opsec vulnerabilities and indicators
Post on 09-May-2015
17.432 Views
Preview:
DESCRIPTION
TRANSCRIPT
Provided by OSPA (wwwopsecprofessionalsorg)
Vulnerabilities and IndicatorsThe OPSEC Process
Definitions
bull Indicatorndash Points to vulnerability or critical information1048708
bull Vulnerabilityndash Weakness the adversary can exploit to get to
critical information
Indicators
bull Pathways or detectable activities that lead to specific information that when looked at by itself or in conjunction with something else allows an adversary to obtain sensitive information or identify a vulnerability
Profiles and Signatures
bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done
arranged or have occurredndash Signatures are the emissions that are the
result of or caused by what is or was donendash Profiles are collected on all our activities
procedures and methodologies
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Definitions
bull Indicatorndash Points to vulnerability or critical information1048708
bull Vulnerabilityndash Weakness the adversary can exploit to get to
critical information
Indicators
bull Pathways or detectable activities that lead to specific information that when looked at by itself or in conjunction with something else allows an adversary to obtain sensitive information or identify a vulnerability
Profiles and Signatures
bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done
arranged or have occurredndash Signatures are the emissions that are the
result of or caused by what is or was donendash Profiles are collected on all our activities
procedures and methodologies
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Indicators
bull Pathways or detectable activities that lead to specific information that when looked at by itself or in conjunction with something else allows an adversary to obtain sensitive information or identify a vulnerability
Profiles and Signatures
bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done
arranged or have occurredndash Signatures are the emissions that are the
result of or caused by what is or was donendash Profiles are collected on all our activities
procedures and methodologies
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Profiles and Signatures
bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done
arranged or have occurredndash Signatures are the emissions that are the
result of or caused by what is or was donendash Profiles are collected on all our activities
procedures and methodologies
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
top related