1 / 26

Implement OPSEC

Implement OPSEC. Terminal Learning Objective. References. Administrative Notes. SAFETY CONSIDERATIONS NONE RISK ASSESSMENT LOW ENVIRON. CONSIDERATIONS NONE EVALUATION YES. Security & Surprise.

cerise
Télécharger la présentation

Implement OPSEC

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Implement OPSEC

  2. Terminal Learning Objective

  3. References

  4. Administrative Notes • SAFETY CONSIDERATIONS NONE • RISK ASSESSMENT LOW • ENVIRON. CONSIDERATIONS NONE • EVALUATION YES

  5. Security & Surprise Operations Security (OPSEC), if properly employed, provides your operations with the security and surprise needed to effectively use your resources for overall mission success

  6. Enabling Learning Objective 1

  7. OPSEC Definition Is a process of analyzing friendly actions pursuant to military operations and other activities. Maintains essential secrecy, which is the condition achieved by the denial of critical information to the threat.

  8. What is an INDICATOR… Indicators are data derived from open sources or from detectable actions that the threat can piece together or interpret to reach conclusions or official estimates concerning friendly intentions, capabilities or activities. Indicators are observable or discernible

  9. Types of Indicators • Profile: developed from viewpoint of the threat • Patterns: habitual actions • Signatures: equipment, unit size, noise, etc • Deviation: provides contrast to normal activity • Tip-off: Something that occurs that will make the enemy pay closer attention to you.

  10. Threat Collection Capabilities • Human Intelligence (HUMINT): includes all information derived through human sources not accessible to other collection assets • Imagery Intelligence (IMINT): obtain from land, sea, air, and space platforms & airborne collection • Signals Intelligence (SIGINT): collection, evaluation, analysis, integration, and interpretation of information from intercepted electromagnetic emissions. • Measurement and Signature Intelligence (MASINT): is scientific and technical intelligence obtained by quantitative and qualitative analysis of data (technical sensors)

  11. Define OPSEC Measures OPSEC measures are methods and means to gain and maintain essential secrecy about critical information & to deny the threat friendly information. Action Control: eliminates indicators. Select what action to undertake, decide whether or not to execute actions, or impose restraints on actions. Countermeasures: • Diversions • Camouflage • Concealment. • Jamming. • Deception

  12. OPSEC: 5 Steps • Identify critical information • What needs protection? • Conduct an analysis of threats • Identify OPSEC vulnerabilities • Conduct an analysis of vulnerabilities • Identify OPSEC measures for each vulnerability • Perform Risk Assessment • What is the risk to the mission if the OPSEC measure does not work? • Apply appropriate countermeasures • Implement those measures that require immediate action

  13. Implement OPSEC • Applies to any plan, operation, program, project or activity • Is continuous • Are command directed, soldier executed * The 5 steps of OPSEC are not followed in any particular sequence.

  14. Check on Learning: ELO #1 Question: What is the definition of OPSEC? Answer: Is a process of analyzing friendly actions pursuant to military operations and other activities.

  15. Check on Learning: ELO #1 Question: What is an indicator? Answer: Indicators are data derived from open sources or from detectable actions that the threat can piece together or interpret to reach conclusions or official estimates concerning friendly intentions, capabilities or activities.

  16. Check on Learning: ELO #1 Question: How many step in the OPSEC process: Answer: • Identify critical information • Conduct an analysis of threats • Conduct an analysis of vulnerabilities • Perform Risk Assessment • Apply appropriate countermeasures

  17. Enabling Learning Objective 2

  18. OPSEC Review An evaluation of a document to ensure protection of sensitive or critical information.

  19. OPSEC Assessment Is an analysis of an operation, activity, exercise, or support function to determine the overall OPSEC posture and to evaluate the degree of compliance of subordinate organizations with the published OPSEC plan or OPSEC program.

  20. OPSEC Survey Is a method to determine if there is adequate protection of critical information during planning, preparations, execution, and post-execution phases of any operation or activity. It analyzes all associated functions to identify sources of information, what they disclose, and what can be derived from the information.

  21. Check on Learning Question: What are the 4 threat collection capabilities? Answer: • Human Intelligence (HUMINT) • Imagery Intelligence (IMINT) • Signals Intelligence (SIGINT) • Measurement and Signature Intelligence (MASINT)

  22. Check on Learning Question: Are profile, deviation & tip-off the three Indicators? Yes or No Answer: Yes

  23. Check on Learning Question: What is the definition of OPSEC assessment? Answer: Is an analysis of an operation, activity, exercise, or support function to determine the overall OPSEC posture and to evaluate the degree of compliance of subordinate organizations with the published OPSEC plan or OPSEC program.

  24. Summary • Implement the OPSEC process. • Define OPSEC review, assessment and survey

  25. Conclusion Huah! If known by the threat, what actions in what time frame could provide them with our capabilities, intentions, and vulnerabilities? Effective OPSEC will reduce this risk – use its tenent is all military operations.

More Related