Professional Documents
Culture Documents
Implement Opsec Measures
Implement Opsec Measures
16 August 2004
OPERATIONS SECURITY
31 December 2003
OPERATIONS SECURITY
RE:AR 530-1, CH 1
Is the process of analyzing friendly actions pursuant to
military operations and other activities.
OPSEC maintains essential secrecy, which is the condition
achieved by the denial of critical information to adversaries.
OPSEC is an operations function and not a security function
which protect classified information. At battalion level the S-3
is the staff proponent for OPSEC, he implements other OPSEC
measures to maintain surprise and security.
OPSEC applies during peace, crisis, and war to all Army
operations and support activities.
VGT 1
5 STEPS IN THE OPSEC PROCESS
RE:AR 530-1, CH 3
2. Analysis of Threats
3. Analysis of Vulnerabilities
4. Assessment of Risks
VGT 2
(1)Identification of Critical Information
para 3-4
The purpose of this step is to determine what needs
protection.
Identify questions the enemy may ask (5Ws + 1H)
Facts about your intentions, capabilities, limitations
Commander’s EEFIs, samples in appendix C
Information concerning protected person(s)
Operational and Tactical information (OPORD)
Test materials used in an academic environment
Sensitive Information FOUO/Classified Information
1. PROFILE-
PROFILE Activity patterns and signatures that shows
how your activities are normally conducted.
2. DEVIATION-
DEVIATION Profile changes which helps an adversary
learn about your intentions, preparations, time and place.
3. TIP-OFF-
TIP-OFF Actions that warn or shows an adversary of
friendly impending activity.
VGT 6
Characteristics of an Indicator
Signature=
Signature an identifiable trace or something that causes it to
stand out.
Associations=
Associations compares current with past indicator information
for relationship.
Profiles=
Profiles other indicators that have not been observed or
detected.
Contrast=
Contrast only needs be recognized not understood.
Exposure=
Exposure duration, repetition, and timing of exposed indicator.
VGT 7
(3)Analyze the Vulnerabilities para 3-6
VGT 9
(4) Assessment of Risks para 3-7
VGT 12