Understanding OPSEC: Protecting Critical Information in Military Operations

Slide Note
Embed
Share

OPSEC is crucial in military operations to safeguard critical information from adversaries. This involves identifying vulnerable actions, analyzing threats, and implementing countermeasures. Soldiers must be aware of what information to protect and how to enforce OPSEC effectively.


Uploaded on Aug 01, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. OPSEC. A process of identifying critical information and analyzing friendly actions attendant to military operations and other activities to: identify those actions that can be observed by adversary intelligence systems; determine indicators and vulnerabilities that adversary intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries, and determinewhich of these represent an unacceptable risk; then select and execute countermeasures. O P S E C What s wrong with this picture? OPSECassessment. An evaluative process of an organization, operation, activity, exercise, or support function to determine if sufficient countermeasures are in place to protect critical information. This term and its definition are approved for inclusion in the next edition of Reference (k). OFFICE OF THE ADJUTANT GENERAL

  2. UPAR Responsibilities Enforce OPSEC in all UPAR Products Enforce OPSEC amongst your peers Educate fellow service members on OPSEC for their personal social media sites OFFICE OF THE ADJUTANT GENERAL

  3. Steps to Identify OPSEC Identify Critical Information Analyze the threat Analyze the vulnerability Assess the risk Apply Countermeasures Soldiers serving on border mission what s wrong with picture? OFFICE OF THE ADJUTANT GENERAL

  4. http://i106.photobucket.com/albums/m265/DeadxBoi/horror.jpg OFFICE OF THE ADJUTANT GENERAL

  5. What is the enemy looking for? Information about government personnel, officers, important personalities, and all matters related to them (residence, work place, times of leaving and returning, and children). - Al Qaeda Handbook OFFICE OF THE ADJUTANT GENERAL

  6. What Information Should We Protect? (Critical Information) Military movements (deployment/redeployment dates, dates of field exercises, flight information etc.) next Tuesday IS a specific date Using timeframes Deploying next spring is OK Any issues with the unit Anything concerning security Avoid pictures with Afghan children (PII) Equipment issues (what, no flak vests?) Locationsof units (it s OK to say they re in Afghanistan, but not to say that your spouse's battalion is at 14th and Ramadan in Tora Bora) i.e. CELL PHONES KIAs, WIAs DO NOT POST ABOUT THIS ON FACEBOOK! COMMON SENSE OFFICE OF THE ADJUTANT GENERAL

  7. TMD Critical Information OFFICE OF THE ADJUTANT GENERAL

  8. OFFICE OF THE ADJUTANT GENERAL

  9. OPSEC Countermeasures OFFICE OF THE ADJUTANT GENERAL

  10. OPSEC Countermeasures 10 or less Publish IAW unit publishing guidelines 11-15 Review with PA OPSEC manager to mitigate concerns prior to publishing 16 or greater Review with PA OPSEC manager & State PAO to mitigate concerns and determine if product should be published OFFICE OF THE ADJUTANT GENERAL

  11. OPSEC Countermeasures Be careful what you post on social media sites (Facebook, Instagram, web-pages). Be careful what you post elsewhere (i.e. bumper stickers) OFFICE OF THE ADJUTANT GENERAL

  12. OPSEC Countermeasures Take a close look at all privacy settings. Set security options to allow visibility to friends only. Do not reveal sensitive information about yourself such as schedules and event locations. Ask, What could the wrong person do with this information? and Could it compromise the safety of myself, my family or my unit? Closely review photos before they go online. Make sure they do not give away sensitive information which could be dangerous if released. Make sure to talk to family about operations security and what can and cannot be posted. Videos can go viral quickly, make sure they don t give away sensitive information. OFFICE OF THE ADJUTANT GENERAL

  13. OPSEC Countermeasures E-mail can be intercepted and read by an adversary, unless it s encrypted. MS Outlook can encrypt e-mail with a digital certificate. Other encryption is also an option. OFFICE OF THE ADJUTANT GENERAL

  14. OPSEC Countermeasures Telephones are NOT secure! Cell phones, cordless phones and land-lines can all be compromised. Face to Face contact is! Limit what you discuss on the phone because you never know who could be listening in on you. OFFICE OF THE ADJUTANT GENERAL

  15. To Summarize OFFICE OF THE ADJUTANT GENERAL

  16. Now repeat after me OFFICE OF THE ADJUTANT GENERAL

  17. There is a fine line between posting too much information and not enough. We need YOU to help keep your unit right in the middle. OFFICE OF THE ADJUTANT GENERAL

Related


More Related Content