OPERATIONS SECURITY 16 August 2004 16 August 2004.

Slides:



Advertisements
Similar presentations
Risk Management Introduction Risk Management Fundamentals
Advertisements

Joint Operation Planning Process:
PROJECT RISK MANAGEMENT
Unified Land Operations
THE FOLLOWING MINI PRESENTATION ON OPSEC IS TAKEN FROM A US AIR FORCE BRIEFING. ALTHOUGH THIS IS A MILITARY PRESENTATION, IT PROVIDES A GOOD OVERVIEW OF.
Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
UNIT PHYSICAL SECURITY PLAN
Introduction to Information Operations Attaché Corps- SEP 09
TROOP LEADING PROCEDURES FM 7-8
TROOP LEADING PROCEDURES
TLO 2: Action: Plan operational security. Intermediate-level training.
Cyber Support to CJOC / CAF Operations Brief to AFCEA 3 March 2015
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Commander’s Intent & Guidance Deployable Joint Task Force Augmentation Cell (DJTFAC) Multinational Planning Augmentation Team (MPAT) Major Paul Zavislak.
Computer Security: Principles and Practice
Military Decision Making Process (MDMP)
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Risk Management at a Glance. Terms Hazard Hazard Risk Risk Probability Probability Severity Severity Estimating Estimating Exposure Exposure Risk Assessment.
Army Doctrine Publication (ADP) 3-37; and Army
Commander’s Intent & Guidance
Crisis Action Planning Commander’s Guidance and Intent
Campaign Planning Process Step 3B – System Center of Gravity Analysis
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Operations Security (OPSEC) GOOD SECURITY IS A GROUP EFFORT
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
List of intelligence gathering disciplines
Operational Security PCC. VII-F.1.
MPAT TE-2 COMBINED TASK FORCE TRAINING Information Management.
The Military Decision Making Process
Dr. Benjamin Khoo New York Institute of Technology School of Management.
TYPES OF ORDERS ADMINISTRATIVE ORDER: COVERS NORMAL ADMINISTRATIVE OPERATIONS IN GARRISON OR IN THE FIELD. THEY INCLUDE GENERAL, SPECIFIC, & MEMORANDUM.
Military Decision Making Process (MDMP)
Military Decision Making Process (MDMP)
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
Operational Security Awareness
COMMANDER’S INTENT & GUIDANCE
Purpose To understand Commander’s Intent & Guidance and their importance in crisis action planning Intent & Guidance and their importance in crisis action.
Military Decision Making Process (MDMP)
MPAT SECRETARIAT Multinational Force Crisis Action Planning Overview COALITION/COMBINED TASK FORCE TRAINING.
Staff (Running) Estimate
Military Intelligence
TSP 310-C , Phase II, OCS TSP 310-C , Phase II, OCS Implement OPSEC.
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Headquarters U.S. Air Force
Headquarters U.S. Air Force
Campaign Planning Process Working Overview Slides
Operations Security (OPSEC) For New Hires
Religious Inputs/Outputs
The MDMP Process MDMP Inputs MDMP Outputs Step 1 MDMP Inputs Step 5
Command Indoctrination Operations Security DD MMM YY
Electronic Warfare.
Peacekeeping and Stability Operations Institute The Army’s only organization for Peace and Stability Operations at the strategic and operational level.
COMBAT HUNTER TRAINER COURSE
Mission Command Conference 2013
TROOP LEADING PROCEDURES
Operations Security (OPSEC)
CMD LOGO Operations Security (OPSEC) Assessment in-brief Presenter
Overall Classification of this Briefing is UNCLASSIFIED
Operations Security (OPSEC): A Force Multiplier
FUNCTION OF MANAGEMENT
TYPES OF ORDERS ADMINISTRATIVE ORDER: COVERS NORMAL ADMINISTRATIVE OPERATIONS IN GARRISON OR IN THE FIELD. THEY INCLUDE GENERAL, SPECIFIC, & MEMORANDUM.
TROOP LEADING PROCEDURES
TROOP LEADING PROCEDURE
Command Indoctrination Operations Security DD MMM YY
Presentation transcript:

OPERATIONS SECURITY 16 August August 2004

OPERATIONS SECURITY 31 December 2003

VGT 1 OPERATIONS SECURITY RE:AR 530-1, CH 1 Is the process of analyzing friendly actions pursuant to military operations and other activities.   OPSEC maintains essential secrecy, which is the condition achieved by the denial of critical information to adversaries.  not  OPSEC is an operations function and not a security function which protect classified information. At battalion level the S-3 is the staff proponent for OPSEC, he implements other OPSEC measures to maintain surprise and security.   OPSEC applies during peace, crisis, and war to all Army operations and support activities.

VGT 2 5 STEPS IN THE OPSEC PROCESS RE:AR 530-1, CH Identification of Critical Information 2. 2.Analysis of Threats 3. 3.Analysis of Vulnerabilities 4. 4.Assessment of Risks 5. 5.Application of Appropriate Countermeasures

VGT 3 (1)Identification of Critical Information para 3-4 The purpose of this step is to determine what needs protection.   Identify questions the enemy may ask (5Ws + 1H)   Facts about your intentions, capabilities, limitations   Commander’s EEFIs, samples in appendix C   Information concerning protected person(s)   Operational and Tactical information (OPORD)   Test materials used in an academic environment   Sensitive Information FOUO/Classified Information The TF commander approves EEFI list. Identify the length of time critical information needs protection. The TF commander approves EEFI list.

VGT 4 (2)Analysis of Threats (2)Analysis of Threats para3-5 The purpose of this step is to identify all vulnerabilities and/or indicators.   A vulnerability exists when an adversary can collect an indicator, correctly analyze the information, make a decision, and take timely actions to degrade friendly operations.   Indicators are data derived from open sources or from detectable actions that an adversary can piece together or interpret to reach conclusions or estimates concerning friendly intentions, capabilities or activities.  OPSECindicators.  Examine each part of the OPORD/FRAGO to find OPSEC vulnerabilities/indicators.

THREAT COLLECTION EFFORTS App E   Human Intelligence (HUMINT) Overt, Covert and Clandestine   Open Source Intelligence (OSINT) ( New update )   Imagery Intelligence (IMINT)   Signal Intelligence (SIGINT)

VGT 6 3 TYPES OF INDICATORS App B-1, B-2 1.PROFILE 1.PROFILE- Activity patterns and signatures that shows how your activities are normally conducted. DEVIATION 2. DEVIATION- Profile changes which helps an adversary learn about your intentions, preparations, time and place. 3.TIP-OFF 3.TIP-OFF- Actions that warn or shows an adversary of friendly impending activity.

Characteristics of an Indicator Signature Signature= an identifiable trace or something that causes it to stand out. Associations Associations= compares current with past indicator information for relationship. Profiles Profiles= other indicators that have not been observed or detected. Contrast Contrast= only needs be recognized not understood. Exposure Exposure= duration, repetition, and timing of exposed indicator. VGT 7

(3)Analyze the Vulnerabilities (3)Analyze the Vulnerabilities para 3-6 The purpose of this step is to identify possible OPSEC measures for each vulnerability/indicator. OPSEC measures are methods and means to gain and maintain essential secrecy about critical information using: 1.Action Control: 1.Action Control: Select a COA, impose restraints on actions and determine the 5Ws +1H for actions necessary to accomplish collective/individual tasks. 2.Countermeasures a Diversions, Camouflage, Concealment, Jamming, Deception, Police Powers and Force. 2.Countermeasures attack the adversaries collection efforts using Diversions, Camouflage, Concealment, Jamming, Deception, Police Powers and Force. Counteranalysis 3. Counteranalysis provides a possible alternate analysis for an indicator. Confuse the adversary analyst through deception. VGT 8

(3)Analyze the Vulnerabilities (3)Analyze the Vulnerabilities para 3-6 The purpose of this step is to identify possible OPSEC countermeasures for each vulnerability/indicator.   Select two OPSEC countermeasures for each vulnerability/indicator.   Some countermeasures interact and may apply to more than one vulnerability/indicator.   Assess the sufficiency of routine security measures (PerSec, PhySec, InfoSec, ComSec). These will provide OPSEC countermeasures for residual vulnerabilities/indicator. VGT 9

(4) Assessment of Risks (4) Assessment of Risks para 3-7 This step is to select the OPSEC countermeasures for implementation.   The leader balance risking operational success/failure versus selecting the right/wrong OPSEC countermeasures.   Check interaction of select OPSEC countermeasures.   Coordinate select OPSEC countermeasures with lateral units and bring attach leaders into your briefings.   The TF commander may decide on a “no-measures” alternative. VGT 10

VGT 11 (5)Application of appropriate countermeasures para 3-8 Apply the select countermeasures, (directed by the TF commander or recommended by PLD) to the operation or incorporate into plans for future operations.   Emphasize the adverse results if failure to maintain effective OPSEC.   Implement countermeasures first on indicators requiring immediate action or as directed by the TF commander.   Document the measures or state “no-measures” alternative.   Monitor each countermeasures before and during execution, evaluate effectiveness.   Recommend to improve effectiveness of countermeasures or select new measures when new vulnerabilities develop.

VGT 12 REVIEW   Define OPSEC   Define the 5 steps in the OPSEC Process   Define the 4 Threats Capabilities   Define the 3 Indicators