OPSEC: a real-world game Published Feb. 4, 2010 By Senior Airman Jessica Lockoski 22nd Air Refueling Wing public affairs MCCONNELL AIR FORCE BASE, Kan. -- The childhood game "Capture the Flag" requires a team to seize a hidden flag from its opponent's territory. The concept of the game is for each team to capture its enemy's flag while simultaneously preventing its flag from being seized. The team that is first to "capture the flag" wins. Knowledge over an opponent results in a victory and, of course, bragging rights in this game. In real-world battles, adversaries often have a more serious agenda for capturing information, and those results could potentially topple McConnell's mission. Two operations security officials here explain the importance of maintaining operational security, so adversaries can't acquire upon valuable informational assets. "OPSEC is important for protecting McConnell's critical information," said Capt. Michael Sartain, 22nd Air Refueling Wing Plans and Programs OPSEC program manager. "There are pieces of critical information in everything we do - from normal ops, to exercises and full up-deployments." To avoid revealing critical information such as this, Jennifer Vogt, another wing OPSEC manager, said first and foremost, McConnell personnel should acquaint themselves with the base's critical information list. Critical information is derived from OPSEC indicators, she said, which can include friendly intentions, detectable actions or open information the adversary pieces together to build a bigger picture. Though not all critical information is classified, the bigger picture can help the enemy guarantee their opponent's failure and result in bad consequences for mission accomplishment. "OPSEC measures withhold those pieces from being put together in the first place," she said. The two, who strive to increase McConnell's information superiority, said adversaries have a wide spectrum of resources to gather information about the base. "Satellite imaging of the flightline, someone noticing an Airman wearing a reflective belt or (having) articles issued for deployment at the off-base gas station can all be indicators," the captain said. Even casual talk, seemingly harmless e-mail traffic and routine mannerisms can make it easier for advisories to get what they're looking for, the OPSEC experts said. "One example of critical information could be flight departure or arrival times or specific capabilities and limitations of our assets," Mrs. Vogt said. "These are things that typically come up in everyday conversations within the Air Force ... the types of things that could be extremely beneficial to adversaries if they were planning a terrorist attack against us." Even with today's access to social media sites and micro-blogging, the captain said, "the bottom line is Airmen do not need to make the adversary's job any easier. Whatever we do here on the base as far as deployments, exercises or just daily operations need to be protected" For example, posting a photo album on a social media site with pictures of classified information in the background of the photo is not using good OPSEC, he said. While protecting information off base and off duty is important, work areas can also host a bountiful amount of critical information. Mrs. Vogt said flight orders, recall rosters, technical orders, telephone listings and leave forms are common items found in work areas that contain personal contact information and specific operating instructions. One item, in particular, is found on every Airman - a military identification card. Mrs. Vogt said there are valid reasons to photocopy IDs, such as to facilitate medical care, check cashing or to give military-related benefits to beneficiaries. It is not authorized, however; if an ID card holder photocopies the card in a way that gives him privileges he wouldn't otherwise have. She said military ID card holders should not give copies to agencies that offer benefits such as online military discounts, or for reach-back information. If Airmen are unsure whether or not information they divulge, on purpose or by accident, tarnishes OPSEC measures, Mrs. Vogt said they can ask themselves the following questions to keep a good assessment. · Could anything I am writing, sending or saying be considered an indicator? Could that information be used against me or the Air Force? · Is this information acceptable to post on a social networking Web site? · Should I encrypt or secure what I am sending, or use a caveat with a For Official Use Only statement? · Am I disposing of sensitive or critical information properly? In real-world competition, Airmen don't have to run across a backyard or playground to protect their flag from an opponent; instead victory comes from following OPSEC procedures both on and off-duty.