Hsia, Timothy
May 2008
Infantry;May/Jun2008, Vol. 97 Issue 3, p24
A reprint of the article "OPSEC Key to Current, Future Operations," which appeared in the previous issue of "Small Worlds Journal." The threat the military faces in terms of operational security (OPSEC) ranges from the profundity of open source information readily available to the problems arising from joint operations. OPSEC has long been a concern of military commanders and the growth of information technology has exacerbated it. The military's dependence on contractors, U.S. and foreign, also has heightened the OPSEC dilemma.


Related Articles

  • A batch of innovative new tools to get 2017 started. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Feb2017, Vol. 28 Issue 1, p32 

    The article discusses open source threat intelligence tools in the data protection sector.

  • Open Source Intelligence. Fast, Barbara G. // Military Intelligence Professional Bulletin;Oct-Dec2005, Vol. 31 Issue 4, p2 

    The article offers information on the efforts of U.S. Army Intelligence Center and Fort Huachuca to introduce Open Source Intelligence (OSINT) practice in military operation. OSINT emphasizes the importance of utilizing public information in military intelligence operations. Advantages of using...

  • The Open Source Academy Helps the Intelligence Community Make the Most of Open Sources. Peak, Douglas // Military Intelligence Professional Bulletin;Oct-Dec2005, Vol. 31 Issue 4, p18 

    The article offers information on Open Source Center's Open Source Academy (OSA) curriculum. OSA is one of the leading provider of open source tradecraft training in the intellegince community. OSA curriculum includes basic tradecraft, Internet exploitation and reviewing finished intelligence...

  • PRODUCING INTELLIGENCE FROM OPEN SOURCES. Madill, Donald L. // Military Intelligence Professional Bulletin;Oct-Dec2005, Vol. 31 Issue 4, p19 

    The article offers information on the underlying processes, procedures and security concerns regarding the use of open source intelligence. Intelligence collectors could utilize publicly available information such as unclassified government documents, newspapers, magazines, scholarly and trade...

  • Intelligence Support to Information Operations: Open Source Intelligence Operations at the Division Level. Levesque, Laura A. // Military Intelligence Professional Bulletin;Oct-Dec2005, Vol. 31 Issue 4, p55 

    The article offers information on the use of open source information (OSINT) by the 10th U.S. Mountain Division. The division's Mission Essential Task List which outlines the intelligence support subtasks is presented. The development of OSINT analysis cell to support Civil Affairs Operations,...

  • Challenges and Capabilities Increase the Role of Open Source Intelligence. SCHNEIDER, KENT R. // Signal;Apr2014, Vol. 68 Issue 8, p17 

    The article discusses open source intelligence (OSINT), and the challenges and capabilities that increase its role. The author explains that dramatic increase in available OSINT volume is due to technology making it easier to create and disseminate content. According to the author, increased...

  • C4I2WS: The Enablers of Information Dominance in the Battlespace. Perricelli, Robert F. // Military Technology;May2002, Vol. 26 Issue 5, p64 

    Discusses how advanced digital information technology allows the achievement of full spectrum dominance in the battle space. Information on the concept of Command, Control, Communications, Computers, Intelligence, Information Warfare and Sensors advanced digital technology; Communications...

  • Making Information Technology Friend Rather Than Foe. Sinnreich, Richard Hart // Army Magazine;Mar2003, Vol. 53 Issue 3, p8 

    Focuses on the use of information technology in military operations in the U.S. Role of institutional culture in the successful adoption of technologies; Lessons that can be learned by the Armed Forces from Wal-Mart Stores Inc.

  • INCUBATING DEFENSE TECHNOLOGY. Brody, Herb // Technology Review;Jul/Aug2002, Vol. 105 Issue 6, p25 

    Reports the commercial development of military technologies in the U.S. Use of ultrasecure cellular phones; Ways of delivering information technologies for the battlefield; Importance of networked warfighting.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics