Premium Essay

Opsec and Terrorism

In:

Submitted By swelp
Words 5936
Pages 24
OPSEC in Warfare and Terrorism “The enemy aggressively "reads" our open source and continues to exploit such information for use against our forces. Some soldiers continue to post sensitive information to internet websites and blogs, e.g., photos depicting weapon system vulnerabilities and tactics, techniques, and procedures. Such OPSEC violations needlessly place lives at risk and degrade the effectiveness of our operations.” Peter Schoomaker (1). Operations Security (OPSEC), while a relatively recent term, is an operations enabler that has been practiced in varying degrees throughout history. This document will explore the history of OPSEC as it’s known today, discuss the process and its role in disrupting the capabilities of adversarial forces using multiple collection and planning models and examine the rapidly advancing technical capabilities of threat vectors. OPSEC as a concept was developed during the Vietnam War under the command of Admiral Ulyssess Sharp. The mission of the newly-established “Purple Dragon” team was to determine how the enemy was able to gather information on military operations (2). The team was able to understand the need to alter tactics and procedures to reduce an adversary's ability to make educated predictions based on the knowledge of routines (3). Post-war OPSEC was formally established as a national program when President Ronald Regan signed the National Security Decision Directive Number 298 in 1988 (4/ p1). Although the program was created as a result of the Purple Dragon team’s notable efforts in the Vietnam War; OPSEC as a concept has been a combat enabler (and a lack thereof has been an impediment to effectiveness) throughout history.

President George Washington understood this well, as did Sun Tzu almost a millennia before (2). During the Revolutionary War,

Similar Documents

Premium Essay

Explain The Five-Step Process Of Following The Oppsec

...With any type of threat especially one that may be eminent emotions and doubt will be uncontrolled and as the emergency manager it will be necessary to maintain a sense of practicality and composure. To maintain control and focus it would be essential to follow the OPSEC outlined by Maniscalco & Christen (2011) in the five-step process: 1. Identification of critical information: Critical information is factual data about an organizations intentions, capabilities and activities that the adversary needs to plan and act effectively to degrade operationally effectiveness or place the potential of organizational success at risk (Maniscalco & Christen, 2011). Part of the initial actions as emergency manager is to reaffirm the credibility of the threat with local law enforcement and the federal partners and perhaps identify additional critical information regarding the threat. 2. Analysis of the threat: To know as much as possible about each adversary and its ability to target the organization and to tailor the threat to that actual activity and to the extent possible (Maniscalco & Christen, 2011). The purpose of this step is focused on the possible severity of the actions and the impact once carried out. 3. Analysis of vulnerabilities: The analysis attempts to identify weaknesses...

Words: 1060 - Pages: 5

Premium Essay

High Value Target Model Analysis

...Ending a terrorist campaign from a democratic stand point is a hard task. Terrorist, especially in the 21st century is very adaptive to their environment and have gone global. This overall has left many different approaches to combating terrorism or insurgences. There is HVT approach; cutting their financial flow approach; the heavy intelligence approach; train, advise, assist; and the hearts and minds approach. These approaches can be used by themselves, or in conjunction with each other. HVT Approach The High Value Target (HVT) approach works toward taking out key leaders in a terrorist organization, to hopefully create a tunnel effect. This tunnel effect is supposed to either take the leadership out of the organization, establish weaker leadership, or cause internal conflict within the organization which overall weakens it (Frankel 2011). This...

Words: 1670 - Pages: 7

Premium Essay

Security

...Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region. This will enable the community members to identify with the resources and wealth of a region and hence strive to protect it by all means. Governments and administrative officials should also involve the locals in making of decisions that are of utmost importance to the people’s welfare (Bakari, Magnusson, Tarimo, & Yngström, 2006). The benefits if personnel in security management develop skills as educators for their organization's security Having high skilled employees who are given the potential to grow their expertise is a great benefit to any organization. An organizations success can often be attributed to individual expertise and skills of its employees. The benefits are as follows: 1. Cuts on the costs of hiring external consultants; many organizations spend a lot of money in hiring third party consultants to cover essential tasks within the organization such as periodic network vulnerability scans and developing security programs. The cost of sending employees to the requisite training may be relatively cheaper (McCoy & Fowler...

Words: 1066 - Pages: 5

Premium Essay

Security

...Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region. This will enable the community members to identify with the resources and wealth of a region and hence strive to protect it by all means. Governments and administrative officials should also involve the locals in making of decisions that are of utmost importance to the people’s welfare (Bakari, Magnusson, Tarimo, & Yngström, 2006). The benefits if personnel in security management develop skills as educators for their organization's security Having high skilled employees who are given the potential to grow their expertise is a great benefit to any organization. An organizations success can often be attributed to individual expertise and skills of its employees. The benefits are as follows: 1. Cuts on the costs of hiring external consultants; many organizations spend a lot of money in hiring third party consultants to cover essential tasks within the organization such as periodic network vulnerability scans and developing security programs. The cost of sending employees to the requisite training may be relatively cheaper (McCoy & Fowler...

Words: 1066 - Pages: 5

Free Essay

Resume

...RODOLFO RODRIGUEZ VELEZ 2502 Riverside Pkwy Apt 1537, Grand Prairie, TX 75050 H: (931) 395-0053 rodorodz@gmail.com OBJECTIVE Seeking a Full time position. PROFESSIONAL SUMMARY Over three years of progressive experience and training performing Air Defense artillery operations including surveillance and combat operations as a Team Leader with direct supervisory responsibility for up to 5 personnel. Bilingual, fluent Spanish and English. Proficient in small unit close-quarters combat techniques in urban settings. Proficient in radars, missiles and rockets. Qualified with a variety of small arms weapons with training in both safety and marksmanship procedures. Proficient in a variety of computer software to include: Microsoft Word, Excel, Power Point and the internet. Strong and effective oral and written communication skills. Possess United States Government Security Clearance Secret and valid driver's license. SKILLS Critical thinking Adept multi-tasker Weapons training Trained in counterterrorism strategies First Aid certified Trained in cross-cultural communication Secret Security Clearance Defensive tactics training Troubleshooting Calm in emergency situations Trained in security Safety-conscious Quick learner Service-oriented Team leader WORK HISTORY Team Leader, 09/2011 to Current U.S. Army – Fort Campbell, KY Developed and led training programs in preparation for combat. Employed, fired and recovered anti-personnel and...

Words: 613 - Pages: 3

Premium Essay

Defense Attacks

...The Department of Defense (DoD) manages one of the largest and most targeted networks, up to 250,000 attacks per day. (Daniel Gouré, 2015) As a member of this organization, I see the low level applications set forth by the strategic minds of the DoD Chief Information Officer and Secretary of Defense. As the organization that laid the foundation for the internet, the DoD has evolved over the years reacting to the vulnerabilities and threats to their vast information systems. Past breaches have illustrated how vulnerable the networks are, and we can look at history to see the development of the defense networks and security. The DoD made a large impact across the computer security field with their security handbook called the “Orange Book”. The official name for the Orange Book is “DoD 5200.28-STD, Department of Defense Trusted Computer System Evaluation Criteria”, which was first written in 1983 and further updated in 1985. (Department of Defense, 1985) It is the computer system criteria book within a series of security related guides and directives called the “Rainbow Series,” which are the numerous standards and guidelines published by the Department of Defense. The document laid the foundation for the communication between the developers and the customers. The model was based on systems meeting six security requirements: security policy, marking of objects, identification of subjects, accountability, assurance, and continuous protection. After evaluation, the system is placed...

Words: 2282 - Pages: 10

Premium Essay

Great Army Info

...The Doctrine 2015 Army Study Guide Mission Command Center of Excellence, Doctrine 2015 http://usacac.army.mil/cac2/MCCOE/Doctrine2015Tables.asp Doctrine 2015 is transforming the Army's doctrinal base to deliver doctrine - clear, concise, current and accessible - to the point of need. This process accelerates the implementation of new doctrine across the force by providing the Army with a completely revised structure of manuals. Doctrine 2015 captures the essential lessons learned from 10+ years of persistent conflict. It leverages a broader range of available collaborative technologies including wiki, interactive media instruction, video books, blogs and social media. Most importantly, it makes doctrine more accessible to Soldiers whether they are in a learning, training or operational environment."Our force has been operating at the speed of war for a decade-it's time our doctrine caught up." LTG Perkins, Commanding General, US Army Combined Arms Center, ARMY Magazine, March 2012. Created by: SAMANTHA S. SHIRLEY SGM, USA S-3 SGM, 86th ESB BLDG 21100, Room 3117 FT Bliss, TX 79918 COM: 915.741.4866 DSN: 312.711.4866 BB: 520.508.8370 NIPR: samantha.s.shirley.mil@mail.mil AKO: samantha.shirley@us.army.mil The NCO Creed No one is more professional than I. I am a Noncommissioned Officer, a leader of Soldiers. As a Noncommissioned Officer, I realize that I am a member of a time-honored corps, which is known as “The Backbone of the Army”. I am proud of...

Words: 8961 - Pages: 36

Premium Essay

Dodi 8500.01

...Department of Defense INSTRUCTION NUMBER 8500.01 March 14, 2014 DoD CIO SUBJECT: Cybersecurity References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues and renames DoD Directive (DoDD) 8500.01E (Reference (a)) as a DoD Instruction (DoDI) pursuant to the authority in DoDD 5144.02 (Reference (b)) to establish a DoD cybersecurity program to protect and defend DoD information and information technology (IT). b. Incorporates and cancels DoDI 8500.02 (Reference (c)), DoDD C-5200.19 (Reference (d)), DoDI 8552.01 (Reference (e)), Assistant Secretary of Defense for Networks and Information Integration (ASD(NII))/DoD Chief Information Officer (DoD CIO) Memorandums (References (f) through (k)), and Directive-type Memorandum (DTM) 08-060 (Reference (l)). c. Establishes the positions of DoD principal authorizing official (PAO) (formerly known as principal accrediting authority) and the DoD Senior Information Security Officer (SISO) (formerly known as the Senior Information Assurance Officer) and continues the DoD Information Security Risk Management Committee (DoD ISRMC) (formerly known as the Defense Information Systems Network (DISN)/Global Information Grid (GIG) Flag Panel). d. Adopts the term “cybersecurity” as it is defined in National Security Presidential Directive-54/Homeland Security Presidential Directive-23 (Reference (m)) to be used throughout DoD instead of the term “information assurance (IA).” 2. APPLICABILITY a. This instruction applies to: (1) OSD, the...

Words: 19443 - Pages: 78

Free Essay

2009-Report to Congress of the Us-China E and S Review Commission

...2009 REPORT TO CONGRESS of the U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED ELEVENTH CONGRESS FIRST SESSION NOVEMBER 2009 Printed for the use of the U.S.-China Economic and Security Review Commission Available via the World Wide Web: http://www.uscc.gov dkrause on GSDDPC29 with K1 VerDate Nov 24 2008 08:23 Nov 10, 2009 Jkt 052771 PO 00000 Frm 00003 Fmt 6012 Sfmt 6602 M:\USCC\2009\52771.XXX APPS06 PsN: 52771 M:\USCC\USChina.eps Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 01 NOV 2009 4. TITLE AND SUBTITLE 00-00-2009 to 00-00-2009 ...

Words: 185166 - Pages: 741

Premium Essay

Study Guide

...Table Of Content Army Programs ........................................ 4 ASAP - Army Substance Abuse Program ..................... 29 ACS - Army Community Service ........................... 32 ACES - Army Continuing Education Center ................... 34 AER - Army Emergency Relief ............................ 37 Army Sexual Assault Prevention and Response Program ........... 40 EO - Equal Opportunity ................................ 44 AFAP - Army Family Action Plan .......................... 48 ARC - Army Red Cross ................................. 50 Army Reenlistment / Retention Program ...................... 51 Army Safety Program .................................. 53 Army Sponsorship Program .............................. 55 QOLP - Army Quality of Life Program ....................... 56 BOSS - Better Opportunities for Single Soldiers ................. 57 CHAMPUS / TRICARE ................................ 58 DEERS - Defense Enrollment Eligibility Reporting System .......... 59 NCODP - Noncommissioned Officer Development Program ......... 60 Weight Control ....................................... 62 Physical Training ...................................... 66 Weapons ............................................ 70 M136 AT4 - Rocket Launcher ............................ 120 M16/A2 - 5.56 mm Semiautomatic Rifle ..................... 123 M4 - 5.56 mm Semiautomatic Rifle ........................ 130 M18A1 - Antipersonnel (Claymore) Mine .................... 137 M2 - .50 Caliber...

Words: 85951 - Pages: 344

Premium Essay

Word

...Army Regulation 350–1 Training Army Training and Leader Development Rapid Action Revision (RAR) Issue Date: 4 August 2011 Headquarters Department of the Army Washington, DC 18 December 2009 UNCLASSIFIED SUMMARY of CHANGE AR 350–1 Army Training and Leader Development This rapid action revision, 4 September 2011-o Implements the Don’t Ask, Don’t Tell Repeal Act of 2010 by deleting all references to developing and conducting training concerning the Army’s Homosexual Conduct Policy (paras 2-21p and 2-22k.) o Rescinds paragraphs 2-6r, 2-46ac, and G-14e.) o Makes administrative changes (app A: marked obsolete forms and publications; corrected forms and publication titles; and corrected Web site addresses; glossary: deleted unused acronyms and corrected titles/abbreviations as prescribed by Army Records Management and Declassification Agency). *Army Regulation 350–1 Headquarters Department of the Army Washington, DC 18 December 2009 Effective 18 January 2010 Training Army Training and Leader Development History. This publication is a rapid action revision (RAR). This RAR is effective 20 September 2011. The portions affected by this RAR are listed in the summary of change. Summary. This regulation consolidates policy and guidance for Army training and leader development and supports a full-spectrum, force protection, expeditionary Army. Applicability. This regulation applies to the active Army, the Army National ...

Words: 129456 - Pages: 518

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information...

Words: 229697 - Pages: 919

Free Essay

Essay

...GENEROLO JONO ŽEMAIČIO LIETUVOS KARO AKADEMIJA Genovaitė LAUGALIENĖ Milda MIRONAITĖ MOKOMASIS ANGLŲ – LIETUVIŲ IR LIETUVIŲ – ANGLŲ KALBŲ KARYBOS ŽODYNAS Eksperimentinis leidinys Vilnius 2008 UDK 355(03)=20=882 La-458 Mokomąjį anglų – lietuvių ir lietuvių – anglų kalbų karybos žodyną parengė Generolo Jono Žemaičio Lietuvos karo akademijos Užsienio kalbų instituto direktorė Genovaitė Laugalienė ir Užsienio kalbų instituto Užsienio kalbų katedros lektorė Milda Mironaitė. Atsakingoji redaktorė Užsienio kalbų instituto Užsienio kalbų katedros lektorė Aušra Bučaitė. Recenzavo Generolo Jono Žemaičio Lietuvos karo akademijos viršininko pavaduotojas doc. dr. Pranas Jankauskas, Užsienio kalbų instituto Anglų kalbos mokymo centro viršininkas vyr. ltn. Andrius Kiesas ir Lietuvos kariuomenės Mokymo ir doktrinų valdybos Individualiojo rengimo skyriaus Anglų kalbos mokymo poskyrio vedėja Aušra Narbutienė. © Genovaitė Laugalienė, 2008 © Milda Mironaitė, 2008 © Generolo Jono Žemaičio Lietuvos karo akademija, 2008 Turinys Pratarmė......................................................................................................................... 4 . Angliški ir lietuviški sutrumpinimai ............................................................................ 5 Anglų – lietuvių kalbų karybos žodynas........................................................................ 7 Lietuvių – anglų kalbų karybos žodynas ....................................

Words: 111618 - Pages: 447