Operations security: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
No edit summary
mNo edit summary
 
(5 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{{PropDel}}<br><br>
{{subpages}}
'''Operations Security (OPSEC)''' is both a planning discipline, and a set of procedures and techniques, that begins by determining what adversary wants to know about one's plans. The analytic process identifies how the opponent may obtain that information, and how to frustrate the collection of this information. While this is closely related to counterintelligence, it is more specifically focused at protecting specific resources and the manner in which they will be, or are used. It complements, but does not replace, other forms of security.
{{seealso|Intelligence cycle security}}
{{seealso|Intelligence cycle security}}
'''Operations Security (OPSEC)''' is both a planning discipline, and a set of procedures and techniques, that begins by determining what adversary wants to know about one's plans. The analytic process identifies how the opponent may obtain that information, and how to frustrate the collection of this information. While this is closely related to [[counterintelligence]], it is more specifically focused at protecting specific resources and the manner in which they will be, or are used. It complements, but does not replace, other forms of security.


In the current U.S. definition, it focuses on unclassified sources of information that may be of value to an opponent: <blockquote>...information generally available to the public as well as certain detectable activities reveal the existence of, and sometimes details about, classified or sensitive information or undertakings. Such indicators may assist those seeking to neutralize or exploit U.S. Government actions in the area of national security. Application of the operations security (OPSEC) process promotes operational effectiveness by helping prevent the inadvertent compromise of sensitive or classified U.S. Government activities, capabilities, or intentions.<ref name=NSDD>{{citation
In the current U.S. definition, it focuses on unclassified sources of information that may be of value to an opponent: <blockquote>...information generally available to the public as well as certain detectable activities reveal the existence of, and sometimes details about, classified or sensitive information or undertakings. Such indicators may assist those seeking to neutralize or exploit U.S. Government actions in the area of national security. Application of the operations security (OPSEC) process promotes operational effectiveness by helping prevent the inadvertent compromise of sensitive or classified U.S. Government activities, capabilities, or intentions.<ref name=NSDD>{{citation
  | url = http://www.ioss.gov/nsdd298.html
  | url = http://www.ioss.gov/nsdd298.html
  | title = National Security Decision Memorandum 298: National Operations Security Program
  | title = National Security Decision Memorandum 298: National Operations Security Program  
  | author = Ronald Reagan
  | author = Ronald Reagan
  | year = 1988}}</ref></blockquote>
  | year = 1988}}</ref></blockquote>
==History==
==History==
During the [[Vietnam War]], a December 1969 capture of a Viet Cong [[communications intelligence]] center and documents revealed that they had been getting a huge amount of information using simple technology and smart people, as well as sloppy U.S. communications security. <ref name=Fiedler>{{citation
During the [[Vietnam War]], a December 1969 capture of a Viet Cong communications intelligence center and documents revealed that they had been getting a huge amount of information using simple technology and smart people, as well as sloppy U.S. communications security. <ref name=Fiedler>{{citation
  | journal = Army Communicator
  | journal = Army Communicator
  | date = Spring, 2003
  | date = Spring, 2003
  | title = Project touchdown: how we paid the price for lack of communications security in Vietnam - A costly lesson
  | title = Project touchdown: how we paid the price for lack of communications security in Vietnam - A costly lesson
  | first = David | last = Fiedler
  | first = David | last = Fiedler
  | url = http://findarticles.com/p/articles/mi_m0PAA/is_1_28/ai_103992824/print?tag=artBody;col1}}</ref>  This specific discovery was by [[U.S. Army]] infantry, with interpretation by regular communications officers rather than security specialists; the matter infuriated GEN [[Creighton Abrams]] &mdash; at the communications specialists. Before and after, there had been a much more highly classified, and only now available in heavily censored form, [[National Security Agency]] analysis of how the Communists were getting their information, which has led to a good deal of modern [[counterintelligence]] and operations security. <ref name=PurpleDragon>{{citation
  | url = http://findarticles.com/p/articles/mi_m0PAA/is_1_28/ai_103992824/print?tag=artBody;col1}}</ref>  This specific discovery was by [[U.S. Army]] infantry, with interpretation by regular communications officers rather than security specialists; the matter infuriated GEN [[Creighton Abrams]] &mdash; at the communications specialists. Before and after, there had been a much more highly classified, and only now available in heavily censored form, [[National Security Agency]] analysis of how the Communists were getting their information, which has led to a good deal of modern counterintelligence and operations security. <ref name=PurpleDragon>{{citation
  | title = PURPLE DRAGON: The Origin and Development of the United States OPSEC Program
  | title = PURPLE DRAGON: The Origin and Development of the United States OPSEC Program
  | volume = United States Cryptologic History, Series VI, The NSA Period, Volume 2
  | volume = United States Cryptologic History, Series VI, The NSA Period, Volume 2
Line 20: Line 23:
  | url = http://www.nsa.gov/public/purple_dragon.pdf}}</ref>
  | url = http://www.nsa.gov/public/purple_dragon.pdf}}</ref>
==References==
==References==
{{reflist|2}}
{{reflist|2}}[[Category:Suggestion Bot Tag]]

Latest revision as of 06:01, 29 September 2024

This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

Operations Security (OPSEC) is both a planning discipline, and a set of procedures and techniques, that begins by determining what adversary wants to know about one's plans. The analytic process identifies how the opponent may obtain that information, and how to frustrate the collection of this information. While this is closely related to counterintelligence, it is more specifically focused at protecting specific resources and the manner in which they will be, or are used. It complements, but does not replace, other forms of security.

See also: Intelligence cycle security
In the current U.S. definition, it focuses on unclassified sources of information that may be of value to an opponent:

...information generally available to the public as well as certain detectable activities reveal the existence of, and sometimes details about, classified or sensitive information or undertakings. Such indicators may assist those seeking to neutralize or exploit U.S. Government actions in the area of national security. Application of the operations security (OPSEC) process promotes operational effectiveness by helping prevent the inadvertent compromise of sensitive or classified U.S. Government activities, capabilities, or intentions.[1]

History

During the Vietnam War, a December 1969 capture of a Viet Cong communications intelligence center and documents revealed that they had been getting a huge amount of information using simple technology and smart people, as well as sloppy U.S. communications security. [2] This specific discovery was by U.S. Army infantry, with interpretation by regular communications officers rather than security specialists; the matter infuriated GEN Creighton Abrams — at the communications specialists. Before and after, there had been a much more highly classified, and only now available in heavily censored form, National Security Agency analysis of how the Communists were getting their information, which has led to a good deal of modern counterintelligence and operations security. [3]

References

  1. Ronald Reagan (1988), National Security Decision Memorandum 298: National Operations Security Program
  2. Fiedler, David (Spring, 2003), "Project touchdown: how we paid the price for lack of communications security in Vietnam - A costly lesson", Army Communicator
  3. Center for Cryptologic History, National Security Agency (1993), PURPLE DRAGON: The Origin and Development of the United States OPSEC Program, vol. United States Cryptologic History, Series VI, The NSA Period, Volume 2