150 likes | 174 Views
OPERATIONS SECURITY. 16 August 2004. OPERATIONS SECURITY. 31 December 2003. OPERATIONS SECURITY RE:AR 530-1, CH 1. Is the process of analyzing friendly actions pursuant to military operations and other activities.
E N D
OPERATIONS SECURITY 16 August 2004
OPERATIONS SECURITY 31 December 2003
OPERATIONS SECURITY RE:AR 530-1, CH 1 • Is the process of analyzing friendly actions pursuant to • military operations and other activities. • OPSEC maintains essential secrecy, which is the condition • achieved by the denial of critical information to adversaries. • OPSEC is an operations function and not a security function • which protect classified information. At battalion level the S-3 • is the staff proponent for OPSEC, he implements other OPSEC • measures to maintain surprise and security. • OPSEC applies during peace, crisis, and war to all Army • operations and support activities. VGT 1
5 STEPS IN THE OPSEC PROCESS RE:AR 530-1, CH 3 • Identification of Critical Information • Analysis of Threats • Analysis of Vulnerabilities • Assessment of Risks • Application of Appropriate Countermeasures VGT 2
(1)Identificationof Critical Information • para 3-4 • The purpose of this step is to determinewhat needsprotection. • Identify questions the enemy may ask (5Ws + 1H) • Facts about your intentions, capabilities, limitations • Commander’s EEFIs, samples in appendix C • Information concerning protected person(s) • Operational and Tactical information (OPORD) • Test materials used in an academic environment • Sensitive InformationFOUO/Classified Information Identify the length of time critical information needs protection. The TF commander approves EEFI list. VGT 3
(2)Analysis of Threatspara3-5 • The purpose of this step is to identify all vulnerabilities and/or indicators. • A vulnerability exists when an adversary can collect an indicator, correctly analyze the information, make adecision, and take timely actions to degrade friendlyoperations. • Indicators are data derived from open sourcesor fromdetectable actions that an adversary can piece together or interpret to reach conclusions or estimates concerning friendly intentions, capabilities or activities. • Examine each part of the OPORD/FRAGO to find OPSEC vulnerabilities/indicators. VGT 4
THREAT COLLECTION EFFORTS App E • Human Intelligence (HUMINT) • Overt, Covert and Clandestine • Open Source Intelligence (OSINT) (New update) • Imagery Intelligence (IMINT) • Signal Intelligence (SIGINT)
3 TYPES OF INDICATORS App B-1, B-2 • PROFILE- Activity patterns and signatures that shows how your activities are normally conducted. • 2.DEVIATION- Profile changes which helps an adversary learn about your intentions, preparations, time and place. • TIP-OFF- Actions that warn or shows an adversary of friendly impending activity. VGT 6
Characteristics of an Indicator Signature= an identifiable trace or something that causes it to stand out. Associations= compares current with past indicator information for relationship. Profiles= other indicators that have not been observed or detected. Contrast= only needs be recognized not understood. Exposure= duration, repetition, and timing of exposed indicator. VGT 7
(3)Analyze the Vulnerabilities para 3-6 • The purpose of this step is to identify possible OPSEC measures for each vulnerability/indicator. OPSEC measures are methods and means to gain and maintain essentialsecrecy about critical information using: • Action Control: Select a COA, impose restraints on actions and determine the 5Ws +1H for actions necessary to accomplish collective/individual tasks. • Countermeasures attack the adversaries collection efforts using Diversions, Camouflage, Concealment, Jamming, Deception, Police Powers and Force. 3. Counteranalysis provides a possible alternate analysis for an indicator. Confuse the adversary analyst through deception. VGT 8
(3)Analyze the Vulnerabilities para 3-6 • The purpose of this step is to identify possible OPSEC countermeasures for each vulnerability/indicator. • Select two OPSEC countermeasures for each vulnerability/indicator. • Some countermeasures interact and may apply to more than one vulnerability/indicator. • Assess the sufficiency of routine security measures (PerSec, PhySec, InfoSec, ComSec). These will provide OPSEC countermeasures for residual vulnerabilities/indicator. VGT 9
(4) Assessment of Risks para 3-7 • This step is to select the OPSEC countermeasures for implementation. • The leader balance risking operational success/failure versus selecting the right/wrong OPSEC countermeasures. • Check interaction of select OPSEC countermeasures. • Coordinate select OPSEC countermeasures with lateral units and bring attach leaders into your briefings. • The TF commander may decide on a “no-measures” alternative. VGT 10
(5)Application of appropriate countermeasures para 3-8 • Apply the select countermeasures, (directed by the TF commander or recommended by PLD) to the operation or incorporate into plans for future operations. • Emphasize the adverse results if failure to maintain effective OPSEC. • Implement countermeasures first on indicators requiring immediate action or as directed by the TF commander. • Document the measures or state “no-measures” alternative. • Monitor each countermeasures before and during execution, evaluate effectiveness. • Recommend to improve effectiveness of countermeasures or select new measures when new vulnerabilities develop. VGT 11
REVIEW • Define OPSEC • Define the 5 steps in the OPSEC Process • Define the 4 Threats Capabilities • Define the 3 Indicators VGT 12