Operations security

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 8.44.100.11 (talk) at 19:28, 20 June 2016 (→‎NSDD 298 - Reagan wasn't president in 1998). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Template:Globalize/US

World War II propaganda poster which popularized the cautionary phrase "Loose lips sink ships"
"OPSEC" redirects here. OPSEC may also refer to the 501(c)(4) group calling itself Special Operations OPSEC Education Fund.

Operations security (OPSEC) is a term originating in U.S. military jargon, as a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information.

Women's Army Corps anti-rumor propaganda (1941–1945)

In a more general sense, OPSEC is the process of protecting individual pieces of data that could be grouped together to give the bigger picture (called aggregation). OPSEC is the protection of critical information deemed mission essential from military commanders, senior leaders, management or other decision-making bodies. The process results in the development of countermeasures, which include technical and non-technical measures such as the use of email encryption software, taking precautions against eavesdropping, paying close attention to a picture you have taken (such as items in the background), or not talking openly on social media sites about information on the unit, activity or organization's Critical Information List.

Social engineering is the art of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques

Process

OPSEC is a five-step iterative process that assists an organization in identifying specific pieces of information requiring protection and employing measures to protect them.

  1. Identification of Critical information: Critical information is information about friendly intentions, capabilities and activities that allow an adversary to plan effectively to disrupt their operations. This step results in the creation of a Critical Information List (CIL). This allows the organization for focus resources on vital information, rather than attempting to protect all classified or sensitive unclassified information. Critical information may include, but is not limited to, military deployment schedules, internal organizational information, details of security measures, etc.
  2. Analysis of Threats: A Threat is any individual or group that may attempt to disrupt or compromise a friendly activity. This step uses multiple sources, such as intelligence activities, law enforcement, and open source information to identify likely adversaries to a planned operation.
  3. Analysis of Vulnerabilities: examining each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then comparing those indicators with the adversary’s intelligence collection capabilities identified in the previous action.
  4. Assessment of Risk: First, planners analyze the vulnerabilities identified in the previous action and identify possible OPSEC measures for each vulnerability. Second, specific OPSEC measures are selected for execution based upon a risk assessment done by the commander and staff.
  5. Application of Appropriate OPSEC Measures: The command implements the OPSEC measures selected in the assessment of risk action or, in the case of planned future operations and activities, includes the measures in specific OPSEC plans. Countermeasures must be continually monitored to ensure that they continue to protect current information against relevant threats.[1]

An OPSEC Assessment is the formal application of this process to an existing operation or activity by a multidisciplinary team of experts. These assessments identify the requirements for additional OPSEC measures and required changes to existing ones.[2] Additionally, OPSEC planners, working closely with Public Affairs personnel, must develop the Essential Elements of Friendly Information (EEFI) used to preclude inadvertent public disclosure of critical or sensitive information.[3]

History

Vietnam

In 1966, United States Admiral Ulysses Sharp established a multidisciplinary security team to investigate the failure of certain combat operations. This operation was dubbed Operation Purple Dragon, and included personnel from the National Security Agency and the Department of Defense.[4]

When the operation concluded, the Purple Dragon team codified their recommendations. They called the process "Operations Security" in order to distinguish the process from existing processes and ensure continued inter-agency support.[5]

NSDD 298

In 1988, President Ronald Reagan signed National Security Decision Directive (NSDD) 298. This document established the National Operations Security Program and named the Director of the National Security Agency as the executive agent for inter-agency OPSEC support. This document also established the Interagency OPSEC Support Staff (IOSS).[6]

International and Private Sector Application

Although originally developed as a US Military methodology, Operations Security has been adopted worldwide for both military and private sector operations. In 1992, the North Atlantic Treaty Organization (NATO) added OPSEC to its glossary of terms and definitions.[7]

The private sector has also adopted OPSEC as a defensive measure against competitive intelligence collection efforts.[8]

Other measures that impact OPSEC

See also

References

  1. ^ "The OPSEC Process". The Operations Security Professional's Association. Retrieved April 12, 2011.
  2. ^ "OPSEC Glossary of Terms". Interagency OPSEC Support Staff. Retrieved June 16, 2016.
  3. ^ "Joint Operation Planning Process and Public Affairs Actions" (PDF). Defense Technical Information Center (DTIC). Retrieved June 16, 2016.
  4. ^ "PURPLE DRAGON: The Formations of OPSEC". Information Assurance Directorate. National Security Agency. Retrieved June 15, 2016.
  5. ^ "The Origin of OPSEC- from the dragon's mouth". www.opsecprofessionals.org. Retrieved 2016-06-16.
  6. ^ "About the IOSS". National OPSEC Program. Interagency OPSEC Support Staff. Retrieved June 15, 2016.
  7. ^ "NATO Glossary of Terms and Definitions" (PDF). AAP-6. NATO. Retrieved June 16, 2016.
  8. ^ Kahaner, Larry (1997). Competitive Intelligence. Simon and Schuster. pp. 252–255.

External links