Falsify, or deny evidence of intended or current operations or activities.
By so doing, the enemy is induced to react in a way prejudicial to his best
10. OPSEC Analysis Procedures.
The OPSEC analysis procedures are
accomplished through four steps. The first two are analysis and selecting
the correct protective measure; the second two are choosing countermeasures
These steps correspond respectively to the planning,
execution, and after-action of an operation.
a. Analysis. Conducting an OPSEC analysis is part of the normal staff
work. Analysis must be done in planning each phase of an operation. Three
things have to occur:
(1) Estimating the Hostile Intelligence Threat.
Once the S3 has
stated the mission, estimation is done by the S2. The S2 coordinates with
the communications-electronic offices, supporting Army Security Agency (ASA)
elements, and other sources.
Their aim is to find answers to two very
important questions: "What are the enemy's intelligence collection
capabilities?" "What are the intelligence collection resources of the enemy
CO directly opposing us?" The S2 will try to determine the impact of those
enemy capabilities used in the immediate area.
(2) Determining the Sensitive Aspects of the Operation. This task is
a joint effort of S3 and S2. They must answer the question: "If known by
the enemy, what information, in what time frame, could compromise the
operation?" Some essential elements of friendly information (EEFI) are:
(a) The objective.
(b) The unit conducting the attack.
(c) Task organization.
(e) The command post.
(f) The morale of the unit.
(g) The unit strength.
(h) Logistical problems.
(i) The combat service support activity, location and movement.
(3) Determining OPSEC Vulnerabilities. This effort is a function of
He coordinates and reviews staff actions necessary to accomplish
He must answer the question: "If known by the enemy, what
staff actions, in what time frame, could provide EEFI?"