SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Social Media Roundup

OPSEC and Safe Social Networking
Social Media Roundup


                                 Agenda
This week’s Social Media Roundup takes an in-depth look at OPSEC considerations
for social media use. Maintaining OPSEC should be a primary concern for everyone in
the Army Family, whether you’re on an installation, deployed or on Facebook.

   Introduction
   Did you know?
   Social media access
   What not to post
   Privacy settings
   Geotagging
   Social Media OPSEC for units
   Social media concerns for Families and Family Readiness Groups
   Social media concerns for Army children
   Countermeasures
   Resources
Social Media Roundup



Safe social networking
   Social media has become a big part of our
    lives. Social media can help people and
    Army organizations share information. It also
    helps Soldiers, family members and Army
    civilians to stay connected to loved ones.
   As a culture, we depend on social media, but
    social media use can be extremely
    dangerous if you’re not careful.
   Do you know what information you can post
    about your job? Did you know people can
    use social media to collect information and
    steal your identity? Did you know you can be
    at risk even if you don’t use social media.
   Operations security (OPSEC) and personal
    privacy concerns should be paramount when
    using social media.
Social Media Roundup


    Did you know?
    A U.S. Government official on sensitive travel to Iraq created a security risk for
     himself and others by Tweeting his location and activities every few hours.
    A Family on vacation kept friends up-to-date via online profiles; their home was
     burglarized while they were away.
    New computer viruses and Trojans that successfully target information on social
     networking sites are on the rise.
    Information on social networking sites has led to people losing job offers, getting
     fired and even being arrested.
    Social networking sites have become a haven for identity thieves and con artists
     trying to use your information against you.
    Several kidnapping, rape and murder cases were linked to social networking sites
     where the victims first connected with their attackers.
    According to the Al Qaeda Handbook, terrorists search online for data about
     “Government personnel and all matters related to them (residence, work place,
     times of leaving and returning, children and places visited.)”
Source: Interagency OPSEC Support Staff
Social Media Roundup



Daily social media interactions
   Be cautious when accepting friend requests and interacting with people online. You
    should never accept a friend request from someone you do not know, even if they
    know a friend of yours. For more on this, check out this article about the Robin
    Sage Experiment: “Fictitious femme fatale fooled cybersecurity” http://goo.gl/Ocf7e
   Don’t share information that you don’t want to become public. Be careful about what
    you post about yourself on social media platforms. Once you put something out
    there, you can’t control where it goes. Someone might target you based simply
    because you work in the DoD. Be cautious when listing your job, military
    organization, education and contact information.
   Providing too much information in your profile can leave you exposed to people who
    want to steal your identity or steal sensitive operational information.




                        Pvt. Creeper
Social Media Roundup



What not to post
   When using Facebook and other social media platforms, do not post personally
    identifiable information and any information that can damage Army operations.
   Think about what you’re posting before hitting share. Many times, you can avoid
    releasing sensitive information by simply rephrasing your social media post.
   If you aren’t comfortable placing the same information on a sign in your front yard,
    don’t put it online.
Social Media Roundup

                                                  Facebook
Privacy settings
   Understanding what you can and cannot
    post on social media platforms goes a
    long way in protecting yourself online,
    but more can be done by adjusting your
    privacy settings on social media sites.
   Facebook’s default privacy settings are
    often public, but Facebook provides
    various setting options that help
    Facebook users adjust privacy settings.
   Twitter allows users to keep their Tweets
    private and Flickr gives users the option     On the top are Facebook’s sharing
                                                  recommendations, on the bottom are the Army’s
    of keeping photos private. The settings       sharing recommendations. For more information
    are easily accessible, the trick is setting   about protecting yourself on Facebook, check out
                                                  this Social Media Roundup: http://goo.gl/2WAlu
    them to meet your privacy needs. Similar
                                                  Twitter
    privacy settings can be found on other
    social media sites like Myspace and
    LinkedIn.
Social Media Roundup



Geotagging safety
•   Geotagging is the process of adding
    geographical identification to photographs,
    video, websites and SMS messages. It is the
    equivalent of adding a 10-digit grid
    coordinate to everything you post on the
    internet.
•   Geotags are automatically embedded in
    some pictures taken with smartphones.
    Many people are unaware of the fact that the
    photos they take with their smartphones and
    load to the Internet have been geotagged.
•   Photos posted to photo sharing sites like
    Flickr and Picasa can also be tagged with
    location, but it is not an automatic function.
•   For more information about geotagging,
    check out this website: http://goo.gl/DmJoq
Social Media Roundup


Geotagging safety
    Location-based social networking is quickly growing in popularity. A variety of
     applications are capitalizing on users’ desire to broadcast their geographic location.
    The increased popularity of these applications is changing the way we as a digital
     culture view security and privacy on an individual level. These changes in
     perception are also creating OPSEC concerns on an Army level.
    Deployed Soldiers, or Soldiers conducting operations in classified areas should not
     use location-based social networking services. These services will bring the enemy
     right to the Army’s doorstep.
    Want to avoid giving away location? Disable the GPS function on your smartphone.
     For instructions on how to do that, check out this website: http://goo.gl/IAmsY




    For more information about geotagging safety, check
    out this Social Media Roundup: http://goo.gl/dyIjB
Social Media Roundup



Social media OPSEC for units
   Protecting OPSEC goes beyond personal use of social media. Hundreds of Army
    organizations use social media to put out information, so it’s important social media
    managers keep the checklist below in mind during organizational social media use.
Social Media Roundup


Social media OPSEC concerns for families and
Family Readiness Groups      Security items to consider
   Social media helps Family Readiness         • Take a close look at all privacy settings. Set
    Groups and Army family members stay         security options to allow visibility to “friends only.”
                                                • Do not reveal sensitive information about yourself
    connected, but OPSEC should always be
                                                such as schedules and event locations.
    the primary concern.                        • Ask, “What could the wrong person do with this
   Family Readiness Groups, Army spouses       information?” and “Could it compromise the safety
    and Army Family members need to know        of myself, my family or my unit?”
                                                • Geotagging is a feature that reveals your location
    that posting sensitive information can be
                                                to other people within your network. Consider
    detrimental to Soldier safety.              turning off the GPS function of your smartphone.
   Ensure that information posted online has   • Closely review photos before they go online.

    no significant value to the enemy. Always   Make sure they do not give away sensitive
                                                information which could be dangerous if released.
    assume that the enemy is reading every
                                                • Make sure to talk to family about operations
    post made to a social media platform.       security and what can and cannot be posted.
   Even seemingly innocent posts about a       • Videos can go viral quickly, make sure they don’t
    family member’s deployment or               give away sensitive information.
    redeployment date can put them at risk.
Social Media Roundup



Social media concerns for Army children
                      What is the best way to protect your kids
                       online? Talk to them. Research suggests
                       that when children want important
                       information, most rely on their parents.
                      The important thing is to start the
                       education early. Talk to your children
                       about online risks and make sure you
                       create an honest and open environment.
                      Some social media sites like Facebook,
                       provide family safety resources and tools
                       for reporting issues: http://goo.gl/sLBym
                      Make sure you check out
                       www.Onguardonline.com to find more
                       resources that will help protect your
                       family and yourself online.
Social Media Roundup



Countermeasures
   These tips will help you protect critical information while using social media

   Follow computer security guidelines:              Keep your password secure: Use
    Adversaries prefer to go after easy targets.       different, strong passwords for each online
    Keep your computer security up-to-date and         account. Never give your password away.
    make yourself a hard target.                      Don’t depend on the social media site for
   Never login from risky locations: Public           confidentiality: Even social media sites
    social networking sites generally do not           that aren’t open and public by design can
    have secure login available. If you login          become so due to hacking, security errors
    from a hotel, cyber-café or an airport             and poor data management practices. In
    hotspot, particularly ones in foreign              some cases, the site terms of service
    countries, your name and password can be           explicity claim ownership of all your posted
    captured at any time.                              content.
   Modify your search profile: Do a search           Treat links and files carefully: Social
    for yourself and if too much data comes up,        engineers and hackers post links in
    you should consider adjusting your settings.       comments and try to trick you into
                                                       downloading an “update,” “security patch”
                                                       or “game.”
Social Media Roundup



Countermeasures (cont.)
   These tips will help you protect critical information while using social media

   Don’t trust add-ons: Plugins, games and           Review your friends profiles: The photos
    applications are often written by other            or information they post about you may be a
    users, not the social media sites                  problem.
    themselves. The authors can easily gain           Control “friend” access: Verify a “friend”
    access to your data once you install them.         request by phone or other means before
   Don’t post critical information: If you            allowing access. Group “friends” (e.g., real
    don’t want it public, don’t post it. Search        life, co-workers, strangers, etc.) and control
    engines make it easy for adversaries to find       access permissions based on the groups.
    what they’re interested in. Once information
    is online, it’s there forever.
Social Media Roundup



OPSEC resources
   OPSEC resources
        Interagency OPSEC Support Staff: www.ioss.gov
        Anti-Phishing Phil: http://goo.gl/ZFkY3
        OnGuard Online: www.onguardonline.gov
   Social media training: http://goo.gl/AqmE1
   Social Media Roundups
        9 Critical Steps to Protecting Yourself on Facebook: http://goo.gl/igGzN
        Geotags and Location-based Social Networking: http://goo.gl/wqKwZ
        Social Media For Family Readiness Groups: http://goo.gl/rS88l
   Army Slideshare site: http://goo.gl/cJM9T
Social Media Roundup



                                                   Contact information
Have questions? Please feel free to
reach out to us at the Online and
Social Media Division
Email:
Ocpa.osmd@us.army.mil

To review and download past editions of the
Social Media Roundup, visit our Slideshare site
at: http://www.slideshare.net/usarmysocialmedia.
All Social Media Roundups are authorized to be
distributed to a broader audience.



4/20/2011
OFFICE OF THE CHIEF OF PUBLIC AFFAIRS
PENTAGON

Contenu connexe

Tendances

Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networksprofesorjulioperez
 
Will you accept love in a technology-dependent society?
Will you accept love in a technology-dependent society?Will you accept love in a technology-dependent society?
Will you accept love in a technology-dependent society?katherinegregs
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPSmicaja
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNuttMcNutt
 
Secure social networking
Secure social networkingSecure social networking
Secure social networkingOsaid To'meh
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNorth Texas Chapter of the ISSA
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The UglyDr. Joel Evans
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
Social Media Privacy Concerns
Social Media Privacy ConcernsSocial Media Privacy Concerns
Social Media Privacy ConcernsMichael McDermott
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentationahazley
 
Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021Mark Kor
 
Cyber Safety from a Teacher's Perspective2
Cyber Safety from a Teacher's Perspective2Cyber Safety from a Teacher's Perspective2
Cyber Safety from a Teacher's Perspective2Ron Reyer, Jr.
 
UMAR YAHAYA
UMAR YAHAYAUMAR YAHAYA
UMAR YAHAYAUmar Zai
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safetyguestd5e1d2
 
Lower School Social Media: Session #1
Lower School Social Media: Session #1Lower School Social Media: Session #1
Lower School Social Media: Session #1meganhowardatwalker
 

Tendances (18)

Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Will you accept love in a technology-dependent society?
Will you accept love in a technology-dependent society?Will you accept love in a technology-dependent society?
Will you accept love in a technology-dependent society?
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPS
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNutt
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Social Media Spring Cleaning
Social Media Spring CleaningSocial Media Spring Cleaning
Social Media Spring Cleaning
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
Social media security challenges
Social media security challengesSocial media security challenges
Social media security challenges
 
Social Media Privacy Concerns
Social Media Privacy ConcernsSocial Media Privacy Concerns
Social Media Privacy Concerns
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentation
 
Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021
 
Cyber Safety from a Teacher's Perspective2
Cyber Safety from a Teacher's Perspective2Cyber Safety from a Teacher's Perspective2
Cyber Safety from a Teacher's Perspective2
 
UMAR YAHAYA
UMAR YAHAYAUMAR YAHAYA
UMAR YAHAYA
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
Lower School Social Media: Session #1
Lower School Social Media: Session #1Lower School Social Media: Session #1
Lower School Social Media: Session #1
 

En vedette

OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMENNaval OPSEC
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineFtlwood Families
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackersgrugq
 

En vedette (6)

Conley Group Opsec Presentation
Conley Group Opsec PresentationConley Group Opsec Presentation
Conley Group Opsec Presentation
 
Analogic Opsec 101
Analogic Opsec 101Analogic Opsec 101
Analogic Opsec 101
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_online
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 

Similaire à Social Media Safety Tips for the Army Community

Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
FRG Social Media Training Slides
FRG Social Media Training Slides FRG Social Media Training Slides
FRG Social Media Training Slides Noel Waterman
 
Social network and digital security
Social network and digital securitySocial network and digital security
Social network and digital securityMohammadBanjar
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Typeset
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Mining Oil and Gas Jobs
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social MediaDilna DV
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safeTSageer
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safeTSageer
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safeTSageer
 
Social Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietySocial Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietyMining Oil and Gas Jobs
 
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...Typeset
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550Liberteks
 

Similaire à Social Media Safety Tips for the Army Community (20)

Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
You Sure That's Secure?
You Sure That's Secure?You Sure That's Secure?
You Sure That's Secure?
 
FRG Social Media Training Slides
FRG Social Media Training Slides FRG Social Media Training Slides
FRG Social Media Training Slides
 
Sep 16 2010 safe and responsible personal use of social media
Sep 16 2010 safe and responsible personal use of social mediaSep 16 2010 safe and responsible personal use of social media
Sep 16 2010 safe and responsible personal use of social media
 
Social network and digital security
Social network and digital securitySocial network and digital security
Social network and digital security
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
UPAR 2017 10 Social Media
UPAR 2017 10 Social MediaUPAR 2017 10 Social Media
UPAR 2017 10 Social Media
 
Social Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietySocial Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer Society
 
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
Connecting Online
Connecting OnlineConnecting Online
Connecting Online
 

Plus de Fort Rucker FRSA

Plus de Fort Rucker FRSA (20)

Salute to the troops
Salute to the troopsSalute to the troops
Salute to the troops
 
Salute to the troops
Salute to the troopsSalute to the troops
Salute to the troops
 
Aviation spouse day may 2012 flier
Aviation spouse day may 2012 flierAviation spouse day may 2012 flier
Aviation spouse day may 2012 flier
 
Soldier Show-2012
Soldier Show-2012Soldier Show-2012
Soldier Show-2012
 
Spouses Club Apr flier
Spouses Club Apr flierSpouses Club Apr flier
Spouses Club Apr flier
 
ACS Calendar April 2012
ACS Calendar April 2012ACS Calendar April 2012
ACS Calendar April 2012
 
Administrative Professional Day 2012
Administrative Professional Day 2012Administrative Professional Day 2012
Administrative Professional Day 2012
 
Bingo Rave
Bingo RaveBingo Rave
Bingo Rave
 
Dueling Pianos 14 April 2012
Dueling Pianos 14 April 2012Dueling Pianos 14 April 2012
Dueling Pianos 14 April 2012
 
Soldier show-2012
Soldier show-2012Soldier show-2012
Soldier show-2012
 
Spouses club apr flyer[3]
Spouses club apr flyer[3]Spouses club apr flyer[3]
Spouses club apr flyer[3]
 
Women's health 2012[1]
Women's health 2012[1]Women's health 2012[1]
Women's health 2012[1]
 
Sfp onesheet fort rucker mar2012
Sfp onesheet fort rucker mar2012Sfp onesheet fort rucker mar2012
Sfp onesheet fort rucker mar2012
 
24 feb 2012
24 feb 201224 feb 2012
24 feb 2012
 
Deployed spouse dinner flyer (feb 2012)
Deployed spouse dinner flyer (feb 2012)Deployed spouse dinner flyer (feb 2012)
Deployed spouse dinner flyer (feb 2012)
 
Spector soft internet lingo for parents
Spector soft internet lingo for parentsSpector soft internet lingo for parents
Spector soft internet lingo for parents
 
2012 aba symposium flyer
2012 aba symposium flyer2012 aba symposium flyer
2012 aba symposium flyer
 
10 feb 2012
10 feb 201210 feb 2012
10 feb 2012
 
All flight social march 2012
All flight social march 2012All flight social march 2012
All flight social march 2012
 
Dinner special-with-dueling-pianos2
Dinner special-with-dueling-pianos2Dinner special-with-dueling-pianos2
Dinner special-with-dueling-pianos2
 

Dernier

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Dernier (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Social Media Safety Tips for the Army Community

  • 1. Social Media Roundup OPSEC and Safe Social Networking
  • 2. Social Media Roundup Agenda This week’s Social Media Roundup takes an in-depth look at OPSEC considerations for social media use. Maintaining OPSEC should be a primary concern for everyone in the Army Family, whether you’re on an installation, deployed or on Facebook.  Introduction  Did you know?  Social media access  What not to post  Privacy settings  Geotagging  Social Media OPSEC for units  Social media concerns for Families and Family Readiness Groups  Social media concerns for Army children  Countermeasures  Resources
  • 3. Social Media Roundup Safe social networking  Social media has become a big part of our lives. Social media can help people and Army organizations share information. It also helps Soldiers, family members and Army civilians to stay connected to loved ones.  As a culture, we depend on social media, but social media use can be extremely dangerous if you’re not careful.  Do you know what information you can post about your job? Did you know people can use social media to collect information and steal your identity? Did you know you can be at risk even if you don’t use social media.  Operations security (OPSEC) and personal privacy concerns should be paramount when using social media.
  • 4. Social Media Roundup Did you know?  A U.S. Government official on sensitive travel to Iraq created a security risk for himself and others by Tweeting his location and activities every few hours.  A Family on vacation kept friends up-to-date via online profiles; their home was burglarized while they were away.  New computer viruses and Trojans that successfully target information on social networking sites are on the rise.  Information on social networking sites has led to people losing job offers, getting fired and even being arrested.  Social networking sites have become a haven for identity thieves and con artists trying to use your information against you.  Several kidnapping, rape and murder cases were linked to social networking sites where the victims first connected with their attackers.  According to the Al Qaeda Handbook, terrorists search online for data about “Government personnel and all matters related to them (residence, work place, times of leaving and returning, children and places visited.)” Source: Interagency OPSEC Support Staff
  • 5. Social Media Roundup Daily social media interactions  Be cautious when accepting friend requests and interacting with people online. You should never accept a friend request from someone you do not know, even if they know a friend of yours. For more on this, check out this article about the Robin Sage Experiment: “Fictitious femme fatale fooled cybersecurity” http://goo.gl/Ocf7e  Don’t share information that you don’t want to become public. Be careful about what you post about yourself on social media platforms. Once you put something out there, you can’t control where it goes. Someone might target you based simply because you work in the DoD. Be cautious when listing your job, military organization, education and contact information.  Providing too much information in your profile can leave you exposed to people who want to steal your identity or steal sensitive operational information. Pvt. Creeper
  • 6. Social Media Roundup What not to post  When using Facebook and other social media platforms, do not post personally identifiable information and any information that can damage Army operations.  Think about what you’re posting before hitting share. Many times, you can avoid releasing sensitive information by simply rephrasing your social media post.  If you aren’t comfortable placing the same information on a sign in your front yard, don’t put it online.
  • 7. Social Media Roundup Facebook Privacy settings  Understanding what you can and cannot post on social media platforms goes a long way in protecting yourself online, but more can be done by adjusting your privacy settings on social media sites.  Facebook’s default privacy settings are often public, but Facebook provides various setting options that help Facebook users adjust privacy settings.  Twitter allows users to keep their Tweets private and Flickr gives users the option On the top are Facebook’s sharing recommendations, on the bottom are the Army’s of keeping photos private. The settings sharing recommendations. For more information are easily accessible, the trick is setting about protecting yourself on Facebook, check out this Social Media Roundup: http://goo.gl/2WAlu them to meet your privacy needs. Similar Twitter privacy settings can be found on other social media sites like Myspace and LinkedIn.
  • 8. Social Media Roundup Geotagging safety • Geotagging is the process of adding geographical identification to photographs, video, websites and SMS messages. It is the equivalent of adding a 10-digit grid coordinate to everything you post on the internet. • Geotags are automatically embedded in some pictures taken with smartphones. Many people are unaware of the fact that the photos they take with their smartphones and load to the Internet have been geotagged. • Photos posted to photo sharing sites like Flickr and Picasa can also be tagged with location, but it is not an automatic function. • For more information about geotagging, check out this website: http://goo.gl/DmJoq
  • 9. Social Media Roundup Geotagging safety  Location-based social networking is quickly growing in popularity. A variety of applications are capitalizing on users’ desire to broadcast their geographic location.  The increased popularity of these applications is changing the way we as a digital culture view security and privacy on an individual level. These changes in perception are also creating OPSEC concerns on an Army level.  Deployed Soldiers, or Soldiers conducting operations in classified areas should not use location-based social networking services. These services will bring the enemy right to the Army’s doorstep.  Want to avoid giving away location? Disable the GPS function on your smartphone. For instructions on how to do that, check out this website: http://goo.gl/IAmsY For more information about geotagging safety, check out this Social Media Roundup: http://goo.gl/dyIjB
  • 10. Social Media Roundup Social media OPSEC for units  Protecting OPSEC goes beyond personal use of social media. Hundreds of Army organizations use social media to put out information, so it’s important social media managers keep the checklist below in mind during organizational social media use.
  • 11. Social Media Roundup Social media OPSEC concerns for families and Family Readiness Groups Security items to consider  Social media helps Family Readiness • Take a close look at all privacy settings. Set Groups and Army family members stay security options to allow visibility to “friends only.” • Do not reveal sensitive information about yourself connected, but OPSEC should always be such as schedules and event locations. the primary concern. • Ask, “What could the wrong person do with this  Family Readiness Groups, Army spouses information?” and “Could it compromise the safety and Army Family members need to know of myself, my family or my unit?” • Geotagging is a feature that reveals your location that posting sensitive information can be to other people within your network. Consider detrimental to Soldier safety. turning off the GPS function of your smartphone.  Ensure that information posted online has • Closely review photos before they go online. no significant value to the enemy. Always Make sure they do not give away sensitive information which could be dangerous if released. assume that the enemy is reading every • Make sure to talk to family about operations post made to a social media platform. security and what can and cannot be posted.  Even seemingly innocent posts about a • Videos can go viral quickly, make sure they don’t family member’s deployment or give away sensitive information. redeployment date can put them at risk.
  • 12. Social Media Roundup Social media concerns for Army children  What is the best way to protect your kids online? Talk to them. Research suggests that when children want important information, most rely on their parents.  The important thing is to start the education early. Talk to your children about online risks and make sure you create an honest and open environment.  Some social media sites like Facebook, provide family safety resources and tools for reporting issues: http://goo.gl/sLBym  Make sure you check out www.Onguardonline.com to find more resources that will help protect your family and yourself online.
  • 13. Social Media Roundup Countermeasures  These tips will help you protect critical information while using social media  Follow computer security guidelines:  Keep your password secure: Use Adversaries prefer to go after easy targets. different, strong passwords for each online Keep your computer security up-to-date and account. Never give your password away. make yourself a hard target.  Don’t depend on the social media site for  Never login from risky locations: Public confidentiality: Even social media sites social networking sites generally do not that aren’t open and public by design can have secure login available. If you login become so due to hacking, security errors from a hotel, cyber-café or an airport and poor data management practices. In hotspot, particularly ones in foreign some cases, the site terms of service countries, your name and password can be explicity claim ownership of all your posted captured at any time. content.  Modify your search profile: Do a search  Treat links and files carefully: Social for yourself and if too much data comes up, engineers and hackers post links in you should consider adjusting your settings. comments and try to trick you into downloading an “update,” “security patch” or “game.”
  • 14. Social Media Roundup Countermeasures (cont.)  These tips will help you protect critical information while using social media  Don’t trust add-ons: Plugins, games and  Review your friends profiles: The photos applications are often written by other or information they post about you may be a users, not the social media sites problem. themselves. The authors can easily gain  Control “friend” access: Verify a “friend” access to your data once you install them. request by phone or other means before  Don’t post critical information: If you allowing access. Group “friends” (e.g., real don’t want it public, don’t post it. Search life, co-workers, strangers, etc.) and control engines make it easy for adversaries to find access permissions based on the groups. what they’re interested in. Once information is online, it’s there forever.
  • 15. Social Media Roundup OPSEC resources  OPSEC resources  Interagency OPSEC Support Staff: www.ioss.gov  Anti-Phishing Phil: http://goo.gl/ZFkY3  OnGuard Online: www.onguardonline.gov  Social media training: http://goo.gl/AqmE1  Social Media Roundups  9 Critical Steps to Protecting Yourself on Facebook: http://goo.gl/igGzN  Geotags and Location-based Social Networking: http://goo.gl/wqKwZ  Social Media For Family Readiness Groups: http://goo.gl/rS88l  Army Slideshare site: http://goo.gl/cJM9T
  • 16. Social Media Roundup Contact information Have questions? Please feel free to reach out to us at the Online and Social Media Division Email: Ocpa.osmd@us.army.mil To review and download past editions of the Social Media Roundup, visit our Slideshare site at: http://www.slideshare.net/usarmysocialmedia. All Social Media Roundups are authorized to be distributed to a broader audience. 4/20/2011 OFFICE OF THE CHIEF OF PUBLIC AFFAIRS PENTAGON