Presentation is loading. Please wait.

Presentation is loading. Please wait.

Operations Security (OPSEC) 301-371-1050. Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.

Similar presentations


Presentation on theme: "Operations Security (OPSEC) 301-371-1050. Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators."— Presentation transcript:

1 Operations Security (OPSEC) 301-371-1050

2 Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators Definition  Identify Threat Capabilities  The OPSEC Process  Define OPSEC Review, Assessment, and Survey

3 Standard Implement OPSEC measures based on unit indicators and vulnerabilities; protect unit essential elements of friendly information against threat collection efforts and prevented compromise..

4 Application Operations security awareness and execution is crucial to Army success. OPSEC is applicable to all personnel and all Army missions and supporting activities on a daily basis.

5 Objectives Understand the OPSEC concept, process, and analytical methodology Apply OPSEC to establish and maintain Essential Secrecy concerning Command Capabilities, Intentions and Activities Define OPSEC review, assessment, & survey

6 Regulations & Guidance  Operations Security is a national program.  Regulatory guidance for OPSEC is contained in: NSDD 298 DOD Dir 5205.2 CJCS Inst 3213.01 and JOPES CJCS MOP 30 AR 530-1

7 OPSEC Definition OPSEC is a process of analyzing friendly actions pursuant to military operations and other activities to— 1.Identify those friendly actions that can be observed by the threat. 2.Determine indicators that the threat might obtain that could be interpreted or pieced together to derive critical information in time to be useful. 3.Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to the threat exploitation.

8 Indicators - Definition Indicators are data derived from open sources or from detectable actions that the threat can piece together or interpret to reach conclusions or official estimates concerning friendly intentions, capabilities, or activities. They are also activities that result from military operations.

9 3 Types of Indicators 1.Profile - show how activities are normally conducted. Profiles are developed by looking at all aspects of friendly operations from the viewpoint of the threat. 2.Deviation - highlight contrasts to normal activity, help the threat gain appreciation about intentions, preparations, time, and place. 3.Tip-Off - draws attention to information that otherwise might pass unnoticed.

10 Identify Threat Capabilities The threat consists of multiple and overlapping collection efforts targeted against all sources of Army information.

11 The OPSEC process 1.Identify Critical Information 2.Threat Analysis 3.Vulnerability Analysis 4.Risk Assessment 5.Implement OPSEC Countermeasures

12 1. Identify Critical Information v Determine what needs protection v Identify critical information in a variety of situations (ask “If known by the threat, what would be the mission impact” v Identify friendly force profiles v Avoid setting patterns

13 Critical Information can be......  Information or data Comm, Verbal, Printed, Non-Verbal, Detectable & Observable Activities  An activity, event or operation Logistics, Movement, Training & Testing  Classified or unclassified Anything that could hinder or prevent mission accomplishment Facts about our protective measures

14 The Essential Elements of Friendly Information (EEFI)  “What key questions about friendly intentions and military capabilities are likely to be asked by adversary officials and intelligence systems”  Answers to the EEFI are critical information EXAMPLE: What specific network security procedures are used by the command? Anything that will answer this question is critical information

15 2. Analysis of Threat v Identify OPSEC vulnerabilities. v Identify OPSEC indicators.

16 Threat Characteristics  Capabilities  Motivation  Intent  History of Action (Probability)

17 Information Collection  All nations collect  Groups collect  All sources are exploited  Increasing collection sophistication  Increasing collection capability  Increasing lethality is the result

18 How is the information collected? It is Multi-disciplined.  HUMINT (Human Intelligence)  SIGINT (Signals Intelligence)  IMINT (Imagery Intelligence)  MASINT (Measurement and Signatures Intelligence)  OSINT (Open Source)

19 3. Vulnerability Analysis v Identify and discuss Indicators v Identify and discuss vulnerabilities v Describe the elements of a vulnerability

20 Vulnerabilities  Visualize the Operation  Identify Critical Information & location in your operation/systems  Compare threat capabilities to Critical Information

21 Select Possible Protective Measures  Action Control - Indicator  Countermeasures - Collection System  Counter Analysis - Analyst

22 4. Risk Assessment v Understand the concept of risk. v Assess the degree of risk. v Understand the difference between Risk management vice risk avoidance

23 Concept RISK Assets Threats Vulnerabilities

24 Process Assess Assets Assess Threat Assess Vulnerabilities Assess Risks Determine Countermeasure Options Cost Analysis Benefit Analysis

25 THE COMMANDER CONSIDERS...  Mission Accomplishment  Combat Effectiveness  Effectiveness vs Efficiency Cannot avoid all risksCannot avoid all risks Military activities have inherent risksMilitary activities have inherent risks Must manage the risks that cannot be avoidedMust manage the risks that cannot be avoided Cannot avoid all risksCannot avoid all risks Military activities have inherent risksMilitary activities have inherent risks Must manage the risks that cannot be avoidedMust manage the risks that cannot be avoided

26 5. Implement OPSEC Measures  Identify means to implement countermeasures  Evaluate the effectiveness of OPSEC program

27  Orders  Annexes  Plans  The Commander OPSEC is Implemented via...

28 OPSEC Review, Assessment, and Survey

29 OPSEC Review OPSEC review is an evaluation of a document to ensure protection of sensitive or critical information.

30 OPSEC Assessment OPSEC assessment is an analysis of an operation, activity, exercise, or support function to determine the overall OPSEC posture and to evaluate the degree of compliance of subordinate organizations with the published OPSEC plan or OPSEC program.

31 OPSEC Survey OPSEC survey is a method to determine if there is adequate protection of critical information during planning, preparations, execution, and post-execution phases of any operation or activity. It analyzes all associated functions to identify sources of information, what they disclose, and what can be derived from the information.

32 REMAIN ALERT

33 Summary  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators Definition  Identify Threat Capabilities  The OPSEC Process  Define OPSEC Review, Assessment, and Survey


Download ppt "Operations Security (OPSEC) 301-371-1050. Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators."

Similar presentations


Ads by Google