Download presentation
Presentation is loading. Please wait.
Published byMercy Adams Modified over 8 years ago
1
OPSEC and Geospatial Information
2
Five step process Our operations from an adversary point of view Compilation Indicators Operations Security
3
Critical Information “It is necessary to gather as much information about the location as possible. For instance: Transportation Traffic signals and pedestrian areas Security personnel centers and government agencies Embassies and consulates Public parks Amount and location of lighting”
4
Critical Information “Information about government personnel, officers, important personalities, and all matters related to them (residence, work place, times of leaving and returning, and children).” - Al Qaeda Handbook
5
Value of Information What is your information worth to the adversary? Is it important to us? Is it FOUO? What would it cost to replace it?
6
Threat = Intent + Capability Threat Analysis
7
Adversary Hostile nations Terrorists Hackers Criminals Competitors Insiders (access to information)
8
“Using public sources openly and without resorting to illegal means, it is possible to gather at least 80% of information about the enemy.” - Manchester Document Al-Qaeda terrorist training manual Captured in Manchester, England in 2000 Sources
9
Information-Rich Environment Google Commercial imagery Public data bases FAS Global Security Archives
10
OPSEC Solution Threat Awareness Value of Information Vulnerabilities and Risk Countermeasures
11
OPSEC & Geospatial Information Compilation Public release analysis Data bases Validation
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.