OPSEC Vulnerabilities And Indicators
-
Upload
department-of-defense -
Category
Education
-
view
17.434 -
download
2
description
Transcript of OPSEC Vulnerabilities And Indicators
![Page 1: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/1.jpg)
Provided by OSPA (wwwopsecprofessionalsorg)
Vulnerabilities and IndicatorsThe OPSEC Process
Definitions
bull Indicatorndash Points to vulnerability or critical information1048708
bull Vulnerabilityndash Weakness the adversary can exploit to get to
critical information
Indicators
bull Pathways or detectable activities that lead to specific information that when looked at by itself or in conjunction with something else allows an adversary to obtain sensitive information or identify a vulnerability
Profiles and Signatures
bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done
arranged or have occurredndash Signatures are the emissions that are the
result of or caused by what is or was donendash Profiles are collected on all our activities
procedures and methodologies
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 2: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/2.jpg)
Definitions
bull Indicatorndash Points to vulnerability or critical information1048708
bull Vulnerabilityndash Weakness the adversary can exploit to get to
critical information
Indicators
bull Pathways or detectable activities that lead to specific information that when looked at by itself or in conjunction with something else allows an adversary to obtain sensitive information or identify a vulnerability
Profiles and Signatures
bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done
arranged or have occurredndash Signatures are the emissions that are the
result of or caused by what is or was donendash Profiles are collected on all our activities
procedures and methodologies
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 3: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/3.jpg)
Indicators
bull Pathways or detectable activities that lead to specific information that when looked at by itself or in conjunction with something else allows an adversary to obtain sensitive information or identify a vulnerability
Profiles and Signatures
bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done
arranged or have occurredndash Signatures are the emissions that are the
result of or caused by what is or was donendash Profiles are collected on all our activities
procedures and methodologies
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 4: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/4.jpg)
Profiles and Signatures
bull Adversaries look for Patterns and Signatures to establish a Profilendash Patterns are the way things are done
arranged or have occurredndash Signatures are the emissions that are the
result of or caused by what is or was donendash Profiles are collected on all our activities
procedures and methodologies
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 5: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/5.jpg)
Vulnerability Areas
bull Operationsbull Physical Environmentbull Personnel
bull Financebull Administrativebull Logisticsbull Public Affairsbull Family
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 6: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/6.jpg)
Common Vulnerabilities
bull Discussion of sensitive information in unsecured areas
bull Lack of policyenforcementndash Camerasndash Cell Phonesndash Internet Usagendash Shredding
bull TrainingAwareness
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 7: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/7.jpg)
Stereotyped Operations
bull Same Time
bull Same Place
bull Same People
bull Same Route
bull Same Way
PREDICTIBILITY
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 8: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/8.jpg)
Examples of Vulnerabilities
bull Publications
bull Press Releases
bull Unencrypted Email
bull Organization Website
bull Non-Secure Telephone
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 9: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/9.jpg)
Examples of Vulnerabilities
bull Trash
bull Employee Turnover
bull Employee Mistakes
bull Lack of Good Passwords
bull Exhibits and Conventions
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 10: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/10.jpg)
Communication Vulnerabilities
bull Radios
bull Cell Phones
bull Telephones
bull Facsimiles (Fax)
bull Computers
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 11: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/11.jpg)
Common Vulnerabilities
bull Government Reliance on Commnercial Backbonendash Domesticndash Overseas
Few Government-Owned Systems
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 12: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/12.jpg)
Cell Phones
bull Incorporate a wide-spectrum of technologiesndash Analog Digital Wirelessndash Sound Recording ndash PDAndash Camerandash Streaming videondash Computing Internetndash And more
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 13: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/13.jpg)
Cell Phones
bull Asset vs Vulnerabilityndash The Good
bull Conveniencebull ldquoReach out and touch someonerdquobull Access to Commercial Numbersbull Coordination Outside radio Range Frequency
ndash The Bad and the Uglybull Multiple Technical Vulnerabilitiesbull Typically Unsecure
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 14: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/14.jpg)
Common Vulnerabilities
bull Computersndash Access Controlndash Auditingndash Regulations Policyndash User Trainingndash Passwordsndash Systems Accreditation
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 15: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/15.jpg)
Common Vulnerabilities
bull Associated Computer Concernsndash Emailndash Snifferndash Cookiesndash Virus Spywarendash Web Logs (ldquoBlogsrdquo)ndash Instant Messaging (ldquoIMrdquo)ndash Personal Data Assistants (ldquoPDAsrdquo)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 16: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/16.jpg)
Areas of Vulnerability
bull Administration
bull Financial
bull Logistics
bull Operations
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 17: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/17.jpg)
Administrative
bull Memosbull Schedulesbull Travel Ordersbull Advance Plansbull Annual Reviewsbull Org Chartsbull Job Announcementsbull Management Reports
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 18: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/18.jpg)
Financial
bull Projections
bull Justifications
bull Financial Plans
bull Special Purchases
bull Budget and Contracts
bull Supplemental Requests
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 19: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/19.jpg)
Logistics
bull Unusual Equipment
bull Volume or Priority Requisitions
bull Boxes Labeled With the Name of an Operation or Mission
bull etc
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 20: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/20.jpg)
Operations
bull VIP Visits
bull Schedules
bull Stereotyped Activities
bull Increased Mission-Related Training
bull Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 21: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/21.jpg)
EVEN MORE Indicators and Vulnerabilities
bull Family
bull Personnel
bull Public Affairs
bull Physical Environment
bull Procedures and Reports
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 22: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/22.jpg)
Where Are the Indicators
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 23: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/23.jpg)
Indicators
bull Presence of specialized Equipment
bull Increase (or Decrease) in activity
bull Sudden Changes in Procedure
bull Unique Convoy Configuration
bull Staging of Cargo or
Vehicles
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 24: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/24.jpg)
Information of Intelligence Value
Collectible
Observable
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 25: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/25.jpg)
Collectible
Can be physically collected or intercepted
Examples Dumpster diving cordlesscell phone interception email open source
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 26: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/26.jpg)
Observable
What you can see
What you can smell
What you can hear
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 27: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/27.jpg)
Why train for OPSEC ( A real Exercise)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 28: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/28.jpg)
What is our greatest Weakness
OURSELVES
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-
![Page 29: OPSEC Vulnerabilities And Indicators](https://reader036.fdocuments.us/reader036/viewer/2022062300/554d8e68b4c90567188b51f8/html5/thumbnails/29.jpg)
Questions
ldquoIn wartime the truth is so precious that it must be protected by a bodyguard of liesrdquondash Winston Churchill
- Slide 1
- Definitions
- Indicators
- Profiles and Signatures
- Vulnerability Areas
- Common Vulnerabilities
- Stereotyped Operations
- Examples of Vulnerabilities
- Examples of Vulnerabilities
- Communication Vulnerabilities
- Slide 11
- Cell Phones
- Slide 13
- Slide 14
- Slide 15
- Areas of Vulnerability
- Administrative
- Financial
- Logistics
- Operations
- EVEN MORE Indicators and Vulnerabilities
- Where Are the Indicators
- Slide 23
- Information of Intelligence Value
- Collectible
- Observable
- Why train for OPSEC ( A real Exercise)
- What is our greatest Weakness
- Questions
-