Operations Security (OPSEC) Flashcards
Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures
Operations Security (OPSEC)
FIVE STEP OPSEC PROCESS
Info in need of protection and analyzes how that Information may be inadvertently compromised
EEFI - Essential Elements of Friendly Information - personnel rosters, unmarked vehicles, equipment, frequencies, capabilities
Operation/mission sensitive information - current operations, suspects, informants, warrants, location of operations, surveillance
Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures
Operations Security (OPSEC)
IDENTIFICATION OF CRITICAL INFORMATION
Intent and Capability
Ways to gather - communication, imagery, trash, open-source, human, computer accessing
Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures
Operations Security (OPSEC)
ANALYSIS OF THREAT
To use the information that has been collected in attempt to utilize the information against us
Critical information posted on the internet, non-secure communication
Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures
Operations Security (OPSEC)
ANALYSIS OF VULNERABILITIES
Determined the threat, vulnerability and impact
Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures
Operations Security (OPSEC)
ASSESSMENT OF RISKS
Effectively negate an adversary’s ability to exploit vulnerabilities, simple and straightforward procedural adjustments eliminate or minimize the generation of indicators
Procedural changes, deception, background checks, physical security, perception management, speed of execution, stopping the mission, any other actions that protect the vital information, such as training and awareness
Individual countermeasures - limiting web page access, shredding sensitive documents, sanitizing bulletin boards, monitoring public conversations, DO NOT use email to discuss sensitive operations
Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures
Operations Security (OPSEC)
APPLICATION OF COUNTERMEASURES