Operations Security - Process

Process

  1. Identification of Critical Information: Identifying information needed by an adversary, which focuses the remainder of the OPSEC process on protecting vital information, rather than attempting to protect all classified or sensitive unclassified information.
  2. Analysis of Threats: the research and analysis of intelligence, counterintelligence, and open source information to identify likely adversaries to a planned operation.
  3. Analysis of Vulnerabilities: examining each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then comparing those indicators with the adversary’s intelligence collection capabilities identified in the previous action.
  4. Assessment of Risk: First, planners analyze the vulnerabilities identified in the previous action and identify possible OPSEC measures for each vulnerability. Second, specific OPSEC measures are selected for execution based upon a risk assessment done by the commander and staff.
  5. Application of Appropriate OPSEC Measures: The command implements the OPSEC measures selected in the assessment of risk action or, in the case of planned future operations and activities, includes the measures in specific OPSEC plans.
  6. Assessment of Insider Knowledge: Assessing and ensuring employees, contractors, and key personnel having access to critical or sensitive information practice and maintain proper OPSEC measures by organizational security elements; whether by open assessment or covert assessment in order to evaluate the information being processed and/or handled on all levels of operatability (employees/mid-level/senior management) and prevent unintended/intentional disclosure.

Read more about this topic:  Operations Security

Famous quotes containing the word process:

    You can read the best experts on child care. You can listen to those who have been there. You can take a whole childbirth and child-care course without missing a lesson. But you won’t really know a thing about yourselves and each other as parents, or your baby as a child, until you have her in your arms. That’s the moment when the lifelong process of bringing up a child into the fold of the family begins.
    Stella Chess (20th century)

    We are in the process of creating what deserves to be called the idiot culture. Not an idiot sub-culture, which every society has bubbling beneath the surface and which can provide harmless fun; but the culture itself. For the first time, the weird and the stupid and the coarse are becoming our cultural norm, even our cultural ideal.
    Carl Bernstein (b. 1944)

    At the heart of the educational process lies the child. No advances in policy, no acquisition of new equipment have their desired effect unless they are in harmony with the child, unless they are fundamentally acceptable to him.
    —Central Advisory Council for Education. Children and Their Primary Schools (Plowden Report)