Shawn Dutton
copyright
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
1993
1994
1995
1996
1997
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015





http://familypreparednessexpo.com
EMP
Shawn Dutton
SPECTRUM WARFARE
Shawn Dutton PhD
Spectrum Warfare
Shawn Dutton PhD
Spectrum Warfare
NORAD
Cheyenne Mountain
JOIN US and FlashPrepper, Shawn Dutton from the comfort of your own home to learn what YOU can do about: Cyber Safety and OPSEC!

- Exactly what is "OPSEC"?
- What are considered "Open Sources"?
- What NOT share Social Networks and why!
- Cyber adversaries, who are they and how to look out for them?
- Your personal Questions!

Shawn will be LIVE to answer your specific questions! Ask some questions now in the 'Contact Us' Box...

*Shawn Dutton Ph.D. is an Emergency Preparedness Consultant, Webmaster, Political Activist and Militia Commander. He also holds an MBA Broadcast Media, BA Counterintelligence, Ph.D. (PSYWAR) and PhD in Spectrum Warfare he spends his time writing, hosting radio shows, public speaking and teaching. His websites are:

Flashprepper
Prepared Times Magazine.

NORAD
What is OPSEC?

OPSEC (Operational Security) is keeping potential adversaries (enemies) from discovering critical information or weaknesses in an operation, plan or security detail. It protects operations — planned, in progress and those completed. Success depends on secrecy and surprise, and to accomplish the mission more quickly and with less risk. Enemies or adversaries want this information, and they are not just after the leaders to get it. They want you, the family member or anyone with knowledge of any operation that can help exploit weaknesses in an operation.

THE 5 STEPS OF MILITARY OPSEC

Opsec
The five-step OPSEC process provides the framework to answer important questions about risk and allows us to protect critical information. The OPSEC process consists of five steps:

Identify critical information – what information must be protected and why.
Critical information includes:
1.    •   Information about friendly activities, intentions, capabilities, and limitations
2     •   Information relating to military technologies, vulnerabilities, and performance data
3     •   Intelligence capabilities, collection methods, personnel strength, and dispersement
4     •   Personal information about people we work with
5     •   Any information that is useful to an adversary

Opsec
Analyze threats – who are your adversaries and what their goals are:
1.    •   Threats to the success of a mission result from the efforts of adversaries.
2.    •   Who is an adversary?
4.    •   An individual, group, organization, or government that must be denied critical information
5.    •   Not necessarily a sworn enemy, foreign government, or military power
6.    •   Any person or group whose intentions and capabilities are contrary to ours

Opsec
Analyze vulnerabilities - what weaknesses can an adversary exploit:
1     •   A vulnerability exists when an adversary can:
2.    •   Exploit weaknesses to obtain critical information
3.    •   Take timely action against our mission based on that information

Opsec
Assess risks - If adversary exploits a weakness how it will affect the mission?
To assess risks:
1     •   Consider the consequences of your actions
2.    •   Will something you do or say provide an indicator to an adversary?
3.    •   How would an adversary benefit from the indicator?
4.    •   What's the effect on the mission?
5.    •   What is the cost of avoiding the risk?

Opsec
Apply OPSEC countermeasures – how will you protect critical information
OPSEC countermeasures:
1.    •   Minimize predictable patterns
2.    •   Conceal indicators that may point to critical information or vulnerabilities
3.    •   Make indicators seem unimportant
4.    •   May be as simple as choosing not to talk about something
5.    •   Protect critical information