Presentation is loading. Please wait.

Presentation is loading. Please wait.

UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.

Similar presentations


Presentation on theme: "UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information."— Presentation transcript:

1 UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information

2 UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Overview  Purpose  Objective  Team composition  Methodology  Ground rules  Discussion

3 UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO  To determine the likelihood that critical information can be protected from the adversary’s intelligence collection.  Bottom line: OPSEC is emphasized, security is improved, threat awareness raised and mission success rate increased. Purpose

4 UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO  Observe potential vulnerabilities affecting operational effectiveness  Apply OPSEC 5-step process: Verify critical information, identify threat, identify vulnerabilities, assess risk & apply / evaluate countermeasures  Observe UNCLAS indicators, examine exploitable processes & procedures  Evaluate ability to thwart adversary open-source intelligence collection Objective

5 UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Team composition  Team lead: (Name)  Assistant Team lead: (Name)  Team member: (Name)

6 UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO  Verify CI  Obtain threat assessment: N2, J2, G2, S2 / NCIS, DIA, CID, OSI  Foreign intelligence service collectors, terrorists, criminals  Identify Vulnerabilities / Conduct assessment (Dates)  Evaluate command emphasis, awareness, training; conduct interviews  Emulate threat: Open source discovery, dumpster dives [observe routines, compartment / office walk through]  Assess risk of vulnerability findings  Apply / evaluate countermeasures (recommendations) Threat Brief Day 2 interviews  Web Risk Assessment  Observations / Trash review  Evaluation Complete  Program Review  Day 1 -7 Day  Compartment / office walk through  Compile results Open source research Methodology

7 UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Ground rules  No photographs in controlled compartments / offices  Interviews conducted in private when possible  Adherence to restrictions / limitations levied by Commanding Officer  Any other directions from Commanding Officer

8 UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Discussion / Questions


Download ppt "UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information."

Similar presentations


Ads by Google