Operations security: Difference between revisions
imported>Howard C. Berkowitz No edit summary |
mNo edit summary |
||
(6 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
{{PropDel}}<br><br> | |||
{{subpages}} | |||
'''Operations Security (OPSEC)''' is both a planning discipline, and a set of procedures and techniques, that begins by determining what adversary wants to know about one's plans. The analytic process identifies how the opponent may obtain that information, and how to frustrate the collection of this information. While this is closely related to counterintelligence, it is more specifically focused at protecting specific resources and the manner in which they will be, or are used. It complements, but does not replace, other forms of security. | |||
{{seealso|Intelligence cycle security}} | {{seealso|Intelligence cycle security}} | ||
In the current U.S. definition, it focuses on unclassified sources of information that may be of value to an opponent: <blockquote>...information generally available to the public as well as certain detectable activities reveal the existence of, and sometimes details about, classified or sensitive information or undertakings. Such indicators may assist those seeking to neutralize or exploit U.S. Government actions in the area of national security. Application of the operations security (OPSEC) process promotes operational effectiveness by helping prevent the inadvertent compromise of sensitive or classified U.S. Government activities, capabilities, or intentions.<ref name=NSDD>{{citation | In the current U.S. definition, it focuses on unclassified sources of information that may be of value to an opponent: <blockquote>...information generally available to the public as well as certain detectable activities reveal the existence of, and sometimes details about, classified or sensitive information or undertakings. Such indicators may assist those seeking to neutralize or exploit U.S. Government actions in the area of national security. Application of the operations security (OPSEC) process promotes operational effectiveness by helping prevent the inadvertent compromise of sensitive or classified U.S. Government activities, capabilities, or intentions.<ref name=NSDD>{{citation | ||
| url = http://www.ioss.gov/nsdd298.html | | url = http://www.ioss.gov/nsdd298.html | ||
| title = National Security Decision Memorandum 298: National Operations Security Program | | title = National Security Decision Memorandum 298: National Operations Security Program | ||
| author = Ronald Reagan | | author = Ronald Reagan | ||
| year = 1988}}</ref></blockquote> | | year = 1988}}</ref></blockquote> | ||
==History== | ==History== | ||
During the [[Vietnam War]], a December 1969 capture of a Viet Cong | During the [[Vietnam War]], a December 1969 capture of a Viet Cong communications intelligence center and documents revealed that they had been getting a huge amount of information using simple technology and smart people, as well as sloppy U.S. communications security. <ref name=Fiedler>{{citation | ||
| journal = Army Communicator | | journal = Army Communicator | ||
| date = Spring, 2003 | | date = Spring, 2003 | ||
| title = Project touchdown: how we paid the price for lack of communications security in Vietnam - A costly lesson | | title = Project touchdown: how we paid the price for lack of communications security in Vietnam - A costly lesson | ||
| first = David | last = Fiedler | | first = David | last = Fiedler | ||
| url = http://findarticles.com/p/articles/mi_m0PAA/is_1_28/ai_103992824/print?tag=artBody;col1}}</ref> This specific discovery was by U.S. Army infantry, with interpretation by regular communications officers; the matter infuriated GEN Abrams — at the communications specialists. Before and after, there had been a much more highly classified, and only now available in heavily censored form, [[National Security Agency]] analysis of how the Communists were getting their information, which has led to a good deal of modern | | url = http://findarticles.com/p/articles/mi_m0PAA/is_1_28/ai_103992824/print?tag=artBody;col1}}</ref> This specific discovery was by [[U.S. Army]] infantry, with interpretation by regular communications officers rather than security specialists; the matter infuriated GEN [[Creighton Abrams]] — at the communications specialists. Before and after, there had been a much more highly classified, and only now available in heavily censored form, [[National Security Agency]] analysis of how the Communists were getting their information, which has led to a good deal of modern counterintelligence and operations security. <ref name=PurpleDragon>{{citation | ||
| title = PURPLE DRAGON: The Origin and Development of the United States OPSEC Program | | title = PURPLE DRAGON: The Origin and Development of the United States OPSEC Program | ||
| volume = United States Cryptologic History, Series VI, The NSA Period, Volume 2 | | volume = United States Cryptologic History, Series VI, The NSA Period, Volume 2 | ||
Line 20: | Line 23: | ||
| url = http://www.nsa.gov/public/purple_dragon.pdf}}</ref> | | url = http://www.nsa.gov/public/purple_dragon.pdf}}</ref> | ||
==References== | ==References== | ||
{{reflist|2}} | {{reflist|2}}[[Category:Suggestion Bot Tag]] |
Latest revision as of 07:01, 29 September 2024
This article may be deleted soon. | ||
---|---|---|
Operations Security (OPSEC) is both a planning discipline, and a set of procedures and techniques, that begins by determining what adversary wants to know about one's plans. The analytic process identifies how the opponent may obtain that information, and how to frustrate the collection of this information. While this is closely related to counterintelligence, it is more specifically focused at protecting specific resources and the manner in which they will be, or are used. It complements, but does not replace, other forms of security.
HistoryDuring the Vietnam War, a December 1969 capture of a Viet Cong communications intelligence center and documents revealed that they had been getting a huge amount of information using simple technology and smart people, as well as sloppy U.S. communications security. [2] This specific discovery was by U.S. Army infantry, with interpretation by regular communications officers rather than security specialists; the matter infuriated GEN Creighton Abrams — at the communications specialists. Before and after, there had been a much more highly classified, and only now available in heavily censored form, National Security Agency analysis of how the Communists were getting their information, which has led to a good deal of modern counterintelligence and operations security. [3] References
|