380 likes | 415 Views
Operations Security (OPSEC). DEFENSE-SENSITIVE INFORMATION. SUMMER CRUISES REQUIRED TRAINING OPNAVINST 3432. DEFINITIONS & BACKGROUND. OPSEC IS: ONE OF THREE COMPONENTS USED TO MAINTAIN THE SECRECY NEEDED TO ACHIEVE SURPRISE OPSEC IS NOT A SECURITY FUNCTION, BUT AN OPERATIONS FUNCTION
E N D
DEFENSE-SENSITIVE INFORMATION • SUMMER CRUISES • REQUIRED TRAINING • OPNAVINST 3432
DEFINITIONS & BACKGROUND • OPSEC IS: • ONE OF THREE COMPONENTS USED TO MAINTAIN THE SECRECY NEEDED TO ACHIEVE SURPRISE • OPSEC IS NOT A SECURITY FUNCTION, BUT AN OPERATIONS FUNCTION • SECURITY PROGRAMS AND OPSEC MUTUALLY SUPPORT EACH OTHER
DEFINITIONS & BACKGROUND • OPSEC IDENTIFIES & CONTROLS INFORMATION THAT INDICATES • OUR • FRIENDLY (U.S.) INTENTIONS • FRIENDLY (U.S.) CAPABILITIES • FRIENDLY (U.S.) ACTIVITIES
DEFINITIONS & BACKGROUND • SECURITY PROGRAMS • DENY CLASSIFIED INFORMATION TO ADVERSARIES • PHYSICAL SECURITY • PERSONAL SECURITY • INFORMATION SECURITY • INFORMATION SYSTEMS SECURITY
DEFINITIONS & BACKGROUND • COUNTERINTELLIGENCE PROGRAMS • SUPPORT BOTH SECURITY AND OPSEC PROGRAMS • IDENTITY INTELLIGENCE THREATS AND METHODS OF AN ADVERSARY
FREEDOM OF ACTION • BY MAINTAINING OPERATIONAL SECURITY OF PLANS WE GAIN THE FULLEST POSSIBLE SURPRISE • THIS IN TURN GIVES US FREEDOM OF ACTION
GOOD OPSEC • OPSEC, PROPERLY APPLIED, CONTRIBUTES TO: • OPERATIONAL EFFECTIVENESS • ENHANCES PROBABILITY OF SURPRISE • CAUSES ADVERSARIES TO MAKE BAD DECISIONS DUE TO: • LACK OF CRITICAL INFORMATION ABOUT OUR FORCES AND EQUIPMENT
OPSEC REQUIRED FOR • OPSEC MEASURES ARE REQUIRED FOR OPERATIONS AND ACTIVITIES RELATING TO THE…: • EQUIPPING • PREPARING • DEPLOYING • SUSTAINING • EMPLOYMENT • …OF THE NAVY AND MARINE CORPS TEAM IN TIME OF WAR, CRISIS, OR PEACE • ALSO, PROTECT THE PLANS
INADEQUATE OPSEC • DEGRADES OPERATIONAL EFFECTIVENESS BY HINDERING SURPRISE • CONVERSELY, EXCESSIVE OPSEC CAN INTERFERE WITH: • COORDINATION • TRAINING • LOGISTICAL SUPPORT
SUMMATION • OPSEC IS THE CONTROL OF INFORMATION BY: • KNOWING THE THREAT • KNOWING WHAT TO PROTECT • DETERMINING RISKS • KNOWING HOW TO PROTECT INFORMATION
OPSEC PROCESS • OPSEC PLANNING IS ACCOMPLISHED VIA THE OPSEC PROCESS • THE OPSEC PROCESS CONSISTS OF FIVE DISTINCT ACTIONS APPLIED IN A SEQUENTIAL MANNER DURING OPSEC PLANNING • BEFORE WE DISCUSS, YOU MUST KNOW SOME TERMINOLOGY
OPSEC TERMINOLOGY • CRITICAL INFORMATION: Specific facts about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively to guarantee failure or unacceptable consequences for friendly mission accomplishment.
OPSEC TERMINOLOGY • OPSEC INDICATORS: Friendly detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information.
OPSEC TERMINOLOGY • OPSEC VULNERABILITY: A condition in which friendly actions provide OPSEC indicators that may be obtained and accurately evaluated by an adversary in time to provide a basis for effective adversary decision making.
OPSEC ACTION #1 • IDENTIFICATION OF CRITICAL INFORMATION • What will our adversary want to know about our intentions, capabilities, and activities? • The answers to these three questions are known as Essential Elements of Friendly Information (EEFI). • EEFIs are what we protect from exposure to an adversary.
OPSEC ACTION #1 (CONT.) • CRITICAL INFORMATION IS A SUBSET OF EEFI • IT IS ONLY THAT INFORMATION THAT IS VITALLY NEEDED BY AN ADVERSARY • IDENTIFYING CRITICAL INFORMATION ALLOWS US TO FOCUS OUR EFFORTS ON PROTECTING IT, INSTEAD OF TRYING TO PROTECT ALL CLASSIFIED OR SENSITIVE INFORMATION
OPSEC ACTION #2 • ANALYSIS OF THREATS • RESEARCHING & ANALYZING INTELLIGENCE INFORMATION, COUNTERINTELLIGENCE, REPORTS, AND OPEN SOURCE INFORMATION TO IDENTIFY WHO THE LIKELY ADVERSARIES ARE TO THE PLANNED OPERATION • THROUGH THIS ANALYSIS WE SEEK ANSWERS TO THE FOLLOWING QUESTIONS:
OPSEC ACTION #2 (CONT.) • WHO IS THE ADVERSARY? • WHAT ARE THE ADVERSARY’S GOALS? • What IS THE ADVERSARY’S STRATEGY FOR OPPOSING THE PLANNED OPERATION?
OPSEC ACTION #2 (CONT.) • WHAT CRITICAL INFORMATION DOES THE ADVERSARY ALREADY KNOW ABOUT THE OPERATION • WHAT INFORMATION IS IT TOO LATE TO PROTECT? • WHAT ARE THE ADVERSARY’S INTELLIGENCE COLLECTION CAPABILITIES?
OPSEC ACTION #3 • ANALYSIS OF VULNERABILITY • FRIENDLY ACTIONS/ACTIVITIES PROVIDE OPSEC INDICATORS TO AN ADVERSARY THAT MAY BE OBTAINED AND ACCURATELY EVALUATED IN TIME TO PROVIDE A BASIS FOR EFFECTIVE DECISION MAKING AND ACTION AGAINST US
OPSEC ACTION #3 (CONT.) • OPERATIONS PLANNERS SEEK ANSWER TO THE FOLLOWING WHEN ANALYZING VULNERABILITY: • WHAT INDICATORS OF CRITICAL INFORMATION NOT KNOWN TO THE ADVERSARY WILL BE CREATED BY THE FRIENDLY ACTIVITIES IN PREPARATION FOR THE OPERATION?
OPSEC ACTION #3 (CONT.) • WHAT INDICATORS CAN THE ADVERSARY ACTUALLY COLLECT? • WHAT INDICATORS WILL THE ADVERSARY BE ABLE TO USE TO THE DISADVANTAGE OF FRIENDLY FORCES? • CAN THE ADVERSARY ANALYZE THE INFORMATION, MAKE A DECISION, AND TAKE APPROPRIATE ACTION IN TIME TO INTERFERE WITH THE PLANNED OPERATION?
OPSEC ACTION #4 • ASSESSMENT OF RISK • TWO COMPONENTS: • ANALYZE OPSEC VULNERABILITIES IDENTIFIED IN THE PREVIOUS ACTION AND CONSIDER OPSEC MEASURES TO ERASE OR COUNTER EACH VULNERABILITY • SPECIFIC OPSEC MEASURES ARE SELECTED FOR EXECUTION BASED UPON A RISK ASSESSMENT DONE BY THE COMMANDER AND STAFF
OPSEC ACTION #4 (CONT.) • THESE OPSEC MEASURES SPECIFICALLY REDUCE THE ADVERSARY’S CAPABILITY TO ANALYZE OUR ACTIONS
OPSEC ACTION #4 (CONT.) • OPSEC MEASURES CAN BE USED TO: • PREVENT THE ADVERSARY FROM DETECTING AN INDICATOR • PROVIDE AN ALTERNATIVE ANALYSIS OF AN INDICTOR • DECEIVE THE ADVERSARY • ATTACK THE ADVERSARY’S COLLECTION SYSTEM
OPSEC ACTION #4 (CONT.) • OPSEC MEASURES INCLUDE, AMONG OTHER ACTIONS: • COVER • CONCEALMENT • CAMOUFLAGE • DECEPTION • INTENTIONAL DEVIATIONS FROM NORMAL PATTERNS • DIRECT STRIKES AGAINST THE ADVERSARY’S INTELLIGENCE SYSTEM
OPSEC ACTION #4 (CONT.) • GOAL OF OPSEC MEASURES: • HIGHEST POSSIBLE PROTECTION WITH THE LEAST IMPACT ON OPERATIONAL EFFECTIVENESS
OPSEC ACTION #4 (CONT.) • RISK ASSESSMENT: • THIS REQUIRES COMPARING THE ESTIMATED COST WITH IMPLEMENTING PARTICULAR OPSEC MEASURES TO THE POTENTALLY HARMFUL EFFECTS ON MISSION ACCOMPLISHMENT RESULTING FROM AN ADVERSARY’S EXPLOITATION OF AN OPSEC VULNERABILITY • IN THE END, CAN THE ADVERSARY DO MUCH DAMAGE IF WE DON’T IMPLEMENT AN OPSEC MEASURE?
OPSEC ACTION #4 (CONT.) • IMPLEMENTING OPSEC MESURES COSTS: • RESOURCES: • TIME • PERSONNEL • INTERFERES WITH NORMAL OPERATIONS • IF COST > HARMFUL EFFECT, IT IS NOT WORTH IT
OPSEC ACTION #4 (CONT.) • TYPICAL QUESTIONS FOR ANALYSIS • WHAT IS THE RISK TO OUR OPERATIONAL EFFECTIVENESS? • WHAT IS THE RISK TO MISSION SUCCESS IF WE DON’T IMPLEMENT AN OPSEC MEASURE? • WHAT RISK TO MISSION SUCCESS IS LIKELY IF AN OPSEC MEASURE FAILS TO BE EFFECTIVE?
OPSEC ACTION #4 (CONT.) • THE INTERACTION OF OPSEC MEASURES MUST BE ANALYZED • IN SOME SITUATIONS, CERTAIN OPSEC MEASURES MAY ACTUALLY CREATE INDICATORS OF CRITICAL INFORMATION • EXAMPLE: CAMOUFLAGING OF PREVIOUSLY UNPROTECTED FACILITIES COULD BE AN INDICATOR OF PREPARATIONS FOR MILITARY ACTIONS
OPSEC ACTION #4 (CONT.) • COORDINATE OPSEC ACTIONS WITH OTHER COMMAND AND CONTROL COMPONENTS TO ENSURE ACTIONS DO NOT COMPROMISE SECURITY • ACTIONS SUCH AS JAMMING OF INTELLIGENCE NETS OR THE PHYSICAL DESTRUCTION OF CRITICAL INTELLIGENCE CENTERS CAN BE USED AS OPSEC • CONVERSELY, DECEPTION AND PSYOP PLANS MAY REQUIRE THAT OPSEC MEASURES NOT BE APPLIED TO CERTAIN INDICATORS IN ORDER TO PROJECT A SPECIFIC MESSAGE TO THE ADVERSARY
OPSEC ACTION #5 • APPLICATION OF APPROPRIATE OPSEC MEASURES • THE COMMAND IMPLEMENTS THE OPSEC MEASURES SELECTED IN STEP #4 • THE REACTION OF ADVERSARIES TO OPSEC MEASURES IS MONITORED TO DETERMINE EFFECTIVENESS AND TO PROVIDE FEEDBACK • FEEDBACK IS USED TO ADJUST OPSEC MEASURES AND FOR FUTURE OPSEC PLANNING
OPSEC & THE PUBLIC • OPSEC ACTIONS ARE HELD ACCOUNTABLE BY THE AMERICAN PUBLIC • OPSEC IS NOT AN EXCUSE TO DENY THE PUBLIC ACCESS TO NON-CRITICAL INFORMATION