An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.


Operations Security

What is Operations Security (OPSEC)?

Operations Security is a systematic method used to identify, control, and protect critical information and subsequently analyze friendly actions associated with military operations and other activities. Ultimately, OPSEC is protecting your information and activities from your adversaries.

OPSEC poster with a big purple dragon sitting on top of text.

A special emphasis of the Command OPSEC program is placed on reviewing information pertaining the description, location and missions supported by human and physical assets deemed to be critical to the execution of those missions.

Visit the Navy OPSEC site

 

Always Use OPSEC!

  • Be familiar with the critical information list
  • Encrypt sensitive but unclassified e-mails
  • Use secure phones to discuss critical information
  • Shred all paper

 

The OPSEC Five-Step Process

The OPSEC Five-Step Process is a process meant to prevent the inadvertent release of Critical Information. If individuals protect their pieces of the puzzle, adversaries will not be successful in obtaining a piece that could be aggregated with other information resulting in adverse consequences to our mission.

Collage of many dates, the Capitol Building, and a few terrorists.

By integrating the OPSEC Five-Step Process methodology into existing procedures, each organization can accomplish protecting its activities by protecting information. OPSEC is a continuous process and shall be applied to each operation, project, and day-to- day operations and repeated throughout the duration of each.

The OPSEC Five-Step Process consists of:

  1. Identifying critical and sensitive data
  2. Analyzing the threat
  3. Determining the vulnerabilities
  4. Assessing the risk
  5. Developing and implementing countermeasures

 

Get In Touch

For information, please contact the MCICOM OPSEC Program Coordinator.

Phone: 571-256-8193

OPSEC poster with the head of a bald eagle on the left, OPSEC text on the right. A grumpy man pointing at you, poster reads 'Gunny Ermey says shut your pie-hole.' Shred it or regret it on top of a collage of scattered papers. An OPSEC poster mimicing an optometrist eye chart.

GIVE US YOUR FEEDBACK

Have recommendations to improve our website? Not finding what you are looking for? Provide feedback to our website manager for improvements.