55

OPSEC 7 APR

Embed Size (px)

Citation preview

Page 1: OPSEC 7 APR
Page 2: OPSEC 7 APR

MISSION STATEMENT.

HHD, Task Force Provider conducts rear detachment operations for the 82nd SBDE and sustains FORSCOM

units in dwell cycle at Fort Bragg while generating sustainment capabilities to

meet rotational demand.

Page 3: OPSEC 7 APR

METL ASSESSMENT

T =TRAINED U = UNTRAINED P = NEEDS PRACTICE

METL TASKCURRENT

ASSESSMENT REASON

DATE LAST

TRAINED STRATEGYPROJECTED AS OF 15 MAR 2010

DEPLOY UNIT 63-2-E0020 U DELOYMENT, LTT 01-Mar-10 PAI, SRC and LTT U

RELOCATE UNIT AREA

63-2-E0021U LATE

DEPLOYERS, LTT31-Mar-10

SET UP TOC OPERATIONS U

ESTABLISH UNIT AREA

63-2-E0022U DEFEND AGAINST

POST ATTACK31-Mar-10 STX LANES, LTT P-

PROVIDE ADMIN AND LOG. SUPPORT

63-2-E0030P- TFP DAILY

MISSION31-Mar-10 DAILY TASKS T

DEFEND UNIT ASSIGNED AREAS

63-2-E0025P- LIMITED

RESOURCES31-Mar-10 STX LANES, LTT P

REDEPLOY UNIT 63-2-E0030

U LTT 18-Feb-10 DAILY TASKS U

Page 4: OPSEC 7 APR

METL TASKLast Week FY10 (31 MAR)

•Conduct risk-management procedures

•Conduct risk-management procedures

COLLECTIVE TASKS INDIVIDUAL TASKS

•Communicate Via a Tactical Telephone STP 21-1-SMCT•Communicate Via a Tactical Radio in a Secure Net •ESTABLISH COMMUNICATIONS (63-2-4040)

•Communicate Via a Tactical Telephone STP 21-1-SMCT•Communicate Via a Tactical Radio in a Secure Net •ESTABLISH COMMUNICATIONS (63-2-4040)

LEADER TASKS

Maintain CommunicationsMaintain Communications

40 Warrior Tasks

PI: SGT Austin | AI: SSG SmithCertification process: 1SG / CDRRisk Assessment: TDBResources: REDLocation: TBD

Page 5: OPSEC 7 APR

METL TASKWednesday Training FY10 (7 APR)

•Conduct risk-management procedures

•Conduct risk-management procedures

COLLECTIVE TASKS INDIVIDUAL TASKS

• Control Entry to and Exit From a Restricted Area STP 21-1-SMCT

• Implement (OPSEC) Measures STP 21-1-SMCT

• Protect Classified Info. and Material STP 21-24-SMCT

• Identify Intelligence and Electronic Warfare (IEW) Assets STP 21-24-SMCT

• Store Classified Information and Materials STP 21-24-SMCT

• Control Entry to and Exit From a Restricted Area STP 21-1-SMCT

• Implement (OPSEC) Measures STP 21-1-SMCT

• Protect Classified Info. and Material STP 21-24-SMCT

• Identify Intelligence and Electronic Warfare (IEW) Assets STP 21-24-SMCT

• Store Classified Information and Materials STP 21-24-SMCT

LEADER TASKS

•Employ Operations Security Measures

•Employ Operations Security Measures

PROVIDE ADMIN. & LOG. SUPPORT

PI: SSG Pollard | AI: SGT McCollumCertification process: 1SG / CDRRisk Assessment: LowResources: GREENLocation: M-1415

Page 6: OPSEC 7 APR

7 Day Weather Forecast

THURS1 APR

FRI2 APR

SAT3 APR

SUN4 APR

MON5 APR

TUES6 APR

WED7 APR

HIGHLOW

86°48°

88°51°

84°56°

85°56°

83°60°

86°61°

86°57°

PRECIP. 0% 0% 0% 10% 0% 0% 0%

DETAILS Sunny SunnyMostlyCloudy

AM Clouds / PM Sun

Sunny SunnyMostlySunny

Page 7: OPSEC 7 APR

METL TASKNext Week FY10 (14 APR)

•Conduct risk-management procedures

•Conduct risk-management procedures

COLLECTIVE TASKS INDIVIDUAL TASKS

Employ Accident Prevention Measures andRisk Management Process

Assess Potential for Accidents

Control Mission Safety Hazard

Integrate Risk Management Into Mission Plans

Employ Accident Prevention Measures andRisk Management Process

Assess Potential for Accidents

Control Mission Safety Hazard

Integrate Risk Management Into Mission Plans

LEADER TASKS

•Employ Operations Security Measures

•Employ Operations Security Measures

Perform Risk Management Procedures

PI: SSG Pollard | AI: SGT McCollumCertification process: 1SG / CDRRisk Assessment: LowResources: GREENLocation: M-1415

Page 8: OPSEC 7 APR

T-2 (21 APR)T-3 (28 APR)

T-5 ( 12 MAY)

40 Warrior Tasks / Defend Unit Assigned Areas

Zero and qualify an M16-series rifle (M4)

•Select long range aperture•Establish mechanical zero•Establish sight picture•Fire three-round shot group and triangulate shot-group until 6 shots fall within a 4cm circle•Adjust sights to move shot group within circle•Use no more than 18 total rounds to group and zero•Successfully qualify with a minimum score of 23 out of 40.

Zero and qualify an M16-series rifle (M4)

•Select long range aperture•Establish mechanical zero•Establish sight picture•Fire three-round shot group and triangulate shot-group until 6 shots fall within a 4cm circle•Adjust sights to move shot group within circle•Use no more than 18 total rounds to group and zero•Successfully qualify with a minimum score of 23 out of 40.

PI: SGT Sweger | AI: SGT KernCertification process: 1SG / CDRRisk Assessment: TBDResources: GREENLocation: EST Facility (Long ST)

40 Warrior Tasks / Defend Unit Assigned Areas

Zero and qualify an M16-series rifle (M4)

•Select long range aperture•Establish mechanical zero•Establish sight picture•Fire three-round shot group and triangulate shot-group until 6 shots fall within a 4cm circle•Adjust sights to move shot group within circle•Use no more than 18 total rounds to group and zero•Successfully qualify with a minimum score of 23 out of 40.

Zero and qualify an M16-series rifle (M4)

•Select long range aperture•Establish mechanical zero•Establish sight picture•Fire three-round shot group and triangulate shot-group until 6 shots fall within a 4cm circle•Adjust sights to move shot group within circle•Use no more than 18 total rounds to group and zero•Successfully qualify with a minimum score of 23 out of 40.

PI: SGT Sweger | AI: SGT KernCertification process: 1SG / CDRRisk Assessment: TBDResources: GREENLocation: EST Facility (Long ST)

Implement Operations Security (OPSEC)Measures

•Employ Accident Prevention Measures and•Risk Management Process•STP 21-24-SMCT•850-001-2001 Assess Potential for Accidents STP 21-24-SMCT•850-001-3001 Control Mission Safety Hazard STP 21-24-SMCT•850-001-4001 Integrate Risk Management Into Mission•Plans

PI: SGT Snyder | AI: SPC FloydCertification process: 1SG / CDRRisk Assessment: LOWResources: GREENLocation: M-1415

T-4 ( 5 MAY)Low Density Training

S1Army Family Team Building S2: SOR Submission S3: Manage DTMS

S4: Supply IssueS6: Adding a system to the Domain

MEDOPS: Medical ReportingSASMO:V-SAT FAM

Legal: Article 15 ProcessingPBO:Pema vs. Stock Funded Shortages/Ordering

CLASS V:Tamis training on authorizations

Trainer: Section NCOICCertification process: 1SG / CDRRisk Assessment: LowResources: GREENLocation: Various Locations

Low Density Training

Page 9: OPSEC 7 APR

AGENDA

• OPSEC MEASURES

• INTELLIGENCE AND ELECTRONIC WARFARE ASSETS

• STORAGE AND PROTECTION OF CLASSIFIED MATERIALS AND INFORMATION

• CONTROL ENTRY TO AND EXIT FROM RESTRICTED AREAS

Page 10: OPSEC 7 APR

OPERATIONS SECURITY

AR 530-1 OPSEC is a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities.

Page 11: OPSEC 7 APR

OPERATIONS SECURITY

• OPSEC applies during peace, crisis, and war to all Army operations and support activities.

• OPSEC identifies the critical information of military plans, operations, and supporting activities and the indicators that can reveal it, and then develops measures to eliminate, reduce, or conceal those indicators.

Page 12: OPSEC 7 APR

OPERATIONS SECURITY

• All Army units at battalion-level and higher, will have functional, active, and documented OPSEC programs.

• OPSEC program managers are responsible for the development, organization, and administration of an OPSEC program, the commander’s emphasis and support from the chain of command is essential to ensure the proper implementation of an OPSEC program.

Page 13: OPSEC 7 APR

OPSEC SOP

An OPSEC SOP, at a minimum, documents the unit, activity, installation, or staff organization’s critical information and OPSEC measures to protect it.

• The OPSEC SOP can include more information such as a threat analysis and a list of potential vulnerabilities.

• Personnel must know their unit or organization’s OPSEC measures and practice them on a consistent and continuous basis. The OPSEC Officer should see that training of implementing OPSEC measures be included in organization’s annual training guidance.

Page 14: OPSEC 7 APR

OPSEC PROCESS

OPSEC programs utilizes the five-step OPSEC process

1. Identification of critical information - determine what information needs protection.

2. Analysis of threats - identify the adversaries and how they can collect information.

3. Analysis of vulnerabilities - analyze what critical information friendly forces are exposing.

4. Assessment of risks - assess what protective measures should be implemented.

5. Application of appropriate OPSEC measures - countermeasures that protect critical information

Page 15: OPSEC 7 APR

OPSEC PROCESS

Identification of Critical Information

The purpose of this step is to determine what needs protection

• Facts about your intentions, capabilities, limitations

• Commander’s Essential Elements of Friendly Information(EEFI)

Questions that the adversary is likely to ask about friendly capabilities, activities, limitations, and intentions

• Information concerning protected person(s)

• Operational and Tactical information (OPORD)

• Test materials used in an combat environment

• Sensitive Information FOUO/Classified Information

• Identify the length of time critical information needs protection.

Page 16: OPSEC 7 APR

OPSEC PROCESS

Analysis of Threats

The purpose of this step is to identify adversary collection capabilities against critical information.

• Adversary collection activities target actions and open source information to obtain and exploit indicators that will negatively impact the mission.

• Operations security indicators are friendly actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information.

Page 17: OPSEC 7 APR

OPSEC PROCESS

Analysis of Vulnerabilities

The purpose of this step is to identify possible OPSEC measures for each vulnerability/indicator.

OPSEC measures are methods and means to gain and maintain essential secrecy about critical information using:

• Action control consists of measures to control friendly activities. Action control eliminates indicators or the vulnerability of actions to exploitation by adversary intelligence systems.

• CountermeasuresCountermeasures disrupt the information gathering of adversaries collection efforts using Diversions, Camouflage, Concealment, Jamming, Deception, Police Diversions, Camouflage, Concealment, Jamming, Deception, Police Powers and Force.Powers and Force.

Counter analysisCounter analysis provides a possible alternate analysis for an indicator. Confuse the adversary analyst through deception.

Page 18: OPSEC 7 APR

OPSEC PROCESS

Assessment of Risk

This step is to select the OPSEC countermeasures for implementation.

• The leader balances risking operational success/failure versus selecting the right/wrong OPSEC countermeasures.

• Check interaction of select OPSEC countermeasures.

• Coordinate select OPSEC countermeasures with lateral units and bring all unit leaders into your briefings.

• The commander may decide on a “no-measures” alternative.

Page 19: OPSEC 7 APR

OPSEC PROCESS

Application of appropriate OPSEC measures

Apply the select countermeasures, (directed by the commander or recommended by OPSEC Manager) to the operation or incorporate into

plans for future operations.

• Emphasize the adverse results if failure to maintain effective OPSEC.

• Implement countermeasures first on indicators requiring immediate action or as directed by the TF commander.

• Document the measures or state “no-measures” alternative.

• Monitor each countermeasures before and during execution, evaluate effectiveness.

• Recommend to improve effectiveness of countermeasures or select new measures when new vulnerabilities develop.

Page 20: OPSEC 7 APR

CHECK ON LEARNING

• DEFINE OPSEC

• WHAT ARE THE FIVE STEPS IN THE OPSEC PROCESS?

Page 21: OPSEC 7 APR

Intelligence and Electronic Warfare (IEW) Assets

There are four types of intelligence and electronic warfare (IEW) support available to Commanders

Situational Development

Target Development

Electronic Warfare

Counterintelligence

Page 22: OPSEC 7 APR

Electronic Warfare

• What is Electronic Warfare(EW)?EW is the means through which commanders protect their own electronic systems while attacking those of the enemy. EW exploits, disrupts, and deceives enemy command and control while protecting friendly use of communications and non-communications systems. AR 525-22 covers EW.

Page 23: OPSEC 7 APR

EA is the transmission of electronic jamming signals that disrupt the enemy's communications and other signal emitter systems. It also transmits false communications that deceive enemy forces through their own information collection systems.

EW assets are targeted in much the same way as artillery and other weapon systems. EA includes jamming and deception.

Electronic Attack(EA)

Page 24: OPSEC 7 APR

Electronic Warfare Support (ES)

Enemy sources of radiated electromagnetic energy are searched for, located, and identified through a process called ES. ES focuses on the immediate requirements of the tactical commander. ES includes the efforts to search, identify, intercept, and locate electronic emitters.

Page 25: OPSEC 7 APR

Electronic Protection

Defensive EW seeks to protect friendly use of the electromagnetic spectrum by employing EP.

EP is the actions taken to protect friendly command, control, and communication (C3) from enemy collection and disruption efforts.

EP is planned around the commander's mission and concept of operations, and is the responsibility of the unit Operations Officer.

Based on the mission, those communications and electronic systems that must be protected are identified and their vulnerability to enemy EA is assessed. The operation of these systems is then planned and monitored to ensure that the times, frequencies, duration, and location of their emissions provide the greatest possible security from enemy collection and disruption efforts.

Page 26: OPSEC 7 APR

EW EQUIPMENT

The U.S. Army Counter RCIED Electronic Warfare System, or commonly known as CREW Duke, developed to provide U.S. forces critical, life-saving protection against a wide range of low- and high-power RCIED threats, This single-unit system uses state-of-the-art jamming technology to counter the RCIED threat. The design has been engineered to keep weight, size, and power requirements at a minimum while providing simple operation with optimal performance. CREW Duke mounts easily into a HMMWV and other military vehicles.

Page 27: OPSEC 7 APR

EW EQUIPMENT

Page 28: OPSEC 7 APR

Counterintelligence

• FM 34-60

• Counters the hostile intelligence threat.

• Safeguards the command from surprise.

• Deceives the enemy.

• Counters enemy sabotage, subversion, and terrorism.

Page 29: OPSEC 7 APR

Situation Development

• Locate enemy forces. • Determine enemy capabilities, vulnerabilities, and

intentions. • Identify the enemy main effort. • Determine how weather and terrain will affect friendly

and enemy operations. • Detect opportunities to exploit enemy weaknesses and

seize or retain the initiative.• This information can be obtain by SITREPS from

troops on ground.

Page 30: OPSEC 7 APR

Target Development

• Determine the role of target development.

• Provide combat information.

• Provide targeting data.

• Correlate target information.

Page 31: OPSEC 7 APR

Information Collection

• Human intelligence (HUMINT) includes all information derived through human sources not accessible to other collection assets. HUMINT employs overt, covert, and clandestine operations to achieve worldwide collection objectives.

• Imagery intelligence (IMINT) is obtained from land, sea, air, and space platforms (radar, photographic, infrared, and electro-optic imagery).

• Signals intelligence (SIGINT) is the products resulting from the collection, evaluation, analysis, integration, and interpretation of information derived from intercepted electromagnetic emissions.

• Measurement and signature intelligence (MASINT) is scientific and technical intelligence obtained by quantitative and qualitative analysis of data derived from technical sensors for the purpose of identifying any distinctive features associated with the source, emitter, or sender and to facilitate subsequent identification or measurement.

Page 32: OPSEC 7 APR

CHECK ON LEARNING

• NAME THE THREE CATEGORIES OF ELECTRONIC WARFARE

• NAME THE FOUR TYPES OF EWI ASSESTS

Page 33: OPSEC 7 APR

STORAGE AND PROTECTION OF CLASSIFIED MATERIALS

• AR 380-5 , Department of the Army Information Security Program establishes the policy for the classification, downgrading, declassification, transmission, transportation, and safeguarding of information requiring protection in the interests of national security.

• It primarily pertains to classified national security information, now known as classified information, but also addresses controlled unclassified information, to include for official use only and sensitive but unclassified.

Page 34: OPSEC 7 APR

STORAGE AND PROTECTION OF CLASSIFIED MATERIALS

Identifying Classified Material

• Confidential: Information that, if disclosed to unauthorized persons, could reasonably be expected to cause damage to the national security.

• Secret: Information that, if disclosed to unauthorized persons, could reasonably be expected to cause serious damage to the national security.

• Top Secret: Information that, if disclosed to unauthorized persons, could reasonably be expected to cause exceptionally grave damage to the national security

Page 35: OPSEC 7 APR

STORAGE AND PROTECTION OF CLASSIFIED MATERIALS

Marking Classified Information

• Physically marking classified information with appropriate classification and control markings serves to warn and inform holders of the degree of protection required.

• It is important that all classified information and material be marked to clearly convey the level of classification assigned, the portions that contain or reveal classified information, the period of time protection is required, and any other notations required for protection of the information or material

Page 36: OPSEC 7 APR

STORAGE AND PROTECTION OF CLASSIFIED MATERIALS

• The overall (highest) classification of a document is marked at the top and bottom of the outside cover (if there is one), the title page (if there is one), the first page, and the outside of the back cover (if there is one) or back side of the last page.

• Each interior page containing classified information is marked top and bottom with the overall (highest) classification of the page.

• Each unclassified interior page is marked 'Unclassified" at the top and bottom.

• Interior pages that are For Official Use Only need to be marked only at the bottom. Blank pages require no markings.

• Additionally, every classified document must show, on the face of the document, the agency and office that created it and date of creation.

Page 37: OPSEC 7 APR

STORAGE AND PROTECTION OF CLASSIFIED MATERIALS

Portion Marking

• The title or subject of a classified document is marked with the appropriate classification abbreviation in parentheses -- (TS), (S), (C), or (U) immediately following and to the right of the title or subject.

• Each section, part, paragraph, or similar portion of a classified document is to be marked with the appropriate classification abbreviation in parentheses immediately before the beginning of the portion.

Page 38: OPSEC 7 APR

SF 703 SF 704 SF 705

Page 39: OPSEC 7 APR

EXAMPLE OF CLASSIFIED DOCUMENT

Page 40: OPSEC 7 APR

STORAGE AND PROTECTION OF CLASSIFIED MATERIALS

Safeguard Classified Material when in Storage• Store classified information under conditions adequate to prevent

unauthorized access.

• Store, External Hard drives ,computer disks, notes, and similar materials that are classified or used to process classified information, in a locked GSA approved security container, when not under the personal control and observation of an authorized person.

• Follow correct procedures when locking material in a GSA approved security container: a. Complete SF 702 correctly, with the proper date, time, and initials.

b. Turn the "OPEN/CLOSED" sign on the front of the security container to the "CLOSED" position.

c. Ensure that another person checks the container to make sure it is locked and initials the SF 702.

Page 41: OPSEC 7 APR

SF 702

Page 42: OPSEC 7 APR

STORAGE AND PROTECTION OF CLASSIFIED MATERIALS

Proper Procedures when Destroying Classified Information

• Destroy classified information in a way sufficient to preclude recognition or reconstruction. a. Destroy classified information by burning, melting, chemical

decomposition, pulping, pulverizing, cross-cut shredding, or mutilation.

b. Burning is the preferred method of destroying classified

information.

• Complete DA Form 3964, Record of Destruction, for TOP SECRET information. Records shall be dated and signed at the time of destruction.

Page 43: OPSEC 7 APR

DA FORM 3964

Page 44: OPSEC 7 APR

CONTROL ENTRY TO AND EXIT FROM A RESTRICTED AREA

Identify personnel before allowing them to enter or exit the restricted area.

• Ensure that only one individual is processed in or out at any given time.

• Verify the person's identity by comparing the person's face with the photograph on the identification card.

• Ensure the name of the person attempting to enter is on the access roster. The site commander or custodian must authenticate the roster.

• Obtain authority to enter, if applicable, for personnel whose names are not on the access roster. Call the sergeant of the guards, the security officer, or the vouching officer.

• Ensure that personnel entering the facility know the most direct route to their destination.

• Use challenges, passwords, and code words in tactical areas.

Page 45: OPSEC 7 APR

CONTROL ENTRY TO AND EXIT FROM A RESTRICTED AREA

Using Card and Badge Systems• Permission to enter is shown on the card or badge by letters,

numerals, or colors.

• Card or badge exchange system.

a. The individual entering the area presents the badge or card to the guard and the guard exchanges it with the card or badge kept at the entrance.

b. The individual again exchanges the card or badge when leaving the area.

Page 46: OPSEC 7 APR
Page 47: OPSEC 7 APR

CONTROL ENTRY TO AND EXIT FROM A RESTRICTED AREA

Prohibit entry (into the restricted area) of harmful materials, such as matches, cameras, and any other items prohibited by the

special orders.

• Be alert for the wrongful appropriation, pilferage, or compromise of materials or recorded information.

• Make periodic spot checks of personnel.

• Search all packages.

• Search vehicles before allowing them to enter or exit.

Page 48: OPSEC 7 APR

CONTROL ENTRY TO AND EXIT FROM A RESTRICTED AREA

Take appropriate actions in the event of a security violation.

• Detain the suspect until help arrives.

• Report a discovery of security violations to your S2/G2 and/or Security Manager

• Prepare a detailed, written report or sworn statement.

Page 49: OPSEC 7 APR

TASK:Control Entry to and Exit from a Restricted Area

CONDITIONS:You are assigned to control entry to, and exit from, a restricted area. You are given special orders, identification cards or badges, local standing operating

procedures (SOPs), access rosters, and locally produced forms.

STANDARDS:Prevent unauthorized personnel, packages, and/or vehicles from entering or

leaving the restricted area

Page 50: OPSEC 7 APR

SITUATION

THIS CLASSROOM HAS NOW BEEN DECLARED A RESTRICTED AREA. YOU MUST GAIN ACCESS TO THE ROOM BASED OF THE CREDENTIALS AND MATERIALS THAT HAVE BEEN PROVIDED TO YOU. YOU MUST FOLLOW ALL PROCEDURES AT THE CONTROL POINT.

Page 51: OPSEC 7 APR
Page 52: OPSEC 7 APR

THE FOLLOWING ITEMS ARE PROHIBITED

• CELL PHONES AND PORTABLE COMPUTER DEVICES

• FIREARMS

• SMOKING

Page 53: OPSEC 7 APR

Guard Force Desktop SOP

• All personnel must have a badge to enter.

• All bags and equipment must be checked

• Guards must check Access Roster(Sign In Sheet) prior to allowing personnel to enter restricted area.

• Escorted personnel will receive a Red Badge.

Page 54: OPSEC 7 APR
Page 55: OPSEC 7 APR