Operations security

World War II propaganda poster which popularized the cautionary phrase "Loose lips sink ships"
"OPSEC" redirects here. OPSEC may also refer to the 501(c)(4) group calling itself Special Operations OPSEC Education Fund.

Operations security (OPSEC) is a term originating in U.S. military jargon, as a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information.

Women's Army Corps anti-rumor propaganda (1941–1945)

Though the above statement is true in its official military format, OPSEC is the process of protecting little pieces of data that could be grouped together to give the bigger picture. OPSEC is the protecting of critical information deemed mission essential from military commanders. Protecting this critical information is through the use of email encryption software, being careful of who may be listening to you (like in a hotel bar), paying close attention to a picture you have taken (back ground), or not talking openly on social media sites about information on the unit's critical information list (military deployments, shortages of equipment or movement of VIPs).

Social engineering is the art of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques

In more modern usage, the term has come to have a similar meaning including protecting information from unfriendly eyes, including industrial espionage, hackers, law enforcement, social engineering, and (since the revelations of Edward Snowden) mass surveillance. It has been opined regarding highly adversarial environments that "If your secure communications platform isn’t being used by terrorists and pedophiles, you’re probably doing it wrong." [1]

Process

  1. Identification of Critical Information: Identifying information needed by an adversary, which focuses the remainder of the OPSEC process on protecting vital information, rather than attempting to protect all classified or sensitive unclassified information.
  2. Analysis of Threats: the research and analysis of intelligence, counterintelligence, and open source information to identify likely adversaries to a planned operation.
  3. Analysis of Vulnerabilities: examining each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then comparing those indicators with the adversary’s intelligence collection capabilities identified in the previous action.
  4. Assessment of Risk: First, planners analyze the vulnerabilities identified in the previous action and identify possible OPSEC measures for each vulnerability. Second, specific OPSEC measures are selected for execution based upon a risk assessment done by the commander and staff.
  5. Application of Appropriate OPSEC Measures: The command implements the OPSEC measures selected in the assessment of risk action or, in the case of planned future operations and activities, includes the measures in specific OPSEC plans.[2]

Uses

An OPSEC assessment is an intensive application of the OPSEC process to an existing operation or activity by a multidisciplinary team of experts. Assessments are essential for identifying requirements for additional OPSEC measures and for making necessary changes in existing OPSEC measures. Additionally, OPSEC planners, working closely with Public Affairs personnel, must develop the Essential Elements of Friendly Information (EEFI) used to preclude inadvertent public disclosure of critical or sensitive information.

Other measures that impact OPSEC

See also

Wikimedia Commons has media related to Anti-rumor propaganda.

References

  1. the grugq. "Yardbird's Effective Usenet Tradecraft". grugq.github.io.
  2. "The OPSEC Process". The Operations Security Professional's Association. Retrieved April 12, 2011.

External links

This article is issued from Wikipedia - version of the Thursday, November 12, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.