OPSEC Vulnerabilities And Indicators

29
Provided by OSPA (www.opsecprofessionals.org) Vulnerabilities and Indicators The OPSEC Process

description

OPSEC Vulnerabilities and Indicators training presentation.

Transcript of OPSEC Vulnerabilities And Indicators

Page 1: OPSEC Vulnerabilities And Indicators

Provided by OSPA (wwwopsecprofessionalsorg)

Vulnerabilities and IndicatorsThe OPSEC Process

Definitions

bull Indicatorndash Points to vulnerability or critical information1048708

bull Vulnerabilityndash Weakness the adversary can exploit to get to

critical information

Indicators

bull Pathways or detectable activities that lead to specific information that when looked at by itself or in conjunction with something else allows an adversary to obtain sensitive information or identify a vulnerability

Profiles and Signatures

bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done

arranged or have occurredndash Signatures are the emissions that are the

result of or caused by what is or was donendash Profiles are collected on all our activities

procedures and methodologies

Vulnerability Areas

bull Operationsbull Physical Environmentbull Personnel

bull Financebull Administrativebull Logisticsbull Public Affairsbull Family

Common Vulnerabilities

bull Discussion of sensitive information in unsecured areas

bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding

bull TrainingAwareness

Stereotyped Operations

bull Same Time

bull Same Place

bull Same People

bull Same Route

bull Same Way

PREDICTIBILITY

Examples of Vulnerabilities

bull Publications

bull Press Releases

bull Unencrypted Email

bull Organization Website

bull Non-Secure Telephone

Examples of Vulnerabilities

bull Trash

bull Employee Turnover

bull Employee Mistakes

bull Lack of Good Passwords

bull Exhibits and Conventions

Communication Vulnerabilities

bull Radios

bull Cell Phones

bull Telephones

bull Facsimiles (Fax)

bull Computers

Common Vulnerabilities

bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas

Few Government-Owned Systems

Cell Phones

bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 2: OPSEC Vulnerabilities And Indicators

Definitions

bull Indicatorndash Points to vulnerability or critical information1048708

bull Vulnerabilityndash Weakness the adversary can exploit to get to

critical information

Indicators

bull Pathways or detectable activities that lead to specific information that when looked at by itself or in conjunction with something else allows an adversary to obtain sensitive information or identify a vulnerability

Profiles and Signatures

bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done

arranged or have occurredndash Signatures are the emissions that are the

result of or caused by what is or was donendash Profiles are collected on all our activities

procedures and methodologies

Vulnerability Areas

bull Operationsbull Physical Environmentbull Personnel

bull Financebull Administrativebull Logisticsbull Public Affairsbull Family

Common Vulnerabilities

bull Discussion of sensitive information in unsecured areas

bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding

bull TrainingAwareness

Stereotyped Operations

bull Same Time

bull Same Place

bull Same People

bull Same Route

bull Same Way

PREDICTIBILITY

Examples of Vulnerabilities

bull Publications

bull Press Releases

bull Unencrypted Email

bull Organization Website

bull Non-Secure Telephone

Examples of Vulnerabilities

bull Trash

bull Employee Turnover

bull Employee Mistakes

bull Lack of Good Passwords

bull Exhibits and Conventions

Communication Vulnerabilities

bull Radios

bull Cell Phones

bull Telephones

bull Facsimiles (Fax)

bull Computers

Common Vulnerabilities

bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas

Few Government-Owned Systems

Cell Phones

bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 3: OPSEC Vulnerabilities And Indicators

Indicators

bull Pathways or detectable activities that lead to specific information that when looked at by itself or in conjunction with something else allows an adversary to obtain sensitive information or identify a vulnerability

Profiles and Signatures

bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done

arranged or have occurredndash Signatures are the emissions that are the

result of or caused by what is or was donendash Profiles are collected on all our activities

procedures and methodologies

Vulnerability Areas

bull Operationsbull Physical Environmentbull Personnel

bull Financebull Administrativebull Logisticsbull Public Affairsbull Family

Common Vulnerabilities

bull Discussion of sensitive information in unsecured areas

bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding

bull TrainingAwareness

Stereotyped Operations

bull Same Time

bull Same Place

bull Same People

bull Same Route

bull Same Way

PREDICTIBILITY

Examples of Vulnerabilities

bull Publications

bull Press Releases

bull Unencrypted Email

bull Organization Website

bull Non-Secure Telephone

Examples of Vulnerabilities

bull Trash

bull Employee Turnover

bull Employee Mistakes

bull Lack of Good Passwords

bull Exhibits and Conventions

Communication Vulnerabilities

bull Radios

bull Cell Phones

bull Telephones

bull Facsimiles (Fax)

bull Computers

Common Vulnerabilities

bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas

Few Government-Owned Systems

Cell Phones

bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 4: OPSEC Vulnerabilities And Indicators

Profiles and Signatures

bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done

arranged or have occurredndash Signatures are the emissions that are the

result of or caused by what is or was donendash Profiles are collected on all our activities

procedures and methodologies

Vulnerability Areas

bull Operationsbull Physical Environmentbull Personnel

bull Financebull Administrativebull Logisticsbull Public Affairsbull Family

Common Vulnerabilities

bull Discussion of sensitive information in unsecured areas

bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding

bull TrainingAwareness

Stereotyped Operations

bull Same Time

bull Same Place

bull Same People

bull Same Route

bull Same Way

PREDICTIBILITY

Examples of Vulnerabilities

bull Publications

bull Press Releases

bull Unencrypted Email

bull Organization Website

bull Non-Secure Telephone

Examples of Vulnerabilities

bull Trash

bull Employee Turnover

bull Employee Mistakes

bull Lack of Good Passwords

bull Exhibits and Conventions

Communication Vulnerabilities

bull Radios

bull Cell Phones

bull Telephones

bull Facsimiles (Fax)

bull Computers

Common Vulnerabilities

bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas

Few Government-Owned Systems

Cell Phones

bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 5: OPSEC Vulnerabilities And Indicators

Vulnerability Areas

bull Operationsbull Physical Environmentbull Personnel

bull Financebull Administrativebull Logisticsbull Public Affairsbull Family

Common Vulnerabilities

bull Discussion of sensitive information in unsecured areas

bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding

bull TrainingAwareness

Stereotyped Operations

bull Same Time

bull Same Place

bull Same People

bull Same Route

bull Same Way

PREDICTIBILITY

Examples of Vulnerabilities

bull Publications

bull Press Releases

bull Unencrypted Email

bull Organization Website

bull Non-Secure Telephone

Examples of Vulnerabilities

bull Trash

bull Employee Turnover

bull Employee Mistakes

bull Lack of Good Passwords

bull Exhibits and Conventions

Communication Vulnerabilities

bull Radios

bull Cell Phones

bull Telephones

bull Facsimiles (Fax)

bull Computers

Common Vulnerabilities

bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas

Few Government-Owned Systems

Cell Phones

bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 6: OPSEC Vulnerabilities And Indicators

Common Vulnerabilities

bull Discussion of sensitive information in unsecured areas

bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding

bull TrainingAwareness

Stereotyped Operations

bull Same Time

bull Same Place

bull Same People

bull Same Route

bull Same Way

PREDICTIBILITY

Examples of Vulnerabilities

bull Publications

bull Press Releases

bull Unencrypted Email

bull Organization Website

bull Non-Secure Telephone

Examples of Vulnerabilities

bull Trash

bull Employee Turnover

bull Employee Mistakes

bull Lack of Good Passwords

bull Exhibits and Conventions

Communication Vulnerabilities

bull Radios

bull Cell Phones

bull Telephones

bull Facsimiles (Fax)

bull Computers

Common Vulnerabilities

bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas

Few Government-Owned Systems

Cell Phones

bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 7: OPSEC Vulnerabilities And Indicators

Stereotyped Operations

bull Same Time

bull Same Place

bull Same People

bull Same Route

bull Same Way

PREDICTIBILITY

Examples of Vulnerabilities

bull Publications

bull Press Releases

bull Unencrypted Email

bull Organization Website

bull Non-Secure Telephone

Examples of Vulnerabilities

bull Trash

bull Employee Turnover

bull Employee Mistakes

bull Lack of Good Passwords

bull Exhibits and Conventions

Communication Vulnerabilities

bull Radios

bull Cell Phones

bull Telephones

bull Facsimiles (Fax)

bull Computers

Common Vulnerabilities

bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas

Few Government-Owned Systems

Cell Phones

bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 8: OPSEC Vulnerabilities And Indicators

Examples of Vulnerabilities

bull Publications

bull Press Releases

bull Unencrypted Email

bull Organization Website

bull Non-Secure Telephone

Examples of Vulnerabilities

bull Trash

bull Employee Turnover

bull Employee Mistakes

bull Lack of Good Passwords

bull Exhibits and Conventions

Communication Vulnerabilities

bull Radios

bull Cell Phones

bull Telephones

bull Facsimiles (Fax)

bull Computers

Common Vulnerabilities

bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas

Few Government-Owned Systems

Cell Phones

bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 9: OPSEC Vulnerabilities And Indicators

Examples of Vulnerabilities

bull Trash

bull Employee Turnover

bull Employee Mistakes

bull Lack of Good Passwords

bull Exhibits and Conventions

Communication Vulnerabilities

bull Radios

bull Cell Phones

bull Telephones

bull Facsimiles (Fax)

bull Computers

Common Vulnerabilities

bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas

Few Government-Owned Systems

Cell Phones

bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 10: OPSEC Vulnerabilities And Indicators

Communication Vulnerabilities

bull Radios

bull Cell Phones

bull Telephones

bull Facsimiles (Fax)

bull Computers

Common Vulnerabilities

bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas

Few Government-Owned Systems

Cell Phones

bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 11: OPSEC Vulnerabilities And Indicators

Common Vulnerabilities

bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas

Few Government-Owned Systems

Cell Phones

bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 12: OPSEC Vulnerabilities And Indicators

Cell Phones

bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 13: OPSEC Vulnerabilities And Indicators

Cell Phones

bull Asset vs Vulnerabilityndash The Good

bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency

ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 14: OPSEC Vulnerabilities And Indicators

Common Vulnerabilities

bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 15: OPSEC Vulnerabilities And Indicators

Common Vulnerabilities

bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 16: OPSEC Vulnerabilities And Indicators

Areas of Vulnerability

bull Administration

bull Financial

bull Logistics

bull Operations

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 17: OPSEC Vulnerabilities And Indicators

Administrative

bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 18: OPSEC Vulnerabilities And Indicators

Financial

bull Projections

bull Justifications

bull Financial Plans

bull Special Purchases

bull Budget and Contracts

bull Supplemental Requests

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 19: OPSEC Vulnerabilities And Indicators

Logistics

bull Unusual Equipment

bull Volume or Priority Requisitions

bull Boxes Labeled With the Name of an Operation or Mission

bull etc

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 20: OPSEC Vulnerabilities And Indicators

Operations

bull VIP Visits

bull Schedules

bull Stereotyped Activities

bull Increased Mission-Related Training

bull Abrupt Changes in Normal Operation

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 21: OPSEC Vulnerabilities And Indicators

EVEN MORE Indicators and Vulnerabilities

bull Family

bull Personnel

bull Public Affairs

bull Physical Environment

bull Procedures and Reports

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 22: OPSEC Vulnerabilities And Indicators

Where Are the Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 23: OPSEC Vulnerabilities And Indicators

Indicators

bull Presence of specialized Equipment

bull Increase (or Decrease) in activity

bull Sudden Changes in Procedure

bull Unique Convoy Configuration

bull Staging of Cargo or

Vehicles

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 24: OPSEC Vulnerabilities And Indicators

Information of Intelligence Value

Collectible

Observable

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 25: OPSEC Vulnerabilities And Indicators

Collectible

Can be physically collected or intercepted

Examples Dumpster diving cordlesscell phone interception email open source

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 26: OPSEC Vulnerabilities And Indicators

Observable

What you can see

What you can smell

What you can hear

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 27: OPSEC Vulnerabilities And Indicators

Why train for OPSEC ( A real Exercise)

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 28: OPSEC Vulnerabilities And Indicators

What is our greatest Weakness

OURSELVES

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions
Page 29: OPSEC Vulnerabilities And Indicators

Questions

ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill

  • Slide 1
  • Definitions
  • Indicators
  • Profiles and Signatures
  • Vulnerability Areas
  • Common Vulnerabilities
  • Stereotyped Operations
  • Examples of Vulnerabilities
  • Examples of Vulnerabilities
  • Communication Vulnerabilities
  • Slide 11
  • Cell Phones
  • Slide 13
  • Slide 14
  • Slide 15
  • Areas of Vulnerability
  • Administrative
  • Financial
  • Logistics
  • Operations
  • EVEN MORE Indicators and Vulnerabilities
  • Where Are the Indicators
  • Slide 23
  • Information of Intelligence Value
  • Collectible
  • Observable
  • Why train for OPSEC ( A real Exercise)
  • What is our greatest Weakness
  • Questions