OPSEC and Geospatial Information
Five step process Our operations from an adversary point of view Compilation Indicators Operations Security
Critical Information “It is necessary to gather as much information about the location as possible. For instance: Transportation Traffic signals and pedestrian areas Security personnel centers and government agencies Embassies and consulates Public parks Amount and location of lighting”
Critical Information “Information about government personnel, officers, important personalities, and all matters related to them (residence, work place, times of leaving and returning, and children).” - Al Qaeda Handbook
Value of Information What is your information worth to the adversary? Is it important to us? Is it FOUO? What would it cost to replace it?
Threat = Intent + Capability Threat Analysis
Adversary Hostile nations Terrorists Hackers Criminals Competitors Insiders (access to information)
“Using public sources openly and without resorting to illegal means, it is possible to gather at least 80% of information about the enemy.” - Manchester Document Al-Qaeda terrorist training manual Captured in Manchester, England in 2000 Sources
Information-Rich Environment Google Commercial imagery Public data bases FAS Global Security Archives
OPSEC Solution Threat Awareness Value of Information Vulnerabilities and Risk Countermeasures
OPSEC & Geospatial Information Compilation Public release analysis Data bases Validation