Operations Security (OPSEC)


Operations Security, or OPSEC, is the process by which we protect unclassified information that can be used against us.  OPSEC challenges us to look at ourselves through the eyes of an adversary (individuals, groups, countries, organizations). Essentially, anyone who can harm people, resources, or mission is an adversary.


OPSEC should be used to protect information, and thereby deny the adversary the ability to act.  Nearly 90% of the information collected comes from “Open Sources”. Any information that can be obtained freely, without breaking the law, is Open Source.  .  It is social network sites, tweets, text messages, blogs, videos, photos, GPS mapping, newsletters, magazine or newspaper articles, your college thesis, or anything else that is publicly available.


Our OPSEC objective is to ensure a safe and secure environment. OPSEC is best employed daily when making choices about what communications to use, what is written in emails or said on the phone, postings  on social networking sites and blogs.  Any information you put in the public domain is also available to your adversaries. 


The bottom line is that we can be are our own worst enemy.  Google yourself or your organization and see how much you can find out.




OPSEC Five-Step Process to Better Safety & Security

OPSEC Awareness


Basic OPSEC Awareness Brief
 
DIA Statement on Global Threats and Challenges Through 2015
 
Do’s and Don’ts for Unclassified Information
 
Integrating OPSEC into Contracts
 
Threat Awareness Brief


Your Security and the Internet




Open Sources


OPSEC and Espionage/Terrorism




OPSEC FAQs

What does the adversary target?

They target all of these for information, and potentially also target them for harm. OPSEC should be used to protect information, and thereby deny the adversary the ability to act

What is an open source?

It’s not just the web. It is tweets, text messages, magazine or newspaper articles, your college thesis, or anything else that is publicly available. Any information that can be obtained freely, without breaking the law, is Open Source

What is Operations Security (OPSEC)?

Operations Security, or OPSEC, is the process by which we protect unclassified information that an adversary could use against us. OPSEC challenges us to look at ourselves through the eyes of the adversary.

What is the OPSEC objective?

Our OPSEC objective is to ensure a safe and secure environment.     We must protect our people, our plans and procedures, and mitigate our vulnerabilities.

When should you use OPSEC?

OPSEC is best employed during day to day activities when you’re making choices about what communications to use, what you’re saying in an email or on the phone, what you’re posting on social media sites and what you’re including in your tweets. Any information you put in the public domain is also available to your adversaries.

Where does an adversary get information?

Most of the information collected comes from Open Source. A few years ago, the estimate was 80%. Developments in information sharing and new technologies have increased that to nearly 90%.

The bottom line is that we are our own worst enemy. Most of the information terrorists use to carry out attacks comes from their target. Google yourself or your organization and see how much you can find out.

Who is the adversary?

An adversary can be individuals, groups, countries, organizations. Essentially, anyone who could harm your people, resources, or mission could be an adversary. Anyone with whom you wouldn’t want to share certain information is an adversary.