OPSEC Model and Applications

Article

Information is power when kept properly and may be cause of failure if it is not conducted and managed in the right way. Today information technologies and global networks enable risk factors to spread easier compare to previous eras of human history....

Assoc. Prof. Dr. M. Kubilay AKMAN
Uşak University

1. Introduction

Information is power when kept properly and may be cause of failure if it is not conducted and managed in the right way. Today information technologies and global networks enable risk factors to spread easier compare to previous eras of human history. Safety and security of a society cannot be maintained just by security personnel of a country. In accordance with law and human rights values all society and individuals need to take role for securing today and future of humanity.
 
Of course, we do not need to see just negative aspects of globalization and contemporary information technologies. At the beginning of 21st Century scholarly, scientific and academic interaction is in its highest level. This is a big advantage for universal human values and world peace. With ethical behaviors, globalization of knowledge can be helpful to improve life quality of societies internationally.
 
In defense and strategic studies, security sciences international exchange of knowledge has been effective always. For sure, thanks to contemporary translations and publications it is more in our age. Where is Sun Tzu read more, in the East or the West? The Chinese strategist and philosopher definitely very well known in the West. Western concepts of war, defense and strategy are researched, understood and applied in the East too. This is a very natural process and academic, intellectual and scientific progress is achieved by this way.

As a part of globalization of knowledge, scientific models and methodologies in this paper we will focus on OPSEC (Operations Security), a model designed and improved in the United States of America. Although the majority of researches on OPSEC has been conducted in the US, still there is a lot of aspects for its concepts to be analyzed, researched and discussed in other parts of the World. As all social sciences are becoming more international, same tendency is inevitable for security studies as well. OPSEC is also very suitable to emphasize interdisciplinary potential of security studies. In this paper we are going to follow an interdisciplinary perspective which is guided by a sociological approach. Because, insecurity and security are produced in societies, they are societal components and at the end of the day sociology is the science of society and anything related to societies.

2. What is OPSEC?

OPSEC, as an invention of last century, has been used very frequently besides military, security, intelligence, business, trade, etc. operations as a supportive model. It has become almost like an interdisciplinary subfield of security studies with several academies, schools, professional associations and educational programs. Before discussing its importance and potential to be functional in diverse dimensions of societies let us first give a definition of OPSEC. It can be defined as “an analytical process used to deny an adversary information (generally unclassified) concerning our intentions and capabilities by identifying, controlling, and protecting indicators associated with our planning processes or operations“ (COMDTINST M5510.24A, 2014: 10). As it is seen from the definition, for OPSEC it is very crucial to protect critical information of any institution’s, organization’s, department’s plans, operations and intentions especially as keeping safe “unclassified“ information.

This content is protected by Copyright under the Trademark Certificate. It may be partially quoted, provided that the source is cited, its link is given and the name and title of the editor/author (if any) is mentioned exactly the same. When these conditions are fulfilled, there is no need for additional permission. However, if the content is to be used entirely, it is absolutely necessary to obtain written permission from TASAM.

Areas

Continents ( 5 Fields )
Action
 Contents ( 471 ) Actiivities ( 219 )
Areas
TASAM Africa 0 149
TASAM Asia 0 236
TASAM Europe 0 43
TASAM Latin America & Carribea... 0 34
TASAM North America 0 9
Regions ( 4 Fields )
Action
 Contents ( 177 ) Actiivities ( 54 )
Areas
TASAM Balkans 0 93
TASAM Middle East 0 61
TASAM Black Sea and Caucasus 0 16
TASAM Mediterranean 0 7
Identity Fields ( 2 Fields )
Action
 Contents ( 176 ) Actiivities ( 75 )
Areas
TASAM Islamic World 0 147
TASAM Turkic World 0 29
TASAM Türkiye ( 1 Fields )
Action
 Contents ( 223 ) Actiivities ( 59 )
Areas
TASAM Türkiye 0 223

Artificial intelligence has become an important turning point of technological developments. Especially with the use of this technology a transformation process has begun in our lives. Systems developed and under development together with artificial intelligence technology: for example, the developm...;

The ‘Security in East Mediterranean’ Workshop, the first event within the scope of the East Mediterranean Program initiated by the TASAM National Defence and Security Institute and the Near East South Asia Strategic Studies Center (NESA) affiliated to the US Ministry of Defense, is held at Sheraton ...;

After the end of the Cold War, relations between the People's Republic of China (PRC) and the Russian Federation (RF) have developed dynamically, albeit seemingly unevenly. The possibility of a genuine strategic partnership between Russia and China seemed to be downplayed.;

One of the economic and foreign policy objectives of Turkiye is the development of the Middle Corridor on the New Silk Road route and thus becoming a logistics base in the terrestrial East-West trade via Eurasia and being a center in the supply chain.;

We have seen strong Muslim states destabilized, we have seen the UN Security Council role under the chapter seven of the charter undermined by the notion of so called “Coalitions of the Willing“. We have seen extension of out of area operations of NATO resulting in aggravation of regional conflicts ...;

The United States as the most active actor of international relations and international security in the last century, those primarily over Atlantic oriented and it is now dominantly over pacific oriented. This reflects tectonic changes that have been taking place in world affairs international relat...;

Türkiye faced multiple and differentiated terrorist threats in 2015 and 2016. They have dared to reach their separatist, extremist and destructive targets such as PKK, DAESH and DHKP-C. I would also like to express that the FETO coup supports them and gives life-blood. In a period of operational int...;

Unfortunately, in the past few years we have had the opportunity make sure that, despite strong development, people are still vulnerable, and humanity is going through difficult periods in which wise strategic decisions are needed, so that progress does not stop, so that cooperation continues, the r...;

Istanbul Cyber-Security Forum

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background.

  • 03 Nov 2022 - 03 Nov 2022
  • Ramada Hotel & Suites by Wyndham İstanbul Merter -
  • İstanbul - Turkey

6th Türkiye - Gulf Defence And Securıty Forum

  • 04 Nov 2022 - 04 Nov 2022
  • Ramada Hotel & Suites by Wyndham İstanbul Merter -
  • İstanbul - Türkiye

5th Türkiye - Africa Defence Security and Aerospace Forum

  • 04 Nov 2022 - 04 Nov 2022
  • Ramada Hotel & Suites by Wyndham İstanbul Merter -
  • İstanbul - Türkiye

8th Istanbul Security Conference (2022)

  • 03 Nov 2022 - 04 Nov 2022
  • Ramada Hotel & Suites by Wyndham İstanbul Merter -
  • İstanbul - Turkey