) |
VISUAL |
AUDIO |
|||
1. FADE UP ON MONTAGE 9/11 AFTERMATH NEWS REPORTS (STOCK); SUPER UNDER: DEFENSE CRIMINAL INVESTIGATIVE SERVICE (DCIS) PRESENTS: |
(FADE SYNC FROM TAPE UP - SEE LEFT) |
|||
1A. CONTINUE ABOVE SUBSTITUTE SUPER: PROTECTING
WARFIGHTERS |
||||
1B.CUT TO ECU TATTERED AMERICAN FLAG; ADD CHYRON (SUBTITLE): ...FROM TERRORISM |
(FADE OUT NEWS REPORTS TO SILENCE) (ADD REVERBERATING BASS NOTE AS SUBTITLE APPEARS) |
|||
2. DIP TO BLACK; FADE UP ON STOCK FOOTAGE 9/11 AFTERMATH |
DCIS REP (V-O): The DCIS response to the terrorist attacks on September 11, 2001 was immediate and continuous... |
|||
3. CUT TO INTERVIEW WITH DCIS REP |
(SYNC) Since that time DCIS has seen an upsurge in the investigation of terrorism-related matters. It is now a critical part of our agency’s mission. |
|||
4. DIP TO BLACK, FADE UP ON PICS OF 9/11 TERRORISTS (ADD 1 AT A TIME, IN ROWS) |
(FADE UP SOUNDTRACK - SOMBER MUSIC) NARRATOR
(V-O): September 11th, 2001 marked a new era for Americans. The arrival of foreign terrorists
on our soil meant the
|
|||
5. CUT TO STOCK FOOTAGE: INCREASED SURVEILLANCE AT AIRPORTS, BORDERS |
(CHANGE MUSIC-STEADY TEMPO) Law enforcement responded to this shift in urgency. Federal agencies joined together to develop a strategy of prevention and disruption designed to root out terrorists before they act. |
|||
6.
DISSOLVE TO
|
DCIS is an integral part of this effort |
|||
6A. PULL BACK TO SHOW DCIS REP TALKING |
DCIS REP (V-O THEN SYNC): Combating terrorism is a departure from the traditional role of DCIS - but one that’s clearly necessary. |
|||
We still investigate fraud and abuse cases involving the department of defense. But now we also investigate terrorism cases with a DoD nexus. |
||||
6B. PAN OVER TO COMPUTER IN OFFICE |
That includes threats to the Department’s infrastructure - our computer network and our suppliers’ computer networks. |
|||
7. CUT TO GRAPHIC (BUILD AS MENTIONED): DCIS ANTI-TERRORISM PROGRAM: |
NARRATOR (V-O): In fact, the DCIS anti-terrorism effort involves a multipronged approach. |
|||
7A. ADD TO GRAPHIC: . PARTICIPATES IN FBI-LED JTTF’s |
The agency participates on Joint Terrorism Task Forces and the National Joint Terrorism Task Force which are coordinated by the FBI. . |
|||
7A-1. INSET BOX UNDERNEATH: NIGHT SURVEILLANCE IMAGES (FLETC STOCK) |
As part of this team, special agents conduct interviews, record checks, searches and surveillances involving suspected terrorists. They also serve subpoenas, assist in special security operations, provide computer forensics support and effect arrests. |
|||
. |
||||
7B. DELETE BOX, ADD TO GRAPHIC: . PARTICIPATES IN DOJ-SPONSORED ATTF’s |
Subsequent to 9/11 the agency was also requested to participate in Anti-Terrorism Task Forces sponsored by the Department of Justice. |
|||
7B-1. ADD INSET BOX BELOW: NEWS FOOTAGE OF MOUSSAUI IN CUSTODY |
ATTFs develop investigative strategies to support investigations of suspected terrorists and prosecutions of known terrorists. |
|||
7C. DELETE BOX,ADD TO GRAPHIC: .
PARTNERED WITH BICE IN PROJECT “SHIELD
|
Additionally,
Technology Protection is an integral part of the DCIS National Security
mission. DCIS has partnered
with the Department of Homeland Security, Bureau of Immigration and
Customs Enforcement in Project Shield
|
|||
7C-1. ADD INSET BOX BELOW: STOCK FOOTAGE OF PORT W/CONTAINER FREIGHT |
This industry-outreach program aims to raise awareness and identify instances involving the export and import of controlled, prohibited or sensitive technologies and materials some of which may pose a national security risk.. |
|||
8. CUT TO OUTLINE OF DCIS LOGO (DoD SHIELD), ADD INSIDE OUTLINE: . DCIS SO&L STAFF OBTAINS/SHARES TERRORIST INFO |
Internally, DCIS has established a National Security Staff which coordinates with other agencies to identify and share terrorism threat information. |
|||
8A. ADD TO GRAPHIC: . CCD RESPONDS TO CYBER-TERRORISM THREATS |
The DCIS
computer crimes division monitors and responds to potential acts of
terrorism aimed at
|
|||
8B. ADD TO GRAPHIC: . LIAISONS W/DOE AND DTRA FOR QUICK-REACTION RESPONSES TO WMD INCIDIDENTS |
DCIS has also established liaisons with the Department of Energy and Defense Threat Reduction Agency to respond without delay to incidents involving weapons of mass destruction. |
|||
8C. ADD TO GRAPHIC: . PROVIDES INVESTIGATIVE ASSISTANCE TO ARMY CORPS OF ENGINEERS |
Finally,
DCIS responds to calls for assistance from the Army Corps of Engineers
involving the protection of
|
|||
9. CUT TO DCIS REP INTERVIEW |
DCIS REP (SYNC): I think what’s most striking is the upsurge in the the number of terrorism cases we’re working on. Before 9/11, we were involved with maybe two or three cases. Since then, our caseload has increased ten, twenty-fold. It’s a priority now. |
|||
10. CUT TO LS OF PENTAGON BURNING (9/11 STOCK FOOTAGE) |
NARRATOR (V-O): In the aftermath of the September 11th attacks, DCIS provided immediate investigative assistance. Since that time, the agency has become a key component in our nation’s antiterrorism effort. |
|||
11. CUT TO NEWS FOOTAGE RE: ANTHRAX ATTACKS |
For example, DCIS assisted the FBI in its investigation into the anthrax attacks. The result: |
|||
DCIS had the first successful indictment of an anthrax-related case. |
||||
12. CUT TO STOCK FOOTAGE SHOWING CHEMICAL PRODUCTION LINE |
Just as importantly, DCIS continues to gather information on vulnerabilities inherent in DoD and contractor labs - specifically, those that could lead to terrorists obtaining dangerous biological and chemical agents. |
|||
13. CUT
TO HEADLINES RE: FL
|
On an international level, DCIS special agents - as part of the JTTFs - have helped investigate the funding of overseas terrorists through fraudulent businesses and charity organizations. |
|||
13A. CUT TO PIC OR FOOTAGE OF IRAQ/BAGHDAD SCENE W/SOLDIERS |
DCIS has
also established overseas offices to conduct DoD related investigations where
|
|||
14. DIP TO BLACK; FADE UP ON SLIDE/PIC OF AL QAIDA SPOKESMAN SULEIMAN ABU GHEITH -6/12/02 |
(FADE UP ABU GHEITH COMMENTS) ...”We have the right to kill 4 million Americans...We have the right to kill 4 million Americans - 2 million of them children...” |
|||
15. BEGIN MONTAGE OF TERRORIST ACTIONS AGAINST AMERICANS (USS COLE, 9/11, ANTRAX FOOTAGE ETC.) |
(FADE OUT ABOVE COMMENTS, FADE IN CLOSING MUSIC) NARRATOR
(V-O): Terrorists have
declared war on the
|
|||
16. CUT TO DoD DOCUMENT W/QUOTE (SEE RT) HIGHLIGHTED |
DCIS has
not flinched from its role in
In a chillingly prophetic act - a full nine months before the events of September 11th - the Secretary of Defense stated that DCIS would be responsible for criminal investigations involving “substantial and specific danger to the public health and safety involving the Department of Defense.” |
|||
17. CUT TO SHOTS OF MILITARY INSTALLATIONS, DRILLS (STOCK) |
Today that mandate is more crucial than ever. Whether it acts independently or with other federal agencies, DCIS will continue to investigate terrorism cases with a DoD nexus. |
|||
18. CUT TO OVERHEAD SHOT OF JETS TAKING OFF |
In a
world where threats come in all shapes and sizes, DCIS is committed to
helping
|
|||
18A. CUT TO SHOT OF GI’s ON GROUND |
By
protecting
(FADE MUSIC UP) |
|||
19. DISSOLVE TO HOTLINE TAG/GRAPHIC |
(FADE MUSIC UNDER) NARR (V-O): If you wish to assist DCIS in combating fraud, waste and abuse, call the DoD Hot Line whenever you suspect a violation or mismanagement. Help
protect
|
|||
20. . DISSOLVE/ROLL CREDITS; FADE TO BLACK |
(FADE MUSIC UP FULL, FLOURISH THEN FADE OUT) |
|||