OPSEC Model and Applications

Article

Information is power when kept properly and may be cause of failure if it is not conducted and managed in the right way. Today information technologies and global networks enable risk factors to spread easier compare to previous eras of human history....

Assoc. Prof. Dr. M. Kubilay AKMAN
Uşak University

1. Introduction

Information is power when kept properly and may be cause of failure if it is not conducted and managed in the right way. Today information technologies and global networks enable risk factors to spread easier compare to previous eras of human history. Safety and security of a society cannot be maintained just by security personnel of a country. In accordance with law and human rights values all society and individuals need to take role for securing today and future of humanity.
 
Of course, we do not need to see just negative aspects of globalization and contemporary information technologies. At the beginning of 21st Century scholarly, scientific and academic interaction is in its highest level. This is a big advantage for universal human values and world peace. With ethical behaviors, globalization of knowledge can be helpful to improve life quality of societies internationally.
 
In defense and strategic studies, security sciences international exchange of knowledge has been effective always. For sure, thanks to contemporary translations and publications it is more in our age. Where is Sun Tzu read more, in the East or the West? The Chinese strategist and philosopher definitely very well known in the West. Western concepts of war, defense and strategy are researched, understood and applied in the East too. This is a very natural process and academic, intellectual and scientific progress is achieved by this way.

As a part of globalization of knowledge, scientific models and methodologies in this paper we will focus on OPSEC (Operations Security), a model designed and improved in the United States of America. Although the majority of researches on OPSEC has been conducted in the US, still there is a lot of aspects for its concepts to be analyzed, researched and discussed in other parts of the World. As all social sciences are becoming more international, same tendency is inevitable for security studies as well. OPSEC is also very suitable to emphasize interdisciplinary potential of security studies. In this paper we are going to follow an interdisciplinary perspective which is guided by a sociological approach. Because, insecurity and security are produced in societies, they are societal components and at the end of the day sociology is the science of society and anything related to societies.

2. What is OPSEC?

OPSEC, as an invention of last century, has been used very frequently besides military, security, intelligence, business, trade, etc. operations as a supportive model. It has become almost like an interdisciplinary subfield of security studies with several academies, schools, professional associations and educational programs. Before discussing its importance and potential to be functional in diverse dimensions of societies let us first give a definition of OPSEC. It can be defined as “an analytical process used to deny an adversary information (generally unclassified) concerning our intentions and capabilities by identifying, controlling, and protecting indicators associated with our planning processes or operations“ (COMDTINST M5510.24A, 2014: 10). As it is seen from the definition, for OPSEC it is very crucial to protect critical information of any institution’s, organization’s, department’s plans, operations and intentions especially as keeping safe “unclassified“ information.

This content is protected by Copyright under the Trademark Certificate. It may be partially quoted, provided that the source is cited, its link is given and the name and title of the editor/author (if any) is mentioned exactly the same. When these conditions are fulfilled, there is no need for additional permission. However, if the content is to be used entirely, it is absolutely necessary to obtain written permission from TASAM.

Areas

Continents ( 5 Fields )
Action
 Contents ( 465 ) Actiivities ( 219 )
Areas
Africa 0 148
Asia 0 234
Europe 0 40
Latin America & Carribean 0 34
North America 0 9
Regions ( 4 Fields )
Action
 Contents ( 176 ) Actiivities ( 53 )
Areas
Balkans 0 93
Middle East 0 61
Black Sea and Caucasus 0 16
Mediterranean 0 6
Identity Fields ( 2 Fields )
Action
 Contents ( 176 ) Actiivities ( 74 )
Areas
Islamic World 0 147
Turkish World 0 29
Turkey ( 1 Fields )
Action
 Contents ( 221 ) Actiivities ( 59 )
Areas
Turkey 0 221

Just beyond the Russian-Ukrainian War of February 24, 2022, Turkey has made great efforts to play the role of mediator between the two Black Sea states. Turkey has recently emerged as a reasonable and rational diplomatic player and has assumed a historically peaceful role in the conflict between Rus...;

Countries with strong historical consciousness and long political traditions often have to adapt their strategy to be able to face contemporary challenges. But even in the postmodern, information-oriented world, experience (even a bitter one) may be an advantage and not a burden. ;

As the West uses the issue of representation of Africa in international organizations as a tool to strengthen their relations with states in the continent, the sparks of global challenges spread to the U.N., G-20 and BRICS.;

Turkish Asian Center for Strategic Studies (TASAM) and the Institute for Strategic Studies of National Security Council of Mongolia (ISS) have signed a Memorandum of Understanding (MoU) agreement. ;

Issues related to maritime claims, access, and the quest for energy resources have always been considered as significant aspects of sea power, strategy and security. The Eastern Mediterranean at the turn of the 21st century is not an exception to that, particularly in the light of recent hydrocarbon...;

Information is power when kept properly and may be cause of failure if it is not conducted and managed in the right way. Today information technologies and global networks enable risk factors to spread easier compare to previous eras of human history.;

The very essence of NATO’s role in Euro-Atlantic counter-terrorism (CT) is to protect Allied nations and their citizens from terrorist threat. In the New Strategic Concept (NSC), which was adopted at Lisbon Summit (2010) CT was recognized as a mission by NATO.;

5th Türkiye - Africa Defence Security and Aerospace Forum whose main theme “The Future Security Ecosystem and Partnership for Strategic Transformation“ was held by TASAM National Defence and Security Institute, together with the 8th Istanbul Security Conference on the date of 04 November 2022 in Ram...;

Istanbul Cyber-Security Forum

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background.

  • 03 Nov 2022 - 03 Nov 2022
  • Ramada Hotel & Suites by Wyndham İstanbul Merter -
  • İstanbul - Turkey

6th Türkiye - Gulf Defence And Securıty Forum

  • 04 Nov 2022 - 04 Nov 2022
  • Ramada Hotel & Suites by Wyndham İstanbul Merter -
  • İstanbul - Türkiye

5th Türkiye - Africa Defence Security and Aerospace Forum

  • 04 Nov 2022 - 04 Nov 2022
  • Ramada Hotel & Suites by Wyndham İstanbul Merter -
  • İstanbul - Türkiye

8th Istanbul Security Conference (2022)

  • 03 Nov 2022 - 04 Nov 2022
  • Ramada Hotel & Suites by Wyndham İstanbul Merter -
  • İstanbul - Turkey