OPSEC-2500 3-6 March 2015 Flashcards

1
Q

The purpose of Operations Security is to enhance mission or operational effectiveness.

A

OPSEC can contribute to enhance mission effectiveness, protection of personnel, reduced costs and can assist leadership with decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OPSEC is a risk analysis.

A

The most important member of the OPSEC team is Senior Leadership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OPSEC looks at the value of unclassified information from the adversary and the freindly perspectives,

A

OPSEC program should be designed to help integrate OPSEC into the planning process, fix problems as they arise during the preparation phase of an operation and implement countermeasures throughout the planning, preparation and execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Essential secrecy refers to that level of secrecy necessary to achieve mission goals.

A

The OPSEC Program manager is responsible for:

Plan the OPSEC Program, develop the organization’s OPSEC policy, manage the program, develop critical information list, analyze threats, assess vulnerabilites and determine risk.

Develop and implement countermeasures, conduct training, establish and lead OPSEC Working Group, develop OPSEC plans

Conduct assessments, raise OPSEC awareness, advise leadership, deiver briefings and enhance staff proficiencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

National Security Decision Directive (NSDD) 298 defines OPSEC as a process of 5 steps.

Ronald Reagan 1988

A

An OPSEC working group represents all functional areas of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Critical Information is specific facts about our intentions , capabilities and activities needed by the adversary to act effectively against us.

A

OPSEC working group member training should include OPSEC analytical process and threat assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EEFI is essential elements of friendly information

A

The working group should help the Program Manager develop, review or revise your Critical Information List and develop and implement your organizations’ OPSEC awareness training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An adversary can be a disgruntled empoyee, anyone with objectives that counter ours, or an enemy.

A

Coordinators have 4 main roles:

  1. implementation of policies, procedures and training
  2. gathering of information for reporting requirements
  3. providing feedback on program effectiveness
  4. assisting in conducting of assessments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

We determine critical information from both friendly and adversary perspectives.

A

Leadership can demonstrate their support of the OPSEC program by acting as chair of your OPSEC Working Group and bringing ip OPSEC in meetings with middle management; including OPSEC in planning for operations and special events and including OPSEC actions in the awards program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To look at critical information from the adversary’s point of view, determine what strategies we might expect them to use to achieve their objectives.

A

Continuity book should include at a minimum your appointment letter, the local OPSEC policy and your OPSEC Program plan and should be enough background to help your replacement get started.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Placing a vaue on each item of the critical information helps simplify the risk assessment by providing a measure of impact.

A

OPSEC officer should work with Public Affairs mission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat is defined as an adversary with both intent and capability to harm us, our operation or our resources.

A

Webmasters should not be trainined in OPSEC to edit information posted, this is not their job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When completing a threat assessment your should also consider the friends of the adversary.

A

Having OPSEC Program Plan helps you keep track of what you need to accomplish annually.

Endorsement of your OPSEC Program Plan by senior leadership gives you the authority to carry out the program.

OPSEC program plan should include training and awareness requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Intent is an estimation of the probability an adversary will act against us.

A

OPSEC Program manager’s “need to know” coordination circle should include:

Public Affairs Pre-publication review

Webmaster Contracts

FOIA

Foreign Disclosure

AT/FP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Capability encompasses the adversary’s ability to collect information, complete intelligence analysis and use that intelligence to act against friendly interests.

A

FOIA signed into law 1966 and amended in 2002 allows for the full or partial disclosure of information and documents controlled by the US governement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Evidence is not the same as intelligence.

A

OPSEC program manager should be aware of what information has been approved for public release because:

Program manager should be workign with those involved in pre-publication reease to ensure critical Information is aways considered.

Should be aware of what information might be compiled by an adversary from open sources.

17
Q

Threat anaysis is the key to the OPSEC process.

A

Nine exemptions under FOIA:

  1. classifed information 8. Financial institutions
  2. internal personnel rules and practices
  3. statute/law
  4. trade secrets & commercial/financial
  5. litigation
  6. personal privacy
  7. law enforcement 9. Geological & Geophysical
18
Q

Human intelligenc (HUMINT) techniues include surveillance, social engineering and technical.

A

Any person can make a FOIA request, US citizen or foreigner.

19
Q

Social engineering relies on influencing deceiving or psychologically manipulating people to comply with a request for information.

A

Contractors should be expected to apply OPSEC measures/training only if noted in their contract.

20
Q

Co-option is a type of HUMINT that refers to the development of insiders to provide information to an adversary.

A

The Electronic Freedom of Information Act Amendments of 1996 state that agencies are required to make records created by the agency on or after November 1,1996 availble electronically.

21
Q

Overt HUMINT collection is lega intelligence collection conducted by the individuals in a legitmate role such as a student, scientist, businessman or diplomat.

A

Threat= Adversary plus Intent plus capability

EOP- estimation of probability (Intent)

22
Q

Signals Intelligence (SIGINT) involves the collection of electronic signals encompassing:

COMINT communications intelligence

ELINT electronic intelligence

FISINT Foreign Instrumentation Signals Intelligence

A

HUMINT human intelligence

OSINT open source intelligence

SIGINT signals intelligence

IMINT imagery intelligence

MASINT measurement and signatures intelligence

23
Q

Geospatial intelligence unites the complementary fields of Imagery Intelligence and Mapping,Charting and Geodesy.

A

DD254 used for contracts to spell out OPSEC for contractors

24
Q

Open Source Intelligence (OSINT) refers to information that is publicly available (i.e. any member of the public could awfully obtain the information by reuest or observation)

A

PHO historical, policy and doctrine (intent)

HUMINT- surveillance, social engineering and techinal means(cameras,etc.)

25
Q

Manchester Document is the guide to how to be a terrorist found in an Al Qaida safe house in manchester England

A