111 EIWS COMMON CORE (Operations Security

111.1 Define OPSEC
OPSEC is a systematic, proven process that identifies, controls, and protects generally sensitive but unclassified information about a mission, operation, or activity. When effectively employed, it denies or mitigates an adversary's ability to compromise or interrupt a mission, operation, or activity. Without a coordinated effort to maintain the essential secrecy of plans and operations, our enemies can forecast, frustrate or defeat major military operations. Good OPSEC helps to blind our enemies, forcing them to make decisions with insufficient information
111.2 Discuss the five step planning process
The OPSEC process, also known as the OPSEC five step process, is the enabling vehicle for OPSEC planning. It provides the required information for the OPSEC portion of any plan or activity.
Step One: Identify critical information
Step Two: Threat assessment
Step Three: Vulnerability assessment
Step Four: Risk assessment
Step Five: Measures / countermeasures
111.3 Discuss the responsibilities of the command OPSEC Officer
Develop and provide OPSEC plans to support the command mission.
Ensure that all personnel are aware of operations security issues and reinforce with periodic refresher training and briefings prior to major evolutions.
111.4 Describe the OPSEC considerations regarding public affairs
Effective planning and execution of public affairs (PA) operations is critical to accomplishing the commander's mission. The success of both depends on sound leadership and guidance. Successful PA operations are important in order to fulfill the public's right to know and maintain trust and confidence. Credible PA operations are necessary to support the commander's mission and keep the public informed throughout the spectrum of conflict.
111.5 Define WRA
Web Risk Assessment: Web site self-assessment are a useful tool in determining whether potential critical information is on a command's Web site.
111.6 Define the following terms
a. EEFI Essential Elements of Friendly Information. Key information adversaries likely will inquire about regarding our intentions, capabilities and activities, in order to obtain answers critical to their own operational effectiveness. Failure to recognize EEFI renders a command ineffective against revealing operational/missionrelated vulnerabilities and thus against a real or potential threat. The answers to EEFI can potentially lead to CI.
b. Critical Information CI is defined as information about friendly activities, intentions, capabilities, or limitations an adversary seeks in order to gain military, political, diplomatic, economic or technological advantage.
111.7 Describe the components and functions of the command OPSEC Program
Developing communicating, and ensuring implementation of standards, polices, and procedures are in accordance with the OPSEC instruction.
Identifying necessary resources for the effective implementation of Command OPSEC programs.
Conducting program reviews to evaluate and assess the effectiveness and efficiency of the OPSEC program. OPSEC programs should be reviewed at least annually.