Stuff

Submitted by: Submitted by

Views: 10

Words: 1257

Pages: 6

Category: Other Topics

Date Submitted: 02/09/2016 02:09 PM

Report This Essay

Operational security is a process that denied critical information to an adversary. If one were to obtain the information presented it could be used against friendly forces. Utilizing all assets to maintain and secure sensitive items and classified information promote proper operational security and soldier readiness. Not securing items of sensitive nature acquire the risk of loss by being intercepted by unauthorized persons. All personnel should maintain accountability of all sensitive material to allow full utilization by themselves and anyone involved with the mission and still maintain operational security. Operational security can be compromised through the loss of sensitive items due to loss of equipment used for operational planning, or items used for support missions. Depending on the sensitive item that is being classified it could fall under a different level of security as it is deemed by the U.S. Government. The levels included in the term classified (withheld from general circulation for reasons of national security) are RESTRICTED (public disclosure could have undesirable effects or do some harm), CONFIDENTIAL (unauthorized disclosure could damage national security e.g. compromise information that indicates the strength of armed forces or disclosure of technical information about weapons), SECRET (unauthorized disclosure could seriously damage national security) and TOP SECRET (unauthorized disclosure could severely damage national security). With the release of information deemed classified by the government to persons unauthorized problems small and large could arise to include disruption of foreign relations, compromise vital defense plans or cryptologic and communications intelligence systems. Although sensitive items of restricted nature may not disclose information of high value, items and information obtained from being unsecured can cause adverse effects impacting mission success to include compromised routes, vehicle information or sensitive...