Operational security – the neglected vital Published May 1, 2008 By 1st Lt. David Vanzanten 319th Logistics Readiness Squadron GRAND FORKS AIR FORCE BASE, N.D. -- We've all heard someone mention the term OPSEC; however, some may not know what it is or why it is important. Is it a fictional word, made up that doesn't mean anything? Is it taken for granted? Is it really that important? No, yes and YES! Across the Air Force, unclassified information is transmitted every day that, if puzzled together, could cause serious damage to our ability to wage war. Operations security is generally regarded as not only a methodology, but also a mindset, and has its roots in the Vietnam Conflict. Concerned with intelligence leaks to the enemy, Admiral Ulysses Sharp created the "purple dragon" team, which created the OPSEC process that is used today. The program's future largely depends on the personnel trusted to implement and develop it. The process includes five basic steps that should be followed, and used as the basis for the dissemination of information. First and foremost, critical information must be identified. Yes, that's the little paper titled critical information list that should be posted over your telephone. On this list will be categories of information which should be limited to the flow between parties who need to know it, and most importantly, over the proper median. The next step is to identify who or what the threats are in or to an operation. It could be people, or it could be inanimate objects. Ways for an enemy to gather information are just as much a consideration as the people who gather it. Both of these factors will influence steps necessary to safeguard critical information. Ask yourself what your vulnerabilities are. Examine your operation and determine where and how someone is most likely and able to gather information which is listed on the CIL. Knowing your own weaknesses will only help making your operation more secure. Inevitably this leads to the risk involved if the threat and vulnerability are not dealt with appropriately. Ultimately, the identification and selection of measures to counteract the threat and vulnerability is the answer. Once done, you can implement the measure and minimize, if not eradicate, the threat. So there you have it. Five, easy and basic steps that make up the OPSEC process. Common sense right? Well, for the most part. Common sense isn't so common if not everyone knows of it, or uses it. It becomes the responsibility of your unit OPSEC monitor to educate all personnel on the importance and usage of this process. Surprisingly enough, when many details which seem unrelated are connected or intermingled, the outcome could spell disaster. Did you know that the vast majority of information gathered for the 9-11 attacks was done so through open sources? That is, through loose conversations, unchecked statements and passing information to people who didn't need to have it. Every individual plays an important part in maintaining a secure environment. It is safe to say that in the profession of arms, people are out to get you. Protecting information, both classified and unclassified, should be a priority for military personnel of every rank. Ultimately, protecting critical information not only helps protect you, but maintains the integrity and strength of our Air Force.