SlideShare une entreprise Scribd logo
1  sur  16
Provided by OSPA (www.opsecprofessionals.org) OPSEC for Families
[object Object],[object Object]
What is OPSEC?
What OPSEC is: ,[object Object],[object Object],[object Object],[object Object]
What OPSEC is NOT: ,[object Object]
Every piece of information is like a piece of a puzzle. The type of vehicle your soldier drives might not seem like important intelligence, but when combined with other pieces of information, such as location, unit name, unit structure and mission, an enemy can begin to build a profile of the organization.
This manual was captured in a home raid in Iraq, and is only one of countless copies. According to this manual, 80% of military intelligence can be collected from legal sources, including websites, blogs, newspapers and online.
Who would try to get information from a spouse? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Readers of your blog or forum posting might appear very friendly. They might claim to be stationed near your spouse, or to have a loved one deployed as well. No matter the technique, the underlying goal may be to make you comfortable enough to reveal things that you otherwise would not.
What information are they looking for? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
If you were an enemy, could you use this picture? Perception is OPSEC’s worst enemy. In reality, these two Iraqis were caught allegedly looting gasoline from a burning building, and the 12 year old pictured was quickly released. No matter how you describe the picture on your personal website or blog, the picture can often be used against the US! It’s not that you should avoid the web altogether. You’re going to be proud of your spouse, and will probably want to talk to others about them. It is important, though, to understand the risks associated with any public medium and adjust accordingly.
What you can do ,[object Object],[object Object],[object Object],[object Object]
What you can do ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A note on telephones ,[object Object],[object Object]
The bottom line ,[object Object]
Questions?

Contenu connexe

Tendances

The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookMITRE ATT&CK
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!MITRE ATT&CK
 
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CKATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CKMITRE ATT&CK
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Cybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdfCybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdfHamzaAfzal61
 
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and ResearchUsing MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and ResearchMITRE - ATT&CKcon
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...MITRE ATT&CK
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxFwem
 
Addressing the OWASP Mobile Security Threats using Xamarin
Addressing the OWASP Mobile Security Threats using XamarinAddressing the OWASP Mobile Security Threats using Xamarin
Addressing the OWASP Mobile Security Threats using XamarinAlec Tucker
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesLearningwithRayYT
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarRaghunath G
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }AkshayJha40
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationDr. Lydia Kostopoulos
 

Tendances (20)

The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT Playbook
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!
 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CKATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Cybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdfCybersecurity for Everyone Course. Final Project OilRig.pdf
Cybersecurity for Everyone Course. Final Project OilRig.pdf
 
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and ResearchUsing MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Wannacry
WannacryWannacry
Wannacry
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Addressing the OWASP Mobile Security Threats using Xamarin
Addressing the OWASP Mobile Security Threats using XamarinAddressing the OWASP Mobile Security Threats using Xamarin
Addressing the OWASP Mobile Security Threats using Xamarin
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security Presentation
 

En vedette

Opsec for families
Opsec for familiesOpsec for families
Opsec for familiesLindy Kyzer
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackersgrugq
 
Global privacy research
Global privacy researchGlobal privacy research
Global privacy researchbbw1984
 
Catch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingCatch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingJan Seidl
 
NSA-Proof communications (mostly)
NSA-Proof communications (mostly)NSA-Proof communications (mostly)
NSA-Proof communications (mostly)Jan Seidl
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentationguest019923
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Naval OPSEC
 
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsReducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsJan Seidl
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineFtlwood Families
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
OPSEC / PERSEC
OPSEC / PERSECOPSEC / PERSEC
OPSEC / PERSECRmd Frg
 
Social Media - Privacy and Settings
Social Media -  Privacy and SettingsSocial Media -  Privacy and Settings
Social Media - Privacy and SettingsVanguard Leadership
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015Naval OPSEC
 
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...Puppet
 
OPSEC Vulnerabilities And Indicators
OPSEC Vulnerabilities And IndicatorsOPSEC Vulnerabilities And Indicators
OPSEC Vulnerabilities And IndicatorsDepartment of Defense
 

En vedette (20)

Opsec for families
Opsec for familiesOpsec for families
Opsec for families
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 
Global privacy research
Global privacy researchGlobal privacy research
Global privacy research
 
OPSEC Case Study - Bush In Iraq
OPSEC Case Study - Bush In IraqOPSEC Case Study - Bush In Iraq
OPSEC Case Study - Bush In Iraq
 
Catch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingCatch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hacking
 
NSA-Proof communications (mostly)
NSA-Proof communications (mostly)NSA-Proof communications (mostly)
NSA-Proof communications (mostly)
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentation
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)
 
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsReducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutions
 
Conley Group Opsec Presentation
Conley Group Opsec PresentationConley Group Opsec Presentation
Conley Group Opsec Presentation
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_online
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
OPSEC / PERSEC
OPSEC / PERSECOPSEC / PERSEC
OPSEC / PERSEC
 
Social Media - Privacy and Settings
Social Media -  Privacy and SettingsSocial Media -  Privacy and Settings
Social Media - Privacy and Settings
 
Personal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy WorkshopPersonal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy Workshop
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015
 
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
 
Invasive species commanders_guide
Invasive species commanders_guideInvasive species commanders_guide
Invasive species commanders_guide
 
OPSEC Vulnerabilities And Indicators
OPSEC Vulnerabilities And IndicatorsOPSEC Vulnerabilities And Indicators
OPSEC Vulnerabilities And Indicators
 

Similaire à OPSEC for Families

Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishingecarrow
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
150 words agree or disagreeOne terrorist tactic, and its not l.docx
150 words agree or disagreeOne terrorist tactic, and its not l.docx150 words agree or disagreeOne terrorist tactic, and its not l.docx
150 words agree or disagreeOne terrorist tactic, and its not l.docxdrennanmicah
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevarajessica97
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonMateus BahiaRicardo
 
Gloria flores
Gloria floresGloria flores
Gloria floresyaya700
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011larrylieb
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
250 word discussion response james wk 7.docx
250 word discussion response james wk 7.docx250 word discussion response james wk 7.docx
250 word discussion response james wk 7.docxwrite12
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaBen Woelk, CISSP, CPTC
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threatsejhilbert
 
CIS502 discussion post responses.Disaster RecoveryDisaster rec.docx
CIS502 discussion post responses.Disaster RecoveryDisaster rec.docxCIS502 discussion post responses.Disaster RecoveryDisaster rec.docx
CIS502 discussion post responses.Disaster RecoveryDisaster rec.docxmccormicknadine86
 
Information Architecture 101
Information Architecture 101Information Architecture 101
Information Architecture 101Christina Wodtke
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 

Similaire à OPSEC for Families (20)

UPAR 2017 10 Social Media
UPAR 2017 10 Social MediaUPAR 2017 10 Social Media
UPAR 2017 10 Social Media
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
150 words agree or disagreeOne terrorist tactic, and its not l.docx
150 words agree or disagreeOne terrorist tactic, and its not l.docx150 words agree or disagreeOne terrorist tactic, and its not l.docx
150 words agree or disagreeOne terrorist tactic, and its not l.docx
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevara
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of non
 
Users guide
Users guideUsers guide
Users guide
 
Gloria flores
Gloria floresGloria flores
Gloria flores
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Cyber Readiness and Hygiene for Government Contractors
Cyber Readiness and Hygiene for Government ContractorsCyber Readiness and Hygiene for Government Contractors
Cyber Readiness and Hygiene for Government Contractors
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
250 word discussion response james wk 7.docx
250 word discussion response james wk 7.docx250 word discussion response james wk 7.docx
250 word discussion response james wk 7.docx
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
CIS502 discussion post responses.Disaster RecoveryDisaster rec.docx
CIS502 discussion post responses.Disaster RecoveryDisaster rec.docxCIS502 discussion post responses.Disaster RecoveryDisaster rec.docx
CIS502 discussion post responses.Disaster RecoveryDisaster rec.docx
 
Information Architecture 101
Information Architecture 101Information Architecture 101
Information Architecture 101
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 

Plus de Department of Defense

Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Department of Defense
 
Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Department of Defense
 
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...Department of Defense
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Creative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesCreative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesDepartment of Defense
 

Plus de Department of Defense (20)

DoD Cyber Strategy
DoD Cyber StrategyDoD Cyber Strategy
DoD Cyber Strategy
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011
 
National Security Space Strategy
National Security Space StrategyNational Security Space Strategy
National Security Space Strategy
 
Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011
 
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
 
Social Media Overview
Social Media OverviewSocial Media Overview
Social Media Overview
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
How To Tweet
How To TweetHow To Tweet
How To Tweet
 
Getting Started With Twitter
Getting Started With TwitterGetting Started With Twitter
Getting Started With Twitter
 
Tips And Tools For YouTube
Tips And Tools For YouTubeTips And Tools For YouTube
Tips And Tools For YouTube
 
Customizing Your YouTube Channel
Customizing Your YouTube ChannelCustomizing Your YouTube Channel
Customizing Your YouTube Channel
 
YouTube Uses In The Field
YouTube Uses In The FieldYouTube Uses In The Field
YouTube Uses In The Field
 
Army Official Social Media Policy
Army Official Social Media PolicyArmy Official Social Media Policy
Army Official Social Media Policy
 
ONR Innovation Newsletter
ONR Innovation NewsletterONR Innovation Newsletter
ONR Innovation Newsletter
 
Getting Started With You Tube
Getting Started With You TubeGetting Started With You Tube
Getting Started With You Tube
 
Creative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesCreative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook Pages
 
Designing Your Facebook Page
Designing Your Facebook Page Designing Your Facebook Page
Designing Your Facebook Page
 
Getting Started With Facebook
Getting Started With Facebook Getting Started With Facebook
Getting Started With Facebook
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 

Dernier

Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 

Dernier (20)

Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 

OPSEC for Families

  • 1. Provided by OSPA (www.opsecprofessionals.org) OPSEC for Families
  • 2.
  • 4.
  • 5.
  • 6. Every piece of information is like a piece of a puzzle. The type of vehicle your soldier drives might not seem like important intelligence, but when combined with other pieces of information, such as location, unit name, unit structure and mission, an enemy can begin to build a profile of the organization.
  • 7. This manual was captured in a home raid in Iraq, and is only one of countless copies. According to this manual, 80% of military intelligence can be collected from legal sources, including websites, blogs, newspapers and online.
  • 8.
  • 9. Readers of your blog or forum posting might appear very friendly. They might claim to be stationed near your spouse, or to have a loved one deployed as well. No matter the technique, the underlying goal may be to make you comfortable enough to reveal things that you otherwise would not.
  • 10.
  • 11. If you were an enemy, could you use this picture? Perception is OPSEC’s worst enemy. In reality, these two Iraqis were caught allegedly looting gasoline from a burning building, and the 12 year old pictured was quickly released. No matter how you describe the picture on your personal website or blog, the picture can often be used against the US! It’s not that you should avoid the web altogether. You’re going to be proud of your spouse, and will probably want to talk to others about them. It is important, though, to understand the risks associated with any public medium and adjust accordingly.
  • 12.
  • 13.
  • 14.
  • 15.

Notes de l'éditeur

  1. The military provides certain training and equipment designed to keep your loved one safe. You may not know it, but you play a critical role in your loved one’s safety just by protecting what you know about their day to day and operations. This is known as OPSEC.
  2. Operations Security (or OPSEC), for a family member, is simply denying any enemies access to information. The information that you have ALREADY, such as mission, vehicle capabilities, location and tactics are considered intelligence by enemies of the US. By not allowing the information that you have to get out, you help make sure that your soldier can maintain the upper hand.
  3. Every piece of information is like a piece of a puzzle. The type of vehicle your soldier drives might not seem like important intelligence, but when combined with other pieces of information, such as location, unit name, unit structure and mission, an enemy can begin to build a profile of the organization.
  4. This manual was captured in a home raid in Iraq, and is only one of countless copies. According to this manual, 80% of military intelligence can be collected from legal sources, including websites, blogs, newspapers and online.
  5. Military spouses have been target of attempts to gain intelligence through active means, such as fraud, overhearing public conversations, computer hacking or false friendships, as well as passive means such as monitoring a blog, military-spouse themed chat rooms and personal websites.
  6. “ On the internet, nobody knows you’re a dog” Readers of your blog or forum posting might appear very friendly. They might claim to be stationed near your spouse, or to have a loved one deployed as well. No matter the technique, the underlying goal may be to make you comfortable enough to reveal things that you otherwise would not.
  7. Equipment issues: In OIF III, a well meaning spouse sent a letter that got leaked detailing vehicle armor, unit mission and specific vehicle capabilities on mission. The unit responded appropriately before the information became a threat, but it could have been far worse. Specific location of unit: It’s okay to say that the unit is in Iraq or Kuwait, for instance, it is not okay to name the FOB or city.
  8. If you were an enemy, could you use this picture? Perception is OPSEC’s worst enemy. In reality, these two Iraqis were caught allegedly looting gasoline from a burning building, and the 12 year old pictured was quickly released. No matter how you describe the picture on your personal website or blog, the picture can often be used against the US! It’s not that you should avoid the web altogether. You’re going to be proud of your spouse, and will probably want to talk to others about them. It is important, though, to understand the risks associated with any public medium and adjust accordingly.
  9. Ask yourself: Who is the adversary? What does that person/organization need to know about my organization? What can he do with it? How can it affect the mission? It’s not just what the adversary can learn from one site, but what can be pieced together from many sites.