3. What seemed like unimportant information from one site can be the start of the Google search leading to other sites. Remember: even items which are deleted from Web sites can still be searched!
4.
5.
6. Even if you think you’re being “clever,” you could accidentally leak a small piece of information.
7. Myth #1 – “I am no one they care about.” Fact #1 – One small piece of information can be the last puzzle piece the enemy needs. 4 Myths about OPSEC
8. 4 Myths about OPSEC Myth #2 – “I don’t have any adversaries.” Fact #2 – Think about: former boyfriends/girlfriends, angry neighbors, identity thieves
9. 4 Myths about OPSEC Myth #3 – “I’m smarter than the enemy.” Fact #3 – Information theft is a good investment for the enemy. Some nations are willing to spend BILLIONS of dollars for our seemingly trivial information. One small mistake on line can put our Soldiers at big risk.
10. 4 Myths about OPSEC Myth #4 – “I don’t post on the Internet.” Fact #4 – Unencrypted emails can be misrouted, intercepted or gathered.
OPSEC information should be shared with your families. Explain why you can’t ask or talk about certain things and make sure your family understands.
Google is a great Internet tool but it also remembers EVERYTHING! Even items and searches that have been deleted from search history or your browsing cache can be searched on Google.
Social media allows for a more instantaneous way to communicated with your Soldier while he or she is deployed. However, just like conversations on the phone or by letter, watch what you say. Even a simple questions like “What’s work like over there?” could be useful to the enemy.
Be smart about what you post on social media sites. Posting things such as “Going on vacation for two weeks” is really like telling people, “My house will be COMPLETELY empty for two weeks!” If it isn’t already, make your Facebook and Twitter accounts private and then you can ensure only your friends see the information. Don’t friend everyone who asks… make sure you know who that person is!
Trying to be clever or speaking in code really doesn’t work. It can also lead to slip-ups. Be safe and just avoid talking about subjects that can lead to OPSEC violations.
That may be true at the moment but you never know when you will accidentally bringing yourself to attention. Remember, it is difficult to know exactly what an adversary is looking for and if what you have may be of benefit.
Anyone who might want a little bit of information about you can be an adversary.
It’s a common feeling. People interviewed often say they know more than “some guy sitting in a cave, hiding out.” But, our adversaries are willing to spend BILLIONS of dollars to gain an advantage. They are willing to spend money on information. Some agencies train young people in info gathering.
Not posting on the Internet doesn’t mean you don’t leave information on the Internet. Most people email now and unencrypted emails can be used in a negative way. Intercepting emails is the tech equivalent of dumpster diving.
Always remember to be savvy with your conversations and avoid certain topics. That way, you won’t leak information!