OPSEC and Geospatial Information. Five step process Our operations from an adversary point of view Compilation Indicators Operations Security.

Slides:



Advertisements
Similar presentations
Elements of Threat - Challenges for Visualisation Barry Horne Visualisation N/X Penn State University 11 March 2003.
Advertisements

1 Protecting the Long Island Business Community A Public Safety Partnership.
THE FOLLOWING MINI PRESENTATION ON OPSEC IS TAKEN FROM A US AIR FORCE BRIEFING. ALTHOUGH THIS IS A MILITARY PRESENTATION, IT PROVIDES A GOOD OVERVIEW OF.
Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
Open Source Intelligence (OSINT) OSINT and TRASHINT This presentation is the sole property of OSPA. Distribution is limited to OSPA members registered.
FCC Broadband Workshop on Cyber Security Don Welch President and CEO Merit Network, Inc.
NEW YORK NATIONAL GUARD FAMILY PROGRAMS Offered & presented by CW2 Walker Family Programs OPSEC Program Manager.
OPSEC Countermeasures Michael Chesbro DES OPSEC Officer OPSEC Countermeasures Michael Chesbro DES OPSEC Officer.
TLO 2: Action: Plan operational security. Intermediate-level training.
UNCLASSIFIED. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that.
Types of Violent Crime:. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. 2 Copyright.
Randy Marchany VA Tech Computing Center
FSIS’ Innovative Food Security Initiatives Carol Maczka, Ph.D. Assistant Administrator USDA Food Safety and Inspection Service Office of Food Security.
Military families and Operational Security. Family members are vital to the success of our military. You may not know it, but you play a crucial role.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking.
Operations Security (OPSEC) GOOD SECURITY IS A GROUP EFFORT
Presented by the 1st Information Operations Command.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
National Rural Transit Assistance Program. Learning Objectives Safety Safety Security Security Emergency Preparedness Emergency Preparedness.
Measure 27 City Centre Access Control Katerina Oktabcova Usti nad Labem Municipality.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Operational Security PCC. VII-F.1.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Copyright ©2004 Foundstone, Inc. All Rights Reserved »Google Hacking Searching For Ways To Stop Hackers Copyright ©2004 Foundstone, Inc. All Rights Reserved.
APAN Group Owner Training. APAN Groups Overview FOUO PII Other types Information Categories Aggregate data impacts OPSEC Group Owner Responsibilities.
An Analysis of Case Studies for the Baltimore City Health Department By: Ashley Brown.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Defense Security Service Joint Industrial Security Awareness Council March 20, 2015.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Gregor Pavlin Chapter 15 - Exploiting Intelligence for National Security, Pg. 181.
Operational Security Awareness
OPSEC for Families. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know.
Provided by OSPA ( Operations Security (OPSEC)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
TSP 310-C , Phase II, OCS TSP 310-C , Phase II, OCS Implement OPSEC.
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.
OPERATIONS SECURITY 16 August August 2004.
Establishing an Aviation Risk Context APEC TPTWG-27 Aviation Security Experts Sub-Group Meeting Denise Morgan Office of Transport Security May 2006.
Chapter 13: Police Strategies and Tactics Seminar 8.
David Cooper Industry Engagement Manager - Highway June 2016.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
CJS 250 Week 9 Final Project The Security Plan Check this A+ tutorial guideline at 250-Week-9-Final-Project-The-Security-Plan.
Headquarters U.S. Air Force
Headquarters U.S. Air Force
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Virtual Alabama School Safety System
Operations Security (OPSEC) For New Hires
CMD LOGO Operations Security (OPSEC) Assessment out-brief Presenter
Command Indoctrination
Antiterrorism / Force Protection (AT/FP) Assessment Tool Training
OPSEC General Military Training DD MMM YY
Command Indoctrination Operations Security DD MMM YY
Terrorism Training for Law Enforcement
JEB – Little Creek (Bldg 1126)
Chapter 8. Electrical Systems
Minnesota Driver’s Manual – Chapter 3
CMD LOGO Operations Security (OPSEC) Assessment in-brief Presenter
Overall Classification of this Briefing is UNCLASSIFIED
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name) Provided by OSPA (
Operations Security (OPSEC): A Force Multiplier
OPSEC and the World Wide Web
Signal Conditioning.
Prevention, Intelligence
Chapter 1 Key Security Terms.
OPSEC General Military Training DD MMM YY
Command Indoctrination Operations Security DD MMM YY
Overview OPSEC Threat Critical Information Indicators Data Aggregation
Presentation transcript:

OPSEC and Geospatial Information

Five step process Our operations from an adversary point of view Compilation Indicators Operations Security

Critical Information “It is necessary to gather as much information about the location as possible. For instance: Transportation Traffic signals and pedestrian areas Security personnel centers and government agencies Embassies and consulates Public parks Amount and location of lighting”

Critical Information “Information about government personnel, officers, important personalities, and all matters related to them (residence, work place, times of leaving and returning, and children).” - Al Qaeda Handbook

Value of Information What is your information worth to the adversary? Is it important to us? Is it FOUO? What would it cost to replace it?

Threat = Intent + Capability Threat Analysis

Adversary Hostile nations Terrorists Hackers Criminals Competitors Insiders (access to information)

“Using public sources openly and without resorting to illegal means, it is possible to gather at least 80% of information about the enemy.” - Manchester Document Al-Qaeda terrorist training manual Captured in Manchester, England in 2000 Sources

Information-Rich Environment Google Commercial imagery Public data bases FAS Global Security Archives

OPSEC Solution Threat Awareness Value of Information Vulnerabilities and Risk Countermeasures

OPSEC & Geospatial Information Compilation Public release analysis Data bases Validation