GovernmentFiles.ioDeclassified Intelligence Archive

NSA

OPERATIONS SECURITY

SEtftE'f 8P6KE(b) (3)-P.L. 86-36Operations Security Techniques:An Analysis of GIANT SCALE (U)~ Occasionally, quantitative methods -or operations research techniques, if you will - can beused effectively in attacking complex threat analysisproblems which confront the operations security (OP-SEC) community from time to time. This is the storyof one such case involving a threat pΒ·....
Declassified
Internal Periodicals & Publications

Timeline

Created
β€”
Released
β€”
Publication
β€”
Case number
β€”

Files

Download the original PDF or open the CIA Reading Room entry if available.

Sign in to save this dossier to your favorites. Log in

Ask AI

Sign in to ask questions about this document using AI.

Sign in

Discussion & Notes

Capture takeaways or see what other researchers found.

Sign in to start a private notebook for this dossier.

Sign in to add notes
Sign in to view the Intelligence Graph.

Metadata

Document #

β€”

Case #

β€”

Document Type

β€”

Collection

Internal Periodicals & Publications

Release Decision

β€”

Original Classification

β€”

Sequence

β€”

Pages

β€”

File Size

190.7 KB