Presentation is loading. Please wait.

Presentation is loading. Please wait.

OPSEC and Geospatial Information. Five step process Our operations from an adversary point of view Compilation Indicators Operations Security.

Similar presentations


Presentation on theme: "OPSEC and Geospatial Information. Five step process Our operations from an adversary point of view Compilation Indicators Operations Security."— Presentation transcript:

1 OPSEC and Geospatial Information

2 Five step process Our operations from an adversary point of view Compilation Indicators Operations Security

3 Critical Information “It is necessary to gather as much information about the location as possible. For instance: Transportation Traffic signals and pedestrian areas Security personnel centers and government agencies Embassies and consulates Public parks Amount and location of lighting”

4 Critical Information “Information about government personnel, officers, important personalities, and all matters related to them (residence, work place, times of leaving and returning, and children).” - Al Qaeda Handbook

5 Value of Information What is your information worth to the adversary? Is it important to us? Is it FOUO? What would it cost to replace it?

6 Threat = Intent + Capability Threat Analysis

7 Adversary Hostile nations Terrorists Hackers Criminals Competitors Insiders (access to information)

8 “Using public sources openly and without resorting to illegal means, it is possible to gather at least 80% of information about the enemy.” - Manchester Document Al-Qaeda terrorist training manual Captured in Manchester, England in 2000 Sources

9 Information-Rich Environment Google Commercial imagery Public data bases FAS Global Security Archives

10 OPSEC Solution Threat Awareness Value of Information Vulnerabilities and Risk Countermeasures

11 OPSEC & Geospatial Information Compilation Public release analysis Data bases Validation


Download ppt "OPSEC and Geospatial Information. Five step process Our operations from an adversary point of view Compilation Indicators Operations Security."

Similar presentations


Ads by Google