Operational Security PCC. VII-F.1.

Slides:



Advertisements
Similar presentations
Fleet & Family Support Ombudsman Program & Operations Security
Advertisements

Directions for this Template  Use the Slide Master to make universal changes to the presentation, including inserting your organization’s logo –“View”
Naval OPSEC Support Team Navy Information Operations Command, Norfolk #Don’tDoThat: Social Media Trends.
CIP Cyber Security – Security Management Controls
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Directions for this Template  Use the Slide Master to make universal changes to the presentation, including inserting your organization’s logo ‒ “View”
THE FOLLOWING MINI PRESENTATION ON OPSEC IS TAKEN FROM A US AIR FORCE BRIEFING. ALTHOUGH THIS IS A MILITARY PRESENTATION, IT PROVIDES A GOOD OVERVIEW OF.
Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Introduction to Information Operations Attaché Corps- SEP 09
Welcome Greg Hoffman, MDA OPSEC 5 Step Process Morris Burbank, Garrison OPSEC and the Insider Threat Paul Quintel,
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Open Source Intelligence (OSINT) OSINT and TRASHINT This presentation is the sole property of OSPA. Distribution is limited to OSPA members registered.
NEW YORK NATIONAL GUARD FAMILY PROGRAMS Offered & presented by CW2 Walker Family Programs OPSEC Program Manager.
OPSEC Countermeasures Michael Chesbro DES OPSEC Officer OPSEC Countermeasures Michael Chesbro DES OPSEC Officer.
TLO 2: Action: Plan operational security. Intermediate-level training.
29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.
UNCLASSIFIED. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that.
Unit 8: Tests, Training, and Exercises Unit Introduction and Overview Unit objectives:  Define and explain the terms tests, training, and exercises. 
Computer Security: Principles and Practice
Risk Management.
Simulation Exercises Overview Activities designed to assess, enhance and evaluate preparedness.
One Team, One Fight One Mission Presented by the Ordnance Center & Schools Security Office.
Army Doctrine Publication (ADP) 3-37; and Army
Introduction to Network Defense
Operation Name SGT Artemis O’Conan Operations Center
Gurpreet Dhillon Virginia Commonwealth University
Military families and Operational Security. Family members are vital to the success of our military. You may not know it, but you play a crucial role.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking.
Following the terrorist attack on September 11, 2001 the President declared a national emergency … Secretary of Defense Donald Rumsfeld cautioned on the.
Presented by the 1st Information Operations Command.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name)
EDS Incident Command System Tabletop Exercise [Exercise Location] [Exercise Date] [Insert Logo Here]
APAN Group Owner Training. APAN Groups Overview FOUO PII Other types Information Categories Aggregate data impacts OPSEC Group Owner Responsibilities.
Air Force Doctrine Document 2-5.4: Public Affairs Operations.
IT 499 Bachelor Capstone Week 4. Adgenda Administrative Review UNIT Four UNIT Five Project UNIT Six Preview Project Status Summary.
Provided by OSPA ( Vulnerabilities and Indicators The OPSEC Process, step 3 Presented by: (Presenter’s Name)
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
UNCLASSIFIED OPSEC AND THE HOLIDAY SEASON. UNCLASSIFIED O VERVIEW What does OPSEC have to do with the holidays? OPSEC and Shopping Presents! OPSEC at.
AUDIT OF INTERNAL CONTROL Day V Sessions I & II. Session Overview Periodical audit of existence of internal control in order to examine its effectiveness.
Operational Security Awareness
OPSEC for Families. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know.
Provided by OSPA ( Operations Security (OPSEC)
TSP 310-C , Phase II, OCS TSP 310-C , Phase II, OCS Implement OPSEC.
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
OPERATIONS SECURITY 16 August August 2004.
SEC 480 assist Expect Success/sec480assistdotcom FOR MORE CLASSES VISIT
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Campaign Planning Process Working Overview Slides
Operations Security (OPSEC) For New Hires
Introduction to the Federal Defense Acquisition Regulation
Command Indoctrination
Overall Classification of this Briefing is UNCLASSIFIED
Command Indoctrination Operations Security DD MMM YY
JEB – Little Creek (Bldg 1126)
Operations Security (OPSEC)
CMD LOGO Operations Security (OPSEC) Assessment in-brief Presenter
Overall Classification of this Briefing is UNCLASSIFIED
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name) Provided by OSPA (
Operations Security (OPSEC): A Force Multiplier
IS-907 – Active Shooter: What You Can Do
OPSEC General Military Training DD MMM YY
Command Indoctrination Operations Security DD MMM YY
Overview OPSEC Threat Critical Information Indicators Data Aggregation
Presentation transcript:

Operational Security PCC. VII-F.1

Learning Topics Introduction Critical Information Threat OPSSEC measures What to look for Identifying threats

Introduction Operations security (OPSEC) is a process that identifies critical information to determine if: friendly actions can be observed by adversary intelligence systems information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information

Importance “Loose Lips Sink Ships” Any priority information that could be useful to the enemy needs to be regulated In this new technological era, information can pass by the click of a button

Process Operational security is broken down into the following five step process Step 1 Identify Critical Information Step 2 Analyze Threats Step 3 Analyze Vulnerabilities Step 4 Risk Assessment Step 5 Apply Appropriate OPSEC Measures

1. Identification Critical Information Identifying information needed by an adversary, which focuses the remainder of the OPSEC process on protecting vital information, rather than attempting to protect all classified or sensitive unclassified information http://en.wikipedia.org/wiki/Operations_security

2. Analysis of Threats Analysis of Threats: the research and analysis of intelligence, counterintelligence, and open source information to identify likely adversaries and/or planned operations

3. Analysis of Vulnerabilities Examining each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then comparing those indicators with the adversary’s intelligence collection capabilities identified in the previous action

4. Assessment of Risk First, planners analyze the vulnerabilities identified in the previous action and identify possible OPSEC measures for each vulnerability Second, specific OPSEC measures are selected for execution based upon a risk assessment done by the commander and staff

5. Application of Appropriate OPSEC Measures The command implements the OPSEC measures selected in the assessment of risk action or, in the case of planned future operations and activities, includes the measures in specific OPSEC plans

Need To Know  It is possible and not unprecedented for spouses and family members of US military personnel to be targeted for intelligence collection When being deployed do not give out any critical information that the enemy could use against you

Types of Information Examples of Critical Information The following examples may help you in defining parameters for your communications. It is important to remember that there are many more examples than those listed below: 1. Detailed information about the mission of assigned units   2. Details concerning locations and times of unit deployments   3. Personnel transactions that occur in large numbers (e.g., pay information, power of attorney, wills or deployment information)   4. References to trend in unit morale or personnel problems   5. Details concerning security procedures Need to know, secret, etc.

Identifying Threats In today’s society you have to be extremely careful on how your passing information If it is sensitive information you have to make sure you use secure channels

Conclusion “Loose Lips Sink Ships” Make sure you are passing information the correct way Avoid posting critical information to social media sights Avoid the use of cell phones and emails for passing critical information Do not even pass critical information to your family

Resources Operational Security http://www.marines.mil/unit/13thmeu/Pages/Operationa lSecurity.aspx Marine Parents http://www.marineparents.com/deployment/opsec.asp