PROTECTIVE C3CM; AN OPSEC OBJECTIVE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP90-00530R000701710003-8
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
2
Document Creation Date:
December 27, 2016
Document Release Date:
October 26, 2012
Sequence Number:
3
Case Number:
Publication Date:
October 1, 1984
Content Type:
OPEN SOURCE
File:
Attachment | Size |
---|---|
![]() | 370.68 KB |
Body:
Declassified and Approved For Release 2012/10/26: CIA-RDP90-00530R000701710003-8
JOURNAL of ELECTRONIC DEFENSE ? OCT 84 ? ?
1 TV CCE?
1J
:r
1,?-?]
An OPSEC Objective
WALTER G. pEELEY
Deputy Director Communications Security
National Security Agency
rotective C3CM attempts
to prevent an adversary
from destroying our crit-
ical C3 facilities and to protect
our communications against
jamming and intrusion. The Na-
tional Security Agency (NSA),
has a vital interest in this area.
It is responsible for US commu-
nications security (COMSEC) in-
cluding secure communications
practices and procedures, and ad-
vising on the selection and
of COMSEC
equipment and
systems. It also
vigorously fos-
ters effective
control of emis-
sions. These -
measures re-
duce an adver-
sary's capabil-
ity to identify
and target our
C3.
A Protective
C3CM program
must effective-
ly identify
COMSEC and
other security
vulnerabilities,
and recom-
mend correc-
tive measures. Over the years, in
supporting a wide variety of mil-
itary and other government op-
erations, NSA has found the
Operations Security (OPSEC)
process to be the most effective
method of accomplishing this
objective.*
In OPSEC, operational consid-
erations, intelligence analysis
The National Security Agency devel-
oped the data collection and analysis
techniques that were used in the first OP-
SEC study and were subsequently embo-
died in OPSEC methodology. These tech-
niques have proven to be the most suc-
cessful means of identifying, assessing,
and eliminating security weaknesses.
use
identifying and protecting the in-
formation needed to accomplish
this, is typical of the type of prob--
lem effectively addressed by
OPSEC.
Every OPSEC study begins
with the development of Blue
(friendly) and Red (enemy) force
data bases. The collected data is
analyzed to identify Blue force's
susceptibility to intelligence ex-
ploitation and to determine the
Red force's ability to detect and
exploit them. The results are then
analyzed to estimate the relative
significance of each type
and source of information that
the enemy could intercept and
use to his ad-
vantage.
The Blue
force data base
is developed by
interviewing
the people who
support and
carry out an op-
eration or func-
tion. As a rule,
it is not profit-
able to rely on
adversarial ex-
ercises to gath-
er information.
Empirical stud-
ies, such as
those conduct-
ed by COM-
SEC monitors,
may well be es-
sential to obtaining signal or
propagation characteristics, re-
solving conflicting allegations,
or illustrating a security weak-
ness, but the need for such stud-
ies should follow from the initial
analysis. Reliance on adversar-
ial attacks for data base devel-
opment is needlessly time con-
suming, expensive, and often
leads to erroneous conclusions.
The information collected is of-
ten fragmentary, and seldom af-
fords insight into the underlying
causes of security weakness. In
short, we simply cannot spend
the time and money that an ad-
trol of the executing force, there
may be other peripheral activity,
such as radar tracking, which
could be observed by an enemy.
The susceptibility of each
event to exploitation must be de-
termined, a process which re-
quires the expertise of skilled
analysts in each of the pertinent
intelligence or security disci-
plines. Empirical studies can be
arranged at this point to address
specific questionable issues, but
it will be found that communica-
tions-electronics susceptibilities,
for the most part, are readily ap-
parent to COMSEC analysts.
Plain-language communications
would be evaluated -from the
standpoint of their explicit intel-
ligence value, as well as their in-
techniques, and a variety of se- '
curity disciplines are brought to
bear on specific problems.
OPSEC's goal is to enhance
operational effectiveness by pro-
tecting that information which
an adversary must have in order
to counter our operations. Early
OPSEC surveys tried to identify
and eliminate sources of exploit-
able information pertaining to
our imminent military opera-
tions. This objective still figures?
prominently in OPSEC, but our
experience indicates that the ,
OPSEC process can be applied to
virtually any government opera-
tion, program, or function which
could be exploited by an enemy.
For example, an adversary
might try to prevent us from ef- .
fectively using our close air sup-
port aircraft, or from executing
our retaliatory nuclear forces.
Countering these obiectives by
ferential value in relation to oth-
er communications and observ-
able events. Communications
practices and procedures, such
as frequency and callsign usage,
would be examined for weakness-
es which an adversary could ex-
ploit to identify specific organi-
zations for targeting or to pre
diet forthcoming activity. Since
most types of US military activi-
ty are often characterized by dis-
tinctive patterns in the timing,
-volume, and directional flow of
their communications, analysts
would seek to isolate patterns
and determine their significance.
Signal characteristics would al-
so be addressed to determine if
there are susceptibilities to radio-
fingerprinting and position lo-
cating techniques.
After completing this process,
each event in the Blue force se-
quence that is judged susceptible
to intelligence exploitation is ar-
rayed against known or esti-
mated Red force capabilities.
The products of this comparison
of susceptibilities and adversary
threat capability are statements
of vulnerabilities.
It is not uncommon to find
that a multitude of vulnerabili-
ties have been identified. While
it is almost axiomatic that an
adversary can acquire some in-
formation of intelligence value,
the critical issue is whether or
not he will acquire the informa-
tion he needs to achieve his
objectives.
Because of the complexity of
this type of problem, NSA has
advocated using operations anal-
ysis techniques in all OPSEC
assessments to help determine
the relative significance of spe-
cific vulnerabilities. One such
technique, a variation on a com-
monly accepted decision analy-
sis routine, has proved especial-
ly useful.
A key feature of the assess-
ment process is refinement of the
OPSEC objective. "The identifi-
cation and protection of infor-
mation which an adversary must
have to keep us from using our
Close Air Support assets effec-
tively," is typical of many gen-
eral OPSEC objectives. Howev-
er, the scope of a problem stated
in such terms could require con-
sideration of a sizeable number
of adversary scenarios aimed at
countering CAS operations.
By examining the event-se-
quence list and vulnerability in-
formation developed by the sur-
vey portion of the OPSEC study,
analysts and command opera-
tions personnel are able to iden-
tify events which are critically
' important to a successful mis-
sion. The purpose is to see if an
adversary could exploit specific
vulnerabilities to keep those crit-
ical events from being accom-
plished and also to identify the
most likely ways he might attain
his objective.
In the case of CAS operations,
we can focus on those specific
vulnerabilities which enable an
adversary to destroy critical C3
facilities, jam critical communi-
Declassified and Approved For Release 2012/10/26: CIA-RDP90-00530R000701710003:8
//-
r ,ft
Declassified and Approved For Release 2012/10/26: CIA-RDP90-00530R000701710003-8
? 1:,!..7:41.
.cations links, or intrude on com-
munications systems.
Operations security analysts,
working closely with command
operations and intelligence per-
sonnel, postulate adversary
strategies ? sequential steps of
what the adversary must know
and do to carry out his attacks
successfully. The options avail-
able to the adversary for ac-
complishing each step are de-
fined and probabilities assigned
to indicate the likelihood of
completing a step successfully.
In the somewhat simplistic ,
example shown in table 2, it is
considered that the enemy
attempt to undermine CAS op-
erations by jamming the critical
communications link between
the Forward Air Control Party
(FACP) and the CAS aircraft.
For the purposes of illustration,
it is stipulated that the callsigns
and frequencies used in plan-
ning and executing the CAS
mission are unchanged from ,
thosed used in peacetime exer-
cises; further, that the circuit
used to request CAS support is
unsecured.
Given the stipulations of the
strategy depicted in table 2, tile'
overall probability of the enemy ;
successfully jamming the CAS/1
FACP communications link on
detection is calculated to be 83
percent; the probability of suc-
cessfully detecting and follow-
ing frequency changes is 62 per-
cent. We consider these figures to
be "soft," i.e., they are rough es-
timates of high possibilities of
enemy success rather than as-
sertions of precise probability. ,
The estimates are nevertheless a
valid guide and are of consider-
?
able value in demonstrating the
benefits of any security meas-
ures proposed to counter the
enemy strategy.
Security measures are selected
to keep the enemy from complet-
ing one or more steps in his at-
tack strategy. If, for example, we
could keep the enemy from know-
ing that CAS support had been
requested for a geographical
area or from knowing that the
CAS/FACP communications
link was critical to successful air
support, he might well direct his
intercept and jamming assets to
other, seemingly more lucrative
targets.
For the purpose of illustration,
however, let us say that OPSEC
analysts in collaboration with
command operations and com-
munications personnel decide to
attack step 3 in the adversary's
strategy.
If changing callsign and fre-
quency systems were used in all
peacetime CAS exercises and
operations, the rapid acquisition'
and recognition of CAS/FACP
communications would be se-
verely inhibited. The probability
of the adversary knowing the
frequency used on the CAS/
FACP link as a result of inter-
cepting the communications of
previous exercises is nil. Further,
the probability of an enemy
agent being able to acquire and
? 1: EVENT
,
Ground force requests the Tactical Air Control Center STACC
to. provide CAS.
TACC/Af0C sends Air Tasking Order toying Operations
Ce./.!!!; '
WOe i-enda Operations Or-der to the CASsquadron and to the
commands that Will provide Electronic Warfare (EW) and -
Air Refueling (AR) support to the CAS alrciaft.-::f:?-?
cAs alrcpft preparations!;
Tanker takeoff
EW aircraft takeoff
CAS aircraft takeoff
t 1'-?
Tanker aircraft reach AR track
CAS aircraft start refueling
CAS aircraft end refueling
? ?????-? Us. ,
EW eirCraft on station
T 24 Hrs.
22
T.?=-15 kfrs..71
?.?-:-?;.!3 Hrs.
T
T-1.5 Hrs.
T :Z1:2 Firs.
?1.10 14rsA
J..-50 Mn: '
T-20 Mm.?
,CAS air'craft, on station In Area of Op' erations (AO) contacts
the Forward Air 'Control Party (FACP)
P...
Enemy., Jective.:Atop/Inihlhit Cik5 bilammIng FACP commUnicafions.
"
. .
Step 1: Know,CAS suppOii requested
0ptIon 1: intercept request for support
OptIon 2. Agent relied
Optten 3: RECCE detects CAS preparation
Step 2: knOW CXii_FACpr.adio ftnk Critical
OptionI:-'0Pen'sOUre lOterniatien??
,J.Option 2 intercept Of peacetime exercises
Option 3: :Agent reports
Step 3: Know ireCts?irsed orICAS/FACP)14,i
.ipption't ?Intercepi of peacetime exercises
'Option2: -Agent reports
Step 4:-jarn:CAS/FACp link
Step5: Detect and fOlfow'fie'Ci.:Chtinges ithiner
pass the frequency fora single
forthcoming operation would be
very low.
Looking again at table 2, if we
accordingly set the probability
of Option 1 of Step 3 at 0, and the
probability of Option 2 at .05, our
new computation of the overall
probability of the enemy suc-
cessfully jamming the CAS/
FACP communications would be
less than 5 percent!
Using the same method, we
could calculate the impact of us-
ing other approaches, such as
low probability of intercept or
anti-jam equipment. Each could
give a different measure of ef-
fectiveness.
CONCLUSION
At NSA, we recognize that
there are pitfalls inherent in the
subjectivity of the assessment
process described above. The
process is only as good as the
analysts working the problem
and the validity of the data
available to them. We are work-
ing, however, to develop more ef-
fective means of quantifying the
benefits of security to military
commanders. Such measure-
ments are often a critical con-
sideration in ensuring that
CONISEC is effectively and eco-
nomically applied.
We are convinced that it is not
necessary to provide uniformly
high security to all communica-
tions. We know from past expe-
rience that substantial gains in
security can often be achieved
cheaply by procedural changes
which impact only slightly on
operational efficiency. The prob-
lem, however, is to identify the
precise security needs for com-
manders.
In the case of protective C"CM,
we want to conceal or otherwise
protect our critically important
communications links and
nodes. We can make some of
these communications more dif-
ficult for an adversary to ac-
quire, we can hide them amid the
mass of unimportant electromag-
netic activity, and we can build
systems which can work through
various types of jamming. Criti-
cal nodes, our command, con-
trol, and communications facili-
ties can be concealed by remot-
ing of antennas, judicious rout-
king of communications, and
procedures designed to confuse
or mislead an adversary. The
means of protection must always
answer the threat? the proba-
bility that an adversary can
achieve his offensive C3CM ob-
jectives against us.
We believe that the OPSEC
process is an ideal method for
determining security needs with
some precision. NSA, in collabo-
ration with the Service Crypto-
logic Elements, stands ready to
support military commanders in
using OPSEC to identify, ana-
lyze, and assess their protective
C3CM problems.
Walter G. Deeley, has been the
Deputy Director lor.Communica-
tions Security, National Security
Agency, since June 1983. He has
served with NSA and its predeces-
sor organizations since 1948. ?
Declassified and Approved For Release 2012/10/26: CIA-RDP90-00530R000701710003-8