CHAPTER III

THE OPSEC PROCESS


1. General

  1. OPSEC planning is accomplished through the use of the OPSEC process. This process, when used in conjunction with the joint planning processes, provides the information required to write the OPSEC section of any plan or order. OPSEC planning is done in close coordination with the overall C2W planning effort and with the planning of the other C2W components.

  2. The OPSEC process consists of five distinct actions. These actions are applied in a sequential manner during OPSEC planning. In dynamic situations, however, individual actions may be revisited at any time. New information about the adversary's intelligence collection capabilities, for instance, would require a new analysis of threats.

  3. An understanding of the following terms is required before the process can be explained:

      (1) Critical Information: Specific facts about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively so as to guarantee failure or unacceptable consequences for friendly mission accomplishment.

      (2) OPSEC Indicators: Friendly detectable actions and open- source information that can be interpreted or pieced together by an adversary to derive critical information.

      (3) OPSEC Vulnerability: A condition in which friendly actions provide OPSEC indicators that may be obtained and accurately evaluated by an adversary in time to provide a basis for effective adversary decisionmaking.

2. The OPSEC Process

  1. OPSEC Action 1--Identification of Critical Information

  2. OPSEC Action 2--Analysis of Threats

  3. OPSEC Action 3--Analysis of Vulnerabilities

  4. OPSEC Action 4--Assessment of Risk

  5. OPSEC Action 5--Application of Appropriate OPSEC Measures


12-20-1996; 16:59:34