Appendix B
Operations Security
Military police in a theater of operations must be continuously alert for enemy attempts to learn about our plans and capabilities to gain a tactical advantage. The enemy's intelligence collection includes the following four methods.
HUMINT
Human Intelligence--using people to gather information.
Examples:
SIGINT
Signal Intelligence--using devices to intercept our telecommunications and other electronic signal emitters.
Examples:
EW
Electronic Warfare--using EW assets to intercept, direction find, jam and deceive us.
Examples:
PHOTINT
Photographic Intelligence--using photo graphic equipment aboard aircraft and other airborne platforms to gain information.
Examples:
Operations security (OPSEC) is vital to achieving surprise and security on the battlefield. The term applies to all procedures which keep the enemy from collecting information that would give him a tactical advantage.
OPSEC consists of four main categories of security measures--deception, physical security, signal security, and information security. All are interrelated. They must be considered simultaneously for each military operation. Military Police in the theater of operations must understand each type security measure.
Examples of deceptive techniques include:
Camouflage |
Demonstration |
Smoke |
Ruse |
Decoy |
Feint |
COMSEC includes the use of numeral cipher authentication system (DRYAD), operation codes, secure voice equipment and proper radio telephone operator (RTO) procedures.
ELSEC includes radio silence and proper positioning of radars and antennas.
Military Police units and provost marshal elements must maintain continuous liaison with all staff sections and units which influence their roles and mission functions. All commanders and staff efforts, including intelligence, communications-electronics, logistics, maintenance, and administration, consider OPSEC in providing maximum protection for an operation.
The G2/S2 estimates the hostile intelligence threat once the G3/S3 has stated the mission. The S2 coordinates with C-E officers, supporting intelligence and security command (INSCOM) elements, and other appropriate sources to determine the enemy's intelligence collection capabilities and resources.
Of particular importance to MP units and CCPs is information on the following enemy activities:
Determining sensitive aspects of the operation is a joint task of G3/S3 and G2/S2. Examples of information which, if known by the enemy, could compromise an operation are:
Military Police are continuously concerned with the above types of information. They must insure that information is passed only with secure equipment or authorized coding procedures.
Determining OPSEC vulnerabilities is done by the G3/S3 concerned with staff actions that if known by the enemy could provide elements of friendly information (EEFI). Examples of such staff actions are:
OPSEC countermeasures are applied to give maximum protection to each operation. All four categories of OPSEC are considered, as in the following examples.
Deception
Physical Security
Information Security
Signal Security
NEWSLETTER
|
Join the GlobalSecurity.org mailing list |
|
|