OPSEC 5 Step Process

Download Report

Transcript OPSEC 5 Step Process

SCHEDULE
0800 - 0815 Welcome
Greg Hoffman, MDA
0815 - 0900 OPSEC 5 Step Process
Morris Burbank, Garrison
0900 - 0930 OPSEC and the Insider Threat
Paul Quintel, AMCOM
0930 - 1000 Public Release/Web Reviews
Quincy Roby, AMRDEC
1000 - 1015 Break
RSA OPSEC
OFFICERS
Garrison – Morris Burbank, 313-3296
ACC – Raymond Jones, 955-8206
AMC – James Burns, 450-6771
AMCOM – Paul Quintel, 313-3867
AMRDEC – Quincy Roby, 842-5392
FAHC – Charles Allbritten, 955-8888
LOGSA – Vickie Cooper, 313-6701
MDA – Greg Hoffman, 313-9720
MSFC – Terry Odum, 544-4540
1015 - 1100 OPSEC and the Internet
Dwayne Smith, NEC-R
MSIC – SFC Turay, 313-7664
NEC-R – Curtis Elrod, 842-1004
1100 - 1145 OPSEC and Social Media
Ben McGee, ISSA
PEOAVN – Arnetta Manuel, 313-5952
PEOMS – Lori Relford, 313-3483
1145 - 1300 LUNCH
RTC – Blake Stewart, 955-0915
1300 - 1330 Protecting PII
Luereen Phillips, AMCOM
SMDC – Michael Mitchell, 955-2141
1330 - 1400 Trash or Treasure
Arnetta Manual, PEOAVN
USACE – Lori Byrd, 895-1496
TSMO – Terry Vital, 876-8624
USASAC – Ed Reyes, 450-5621
1400 - 1415 Break
1415 - 1500 Family OPSEC
Greg Hoffman, MDA
1500 - 1550 Round Table Discussion
All
1550 - 1600 Closing Remarks
Greg Hoffman, MDA
OPSEC RULES!
0800 - 1600
August 20, 2013
Bob Jones Auditorium
Sparkman Center
Redstone Arsenal
OPSEC LINKS
Interagency OPSEC Support Staff (IOSS):
https://www.iad.gov/ioss/index.cfm
DA OPSEC Support Element
https://www.us.army.mil/suite/page/589183
JIOWC / JOSE
https://www.facebook.com/JIOWC.OPSEC.Support
OPSEC Professionals Society
http://www.opsecsociety.org
OPSEC Professionals Association
http://www.opsecprofessionals.org
10 Ways the Adversary
Collects on You and
Your Organizations
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Email / Internet / Social Media
Recycle Bins, Trash Containers
Freedom of Information Request
Telephone Directories / Organization Tables
Job Announcements
Overhearing Conversations
Open Source Material (Radio, TV, Magazines)
Observation of Activities
Conferences / Seminars
Tours / Visits to your organization
3 Laws of OPSEC
DoD Social Media Hub
http://www.defense.gov/socialmedia
OPSEC, as a methodology, originated during
the Vietnam conflict when a small group of
individuals were assigned the mission of
finding out how the enemy was obtaining
advance information on certain combat
operations in Southeast Asia. This team was
established by the Commander-in-Chief,
Pacific, and given the code name "PURPLE
DRAGON.“
1.
First Law of OPSEC - If you don’t know
the threat, how do you know what to
protect?
2.
Second Law of OPSECIf you don't know what to protect, how do
you know you are protecting it?
3.
Third Law of OPSEC - If you are not
protecting it (the critical and sensitive
information), the adversary wins!
It became apparent to the team that although
traditional security and intelligence
countermeasures programs existed, reliance
solely upon them was insufficient to deny
critical information to the enemy--especially
information and indicators relating to intentions
and capabilities. The group conceived and
developed the methodology of analyzing U.S.
operations from an adversarial viewpoint to find
out how the information was obtained.
OPSEC 5 Step
Process
The team then recommended corrective actions
to local commanders. They were successful in
what they did, and to name what they had done,
they coined the term "operations security.“
Center for Development of Security Excellence
http://www.cdse.edu/catalog/
On Guard Online
http://www.onguardonline.gov/
Origin of
OPSEC
1.
Identify Critical Information
2.
Analyze Threats
3.
Analyze Vulnerabilities
4.
Assess Risk
5.
Apply Countermeasures