An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

NEW SECNAV GUIDANCE ON OPERATIONS SECURITY (OPSEC) AND THE PROTECTION OF CRITICAL INFORMATION

UNCLASSIFIED
ROUTINE
R 131700Z DEC 16
FM SECNAV WASHINGTON DC
TO ALNAV
INFO SECNAV WASHINGTON DC
CNO WASHINGTON DC
CMC WASHINGTON DC
BT
UNCLAS

ALNAV 072/16

MSGID/GENADMIN/SECNAV WASHINGTON DC/-/DEC//

SUBJ/NEW SECNAV GUIDANCE ON OPERATIONS SECURITY (OPSEC) AND THE PROTECTION OF 
CRITICAL INFORMATION//

REF/A/DOC/SECNAVINST 5211.5E//
NARR/REF A IS DEPARTMENT OF THE NAVY (DON) PRIVACY ACT PROGRAM INSTRUCTION.

RMKS/1.  Operations Security (OPSEC) and the requisite protection of critical 
information are priorities for the Department of the Navy (DON).  SECNAVINST 
3070.2, Operations Security, was issued 5 May 2016.  This new policy requires 
the implementation of effective OPSEC programs and additional measures to 
protect critical information.  The instruction can be obtained from the DON 
Issuance webpage:  (https://doni.daps.dla.mil/Directives/03000%20Naval
%20Operations%20and%20Readiness/03-00%20General%20Operations%20and
%20Readiness%20Support/3070.2.pdf).  This guidance should receive wide 
dissemination, but is of particular importance to Public Affairs, Information 
Warfare, Acquisition, Antiterrorism/Force Protection (ATFP), and security 
professionals.

2.  Current threats require that we redouble our efforts to protect critical 
information through enhanced collaboration between OPSEC program managers, 
command security offices, Public Affairs specialists, the Information Warfare 
community, ATFP personnel, and other security professionals.  Exploitation of 
internet based capabilities, publicly released information, and other 
UNCLASSIFIED but potentially sensitive data gives adversaries the ability to 
undermine our technological edge, threaten our personnel, and potentially 
compromise our operations.

3.  Key elements of the policy:
    a.  OPSEC is explicitly the responsibility of each Commanding Officer or 
equivalent.
    b.  OPSEC must be considered and incorporated into all operational 
planning and execution.
    c.  A requirement for commands to develop, resource, and maintain 
effective OPSEC programs.
    d.  OPSEC is clearly defined as an Operations rather than a Security 
function.
    e.  It enhances accountability and requirements for all higher commands 
to provide oversight of subordinate OPSEC programs.
    f.  Failure to attain mandated standards shall result in disqualification 
from all operational awards.
    g.  Requirement for incorporation of OPSEC into the entire Research, 
Development, Test and Evaluation life cycle.
    h.  Documented OPSEC training is a pre-requisite for access to all DON 
information systems.
    i.  Each Command shall develop and implement enforcement mechanisms to 
reduce disclosures of critical information per SECNAVINST 3070.2 (Enclosure 
2).
    j.  OPSEC requires continuous collaboration between ATFP personnel, 
public affairs specialists, command security professionals, and OPSEC program 
managers.
    k.  A requirement for OPSEC to be a stand-alone mission essential task 
and not subordinated under other readiness qualification criteria (e.g., 
Electronic Warfare and Information Operations).  Additionally, OPSEC is 
required to be incorporated into all assess-train-certify related 
documentation and requirements.
    l.  Evaluation of every solicitation/contract award package to ensure 
OPSEC requirements are met in accordance with each Commands OPSEC policy.  
OPSEC requirements should be assessed for inclusion in all DD Form 254.

4.  For the Navy, while the new policy requires O-3/GS-12 program managers, 
per this ALNAV, a waiver is automatically granted for warfare qualified 
Information Warfare officers CWO-2 and above at commands below the Echelon II 
level.

5. OPSEC resources:
    a.  An OPSEC self-inspection tool, included as part of the policy, 
facilitates an internal assessment of compliance with Department of Defense 
and DON standards and provides higher level commands the ability to evaluate 
the effectiveness of subordinate programs.
    b.  The DON Critical Information List (CIL) provides an overview of what 
the Secretary of the Navy (SECNAV) considers critical information across the 
Department.  A DON-wide CIL is also included in the policy.
    c.  The Naval OPSEC Support Team, which can be reached via 
http://www.Facebook.com/NavalOPSEC, the OPSEC link on the Navy Homepage, or 
by e-mailing the team at opsec@navy.mil.
    d.  The Marine OPSEC Support Team can be reached via the OPSEC link on 
the Marine Corps Information Operations Command Homepage or by emailing the 
team at OPSEC@usmc.mil.
    e.  The Naval OPSEC application (APP), an excellent tool for OPSEC 
program managers, Marines, and Sailors, provides access to resources and 
policies, training links, videos and various products, as well as the ability 
to complete annual OPSEC general military training.  The APP is available in 
the Apple App Store and Google Play Store under the title Naval OPSEC.

6.  In light of the current threat environment, existing guidance on the 
release of personally identifiable information (PII) of DON personnel was 
reviewed.  Most types of personal information are already included in the DON 
CIL.  Much personal information, including association with military and 
government entities, is already in the public domain (e.g., many names and 
associated services).  Per reference (a), SECNAV may withhold normally 
releasable PII (e.g., names and associated command) based on specific 
credible changes to the threat environment.  This authority cannot be 
delegated.  Director, Naval Criminal Investigative Service (NCIS) will 
determine the credibility of the threat.  Chief of Naval Operations and/or 
Commandant of the Marine Corps, based on NCIS determination, in coordination 
with Navy Chief of Information, will make recommendations to SECNAV on the 
nature and scope of proposed restrictions.  Any restrictions should be short 
in duration and relaxed immediately upon NCIS determination that the relevant 
threat is no longer viable.

7.  Deputy Under Secretary of the Navy (Policy) OPSEC point of contact is 
LCDR Josh Segal.  He can be reached at joshua.e.segal@navy.mil.

8.   SECNAVINST 3070.2, signed 5 May 2016, shall be implemented immediately, 
and its guidance supersedes current service-level direction until revised 
policies are promulgated bringing them into compliance with current 
department level policy.

9.  Released by Ray Mabus, Secretary of the Navy.//

BT
#0001
NNNN
UNCLASSIFIED//
 

Google Translation Disclaimer

Guidance-Card-Icon Dept-Exclusive-Card-Icon