OPSEC Published June 15, 2009 By compiled staff reports 354th Fighter Wing EIELSON AIR FORCE BASE, Alaska -- As host of Northern Edge 2009 Eielson Air Force Base has welcomed military members from across the Department of Defense to participate in one of the Pacific Air Force's largest exercises. With this in mind, it is crucial that all members remember to apply solid operational security tactics, techniques, and procedures. OPSEC is vital to mission success and whether during a preparedness exercise or a real world contingency, the same rules apply. It is imperative that all Iceman understand the importance of safeguarding sensitive information. The 354th Fighter Wing OPSEC program managers have the arduous task of promoting sound operational security practices throughout the wing, while also providing initial training through Right Start and First Term Airmen briefings. 1st Lt. Robert Slayton and Staff Sgt. Darrell Ramey perform these tasks bi-weekly and have highlighted a few key items that all Icemen should re-familiarize themselves with as Icemen progress through Northern Edge and prepare for the upcoming Red Flag exercises. Eielson's unique mission of preparing, deploying and enabling combat forces provides a perfect target for adversary collection attempts. While the wing has taken great strides to acknowledge and honor the threat; it only takes one person to report to their duty section without their "Think OPSEC" cap on. Consider the following: If you don't know the threat, how do you know what to protect? Although specific threats may vary, Icemen must be aware of the actual and postulated threats. In any given situation, there is likely to be more than one adversary, although each may be interested in different information. If you don't know "what" to protect, how do you know you are protecting it? The "what" is the critical and sensitive, or target, information that adversaries seek in order to accomplish their objectives. If you are not protecting critical and sensitive information, the adversary wins. OPSEC Surveys are conducted to determine whether or not critical information is vulnerable to exploitation. An operational assessment is a critical analysis of "what we do" and "how we do it" from the perspective of an adversary. Internal procedures and information sources are also reviewed to determine whether there is an inadvertent release of sensitive information. Lieutenant Slayton, the newest member of the 354th Fighter Wing Combat Plans and Programs office will be taking over as Eielson's OPSEC Program Manager in August. "Our adversaries know they can cripple our defenses if they compromise our information protection," said Lieutenant Slayton on the discontinued use of computer external storage devices--commonly referred to as thumb drives, " ...this method of warfare has already proven costly since we must now use other techniques and procedures to transfer data between computer systems in the absence of thumb drives." Both Lieutenant Slayton and Sergeant Ramey agree that OPSEC's worst enemy is convenience. Making the job efficient may increase productivity, but easier isn't always better. The path of least resistance, while the easiest to travel, usually offers the least amount of protection, and they both ask that you keep this in mind as the operations tempo increases during the rest of the exercise season.