Operations security

Operations security
A Modern-Day OPSEC Poster

Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by adversary intelligence systems, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information.

Contents

Process

  1. Identification of Critical Information: Identifying information needed by an adversary, which focuses the remainder of the OPSEC process on protecting vital information, rather than attempting to protect all classified or sensitive unclassified information.
  2. Analysis of Threats: the research and analysis of intelligence, counterintelligence, and open source information to identify likely adversaries to a planned operation.
  3. Analysis of Vulnerabilities: examining each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then comparing those indicators with the adversary’s intelligence collection capabilities identified in the previous action.
  4. Assessment of Risk: First, planners analyze the vulnerabilities identified in the previous action and identify possible OPSEC measures for each vulnerability. Second, specific OPSEC measures are selected for execution based upon a risk assessment done by the commander and staff.
  5. Application of Appropriate OPSEC Measures: The command implements the OPSEC measures selected in the assessment of risk action or, in the case of planned future operations and activities, includes the measures in specific OPSEC plans.[1]

Uses

An OPSEC assessment is an intensive application of the OPSEC process to an existing operation or activity by a multidisciplined team of experts. Assessments are essential for identifying requirements for additional OPSEC measures and for making necessary changes in existing OPSEC measures. Additionally, OPSEC planners, working closely with Public Affairs personnel, must develop the Essential Elements of Friendly Information (EEFI) used to preclude inadvertent public disclosure of critical or sensitive information.

Other measures that impact OPSEC

See also

External links

References

  1. ^ "The OPSEC Process". The Operations Security Professional's Association. http://www.opsecprofessionals.org/process.html. Retrieved April 12, 2011. 

Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • operations security — A process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities to: a. identify those actions that can be observed by adversary intelligence systems; b. determine… …   Military dictionary

  • operations security — operacijos apsauga statusas T sritis Gynyba apibrėžtis Pasyviųjų ar aktyviųjų priemonių, suteikiančių karinei operacijai ar pratyboms atitinkamą saugumą ir neleidžiančių priešui gauti žinių apie draugiškų pajėgų išdėstymą, galimybes ar ketinimus …   NATO terminų aiškinamasis žodynas

  • operations security measures — Methods and means to gain and maintain essential secrecy about critical information. The following categories apply. a. action control The objective is to eliminate indicators or the vulnerability of actions to exploitation by adversary… …   Military dictionary

  • operations security planning guidance — Guidance that serves as the blueprint for operations security planning by all functional elements throughout the organization. It defines the critical information that requires protection from adversary appreciations, taking into account friendly …   Military dictionary

  • operations security vulnerability — A condition in which friendly actions provide operations security indicators that may be obtained and accurately evaluated by an adversary in time to provide a basis for effective adversary decisionmaking …   Military dictionary

  • operations security indicators — Friendly detectable actions and open source information that can be interpreted or pieced together by an adversary to derive critical information …   Military dictionary

  • Operations conducted by the Mossad — The following is an incomplete list of recognized and non recognized operations carried out by Israel s intelligence agency, Mossad, sorted in chronological order. Nikita Khrushchev s speech capture (1956) Mossad capture of a copy of the Nikita… …   Wikipedia

  • Security controls — are safeguards or countermeasures to avoid, counteract or minimize security risks. To help review or design security controls, they can be classified by several criteria, for example according to the time that they act, relative to a security… …   Wikipedia

  • Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… …   Wikipedia

  • Security theater — consists of security countermeasures intended to provide the feeling of improved security while doing little or nothing to actually improve security. [cite book last = Schneier first = Bruce authorlink = Bruce Schneier title = Beyond Fear:… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”