Hit The Order Button To Order A **Custom Paper**

>> CLICK HERE TO ORDER 100% ORIGINAL PAPERS FROM AustralianExpertWriters.com <<

22 Dec

Operations Security, Site Security, and Terrorism Incident Response Paul M. Maniscalco Hank T. Christen – NO PLAGIARISM

Operations Security, Site Security, and Terrorism Incident Response Paul M. Maniscalco Hank T. Christen
• Discuss the definitions of operations security (OPSEC) and site security.
• Describe the difference between OPSEC and site security.
• List the five critical component steps of OPSEC.
• Discuss and describe the intelligence cycle.
• Recognize how OPSEC integrates with the incident command system.
• Discuss the challenges of implementing and sustaining site security.
• Describe the integration of OPSEC and site security for terrorism incident response.
• Recognize the importance of evidence preservation and the role of responders in protecting evidence for law enforcement agencies.
57854_CH07_final.indd 8557854_CH07_final.indd 85 1/20/10 10:26:42 AM1/20/10 10:26:42 AM
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.
F O S T E R , C E D R I C 1 6 9 2 T S
86 Homeland Security: Principles and Practice of Terrorism Response
When preparing organizations and individuals for re- sponse to a high-impact/high-yield emergency incident, some of the most often overlooked requirements are OPSEC and site security.
Bound inextricably with coordination and integra- tion strategies for response, OPSEC and site security are often compromised in the heat of the battle. Responders, with nothing but the best of intentions, converge on the scene of an incident implementing strategies that, pre-event, have failed to address these most important aspects of the incident response and management strat- egy. The discipline to apply the principles of OPSEC and site security following a preestablished, organized, and well-practiced plan is crucial given the nature of the threat and the variety of conditions that may pre- sent themselves. Failing to address these critical security tenets prior to an event amounts to failing to protect the protectors.
Terrorist attacks present the contemporary emergency response manager or chief officer with more complex challenges and greater probable risks. Site security and OPSEC are multifaceted concepts, bringing together ele- ments ranging from pre-event protection of information concerning an organization’s activities, intentions, or capabilities to operational issues such as scene access, traffic control, and evidence protection. Due to the fact that this involves so many different aspects of disaster response, and because it cannot be completely achieved without full integration of each of those aspects, site security is best understood broadly. Robust control of the incident and proximal areas should be the desired goal. This includes maintaining command and control over the human and material flow into, out of, and around the site, providing for the security and safety of responding personnel, providing these responders with the ability to perform their jobs, ensuring per- sonal accountability and the fulfillment of performance requirements.
For an OPSEC program to be effective, personnel must be aware of OPSEC concerns, implement OPSEC countermeasures when appropriate, and be observant of potential collection activities directed at their orga- nization. This is possible only if the members of the organization understand the range of threats affect- ing their organization and actively support the OPSEC program.
OPSEC Purpose OPSEC as a formalized strategic concept was developed in 1988 under the provisions of National Security Decision Directive 298, The National Operations Security Program. OPSEC is a tool designed to promote operational effec- tiveness by denying adversaries publicly available indica- tors of sensitive activities, capabilities, or intentions. The goal of OPSEC is to control information and observable actions about an organization’s capabilities, limitations, and intentions to prevent or control the exploitation of available information by an adversary. The OPSEC pro- cess involves five steps, which are discussed in greater depth later in this section. These steps are:
1. Identification of critical information 2. Analysis of threats 3. Analysis of vulnerabilities 4. Assessment of risks 5. Application of appropriate countermeasures
The overarching OPSEC framework comences with an assessment of the entire organization/activity in order to determine and identify what exploiable but unclas- sified evidence or classified or sensitive activities could be acquired by an adversary through known collection capabilities—human or technological.
Indication of sensitive activities is often the conse- quence of publicly available information that can be found via a variety of sources including agency Web sites, press briefings, open house events, scheduled exercises, and de- liberate probing of the 911 system by false alarm responses or monitoring daily response actions. This information can then be pieced together to develop critical informa- tion and understanding of agency response tactics, tech- niques, and procedures. Sensitive activities indicators can originate routine administrative, logistics, or operational activities, and if identified, these observations are analyzed via known collection capabilities of an adversary to be employed to exploit vulnerabilities and place responders at risk. An agency chief officer, manager, or safety officer uses this disciplined threat and vulnerability assessment process to determine the current OPSEC state of affairs and guide the agency through the selection and adoption of countermeasures to diminish or eliminate the threat.
OPSEC Process OPSEC considerations must be integral to the process of planning for and integrated with all response doctrine and standard operating procedures (SOP) irrespective of whether they are sensitive operations or not. Similar to the adaptation and adoption of safety principles and engineering controls to keep responders safe, OPSEC tenets should be an integral component of that strategic process.
57854_CH07_final.indd 8657854_CH07_final.indd 86 1/20/10 10:26:45 AM1/20/10 10:26:45 AM
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.

READ ALSO  Give examples on Egoism


  • Hit The Order Button To Order A **Custom Paper**

>> 100% ORIGINAL PAPERS FROM AustralianExpertWriters.com <<