Upload
shon-stokes
View
213
Download
0
Tags:
Embed Size (px)
Citation preview
Provided by OSPA (wwwopsecprofessionalsorg)
Vulnerabilities and Indicators
The OPSEC Process step 3
Presented by (Presenterrsquos Name)
Definitions
bull Indicatorndash Points to vulnerability or critical information1048708
bull Vulnerabilityndash Weakness the adversary can exploit to get to
critical information
Indicators
bull Pathways or detectable activities that lead to specific information that when looked at by itself or in conjunction with something else allows an adversary to obtain sensitive information or identify a vulnerability
Profiles and Signatures
bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done
arranged or have occurredndash Signatures are the emissions that are the
result of or caused by what is or was donendash Profiles are collected on all our activities
procedures and methodologies
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Definitions
bull Indicatorndash Points to vulnerability or critical information1048708
bull Vulnerabilityndash Weakness the adversary can exploit to get to
critical information
Indicators
bull Pathways or detectable activities that lead to specific information that when looked at by itself or in conjunction with something else allows an adversary to obtain sensitive information or identify a vulnerability
Profiles and Signatures
bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done
arranged or have occurredndash Signatures are the emissions that are the
result of or caused by what is or was donendash Profiles are collected on all our activities
procedures and methodologies
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Indicators
bull Pathways or detectable activities that lead to specific information that when looked at by itself or in conjunction with something else allows an adversary to obtain sensitive information or identify a vulnerability
Profiles and Signatures
bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done
arranged or have occurredndash Signatures are the emissions that are the
result of or caused by what is or was donendash Profiles are collected on all our activities
procedures and methodologies
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Profiles and Signatures
bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done
arranged or have occurredndash Signatures are the emissions that are the
result of or caused by what is or was donendash Profiles are collected on all our activities
procedures and methodologies
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill