Understanding OPSEC: Protecting Critical Information in Military Operations

 
OPSEC
. 
A process of 
identifying critical information 
and 
analyzing 
friendly actions attendant to
military operations 
and other activities to: 
identify those actions that can be observed 
by adversary
intelligence systems; 
determine indicators and vulnerabilities 
that adversary intelligence systems might
obtain that could be interpreted or pieced together to derive critical 
information
 in time to be 
useful to
adversaries
, and 
determine
 
which of these represent an unacceptable risk
; then select and execute
countermeasures.
 
 
 
 
 
 
 
 
 
 
 
 
 
OPSEC
 
assessment. 
An 
evaluative process 
of an organization, operation, activity, exercise, or support
function 
to determine if sufficient countermeasures are in place to protect critical information
. This term
and its definition are approved for inclusion in the next edition of Reference (k).
 
What’s wrong
with this picture?
 
O
P
S
E
C
 
UPAR Responsibilities
 
Enforce OPSEC in all UPAR Products
 
Enforce OPSEC amongst your peers
 
Educate fellow service members on OPSEC
for their personal social media sites
 
Steps to Identify OPSEC
 
Identify Critical Information
Analyze the threat
Analyze the vulnerability
Assess the risk
Apply Countermeasures
 
Soldiers serving on border mission –
what’s wrong 
with picture?
 
 
 
What is the enemy looking for?
 
“Information about government personnel, officers,
important personalities, and all matters related to
them (residence, work place, times of leaving and
returning, 
and children
).”
 
 
 
- Al Qaeda Handbook
 
What Information Should We Protect?
(Critical Information)
 
Military movements (deployment/redeployment dates, dates of field
exercises, flight information etc.)… next Tuesday IS a specific date
 Using timeframes – 
Deploying next spring –
 is OK
Any issues with the unit
Anything concerning security
Avoid pictures with Afghan children (PII)
Equipment issues (what, no flak vests?)
Locations
 of units (it’s OK to say they’re in Afghanistan, but not to say that
your spouse's battalion is at 14th and Ramadan in Tora Bora)  i.e. 
CELL PHONES
KIAs, WIAs – DO NOT POST ABOUT THIS ON FACEBOOK!
COMMON SENSE
 
 
TMD Critical Information
 
 
OPSEC Countermeasures
 
10 or less – Publish IAW unit publishing
guidelines
 
11-15 – Review with PA OPSEC manager to
mitigate concerns prior to publishing
 
16 or greater – Review with PA OPSEC
manager & State PAO to mitigate concerns
and determine if product should be published
 
OPSEC Countermeasures
 
OPSEC Countermeasures
 
Be careful what you post on social media sites
(Facebook, Instagram, web-pages).
Be careful what you post elsewhere (i.e.
bumper stickers)
 
OPSEC Countermeasures
 
Take a close look at all privacy settings. Set security options to allow visibility to
“friends only.”
 
Do not reveal sensitive information about yourself such as schedules and event
locations.
 
Ask, “What could the wrong person do with this information?” and “Could it
compromise the safety of myself, my family or my unit?”
 
Closely review photos before they go online. Make sure they do not give away
sensitive information which could be dangerous if released.
 
Make sure to talk to family about operations security and what can and cannot be
posted.
 
Videos can go viral quickly, make sure they don’t give away sensitive information.
 
E-mail can be intercepted and read by an
adversary, unless it’s encrypted.
MS Outlook can encrypt e-mail with a
digital certificate.
Other encryption is also an option.
 
 
 
 
 
 
OPSEC Countermeasures
 
 
Telephones are NOT secure!
 
Cell phones, cordless phones
and land-lines can all be
compromised.
 
Face to Face contact is!
     Limit what you discuss on the
phone because you never know
who could be listening in on
you.
 
 
OPSEC Countermeasures
 
To Summarize
 
Now repeat after me…
 
 
There is a fine line between posting too much information and not enough.
We need YOU to help keep your unit right in the middle.
Slide Note

Operational Security and how it applies to Public Affairs.

BRIEFLY discuss why the photo of Prince Harry. The photo was posted to social media while Prince Harry was deployed. Due to his status as an heir to the British throne, the British military was not publicizing his deployment. Once the photo was posted it went viral and Prince Harry was pulled out of theater and sent home for his own safety.

Embed
Share

OPSEC is crucial in military operations to safeguard critical information from adversaries. This involves identifying vulnerable actions, analyzing threats, and implementing countermeasures. Soldiers must be aware of what information to protect and how to enforce OPSEC effectively.


Uploaded on Aug 01, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. OPSEC. A process of identifying critical information and analyzing friendly actions attendant to military operations and other activities to: identify those actions that can be observed by adversary intelligence systems; determine indicators and vulnerabilities that adversary intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries, and determinewhich of these represent an unacceptable risk; then select and execute countermeasures. O P S E C What s wrong with this picture? OPSECassessment. An evaluative process of an organization, operation, activity, exercise, or support function to determine if sufficient countermeasures are in place to protect critical information. This term and its definition are approved for inclusion in the next edition of Reference (k). OFFICE OF THE ADJUTANT GENERAL

  2. UPAR Responsibilities Enforce OPSEC in all UPAR Products Enforce OPSEC amongst your peers Educate fellow service members on OPSEC for their personal social media sites OFFICE OF THE ADJUTANT GENERAL

  3. Steps to Identify OPSEC Identify Critical Information Analyze the threat Analyze the vulnerability Assess the risk Apply Countermeasures Soldiers serving on border mission what s wrong with picture? OFFICE OF THE ADJUTANT GENERAL

  4. http://i106.photobucket.com/albums/m265/DeadxBoi/horror.jpg OFFICE OF THE ADJUTANT GENERAL

  5. What is the enemy looking for? Information about government personnel, officers, important personalities, and all matters related to them (residence, work place, times of leaving and returning, and children). - Al Qaeda Handbook OFFICE OF THE ADJUTANT GENERAL

  6. What Information Should We Protect? (Critical Information) Military movements (deployment/redeployment dates, dates of field exercises, flight information etc.) next Tuesday IS a specific date Using timeframes Deploying next spring is OK Any issues with the unit Anything concerning security Avoid pictures with Afghan children (PII) Equipment issues (what, no flak vests?) Locationsof units (it s OK to say they re in Afghanistan, but not to say that your spouse's battalion is at 14th and Ramadan in Tora Bora) i.e. CELL PHONES KIAs, WIAs DO NOT POST ABOUT THIS ON FACEBOOK! COMMON SENSE OFFICE OF THE ADJUTANT GENERAL

  7. TMD Critical Information OFFICE OF THE ADJUTANT GENERAL

  8. OFFICE OF THE ADJUTANT GENERAL

  9. OPSEC Countermeasures OFFICE OF THE ADJUTANT GENERAL

  10. OPSEC Countermeasures 10 or less Publish IAW unit publishing guidelines 11-15 Review with PA OPSEC manager to mitigate concerns prior to publishing 16 or greater Review with PA OPSEC manager & State PAO to mitigate concerns and determine if product should be published OFFICE OF THE ADJUTANT GENERAL

  11. OPSEC Countermeasures Be careful what you post on social media sites (Facebook, Instagram, web-pages). Be careful what you post elsewhere (i.e. bumper stickers) OFFICE OF THE ADJUTANT GENERAL

  12. OPSEC Countermeasures Take a close look at all privacy settings. Set security options to allow visibility to friends only. Do not reveal sensitive information about yourself such as schedules and event locations. Ask, What could the wrong person do with this information? and Could it compromise the safety of myself, my family or my unit? Closely review photos before they go online. Make sure they do not give away sensitive information which could be dangerous if released. Make sure to talk to family about operations security and what can and cannot be posted. Videos can go viral quickly, make sure they don t give away sensitive information. OFFICE OF THE ADJUTANT GENERAL

  13. OPSEC Countermeasures E-mail can be intercepted and read by an adversary, unless it s encrypted. MS Outlook can encrypt e-mail with a digital certificate. Other encryption is also an option. OFFICE OF THE ADJUTANT GENERAL

  14. OPSEC Countermeasures Telephones are NOT secure! Cell phones, cordless phones and land-lines can all be compromised. Face to Face contact is! Limit what you discuss on the phone because you never know who could be listening in on you. OFFICE OF THE ADJUTANT GENERAL

  15. To Summarize OFFICE OF THE ADJUTANT GENERAL

  16. Now repeat after me OFFICE OF THE ADJUTANT GENERAL

  17. There is a fine line between posting too much information and not enough. We need YOU to help keep your unit right in the middle. OFFICE OF THE ADJUTANT GENERAL

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#