Understanding OPSEC: Protecting Critical Information in Military Operations
OPSEC is crucial in military operations to safeguard critical information from adversaries. This involves identifying vulnerable actions, analyzing threats, and implementing countermeasures. Soldiers must be aware of what information to protect and how to enforce OPSEC effectively.
Download Presentation
Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
E N D
Presentation Transcript
OPSEC. A process of identifying critical information and analyzing friendly actions attendant to military operations and other activities to: identify those actions that can be observed by adversary intelligence systems; determine indicators and vulnerabilities that adversary intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries, and determinewhich of these represent an unacceptable risk; then select and execute countermeasures. O P S E C What s wrong with this picture? OPSECassessment. An evaluative process of an organization, operation, activity, exercise, or support function to determine if sufficient countermeasures are in place to protect critical information. This term and its definition are approved for inclusion in the next edition of Reference (k). OFFICE OF THE ADJUTANT GENERAL
UPAR Responsibilities Enforce OPSEC in all UPAR Products Enforce OPSEC amongst your peers Educate fellow service members on OPSEC for their personal social media sites OFFICE OF THE ADJUTANT GENERAL
Steps to Identify OPSEC Identify Critical Information Analyze the threat Analyze the vulnerability Assess the risk Apply Countermeasures Soldiers serving on border mission what s wrong with picture? OFFICE OF THE ADJUTANT GENERAL
http://i106.photobucket.com/albums/m265/DeadxBoi/horror.jpg OFFICE OF THE ADJUTANT GENERAL
What is the enemy looking for? Information about government personnel, officers, important personalities, and all matters related to them (residence, work place, times of leaving and returning, and children). - Al Qaeda Handbook OFFICE OF THE ADJUTANT GENERAL
What Information Should We Protect? (Critical Information) Military movements (deployment/redeployment dates, dates of field exercises, flight information etc.) next Tuesday IS a specific date Using timeframes Deploying next spring is OK Any issues with the unit Anything concerning security Avoid pictures with Afghan children (PII) Equipment issues (what, no flak vests?) Locationsof units (it s OK to say they re in Afghanistan, but not to say that your spouse's battalion is at 14th and Ramadan in Tora Bora) i.e. CELL PHONES KIAs, WIAs DO NOT POST ABOUT THIS ON FACEBOOK! COMMON SENSE OFFICE OF THE ADJUTANT GENERAL
TMD Critical Information OFFICE OF THE ADJUTANT GENERAL
OPSEC Countermeasures OFFICE OF THE ADJUTANT GENERAL
OPSEC Countermeasures 10 or less Publish IAW unit publishing guidelines 11-15 Review with PA OPSEC manager to mitigate concerns prior to publishing 16 or greater Review with PA OPSEC manager & State PAO to mitigate concerns and determine if product should be published OFFICE OF THE ADJUTANT GENERAL
OPSEC Countermeasures Be careful what you post on social media sites (Facebook, Instagram, web-pages). Be careful what you post elsewhere (i.e. bumper stickers) OFFICE OF THE ADJUTANT GENERAL
OPSEC Countermeasures Take a close look at all privacy settings. Set security options to allow visibility to friends only. Do not reveal sensitive information about yourself such as schedules and event locations. Ask, What could the wrong person do with this information? and Could it compromise the safety of myself, my family or my unit? Closely review photos before they go online. Make sure they do not give away sensitive information which could be dangerous if released. Make sure to talk to family about operations security and what can and cannot be posted. Videos can go viral quickly, make sure they don t give away sensitive information. OFFICE OF THE ADJUTANT GENERAL
OPSEC Countermeasures E-mail can be intercepted and read by an adversary, unless it s encrypted. MS Outlook can encrypt e-mail with a digital certificate. Other encryption is also an option. OFFICE OF THE ADJUTANT GENERAL
OPSEC Countermeasures Telephones are NOT secure! Cell phones, cordless phones and land-lines can all be compromised. Face to Face contact is! Limit what you discuss on the phone because you never know who could be listening in on you. OFFICE OF THE ADJUTANT GENERAL
To Summarize OFFICE OF THE ADJUTANT GENERAL
Now repeat after me OFFICE OF THE ADJUTANT GENERAL
There is a fine line between posting too much information and not enough. We need YOU to help keep your unit right in the middle. OFFICE OF THE ADJUTANT GENERAL