BY ORDER OF THE COMMANDER, AIR FORCE OPERATIONAL TEST AND EVALUATION CENTER AIR FORCE INSTRUCTION 10-1101 AIR FORCE OPERATIONAL TEST AND EVALUATION CENTER Supplement 1 1 MARCH 2005 Operations OPERATIONS SECURITY (OPSEC) INSTRUCTIONS COMPLIANCE WITH THIS PUBLICATION IS MANDATORY NOTICE: This publication is available digitally on the AFDPO WWW site at: http://www.e-publishing.af.mil. OPR: HQ AFOTEC/SF (Ms. Geraldine A. Archuleta) Certified by: AFOTEC/CV (Colonel Alison R. Hill) Pages: 17 Distribution: F AFI10-1101, AFOTECSUP 1, 31 May 2001, is supplemented as follows: This supplement applies to HQ AFOTEC, Detachments and Operating Locations. It applies to contractors when it has been determined that such measures are necessary for the adequate protection of critical or sensitive information regarding a specific contract and is included in the DD Form 254, Contract Security Specification. SUMMARY OF REVISIONS Briefly describes OPSEC and the OPSEC process. Requires Dir/Dets to appoint an OPSEC POC in writing to assist AFOTEC/SF with management of the OPSEC program. Requires OPSEC POCs to complete the OPSEC Fundamentals CBT course within 90 days of appointment. Requires OPSEC surveys be conducted annually. Calls for test teams to develop Critical Information Listings (CILs) if test CILs are required. Implements procedures to destroy For Official Use Only (FOUO) and other sensitive but unclassified documents by shredding, whenever possible. Discusses the role of OPSEC in Anti-terrorism and Force Protection. Requires personnel to take OPSEC into consideration prior to posting official information on organizational web pages. 2.2.6. (Added) Critical information related to AFOTEC operational test and evaluation (OT&E) efforts constantly changes with the different systems being involved in OT&E. Attachment 8 (Added) identifies critical information (topics) related to OT&E efforts. These general topics should be selectively applied to particular operational test and evaluation planning and reporting information. Amplify and supplement them as appropriate. Only information not protected by security classification or the privacy act will be included on the critical information list. Detachments will designate a point of contact (POC) to ensure that test teams and supporting personnel are informed of critical information related to the test and evaluation effort. This includes Open Skies and foreign over flight notifications. 2 AFI10-1101_AFOTECSUP1 1 MARCH 2005 2.7. (Added) Attachment 9 (Added) overviews the OPSEC threat and vulnerabilities. Attachment 10 (Added) identifies sample OPSEC indicators, which might give an adversary a clue to AFOTEC’s intentions and activities. Additionally, this attachment includes countermeasures that can be taken to prevent the intentional or unintentional release of sensitive information. 3.2.5. (Added) The OPSEC POC will provide each new member assigned to AFOTEC a basic understanding of OPSEC and their role in the program as well as provide refresher training annually thereafter. 4.1.5. OPSEC POCs at Detachments geographically separated from HQ AFOTEC will conduct an in-house survey of their OPSEC program for their Commander on an annual basis and provide a copy to AFOTEC/SF by 15 September each year. AFOTEC/SF will conduct an in-house survey of the HQs OPSEC program by 15 September each year. OPSEC will also be included in the Information Security Program Review (ISPR) conducted by AFOTEC/SF. Additionally, OPSEC lessons learned from OT&E that can be applied to future tests should be input into the AFOTEC Lessons Learned database, with an information copy to AFOTEC/SF for crossfeed to AFOTEC activities. 4.2. AFOTEC/SF is responsible for overall management of AFOTEC’s OPSEC program and training. Dir/Dets will appoint OPSEC POCs to assist AFOTEC/SF with managing the OPSEC program. Appointees shall be designated in writing. At a minimum, OPSEC POCs will complete the OPSEC Fundamentals CBT within 90 days of appointment for training purposes. 4.3. Core teams will integrate the OPSEC process as applicable into each OT&E at the planning stage. Critical information listings (CILs) will be developed for each specific operation at the earliest possible time during the planning stage. Reference a specific program protection plan (PPP) and augment only if test CILs are required. Refer to AFI 10-1101, Chapter 2, for OPSEC process. Directors and Detachment Commanders will approve CILs for their respective Dir/Det. AFI10-1101_AFOTECSUP1 1 MARCH 2005 3 Attachment 8 (Added) AFOTEC CRITICAL INFORMATION – GENERAL TOPICS A8.1. (Added) Operation concepts and test philosophies that reveal military applications. A8.2. (Added) Guidance system accuracy, orbital parameters, and operations predictions. A8.3. (Added) Test schedules/field tests/laboratory data. A8.4. (Added) Test successes/shortfalls/failures. A8.5. (Added) Weapons system details, such as, design information, concept of application. specifications, capabilities, limitations, and vulnerabilities of those being tested. A8.6. (Added) Limitations and vulnerabilities of test resources. A8.7. (Added) Command and control capabilities: for example, timeliness, force responsiveness, and quality of reaction to stimuli. A8.8. (Added) Critical communications links or logistical chains with unsatisfactory alternate links; especially when loss may cause operation failure or impairment. A8.9. (Added) Impending mission or operation advance notice such as force buildup and communications flow increase. A8.10. (Added) Call signs; nicknames associated with classified operations, projects or activities; frequency allocation; identification of specific users. A8.11. (Added) Any intelligence data or collection capability shortcomings. A8.12. (Added) Reasons for grounding aircraft. A8.13. (Added) Actions taken during specific readiness conditions. A8.14. (Added) Reconnaissance data. A8.15. (Added) Enemy battle estimates. A8.16. (Added) Anticipated enemy battle plans and tactics. A8.17. (Added) Distribution and exact location of troops, weapons and equipment. A8.18. (Added) Logistics (procurement, maintenance, consumption rates, spare requirements, and transportation or personnel and materials). How adequate is it, and how is it provided? Also, supply lines; routes and scope of special operations. A8.19. (Added) Movement; for example, force redistribution or deployment, to include AEF rosters, etc. A8.20. (Added) Weapons and equipment such as types and quantities, performance data, limitations, design specifications, reliability, vulnerability. A8.21. (Added) Unit strength; for example, manning levels, special AFSCs, to include TRPs, reclamas, etc. A8.22. (Added) Readiness state; status of tactical training, success rate in previous exercises and operations, combat efficiency. A8.23. (Added) Purpose and concept of specific plan or operation. 4 AFI10-1101_AFOTECSUP1 1 MARCH 2005 A8.24. (Added) Specific targets and strike priorities. A8.25. (Added) Weapons used. A8.26. (Added) Tactics used. A8.27. (Added) Test team travel, such as TDY dates, locations, times, official orders, TDY worksheets, meeting/conference/briefing attendance. A8.28. (Added) Organizational information, such as org charts, recall rosters, meeting/conference attendance or contact lists. A8.29. (Added) Preparatory documentation, such as agendas, read-aheads, and related documents. A8.30. (Added) Computer, network, and software vulnerabilities when associated with node names and/ or IP addresses. A8.31. (Added) COMSEC equipment and materials in use by AFOTEC and the rationale for such use. A8.32. (Added) Location of classified computer systems and containers. A8.33. (Added) Any computer network system configuration information to include IP addresses and logical schemes, operating system information and network services. AFI10-1101_AFOTECSUP1 1 MARCH 2005 5 Attachment 9 (Added) OPSEC THREAT AND VULNERABILITIES A9.1. (Added) Who wants the critical information? There are countries both allied and adversarial to the U.S., seeking to gain information by all means available and either exploit it for tactical or technological advantage or for economical reasons, both of which can impact U.S. interests. A9.2. (Added) How is our information vulnerable to interception and collection? A9.2.1. (Added) Foreign intelligence services acquire the information they want by three basic methods: A9.2.1.2. (Added) Open sources. Our adversaries satisfy more than 80 percent of their intelligence needs through the collection and analysis of open source literature. These sources provide valuable and free information on technological advances. Specific examples are: A9.2.1.2.1. (Added) Congressional Record A9.2.1.2.2. (Added) Aviation Week and Space Technology A9.2.1.2.3. (Added) Jane’s Fighting Aircraft A9.2.1.2.4. (Added) Missile and Space Daily Newsletter A9.2.1.2.5. (Added) Commerce Business Daily A9.2.1.2.6. (Added) Defense Management Journal A9.2.1.2.7. (Added) Defense Documentation Center Publications A9.2.1.2.8. (Added) Federal Register A9.2.1.2.9. (Added) Defense Electronics A9.2.1.2.10. (Added) Aerospace Daily A9.2.1.2.11. (Added) Military Electronics/Countermeasures A9.2.1.2.12. (Added) Combat Crew A9.2.1.2.13. (Added) The Infrared Handbook A9.2.1.2.14. (Added) Airman Magazine A9.2.1.2.15. (Added) Electronic News A9.2.1.2.16. (Added) Milestone A9.2.1.3. (Added) Technical surveillance. This includes intercepting electronic signals emanating from telephones, computers, printers, instruments, and sensors. A9.2.1.4. (Added) Human intelligence (as the name implies, the source is people). The people problem is our most serious and potentially devastating. It is also the most frustrating and difficult one to deal with. The old saying, “Loose lips sinks ships” is alive and well. We have a constant influx of foreign visitors. This includes official visitors, exchange students, tourists, ship crewmembers, scientists and engineers, and treaty inspection team members. 6 AFI10-1101_AFOTECSUP1 1 MARCH 2005 Attachment 10 (Added) OPSEC INDICATORS AND COUNTERMEASURES A10.1. (Added) Indicators are data derived from openly available information or detectable activities that adversaries can piece together or interpret to reach conclusions or estimates concerning program intentions, capabilities, or activities. Exploitation of this information could enable the adversary to discover or deduce unit critical information. There are three types of indicators: A10.1.1. (Added) Indicators that establish a profile give the observer or analyst patterns that show how activities are normally conducted. A10.1.2. (Added) Indicators showing deviations provide contrasts to normal activity, which helps the adversary gain appreciation about intentions, preparations, time, and place. A10.1.3. (Added) Tip-off indicators highlight and focus attention on information that otherwise might pass unnoticed. These are most significant when they warn an adversary of impending activity, allowing him to pay closer attention and possibly task additional collection assets. A10.2. (Added) Common Indicators: Access lists Agreements/memorandums Conferences/meetings Limiting factors C-Rating factors Locations of units/resources Data processing needs Assigned missions Fixed sequence of actions Nuclear weapons procedures Hours of operation orders Identifiers: Performance criteria Abbreviations/acronyms Implementing procedures Code words Prioritizing services Mission designators Evaluation results Static callsigns Planning conferences Nicknames AFI10-1101_AFOTECSUP1 1 MARCH 2005 Changes to requirements Project numbers Security alerts Times/dates: Personnel/staff composition Arrival/departure Proficiency Milestones/suspenses Quality control Key words: Reports/reporting "Critical" Restrictions "Higher headquarters" Security checks and tests "Priority” Clearance requirements State of readiness Use of stockpiles (WRM) Distinguishing emblems Activity intensity Locations: Planning conferences Origins/destinations Prioritizing services Prepositioned assets Rush requirements Augmentation Shortages/limitations Deficiencies/breakdowns Volume of services requested Emergency procedures Security enhancements A10.3. (Added) Planning Activity Indicators: Climatology Force structure Command and control procedures Composition 7 8 AFI10-1101_AFOTECSUP1 1 MARCH 2005 Conferences Disposition Exercises Pre-positioning Flight planning: Intelligence: Foreign overflight Dissemination ICAO/FAA filing Sources/methods Restricted airspace Gaps Map and chart coverage requirements Mission designators scenarios Number of aircraft/vehicles Search and rescue capabilities Physical security Security classification guides Planned activity profile Sensor capabilities Reaction times/sequences tactics Reconnaissance activities Threat assumptions/intelligence A10.3.1. (Added) Administration Activity Indicators: Accountability records Mission statements Administrative organization Operational organization Clerical workload OPLAN/OPORD-numbers Distribution/AIG lists Property/inventory receipts Document receipts AFI10-1101_AFOTECSUP1 1 MARCH 2005 Publication priorities Job/position description Mail forwarding Mail volume Report distribution Accident/incident reports Security clearance requests Administrative correspondence Security investigations Forms requests Work orders/job requests Mail address changes A10.4. (Added) Civil Government and Commercial Support Indicators: Civilian facility use Courier service Contract security Delivery/pickup locations/times Contract specifications Local government notifications Memorandums of agreement Local law enforcement coordination Technical studies/reports Requests for proposals/bids Trash disposal Technical representative visits Commercial assistance requirements Commercial personnel movement Commercial manpower Commercial movements of material Transportation support Traffic control Vehicle rental Telephone service requests 9 10 AFI10-1101_AFOTECSUP1 1 MARCH 2005 A10.5. (Added) Command and Staff Activity Indicators: Command control procedures Force composition Command control responses Foreign/interagency liaison representative Commander: Intercommand communications Appearances in public Intracommand communications Health Communications flow Leave schedule Organization structure Personal affairs Reactions to hostile actions Reactions under stress Reconnaissance activity Strategic/tactical behavior Reconnaissance unit locations Commander/senior staff identity Staff officer experience/skills A10.6. (Added) Communications Activity Indicators: Antenna types/orientation Net/circuit designators Brevity codes Nets/net membership Call signs Nodes/choke points Communications discipline Operating instructions Communicator signature features Power requirements Encryption/encoding/authenticators priorities Flow volume/intensity radio checks Frequencies assigned AFI10-1101_AFOTECSUP1 1 MARCH 2005 Transmission signature features IFF/SIF codes Reporting times MARS communications Security procedures Message efficiency/speed Telephone usage A10.7. (Added) Financial Activity Indicators: Budget analysis TDY funds requirements/limits Budget justification documents Advance payments Budget projections/estimates POM inputs TDY funds requirements/limits TDY fund-usage Financial plans Travel vouchers Operating budgets A10.8. (Added) Logistics Support Indicators: Cargo/shipment: Specialized vehicles Classification Control numbers Identification numbers/codes Traffic density Number of pieces Container labels Origin/routing/destination Convoy assembly Priority Travel reservations Classification Movement nodes/choke points Weight/cubic feet Commercial transport use Courier service material handling 11 12 AFI10-1101_AFOTECSUP1 1 MARCH 2005 Movement assembly areas A10.9. (Added) Maintenance and Repair Activity Indicators: Aircraft tail numbers Technical order changes Downtime Test equipment Equipment nomenclature Repair scheduling Maintenance team movements Damage assessments Maintenance trends Failure rates Nuclear weapons procedures System-wide deficiencies A10.10. (Added) Supply Indicator: Stock Numbers Inventory Fuels and lubricants: Shelf life times Aircraft full loads Stockpile conditions Inventory Survival equipment Requirements requisition priorities Special types staging of material Storage capacity Re-supply timing Suppliers Storage capacity Maps and charts: Pipeline nodes/choke points Inventory Mobility assets Requirements munitions movements Demand Parts availability A10.11. (Added) Operational Flying Indicators: Aircraft density Aircraft movement Endurance capability AFI10-1101_AFOTECSUP1 1 MARCH 2005 Force locations Force composition ICAO/FAA flight planning: Low/high altitude operations Aircraft type Radar observation/detection Airspeed Refueling requirements Altitude Sortie number/status Course/routing Visual observation Origin Search and rescue operations Times of events Specialized aircraft Call sign/frequency Weather limiting factors A10.12. (Added) Personal Affairs Indicators: Apparel Billeting Child care services Car rental Education program participation Changes of address Immunization records Hotel/motel reservations Newspaper delivery Mail forwarding Passport PCS orders/arrangements Personal equipment issue Arrangements for property care Vehicle identification 13 14 AFI10-1101_AFOTECSUP1 1 MARCH 2005 Powers of attorney Security clearance/access Termination of leave Spouse/dependent routines Wills Advance payments Sale/purchase/rent residence A10.13. (Added) Personnel Activity Indicators: Air Force/MAJCOM requirements Deployment order Apparel Mobility processing Crew proficiency Recall procedures Manpower strengths/projections Skill shortages Personnel locations Unit activation Staff officer assignments Special manning Training Special skills requirements Casualty reports Unfavorable personnel information A10.14. (Added) Public Relations and Public Notices Indicators: News articles/releases Economic impact statements Contractor advertisements Hazardous situation notices Technical journal articles Hometown news releases Warning notices Notice to airmen/mariners Advertisements for bid Public appearances A10.14.1. (Added) Schedules: AFI10-1101_AFOTECSUP1 1 MARCH 2005 15 Delivery/pickup schedules Leave schedules Dining hall schedules Personnel duty schedules Distinguished visitor schedules Senior officer itineraries Intelligence briefing schedules Transportation schedules Laundry service schedules Weekly flying schedules A10.15. (Added) Engineering and Services Support Indicators: Billeting capacity/use Runway usage Design factors Trash disposal Utility requirements Camouflage Environmental impact New construction Firefighting capabilities Structure modifications Road usage Facility maintenance/usage A10.16. (Added) Countermeasures are anything, which effectively negates an adversary’s ability to exploit vulnerabilities. Considerations should include: A10.16.1. (Added) Access Controls. Access to HQ AFOTEC facilities is controlled by an automated access control system. The system is supplemented, where appropriate, with push-button combination locks for additional internal controls and to enforce need-to-know at selected offices or areas. Question people not wearing badges and beware that visitors routinely frequent AFOTEC facilities. A10.16.2. (Added) Classification Guides. Identify and use applicable security classification guides. In the absence of a guide(s) or classification guidance for a particular test and evaluation effort, the AFOTEC Commander has original Top Secret classification authority. A10.16.3. (Added) Supporting Security Disciplines. Applying the controls provided by the following security programs: A10.16.3.1. (Added) Information Security. A10.16.3.1.1. (Added) Mark and safeguard classified material according to DoD 5200.1-R and AFI 31-401. Technical documents subject to export control laws need to be marked and disseminated IAW 16 AFI10-1101_AFOTECSUP1 1 MARCH 2005 AFI 61-204, Disseminating Scientific and Technical Information. Violations of export laws are subject to severe criminal penalties. A10.16.3.1.2. (Added) Enforcing the need-to-know rule to ensure access to sensitive information is required in the performance of official duties. A10.16.3.1.3. (Added) Accurately reflect distribution and destruction notices on test plans/reports and other OT&E documentation. Destruction notices should be as follows: “DESTRUCTION NOTICE: For classified documents follow the procedures in DoD 5200.1-R and AFI 31-401. Contractors follow DoD 5220.22-M, National Industrial Security Program Operating Manual (NISPOM). For unclassified documents, destroy by any method that will prevent reconstruction of the document.” A10.16.3.1.4. (Added) Within AFOTEC, destroy classified by using approved shredders. Destroy For Official Use Only (FOUO), and other sensitive but unclassified documents, by any method to prevent reconstruction- whenever possible, destroy by shredding. A10.16.3.1.5. (Added) Ensure DD Form 254, Contract Security Specification, accurately reflects security requirements for contractors. A10.16.3.2. (Added) Communications Security (COMSEC). Practice good communications security on the telephone. Keep conversations short and to the point. Don’t attempt to talk around classified or sensitive information. Remember that conversations may be monitored. Use a STU/STE and go secure. A10.16.3.3. (Added) Computer Security. Protect computer data. Use reliable and credible passwords. Maintain positive control on all media storage devices. A10.16.3.4. (Added) Emission Security (EMSEC). Separate RED equipment from BLACK signal wire lines by 0.5 meters. This separation is not required for fiber optic cables. Keep at least one meter separation between RED and BLACK equipment. Keep power cords as short as possible. Eliminate unused wires and other conductors such as pipes and ventilation ducts that can carry signals out of the area. Cell phones with integral digital camera capability are prohibited (NOT AUTHORIZED) for use or possession within any Air Force classified processing equipment. A10.16.3.4.1. (Added) Use Encrypt for Transmission Only (EFTO) procedures for teletype and electronic transmissions. A10.16.3.4.2. (Added) Use Encrypt for Transmission Only (EFTO) procedures for teletype and electronic transmissions. A10.16.3.5. (Added) Foreign Disclosure. Ensure foreign disclosure office (HQ AFOTEC/SF) approves release of classified and unclassified information to foreign nationals and representatives of foreign governments. A10.16.3.6. (Added) Anti-terrorism/Force Protection (AT/FP). OPSEC is a key component of Anti-terrorism and Force Protection. These programs protect our most precious asset- people. Be aware of your surroundings and report suspicious activity to appropriate officials ASAP. Know and immediately comply with actions under all Force Protection Conditions (FPCONs). A10.16.4. (Added) Before official information is released to the public, it should be reviewed by HQ AFOTEC/PA. A10.16.5. (Added) Neither confirm nor deny the presence of official information in open publications. AFI10-1101_AFOTECSUP1 1 MARCH 2005 17 A10.16.6. (Added) OPSEC must be taken into consideration prior to posting official information on organizational web pages. FELIX Dupré, Major General, USAF Commander
© Copyright 2026 Paperzz