Food Safety
search
Ask Food Safety AI
cart
facebook twitter linkedin
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Food Safety
  • NEWS
    • Latest News
    • White Papers
  • PRODUCTS
  • TOPICS
    • Contamination Control
    • Food Types
    • Management
    • Process Control
    • Regulatory
    • Sanitation
    • Supply Chain
    • Testing and Analysis
  • PODCAST
  • EXCLUSIVES
    • Food Safety Five Newsreel
    • eBooks
    • FSM Distinguished Service Award
    • Interactive Product Spotlights
    • Videos
  • BUYER'S GUIDE
  • MORE
    • ENEWSLETTER >
      • Archive Issues
      • Subscribe to eNews
    • Store
    • Sponsor Insights
    • ASK FSM AI
  • WEBINARS
  • FOOD SAFETY SUMMIT
  • EMAG
    • eMagazine
    • Archive Issues
    • Editorial Advisory Board
    • Contact
    • Advertise
  • SIGN UP!
ManagementFood Defense

Food and Agriculture Are Domains of War: Part 3

June 18, 2019

The first article in this series posited that, should global war break out, our food supply and agriculture would be domains of war (for example, some day China might challenge the U.S. militarily). The second part introduced the concept of “war games,” in which corporations could examine likely scenarios to gauge whether their defenses were robust enough to ward off potential threats. Because food corporations have been and currently are targeted by adversarial nations, it is important that you and your company start practicing “operational security” or “OPSEC,” the focus of this article.

The label “OPSEC” was first used in the Vietnam War, during “Operation Purple Dragon.” The U.S. Air Force had a problem—no matter where they flew, there always seemed to be a coordinated response of North Vietnamese missiles and anti-aircraft fire. Aircraft were lost and pilots killed. U.S. military personnel were perplexed by their own inability to surprise the enemy until they figured out that flight information was being exposed because they were filing it with international flight authorities. That gave North Vietnam legitimate access to U.S. military flight information. Once the problem was identified, flight-planning practices changed and fewer aircraft were lost.  

Still today, corporations, academia, small businesses, and individuals fall prey to adversaries by unknowingly giving them information. Simply throwing a credit card offer with your name on it in the trash can be labeled poor OPSEC. Most people don’t have the mindset to realize that such a small, seemingly meaningless choice can make them a victim.  
When adversaries pass you by as a potential victim, they likely choose someone else instead. This should not make you feel guilty—your primary responsibility is to protect yourself, your family, your company, and your coworkers. The adversary is responsible for his or her actions, not you. The goal of OPSEC is to protect your information so it can’t be used against you.

The purpose of OPSEC, in military terms, is to identify an operation’s or activity’s vulnerabilities. This is achieved by thoroughly examining each aspect of an operation or activity to identify any OPSEC indicators or vulnerabilities that could reveal critical information. These indicators or vulnerabilities are then compared to what is known about an adversary’s intelligence collection capabilities. A vulnerability exists when the adversary is capable of collecting critical information, correctly analyzing it, and then taking timely action. The adversary can then exploit that vulnerability to obtain an advantage.

Social Media
Social media can be a wonderful way to remained connected to distant friends and family. It can also be dangerous, because what you put on social media remains forever. Adversaries can exploit this information, even turning   seemingly benign posts into psychological weapons.

For example, in a recent Facebook post, an acquaintance posted a picture of her young children on a swing set, commenting on how bold they were. She also commented that, as a child, she had been afraid of swinging. The last comment could be exploited by offering an adversary insight into the mother’s psychology. Was she still timid? Probably, because otherwise she might not have mentioned her fear. Adversarial translation: This individual is easily frightened. Fear tactics would be used when they target her.

Now, suppose this person has access to a computer system or intellectual property the adversary wants to target. Individuals are always the weakest links in any corporation and, therefore, will be the first targets. In particular, decision makers and those who work for and with decision makers in the government, military, and business are highly targeted. Nation states are not the only ones using social media to exploit individuals.

Gangs, criminal organizations, and terrorist groups also use social media to foster membership, communicate among followers and non-followers, and obtain ideological and financial support. This exploitation of social media has serious political, cultural, and societal repercussions that go beyond stolen identities, hacked systems, or loss of productivity, note the authors of Social Media Exploitation by Covert Networks: A Case Study of ISIS. “There are literal life-and-death consequences of the actions of the groups behind these covert networks,” they go on to say.[1]

Here are some ways to prevent social media exploitation:

• Remove yourself completely from social media. Admittedly, this move is one of the most proactive on threat response spectrum. Even so, most decision makers should seriously consider it. Alternatively, become very measured in what you post. Think before you post, and always examine it from an adversary’s perspective. Ask yourself, “Can an adversary exploit this post? If the answer is yes—delete it!  

• Identify and start protecting your critical information. Critical information, also known as your collective “core secrets,” is any information about your company’s personnel, processes, systems, activities, or capabilities or capabilities that could be harmful to your company if discovered by either a competitor or actual adversary (sometimes one and the same).  

• Analyze your threats. It is critical that you have a clear understanding of both your threats and threat actors. These elements are different but closely related. Developing protective measures requires constant adjustment as the threat actors and their capabilities evolve.  

• Identify and analyze your vulnerabilities. Vulnerabilities are the characteristics of your company that could precipitate degradation or failure if they were targeted by a hostile threat. Look at your operations through the lens of the adversary, and then prioritize your true vulnerabilities. Don’t waste time, effort, or money on hypothetical vulnerabilities.

• Assess your risk. OPSEC is dependent on risk assessment, which involves comparing threats to vulnerabilities. If a risk assessment indicates that company vulnerability is high, and there is also a high probability that adversaries pose a threat, then the risk of potential exploitation is high. Rapidly implement additional protective measures. Always plan for the most capable adversary.

• Develop appropriate countermeasures. Countermeasures protect your company’s activities and information. “Ideally, the chosen countermeasures eliminate the adversary threat, the vulnerabilities that can be exploited by the adversary, or the utility of the information.”[2] Design and implement appropriate countermeasures using standard business practices, including a cost/benefit analysis.

• Prioritize OPSEC training for all personnel. Most OPSEC training material is oriented toward the military. However, applying military training materials to your own company can involve simply substituting “Military Operations” with your company name (e.g., “Acme Food Company Operations”). The chart shows some additional equivalency examples:

       
Additionally, practical military-oriented OPSEC resources are available.[3] Training through companies that specialize in OPSEC is also an option, but can be expensive.

Moving Forward         
Any food or agricultural company is capable of identifying its most sensitive information. Think in practical terms: What information do you need to protect?  Who are your company’s adversaries? Nation states are your highest level and most competent of adversaries, and criminal organizations are next. Guard your company’s critical secrets, and you guard your company, your competitive edge, your market share, and your bottom line. Your corporate survival is dependent upon vigilant OPSEC.

Robert A. Norton, Ph.D., is chair of the Auburn University Food System Institute’s Food and Water Defense Working Group (aufsi.auburn.edu/fooddefense). He is a long-time consultant to the U.S. military, federal, and state law enforcement agencies. His blog, Bob Norton’s Food Defense Blog, can be found at aufsi.auburn.edu/fooddefense/blog/. He can be reached at nortora@auburn.edu or by phone at 334.844.7562.

Disclaimer: Dr. Norton and production of this article were supported by the Alabama Agricultural Experiment Stations and the Hatch program of the National Institute of Food and Agriculture (NIFA), U.S. Department of Agriculture (USDA). The article represents the personal opinion of Dr. Norton and does not reflect official policy or statutory related opinion of the federal government, NIFA or USDA.

References
1. aisel.aisnet.org/cgi/viewcontent.cgi?article=4009&context=cais.
2. fas.org/irp/nsa/ioss/threat96/part01.htm.
3. jfsc.ndu.edu/Portals/72/Documents/JC2IOS/Additional_Reading/1C2_JP_3-13-3_OPSEC_Process.pdf.


Author(s): Robert A. Norton, Ph.D.

Looking for quick answers on food safety topics?
Try Ask FSM, our new smart AI search tool.
Ask FSM →

Share This Story

Recommended Content

JOIN TODAY
to unlock your recommendations.

Already have an account? Sign In

  • people holding baby chicks

    Serovar Differences Matter: Utility of Deep Serotyping in Broiler Production and Processing

    This article discusses the significance of Salmonella in...
    Contamination Control
    By: Nikki Shariat Ph.D.
  • woman washing hands

    Building a Culture of Hygiene in the Food Processing Plant

    Everyone entering a food processing facility needs to...
    Management
    By: Richard F. Stier, M.S.
  • graphical representation of earth over dirt

    Climate Change and Emerging Risks to Food Safety: Building Climate Resilience

    This article examines the multifaceted threats to food...
    Risk Assessment
    By: Maria Cristina Tirado Ph.D., D.V.M. and Shamini Albert Raj M.A.
Manage My Account
  • eMagazine Subscription
  • Subscribe to eNewsletter
  • Manage My Preferences
  • Website Registration
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Food Safety Magazine audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Food Safety Magazine or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Salmonella bacteria
    Sponsored byThermoFisher

    Food Microbiology Testing Methods: Salmonella species

  • a diagram explaining indicator organisms
    Sponsored byHygiena

    How Proactive Listeria Testing Helps Prevent Six- and Seven-Figure Recalls

  • woman grocery shopping
    Sponsored byCorbion

    Designing Safety Into Every Bite: Proactive Risk Mitigation for Refrigerated Foods

Popular Stories

newborn earing from bottle

Infants Nationwide Hospitalized With Botulism After Consuming ByHeart Formula

researcher dropping liquid in petri dishes

First-of-its-Kind Study Shows How Listeria Strains Evolve Into Strong Biofilm Formers

us capitol

MAHA Pushback Kills ‘Big Food’-Aligned Legislative Effort to Stop State Food Laws

Events

November 18, 2025

Dry Sanitation and Cleaning Techniques for Facilities and Equipment

Live: November 18, 2025 at 12:00 pm EDT: From this webinar, attendees will learn best practices employed by dry/low-moisture food processors for dry sanitation and equipment cleaning.

November 20, 2025

New U.S. Additive Bans: How to Prepare and Protect Your Brand

Live: November 20, 2025 at 11:00 am EST: From this webinar, attendees will learn the impact of ingredient restrictions on product development, sourcing, labeling, and market access.

December 4, 2025

Beyond Detection: How Integrated PCR Diagnostics Strengthen Food Safety in RTE Manufacturing

Live: December 4, 2025 at 2:00 pm EST: From this webinar, attendees will learn best practices for prevention of FM contamination at the corporate and plant levels.

View All

Products

Global Food Safety Microbial Interventions and Molecular Advancements

Global Food Safety Microbial Interventions and Molecular Advancements

See More Products

Related Articles

  • Food and Agriculture Are Domains of War: Part 5

    See More
  • Food and Agriculture Are Domains of War: Part 4

    See More
  • Food and Agriculture Are Domains of War: Part 1

    See More

Related Products

See More Products
  • 9781498721776.jpg

    Handbook of Food Processing: Food Safety, Quality, and Manufacturing Processes

  • 1444333348.jpg

    Handbook of Food Safety Engineering

  • 1119053595.jpg

    Food Safety for the 21st Century: Managing HACCP and Food Safety throughout the Global Supply Chain, 2E

See More Products

Events

View AllSubmit An Event
  • February 26, 2025

    Transforming Food Safety Through Digitalization and AI—Are You Ready?

    On Demand: This webinar will cover the role of digitalization in addressing food safety challenges and the potential of AI in food safety.
View AllSubmit An Event

Related Directories

  • ETQ, part of Hexagon

    ETQ Reliance is the world’s most flexible, powerful & easy-to-use advanced Quality Management System. Automate & standardize all aspects of quality, from document control, training, CAPA, audits, supply chain & more. Benefit from improved compliance, enhanced reputation, reduced costs, speed to market & visibility into your supply chain.
  • Saldesia "Goddess of Food Safety"

    Saldesia is a distributor of Food Safety products and solutions. We are focused on supplying the Quality, Production, Safety and Sanitation departments. Product lines include Color Coded, Metal Detectable, Antimicrobial Flooring & Mats, Workwear, Footwear, Spray Nozzles, and more!
×

Never miss the latest news and trends driving the food safety industry

eNewsletter | Website | eMagazine

JOIN TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Directories
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • Instagram
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing