Chapter 19 Flashcards
(149 cards)
Why does OPSEC identify, analyze and control critical information indicating friendly actions, whether military operations or other activities
Identify actions that can be observed by adversary intelligence systems
Determine what indicators could be used to derive critical information useful to adversaries
Eliminate the vulnerabilities of friendly actions to adversary exploitation
Closely integrate and synchronize with other influence operations capabilities
_____ must be closely integrated and synchronized with other influence operations capabilities and all aspects of the protect operations
OPSEC
OPSEC is not a collection of specific rules and instructions applicable to every operation T/F
True
What is OPSEC purpose
To eliminate or reduce adversary collection and exploitation of critical information
OPSEC applies to all activities that prepare, sustain or employ forces during which phases of operations
All phases
Why should CC and other decision makers apply OPSEC analysis to the planning, preparation, execution and post execution phases of any operation or activity from the earliest stages of planning
To enhance operational effectiveness
OPSEC analysis helps decision makers weigh the ___ they will accept in specific operational circumstances
Risks
In what four situations are AF forces vulnerable to observation
At peacetime bases and locations
In training or exercises
While moving
When deployed during actual operations
Why is OPSEC incorporated into day to day operations
To ensure a seamless transition to contingency operations
What five distinct steps constitute the OPSEC process
Identify Critical information Analyze threats Analyze vulnerabilities Assess risk Apply appropriate OPSEC measures
What five basic characteristics of OPSEC indicators make them potentially valuable to an adversary
Signatures Associations Profiles Contrasts Exposure
Who is personally and individually responsible for protecting classified information and controlled unclassified Information under their custody and control
All personnel in the AF
Information is only classified to protect
National Security
What are the three levels of classified information
Top secret
Secret
Confidential
By what tow ways may information be classified
Original or derivative classification
Information classified as ___ can cause exceptionally grave damage to national security if it is disclosed
Top secret
Information classifieds as ____ can cause serious damage to national security if it is disclosed
Secret
Information classified as ___ can cause damage to national security if it is disclosed
Confidential
_____ classification is the initial decision by an original classification authority that an item of information could reasonably be expected to cause identifiable or describable damage to the national security subjected to unauthorized disclosure and requires protection in the interest of national security
Original Classification
Who may originally classify information
Only official who are designated in writing
The AF handles its classified information and Controlled Unclassified Information according to AF specific polices T/F
False
What documents provide guidance for managing classified information and controlled unclassified information
DoDM 5200.01 Volumes 1 and 4
DoDM 5200.01 Volumes 2 and 3
AFI 31-401
All cleared DoD personnel are authorized to derivatively classify information provided they have received initial training before making derivative classification decision and a refresher at least once every ___ years
Two
When is information derivatively classified
When it is incorporated, paraphrased, restated or generated in a new form or document