Preview

Opsec

Good Essays
Open Document
Open Document
3078 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Opsec
What is OPSEC and Why Do We Have It What is OPSEC? It’s a process of protecting little pieces of information that might grouped together to give the bigger picture. It is also protecting critical information deemed mission essential for military commanders. It is simply denying your adversary the information that they might need to harm you or the mission. The AR that covers OPSEC is AR 530-1 and goes over purposes, responsibilities, policy, procedures, training requirements, OPSEC review, assessment, survey, contract and subcontract requirements and special access programs. The reasons why we have OPSEC is because any vital information that the enemy can get their hands on can give them an advantage on the battle field or operations. Those little pieces of information could show the enemy the full picture of what it is that we plan to execute. Most don’t know what is considered vital information. Think about it, what would you like to know about your enemy and how to infiltrate, interfere or stop their objective. How about where you are going, when you are going, how are you moving, what equipment that you will be using and even what paths have you taken before. Even your unit’s job association can be a part of the information they can gather on. Certain identifying marks such as your unit patch, or any other unit/ battalion identifiers can even give information. For instance the enemy is looking at the patch and can look up through Google and find out what unit you are with and keep open eyes and ears to see if they can get any information on what your purpose is and where you will be. Even taking pictures in certain places can give the enemy a layout of an area. It’s not wise to take pictures of equipment, it would not be hard with the information highway to find out all they need to know about certain functions of our equipment and their weak spots as well. In this day in age we have the social media network that can also help the enemy track and get


References: Operation Security on Wikipedia: http://en.wikipedia.org/wiki/Operations_security Operation Security AR 530-1: www.fas.org/irp/doddir/army/ar530-1.pdf OPSEC Indicators: www.opsecprofessionals.org/articles/indicators.htm How to Conduct an Operations Security (Opsec) Assessment: http://www.wikihow.com/Conduct-an-Operations-Security-%28Opsec%29-Assessment

You May Also Find These Documents Helpful

  • Good Essays

    References: Chase, R. B., Jacobs, F. R., & Aquilano, N. J. (2005). Operations Management for Competitive Advantage (11th ed.). New York: McGraw-Hill/Irwin. Retrieved November 24, 2009, from University of Phoenix, rEsource, OPS571-Operations Management Course Web site.…

    • 932 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Mt435 Unit 8 Assignment

    • 1572 Words
    • 7 Pages

    Russell, R.S. (2011) Operations Management: Creating Value along the Supply Chain 7th Edition, John Wiley & Sons, Hoboken, NJ…

    • 1572 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    BSOP 429 Midterm Exam 1

    • 375 Words
    • 2 Pages

    1. (TCO 1) List and briefly discuss the five main parts of the operations planning control (OPC) system.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Chase, R. B., Jacobs, F. R., & Aquilano, N. J. (2006) Operations management for competitive advantage (11th ed). New York: McGraw Hill/Irwin.…

    • 920 Words
    • 4 Pages
    Good Essays
  • Best Essays

    University of Phoenix. (2010). Riordan Manufacturing Inc. [Computer Software]. Retrieved from University of Phoenix, Simulation, BSA502 website.…

    • 2807 Words
    • 12 Pages
    Best Essays
  • Good Essays

    At the operational level, military and intelligence operations appear similar in nature. Similarities lead to questions over authorities and debates into infringement into the other's charter. Debates over authorities at the operational level lead to inaction on the ground. I have seen SOF operations stopped because interagency partners did not have a clear understanding of SOF's mission.…

    • 467 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mission Command Analysis

    • 2550 Words
    • 11 Pages

    In late June 1863, Confederate General Robert E. Lee’s Army of Northern Virginia passed through western Maryland and invaded Pennsylvania. General Lee believed that by invading the North, he could draw the Union Army of the Potomac away from their defenses and force them to come after him. He also assumed the people of the North would be so demoralized if the Union were to lose another major battle, especially if it was fought on Northern soil, that President Abraham Lincoln would be forced to negotiate a settlement of the Civil War. On 01 July 1863, then Colonel Joshua Chamberlain, and his 20th Maine received word to begin movement to Gettysburg, Pennsylvania, where the Union Army had already engaged the Confederates. After marching more than 100 miles in five days with only two hours of sleep, COL Chamberlain and his men arrived on 02 July 1863 and immediately began preparing to establish a defensive position on top of Little Round Top, the extreme left of the Union line. The hill, which dominated the Union position, was previously left unprotected do to a failure in communications. Using the six steps of the operations process, this study will demonstrate COL Joshua Chamberlains’ ability to properly use mission command which ultimately led to the Union’s victory at Little Round Top.…

    • 2550 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Commerce Bank

    • 2077 Words
    • 9 Pages

    I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledge and disclosed in the paper. I have also cited any sources from which I used data, ideas of words, whether quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course.…

    • 2077 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Ops 571

    • 532 Words
    • 3 Pages

    There are multiple processes that we do in our daily lives that we would like to take a short amount of time to complete it. "A process is any part of an organization that takes inputs and transforms them into outputs that, it is hoped, are of greater value to the organization than the original inputs" (Chase, Jacobs, Aquilano, 2006, p. 154). Flowcharts are easy-to-understand by demonstrating step-by-step how to get from start to finish of a process. The daily process that I would like to take less time would be the process of getting ready for the day. Although this process is not very long, it would be very beneficial if I was able to reduce it to be done as quickly and effective as possible.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Article 92 - 500 Word

    • 571 Words
    • 3 Pages

    It’s important to follow orders so that things can be done properly and timely. Lives could be on the line and depend on Soldiers following orders properly. And if not lives then equipment could be damaged.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Understanding is the most important essential component of the operational construct for planning brigade offensive operations. The commander’s ability to rapidly and accurately achieve an understanding of the urban environment contributes to seizing, retaining, and exploiting the initiative during UO. Commanders need to visualize and understand the operational environment in order to successfully conduct offensive operations.…

    • 188 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    sensitive item

    • 294 Words
    • 1 Page

    Operational security is a process that denied critical information to an adversary. If one were to obtain the information presented it could be used against friendly forces. Utilizing all assets to maintain and secure sensitive items and classified information promote proper operational security and soldier readiness. Not securing items of sensitive nature acquire the risk of loss by being intercepted by unauthorized persons. All personnel should maintain accountability of all sensitive material to allow full utilization by themselves and anyone involved with the mission and still maintain operational security. Operational security can be compromised through the loss of sensitive items due to loss of equipment used for operational planning, or items used for support missions. Depending on the sensitive item that is being classified it could fall under a different level of security as it is deemed by the U.S. Government. The levels included in the term classified (withheld from general circulation for reasons of national security) are RESTRICTED (public disclosure could have undesirable effects or do some harm), CONFIDENTIAL (unauthorized disclosure could damage national security e.g. compromise information that indicates the strength of armed forces or disclosure of technical information about weapons), SECRET (unauthorized disclosure could seriously damage national security) and TOP…

    • 294 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Operations Management

    • 2215 Words
    • 9 Pages

    Supply chain management is the coordination of the processes and functions within a business, adopted by most companies in the UK in the late 1990’s. It deals with the internal and external factors that, when dealt with correctly and systematically, can determine a businesses success or failure. A supply chain is the network of activities that delivers a finished product service to the customer. By definition, supply chain management (SCM) is “the management of the flows of materials from suppliers to customers in order to reduce overall cost and increase responsiveness to the customers” (Reid & Sanders). SCM entails the co-ordination of the movement of good through the supply chain from suppliers to manufacturers to distributors to the final customer. The main aim of SCM is to maximise the efficiency of any given process being carried out by a company; by doing this it is allowing them to try to cut their costs and hopefully keep satisfying their customers’ needs, while at the same time maintaining their competitive position within their market. Supply chain management is seen as more of an “open system” in contrast to the traditional system used by the majority of companies just 20 years ago. The new “open system” allows room for change which is greatly needed with the current financial instability of the economy.…

    • 2215 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    ops 571

    • 788 Words
    • 4 Pages

    Describe how lean production principles may be used to maximize the efficiency and effectiveness of the electric fan supply chain process.…

    • 788 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Final Report Agile Electric

    • 6985 Words
    • 35 Pages

    order for the new product - the actuator assembly. In turn, Agile having no experience…

    • 6985 Words
    • 35 Pages
    Powerful Essays

Related Topics