TSP 310-C-1050 0901, Phase II, OCS TSP 310-C-1050 0901, Phase II, OCS Implement OPSEC.

Slides:



Advertisements
Similar presentations
PROJECT RISK MANAGEMENT
Advertisements

Unified Land Operations
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
THE FOLLOWING MINI PRESENTATION ON OPSEC IS TAKEN FROM A US AIR FORCE BRIEFING. ALTHOUGH THIS IS A MILITARY PRESENTATION, IT PROVIDES A GOOD OVERVIEW OF.
Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
Military Briefings.
Introduction to Information Operations Attaché Corps- SEP 09
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Establish Verification Procedures (Task 11 / Principle 6)
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
TLO 2: Action: Plan operational security. Intermediate-level training.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Computer Security: Principles and Practice
C4ISR and Information Warfare
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
The Operations Process
PART IX: EMERGENCY EXPOSURE SITUATIONS Module IX.1: Generic requirements for emergency exposure situations Lesson IX.1-2: General Requirements Lecture.
Army Doctrine Publication (ADP) 3-37; and Army
Introduction to Network Defense
Establish a Positive Command Climate MQS II Training Support Package.
Codex Guidelines for the Application of HACCP
Degree and Graduation Seminar Project Management Processes
Following the terrorist attack on September 11, 2001 the President declared a national emergency … Secretary of Defense Donald Rumsfeld cautioned on the.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Unit 5:Elements of A Viable COOP Capability (cont.)  Define and explain the terms tests, training, and exercises (TT&E)  Explain the importance of a.
Presented by the 1st Information Operations Command.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Unit 8:COOP Plan and Procedures  Explain purpose of a COOP plan  Propose an outline for a COOP plan  Identify procedures that can effectively support.
List of intelligence gathering disciplines
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Operational Security PCC. VII-F.1.
© RHEINMETALL DEFENCE 2014 Systems Engineering at Rheinmetall Air Defence Dr. Marc Honikel.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Session 9 & 10. Definition of risk assessment and pre condition for risk assessment Establishment of clear, consistent agency objectives. Risk assessment.
Information Security What is Information Security?
C4ISR and Information Warfare Naval Weapons Systems.
Intelligence Support to Operations
UNCLASSIFIED//FOR OFFICIAL USE ONLY National Reconnaissance Office Overview UNCLASSIFIED//FOR OFFICIAL USE ONLY.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
G2 ORGANIZATION.
TOTAL QUALITY MANAGEMENT
TSP 191-C , Phase II, OCS TSP 191-C , Phase II, OCS Process Captives.
Prepared By: Razif Razali 1 TMK 264: COMPUTER SECURITY CHAPTER SIX : ADMINISTERING SECURITY.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Military Intelligence
This Briefing is Unclassified Space Situation Awareness (SSA) for the Warfighter 25 August 2005 HQ AFSPC/DRC Lt Col Troy Pannebecker.
Report Intel Information
OPERATIONS SECURITY 16 August August 2004.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Headquarters U.S. Air Force
Headquarters U.S. Air Force
Risk management.
PLANNING, MATERIALITY AND ASSESSING THE RISK OF MISSTATEMENT
Operations Security (OPSEC) For New Hires
Command Indoctrination Operations Security DD MMM YY
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
Life Science Chapter 1 Review
Operations Security (OPSEC)
Overall Classification of this Briefing is UNCLASSIFIED
Operations Security (OPSEC): A Force Multiplier
Command Indoctrination Operations Security DD MMM YY
Presentation transcript:

TSP 310-C , Phase II, OCS TSP 310-C , Phase II, OCS Implement OPSEC

TSP 301-C , Phase II, OCS Terminal Learning Objective Action:Implement Operations Security Measures. Conditions:You have been given AR and a unit OPSEC plan, which includes essential elements of friendly information, indicators, vulnerabilities, and OPSEC measures. Standard:Implement OPSEC measures based on unit indicators and vulnerabilities; protect unit’s essential elements of friendly information against enemy collection efforts and to prevent compromise.

TSP 301-C , Phase II, OCS References Number TitleDatePara no. AR 530-1Operations Security (OPSEC) Mar 951-5; 3-3, 3-4; 3-5, 3-6, 3-7, 3-8, 4-1, 4-2, 4-4, 4-5, chapter 2; App B, para B-1; C, E, G.

TSP 301-C , Phase II, OCS SAFETY CONSIDERATIONSNONE RISK ASSESSMENTLOW ENVIRON. CONSIDERATIONS NONE EVALUATIONYES Administrative Notes

TSP 301-C , Phase II, OCS Security & Surprise Operations Security (OPSEC), if properly employed, provides your operations with the security and surprise needed to effectively use your resources for overall mission success

TSP 301-C , Phase II, OCS Enabling Learning Objective 1 Action:Implement the OPSEC process. Conditions:You have received a unit OPSEC plan, which includes essential elements of friendly information, indicators, vulnerabilities, OPSEC measures, and AR Standards:Implement the OPSEC process against the threat to prevent compromise of friendly information.

TSP 301-C , Phase II, OCS OPSEC Definition Is a process of analyzing friendly actions pursuant to military operations and other activities. Maintains essential secrecy, which is the condition achieved by the denial of critical information to the threat.

TSP 301-C , Phase II, OCS What is an INDICATOR… Indicators are data derived from open sources or from detectable actions that the threat can piece together or interpret to reach conclusions or official estimates concerning friendly intentions, capabilities or activities. Indicators are observable or discernible

TSP 301-C , Phase II, OCS Types of Indicators Profile: developed from viewpoint of the threat –Patterns: habitual actions –Signatures: equipment, unit size, noise, etc Deviation: provides contrast to normal activity Tip-off: Something that occurs that will make the enemy pay closer attention to you.

TSP 301-C , Phase II, OCS Threat Collection Capabilities Human Intelligence (HUMINT): includes all information derived through human sources not accessible to other collection assets Imagery Intelligence (IMINT): obtain from land, sea, air, and space platforms & airborne collection Signals Intelligence (SIGINT): collection, evaluation, analysis, integration, and interpretation of information from intercepted electromagnetic emissions. Measurement and Signature Intelligence (MASINT): is scientific and technical intelligence obtained by quantitative and qualitative analysis of data (technical sensors)

TSP 301-C , Phase II, OCS Define OPSEC Measures OPSEC measures are methods and means to gain and maintain essential secrecy about critical information & to deny the threat friendly information. Action Control: eliminates indicators. Select what action to undertake, decide whether or not to execute actions, or impose restraints on actions. Countermeasures: –Diversions –Camouflage –Concealment. –Jamming. –Deception

TSP 301-C , Phase II, OCS OPSEC: 5 Steps Identify critical information –What needs protection? Conduct an analysis of threats –Identify OPSEC vulnerabilities Conduct an analysis of vulnerabilities –Identify OPSEC measures for each vulnerability Perform Risk Assessment –What is the risk to the mission if the OPSEC measure does not work? Apply appropriate countermeasures –Implement those measures that require immediate action

TSP 301-C , Phase II, OCS Implement OPSEC Applies to any plan, operation, program, project or activity Is continuous Are command directed, soldier executed * The 5 steps of OPSEC are not followed in any particular sequence.

TSP 301-C , Phase II, OCS Check on Learning: ELO #1 Question: What is the definition of OPSEC? Answer: Is a process of analyzing friendly actions pursuant to military operations and other activities.

TSP 301-C , Phase II, OCS Check on Learning: ELO #1 Question: What is an indicator? Answer: Indicators are data derived from open sources or from detectable actions that the threat can piece together or interpret to reach conclusions or official estimates concerning friendly intentions, capabilities or activities.

TSP 301-C , Phase II, OCS Check on Learning: ELO #1 Question: How many step in the OPSEC process: Answer: Identify critical information Conduct an analysis of threats Conduct an analysis of vulnerabilities Perform Risk Assessment Apply appropriate countermeasures

TSP 301-C , Phase II, OCS Enabling Learning Objective 2 Action:Define OPSEC review, assessment and survey. Conditions:You have received a unit OPSEC plan, which includes essential elements of friendly information, indicators, vulnerabilities, OPSEC measures, and AR Standards:Define OPSEC review, assessment and survey IAW AR

TSP 301-C , Phase II, OCS OPSEC Review An evaluation of a document to ensure protection of sensitive or critical information.

TSP 301-C , Phase II, OCS OPSEC Assessment Is an analysis of an operation, activity, exercise, or support function to determine the overall OPSEC posture and to evaluate the degree of compliance of subordinate organizations with the published OPSEC plan or OPSEC program.

TSP 301-C , Phase II, OCS OPSEC Survey Is a method to determine if there is adequate protection of critical information during planning, preparations, execution, and post-execution phases of any operation or activity. It analyzes all associated functions to identify sources of information, what they disclose, and what can be derived from the information.

TSP 301-C , Phase II, OCS Check on Learning Question: What are the 4 threat collection capabilities? Answer: Human Intelligence (HUMINT) Imagery Intelligence (IMINT) Signals Intelligence (SIGINT) Measurement and Signature Intelligence (MASINT)

TSP 301-C , Phase II, OCS Check on Learning Question: Are profile, deviation & tip-off the three Indicators? Yes or No Answer: Yes

TSP 301-C , Phase II, OCS Check on Learning Question: What is the definition of OPSEC assessment? Answer: Is an analysis of an operation, activity, exercise, or support function to determine the overall OPSEC posture and to evaluate the degree of compliance of subordinate organizations with the published OPSEC plan or OPSEC program.

TSP 301-C , Phase II, OCS Summary 1.Implement the OPSEC process. 2.Define OPSEC review, assessment and survey

TSP 301-C , Phase II, OCS Conclusion If known by the threat, what actions in what time frame could provide them with our capabilities, intentions, and vulnerabilities? Effective OPSEC will reduce this risk – use its tenent is all military operations.

TSP 301-C , Phase II, OCS