U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

OPSEC (Operations Security) Check

NCJ Number
113311
Journal
Security Management Volume: 32 Issue: 7 Dated: (July 1988) Pages: 67-70
Author(s)
R A Fisher; D B Nickell
Date Published
1988
Length
4 pages
Annotation
Developed during the Viet Nam War, the operations security program (OPSEC), is a set of management procedures to protect classified and sensitive Government operations, programs, and activities.
Abstract
While the protective techniques include all security disciplines, primary emphasis is given to the role of policies, practices, and procedures in protecting critical information. Because of the procedural nature of OPSEC, responsibility for implementation and operation rests with senior management. In reducing the threat represented by hostile national or corporate intelligence systems, the first step involves a self-assessment that includes identifying adversaries, their objectives, and the information they need to attain their objectives. Management must stipulate this information so that security can be tailored to meet specific needs. The size of the OPSEC response should be based on a cost/benefit analysis, and the response should be formalized in the firm's standard operating procedures. An OPSEC master plan should be developed that details the who, what, when, where, and why of the program's key elements. Once this is done, the organization is ready to implement the plan. First, the self-assessment should be validated to ensure that all threats and vulnerabilities were properly identified. Surveys can be conducted to identify the program's hazards and shortcomings. An outside consultant can be used to objectively evaluate the firm's internal efforts. A monitoring process should be developed to provide objective oversight and minimize illegal or unethical activities.

Downloads

No download available

Availability