How to be a Prepper: OPSEC for Preppers Part 6:
What could you do to protect those pieces of information from your adversary?
Here’s where it all comes together to know how to be a prepper with good OPSEC. This is the crux of your OPSEC Plan. Think about what you’re trying to protect and what you can afford to lose. Think about who would want the stuff you have. Think about what they would need to know or assume in order try to get what you have. Think about what about your life they can observe or find out about from others. Now take action on the pieces. Hide your valuables. Vary your routes to and from places. Mask important smells. Be thorough to be discrete. There are a lot of ways to do this, and a lot of reference material out there but here are three things to consider with your plan. The three categories of OPSEC Measures are Action Control, Countermeasures, and Counteranalysis.
- Action Control. The objective here is to eliminate any indication of vulnerabilities to enemy exploitation. Essentially, this is changing what you do to hide what you’re doing, who you’re doing it with, and what you use to do it. This is the defensive part of your plan. Look at what you do, where you do it, who you do it with, what else you do when you do it, when you do it, and how often you do it.
- Countermeasures. The objective of countermeasures is to disrupt the enemy from gathering information on you by changing or camouflaging your indicators. Use diversions, camouflage, concealment, jamming, threats, police powers, and force against adversary information gathering and processing capabilities. This is the offensive part of your plan. These are the actions you take to stop the enemy from finding out what you couldn’t protect in step 1.
- Counteranalysis. This stuff can be pretty sneaky. Basically, you’re running a campaign against the guys who sit down and look at what their collectors have brought them. It’s the chess game part of the OPSEC Process.
During this part of the OPSEC 101 plan, you have to consider each piece of critical information and what it’s protecting. You may find that protecting some pieces of information is relatively simple and some pieces will cost more than they’re worth. Hash it all out until you get a decent plan together and then take action! Once you’ve made the plan and started taking action on the steps of your plan, go back to step one and look at what you have now and bounce what you now know off of that list. If you’ve done it correctly and thoroughly, you’ll now see a few things in a different light and decide that you need to get rid of a few things, keep a few that you weren’t going to, or decide not to worry about protecting something due to the cost of it all. The OPSEC Process is a cycle. That means that you’re never done with it because you continually go through it, fine-tuning it as you go and adding or subtracting pieces of it as you learn more or things change.
So that’s a basic overview of learning how to be a prepper – OPSEC for Preppers. There are plenty of articles to follow that will expand on the details of OPSEC in the near future, and there is also a LOT of information out there, especially in the realm of computer security. What you have to do is break it down Barney-style and figure out what OPSEC has to do with Prepping for a SHTF or TEOTWAWKI scenario, or even just living in today’s world. If you really want to start getting into it and can’t wait for my future posts where I break down the different elements of OPSEC and how you can take specific action as a prepper, you can read the Joint Publication 3-54, Joint Doctrine for Operations Security. Feel free to send in or comment below on any ideas you have about prepping OPSEC.