The Naval Operations Security Support Team

The NOST’s mission is to provide OPSEC support to the Department of the Navy in order to improve the warfighting effectiveness of the fleet forces. As the OPSEC element for the DoN, the NOST guides, assists, and assesses OPSEC programs throughout the Navy and Marine Corps, and develops OPSEC doctrine, training, and awareness for the DoN. The NOST improves the OPSEC posture of our U.S. Naval Forces by educating and training our Sailors, Marines, civilians, and family members.

Operations Security (OPSEC) is a systematic method used to identify, control, and protect critical information and subsequently analyze friendly actions associated with military operations and other activities. Ultimately, OPSEC is protecting your information and activities from your adversaries.

The Arleigh Burke-class guided-missile destroyer USS Spruance (DDG 111), top, transits alongside the Ticonderoga-class guided-missile cruiser USS Mobile Bay (CG 53). Mobile Bay is underway conducting routine operations as part of Carrier Strike Group (CSG) 3 in the U.S. Pacific Fleet area of operations.  U.S. Navy photo by Mass Communication Specialist 3rd Class Nick Bauer (Released)  181112-N-ER806-1019
An MH-60S Knight Hawk helicopter, assigned to Helicopter Sea Combat Squadron (HSC) 14, flies toward the Nimitz-class aircraft carrier USS John C. Stennis (CVN 74). John C. Stennis is underway conducting routine operations in the U.S. Pacific Fleet area of operations.  U.S. Navy photo by Mass Communication Specialist 3rd Class Connor D. Loessin (Released)  181109-N-YW238-1506
The littoral combat ship USS Freedom (LCS 1) transits alongside the aircraft carrier USS John C. Stennis (CVN 74). U.S. Navy ships are underway conducting an independent deployer certification exercise in the Southern California operating area. The exercise provides a multi-ship environment to train and certify independent deployers in surface warfare, air defense, maritime interception operations, command and control/information warfare, command, control, computers and combat systems intelligence and mine warfare.  U.S. Navy photo by Mass Communication Specialist Seaman Christopher Frost (Released)  150427-N-IK337-212
The Nimitz-class aircraft carrier USS John C. Stennis (CVN 74) transits the Pacific Ocean. John C. Stennis is underway conducting routine operations in the U.S. Pacific Fleet area of operations.  U.S. Navy photo by Mass Communication Specialist 3rd Class Connor D. Loessin (Released)  181109-N-YW238-1692

The OPSEC Process

Information about friendly (U.S., allied, and/or coalition) activities, intentions, capabilities, or limitations an adversary seeks in order to gain a military, political, diplomatic, economic, or technological advantage. Simply put, any information that the “bad guy” wants and needs to do us harm or allows them to gain an advantage over us.

A person, or group of people, whose objective differs with the friendly objective.

A weakness that the adversary can exploit.

A measure of the potential degree to which protected information is subject to loss through adversary exploitation. Basically, this is the likelihood your information will be collected and acted on.

Anything that effectively negates or mitigates an adversary’s ability to exploit vulnerabilities.

Navy News

USS Blue Ridge Arrives in Okinawa for Limited Port Call

U.S. 7th Fleet flagship USS Blue Ridge (LCC 19) and embarked 7th Fleet staff pulled into Okinawa, May 24, making the ship's first port visit in more than 70 days. Read More...

Crew of USS Gerald R. Ford Reflects on Fallen Service Members This Memorial Day

While the crew of USS Gerald R. Ford (CVN 78) works hard, steaming in the Atlantic Ocean for its fourth independent steaming event this year, Americans across the country celebrate Memorial Day, May 25. Read More...

Future USS Kansas City Arrives at San Diego Homeport

The next ship to be commissioned and carry the Kansas City name arrived at its homeport in San Diego, May 24. Read More...

  • Never bypass an opportunity to keep your mouth shut.

    MG Paul Menoher, Jr.
  • Intelligence is the exploitation of the other sides' OPSEC failures.

  • Samson slew 10,000 Philistines with the jawbone of an ass.
    OPSEC is jeopardized with the same weapon.

  • Great advantage is drawn from knowledge of your adversary,
    and when you know the measure of his intelligence and character,
    you can use it to play on his weaknesses.

    Frederick the Great
  • You can see a lot of things just by looking.

    Casey Stengle
  • The biggest obstacle of modern day OPSEC
    is the archaic mentality of the grandfathers of intelligence.

    SSG Robert Thomas
  • Things which matter most must never
    be at the mercy of things which matter least,

  • If common sense was common, everyone would have it.

  • Intelligence is the confirmation of information.

  • Thinking is the hardest work there is,
    which is probably the reason so few engage in it.

    Henry Ford

  • Dictionary

    All OPSEC terms & definitions can be found here

    Uncle Sam's OPSEC

    An OPSEC computer-based training course now available in Apple iTunes and Google Play APP stores; search Naval OPSEC

    Program Manager

    Assessment Procedures and Templates



    Briefs on OPSEC topics


    Frequently Asked Questions


    OPSEC policies and guidance for the DoD and DoN


    Where you can find links to other OPSEC Activities


    Click on the videos below to learn more about OPSEC and how it affects you, your family, and everyone you work with

    OPSEC Course

    The Navy 2-Day OPSEC Course is directed at OPSEC program managers and certifies them to conduct their duties. Courses are hosted in various locations on the East Coast and the West Coast and occasionally in the far-East and Europe. To register for a course on the East Coast or in Europe email ; to register for a course on the West Coast/Hawaii or in the Far-East email

    East Coast

    Register at

    West Coast

    Register at

    OPSEC by the numbers

    Attempted malicious computer infections

    180 per second

    Phishing Emails Sent

    1,700 per second

    Identities stolen

    0.5 per second

    New Malwares created

    10 per second