Download presentation
Presentation is loading. Please wait.
Published byEsmond Wilkins Modified over 9 years ago
1
Operations Security (OPSEC) 301-371-1050
2
Introduction Standard Application Objectives Regulations and Guidance OPSEC Definition Indicators Definition Identify Threat Capabilities The OPSEC Process Define OPSEC Review, Assessment, and Survey
3
Standard Implement OPSEC measures based on unit indicators and vulnerabilities; protect unit essential elements of friendly information against threat collection efforts and prevented compromise..
4
Application Operations security awareness and execution is crucial to Army success. OPSEC is applicable to all personnel and all Army missions and supporting activities on a daily basis.
5
Objectives Understand the OPSEC concept, process, and analytical methodology Apply OPSEC to establish and maintain Essential Secrecy concerning Command Capabilities, Intentions and Activities Define OPSEC review, assessment, & survey
6
Regulations & Guidance Operations Security is a national program. Regulatory guidance for OPSEC is contained in: NSDD 298 DOD Dir 5205.2 CJCS Inst 3213.01 and JOPES CJCS MOP 30 AR 530-1
7
OPSEC Definition OPSEC is a process of analyzing friendly actions pursuant to military operations and other activities to— 1.Identify those friendly actions that can be observed by the threat. 2.Determine indicators that the threat might obtain that could be interpreted or pieced together to derive critical information in time to be useful. 3.Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to the threat exploitation.
8
Indicators - Definition Indicators are data derived from open sources or from detectable actions that the threat can piece together or interpret to reach conclusions or official estimates concerning friendly intentions, capabilities, or activities. They are also activities that result from military operations.
9
3 Types of Indicators 1.Profile - show how activities are normally conducted. Profiles are developed by looking at all aspects of friendly operations from the viewpoint of the threat. 2.Deviation - highlight contrasts to normal activity, help the threat gain appreciation about intentions, preparations, time, and place. 3.Tip-Off - draws attention to information that otherwise might pass unnoticed.
10
Identify Threat Capabilities The threat consists of multiple and overlapping collection efforts targeted against all sources of Army information.
11
The OPSEC process 1.Identify Critical Information 2.Threat Analysis 3.Vulnerability Analysis 4.Risk Assessment 5.Implement OPSEC Countermeasures
12
1. Identify Critical Information v Determine what needs protection v Identify critical information in a variety of situations (ask “If known by the threat, what would be the mission impact” v Identify friendly force profiles v Avoid setting patterns
13
Critical Information can be...... Information or data Comm, Verbal, Printed, Non-Verbal, Detectable & Observable Activities An activity, event or operation Logistics, Movement, Training & Testing Classified or unclassified Anything that could hinder or prevent mission accomplishment Facts about our protective measures
14
The Essential Elements of Friendly Information (EEFI) “What key questions about friendly intentions and military capabilities are likely to be asked by adversary officials and intelligence systems” Answers to the EEFI are critical information EXAMPLE: What specific network security procedures are used by the command? Anything that will answer this question is critical information
15
2. Analysis of Threat v Identify OPSEC vulnerabilities. v Identify OPSEC indicators.
16
Threat Characteristics Capabilities Motivation Intent History of Action (Probability)
17
Information Collection All nations collect Groups collect All sources are exploited Increasing collection sophistication Increasing collection capability Increasing lethality is the result
18
How is the information collected? It is Multi-disciplined. HUMINT (Human Intelligence) SIGINT (Signals Intelligence) IMINT (Imagery Intelligence) MASINT (Measurement and Signatures Intelligence) OSINT (Open Source)
19
3. Vulnerability Analysis v Identify and discuss Indicators v Identify and discuss vulnerabilities v Describe the elements of a vulnerability
20
Vulnerabilities Visualize the Operation Identify Critical Information & location in your operation/systems Compare threat capabilities to Critical Information
21
Select Possible Protective Measures Action Control - Indicator Countermeasures - Collection System Counter Analysis - Analyst
22
4. Risk Assessment v Understand the concept of risk. v Assess the degree of risk. v Understand the difference between Risk management vice risk avoidance
23
Concept RISK Assets Threats Vulnerabilities
24
Process Assess Assets Assess Threat Assess Vulnerabilities Assess Risks Determine Countermeasure Options Cost Analysis Benefit Analysis
25
THE COMMANDER CONSIDERS... Mission Accomplishment Combat Effectiveness Effectiveness vs Efficiency Cannot avoid all risksCannot avoid all risks Military activities have inherent risksMilitary activities have inherent risks Must manage the risks that cannot be avoidedMust manage the risks that cannot be avoided Cannot avoid all risksCannot avoid all risks Military activities have inherent risksMilitary activities have inherent risks Must manage the risks that cannot be avoidedMust manage the risks that cannot be avoided
26
5. Implement OPSEC Measures Identify means to implement countermeasures Evaluate the effectiveness of OPSEC program
27
Orders Annexes Plans The Commander OPSEC is Implemented via...
28
OPSEC Review, Assessment, and Survey
29
OPSEC Review OPSEC review is an evaluation of a document to ensure protection of sensitive or critical information.
30
OPSEC Assessment OPSEC assessment is an analysis of an operation, activity, exercise, or support function to determine the overall OPSEC posture and to evaluate the degree of compliance of subordinate organizations with the published OPSEC plan or OPSEC program.
31
OPSEC Survey OPSEC survey is a method to determine if there is adequate protection of critical information during planning, preparations, execution, and post-execution phases of any operation or activity. It analyzes all associated functions to identify sources of information, what they disclose, and what can be derived from the information.
32
REMAIN ALERT
33
Summary Standard Application Objectives Regulations and Guidance OPSEC Definition Indicators Definition Identify Threat Capabilities The OPSEC Process Define OPSEC Review, Assessment, and Survey
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.