ROCK ISLAND ARSENAL, Rock Island, Ill. -- The adversary is often portrayed as a sinister individual secretly photographing classified documents. This type of activity constitutes only a very small part of the current approach to intelligence collection. Collection of information concerning technology and its application to a weapons system, and the employment of the system, can be compared to putting together the pieces of a puzzle. The collection methods that could be facing RIA include Human Intelligence and Signal Intelligence, which is collection by electronic interception. These various collection methods can provide an accurate portrayal of the Arsenal's overall mission, functions, intentions and operations. Consider the following questions:
1. What critical information is already in the public domain? Is it too late to protect this information?
2. What open-source information is there available that can be interpreted or pieced together (OPSEC indicators) that is not known by the adversary/competitor?
3. What indicators can the adversary/competitor actually collect?
4. What indicators will the adversary/competitor be able to use to their advantage.
The answers to these questions can very likely be considered the OPSEC vulnerabilities. Protect our and your vulnerabilities.
If you see something suspicious, say something. Call 911 and report suspicious activity or contact your OPSEC/Security Officer.
Social Sharing