• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/9

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

9 Cards in this Set

  • Front
  • Back

What are the 5 step OPSEC process

Identification of critical information



Analysis of the threat



Analysis of vulnerability



Assessment of risks



Application of countermeasures what

What are the essential elements of friendly information

Personal rosters, equipment, patterns, suspects, warrants, surveillance, unmarked vehicles, capabilities, elements of operational/mission sensitive information

Under analysis of the threat what are 2 elements of threat

Intent- does an adversary intend to gain our sensitive/critical information



Capability- is the adversary capable of gaining the information

Adversaries ways to go use to gather information

Communications- use of electronic devices to obtain information on police operations



Imagery- still cameras to obtain visual representation of LEO



Trash- dumpster diving



Open source- published material that describe how we do things



Human- watching, listing and asking questions about the abilities and intentions of LEO



Computer Accessing


What are the vulnerabilities

Critical information posted on the internet



Non-secure information

What 3 factors determine risk

Threat


Vulnerability


Impact

What 3 factors determine risk

Threat


Vulnerability


Impact

Methods of countermeasure

Procedural changes


Deceptions


Background checks


Physical security


Stopping the mission

Methods of countermeasures

Procedural changes, deception background checks, physical security, perception management