VERIFIED.
Essential Secrecy
The condition achieved from the denial of critical information to adversaries through the
combined efforts traditional security programs and the operations security process. It is
a two pronged approach to to protection (OPSEC and Traditional Security and helps
maintain the element of surprise)
Traditional Security consists of (5)
1. Physical 2. Special Access 3. Information 4. Industrial 5. Personal
Operations Security (5)
1. Critical Information 2. Threats 3. Risks 4. Vulnerabilities 5. Measures
CALI
Capabilities, Activities, Limitations, and Intention
Commander's Role in the OPSEC Program
1. Integrate and issue orders for staff implementation
2. Take administrative action
3. Ensure the coordination and integration with other security programs.
4. Ensure all official information released to the public to include world wide web
receives an OPSEC review prior to release
5. Incorporate OPSEC into contracts
6. Determine what will and will not be protected.
OPSEC 5 step process (IAAAI)
1. Identify Critical Information 2. Analyze Threats 3. Analyze Vulnerabilities 4. Assess
Risk 5. Implement OPSEC measures
U.S. Army Operations Security Manual
AR 530-1
Critical Information