Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
9 Cards in this Set
- Front
- Back
What are the 5 step OPSEC process |
Identification of critical information
Analysis of the threat
Analysis of vulnerability
Assessment of risks
Application of countermeasures what |
|
What are the essential elements of friendly information |
Personal rosters, equipment, patterns, suspects, warrants, surveillance, unmarked vehicles, capabilities, elements of operational/mission sensitive information |
|
Under analysis of the threat what are 2 elements of threat |
Intent- does an adversary intend to gain our sensitive/critical information
Capability- is the adversary capable of gaining the information |
|
Adversaries ways to go use to gather information |
Communications- use of electronic devices to obtain information on police operations
Imagery- still cameras to obtain visual representation of LEO
Trash- dumpster diving
Open source- published material that describe how we do things
Human- watching, listing and asking questions about the abilities and intentions of LEO
Computer Accessing
|
|
What are the vulnerabilities |
Critical information posted on the internet
Non-secure information |
|
What 3 factors determine risk |
Threat Vulnerability Impact |
|
What 3 factors determine risk |
Threat Vulnerability Impact |
|
Methods of countermeasure |
Procedural changes Deceptions Background checks Physical security Stopping the mission |
|
Methods of countermeasures |
Procedural changes, deception background checks, physical security, perception management |