Loose
Chips Sink Ships
Because collecting intelligence is much
like building a puzzle, where bits of information can be pieced
together to form a complete whole, awareness of the importance
of operational security is critical to accomplishing the mission.
Operational Security, or “OPSEC,” is based on
the idea that the accumulation of many sensitive or unclassified
pieces of information could compromise security by revealing
classified information. Thus, OPSEC is an analytic process
used to deny adversaries pieces of the information puzzle
that, while unclassified, are still valuable.
Predictable behavior, casual conversations,
discarded documents, and routine acquisitions can all be indicators
associated with planning processes or operations, and indicators
can give away valuable information about an organization’s
missions or activities. Applying OPSEC counters the efforts
of an organization’s adversaries, because effective
OPSEC minimizes the risk that critical information might be
inadvertently given away.
The following are some ways to practice
OPSEC:
- Shred excess paper involving information on operations.
- Don’t discuss classified or sensitive information
in open areas like hallways, restrooms, and libraries.
- Be aware of established routines that could allow
an adversary to predict your actions.
- Eliminate or reduce the amount of operational information
posted on unclassified web sites.
- Never try to talk around classified information
– it is extremely difficult to outsmart experienced
intelligence analysts.
- Never discuss the purpose of a call and then go
secure; it only highlights the sensitive nature of the subject.
- Be aware that e-mail sent over nonsecure systems
can be intercepted. Sending e-mail to address groups puts
a collection of organizations and names at the heading of
each message, displaying all participants involved in the
operation being discussed.
- Use individual e-mails instead of stringing all
related messages as part of the reply.
- Never attach classified or sensitive documents to
unclassified e-mail.
- When using cell phones, fax machines, or pagers,
always assume that you are being monitored. Equipment to
illegally monitor these devices can be readily obtained
on the open market.
Ultimately, OPSEC is about guarding the
small pieces of the puzzle. Pieces of data that may seem unimportant
on their own can be damaging to national security when placed
in the context of the landscape of information.
|