Which of the following steps of the OPSEC process examines each aspect of the planned
operation to identify OPSEC indicators that could reveal critical information and then compare
those indicators with the adversary’s intelligence collection capabilities identified in the previous
action?
A.
Analysis of Threats
B.
Analysis of Vulnerabilities
C.
Assessment of Risk
D.
Identification of Critical Information
E.
Application of Appropriate OPSEC Measures
Explanation:
OPSEC is a 5-step process that helps in developing protection mechanisms in order to safeguard
sensitive information and preserve essential secrecy. The OPSEC process has five steps, which
are as follows:
1.Identification of Critical Information: This step includes identifying information vitally needed by
an adversary, which focuses the remainder of the OPSEC process on protecting vital information,
rather than attempting to protect all classified or sensitive unclassified information.
2.Analysis of Threats: This step includes the research and analysis of intelligence, counterintelligence, and open source information to identify likely adversaries to a planned operation.
3.Analysis of Vulnerabilities: It includes examining each aspect of the planned operation to identify
OPSEC indicators that could reveal critical information and then comparing those indicators with
the adversary’s intelligence collection capabilities identified in the previous action. 4.Assessment
of Risk: Firstly, planners analyze the vulnerabilities identified in the previous action and identify
possible OPSEC measures for each vulnerability. Secondly, specific OPSEC measures are
selected for execution based upon a risk assessment done by the commander and staff.
5.Application of Appropriate OPSEC Measures: The command implements the OPSEC measures
selected in the assessment of risk action or, in the case of planned future operations and activities,
includes the measures in specific OPSEC plans.