Title: Provided by OSPA www.opsecprofessionals.org
1Vulnerabilities and Indicators
The OPSEC Process, step 3
Presented by (Presenters Name)
Provided by OSPA (www.opsecprofessionals.org)
2Definitions
- Indicator
- Points to vulnerability or critical information??
- Vulnerability
- Weakness the adversary can exploit to get to
critical information
3Indicators
- Pathways or detectable activities that lead to
specific information that, when looked at by
itself or in conjunction with something else,
allows an adversary to obtain sensitive
information or identify a vulnerability
4Profiles and Signatures
- Adversaries look for Patterns and Signatures to
establish a Profile - Patterns are the way things are done, arranged,
or have occurred - Signatures are the emissions that are the result
of, or caused by, what is or was done - Profiles are collected on all our activities,
procedures and methodologies
5Vulnerability Areas
- Operations
- Physical Environment
- Personnel
- Finance
- Administrative
- Logistics
- Public Affairs
- Family
6Common Vulnerabilities
- Discussion of sensitive information in unsecured
areas. - Lack of policy/enforcement
- Cameras
- Cell Phones
- Internet Usage
- Shredding
- Training/Awareness
7Stereotyped Operations
- Same Time
- Same Place
- Same People
- Same Route
- Same Way
- PREDICTIBILITY
8Examples of Vulnerabilities
- Publications
- Press Releases
- Unencrypted Email
- Organization Website
- Non-Secure Telephone
9Examples of Vulnerabilities
- Trash
- Employee Turnover
- Employee Mistakes
- Lack of Good Passwords
- Exhibits and Conventions
10Communication Vulnerabilities
- Radios
- Cell Phones
- Telephones
- Facsimiles (Fax)
- Computers
11Common Vulnerabilities
- Government Reliance on Commnercial Backbone
- Domestic
- Overseas
Few Government-Owned Systems
12Cell Phones
- Incorporate a wide-spectrum of technologies
- Analog/ Digital Wireless
- Sound Recording
- PDA
- Camera
- Streaming video
- Computing/ Internet
- And more
13Cell Phones
- Asset vs Vulnerability
- The Good
- Convenience
- Reach out and touch someone
- Access to Commercial Numbers
- Coordination Outside radio Range/ Frequency
- The Bad and the Ugly
- Multiple Technical Vulnerabilities
- Typically Unsecure
14Common Vulnerabilities
- Computers
- Access Control
- Auditing
- Regulations/ Policy
- User Training
- Passwords
- Systems Accreditation
15Common Vulnerabilities
- Associated Computer Concerns
- Email
- Sniffer
- Cookies
- Virus/ Spyware
- Web Logs (Blogs)
- Instant Messaging (IM)
- Personal Data Assistants (PDAs)
16Areas of Vulnerability
- Administration
- Financial
- Logistics
- Operations
17Administrative
- Memos
- Schedules
- Travel Orders
- Advance Plans
- Annual Reviews
- Org Charts
- Job Announcements
- Management Reports
18Financial
- Projections
- Justifications
- Financial Plans
- Special Purchases
- Budget and Contracts
- Supplemental Requests
19Logistics
- Unusual Equipment
- Volume or Priority Requisitions
- Boxes Labeled With the Name of an Operation or
Mission - etc
20Operations
- VIP Visits
- Schedules
- Stereotyped Activities
- Increased Mission-Related Training
- Abrupt Changes in Normal Operation
21EVEN MORE Indicators and Vulnerabilities
- Family
- Personnel
- Public Affairs
- Physical Environment
- Procedures and Reports
22Where Are the Indicators?
23Indicators
- Presence of specialized Equipment
- Increase (or Decrease) in activity
- Sudden Changes in Procedure
- Unique Convoy Configuration
- Staging of Cargo or
- Vehicles
24Information of Intelligence Value
Collectible
Observable
25Collectible
- Can be physically collected or intercepted
Examples Dumpster diving, cordless/cell phone
interception, email, open source
26Observable
What you can see What you can smell What you can
hear
27Why train for OPSEC? ( A real Exercise)
28What is our greatest Weakness?
OURSELVES!
29Questions?
- In wartime, the truth is so precious that it
must be protected by a bodyguard of lies. - Winston Churchill