Provided by OSPA (www.opsecprofessionals.org) OPSEC for Families Presented by: (Presenter’s Name) Provided by OSPA (www.opsecprofessionals.org)

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Naval OPSEC Support Team Navy Information Operations Command, Norfolk #Don’tDoThat: Social Media Trends.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
INTERNET SAFETY FOR STUDENTS
NEW YORK NATIONAL GUARD FAMILY PROGRAMS Offered & presented by CW2 Walker Family Programs OPSEC Program Manager.
OPSEC Countermeasures Michael Chesbro DES OPSEC Officer OPSEC Countermeasures Michael Chesbro DES OPSEC Officer.
TLO 2: Action: Plan operational security. Intermediate-level training.
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
UNCLASSIFIED. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Do you know how to keep yourself safe?
One Team, One Fight One Mission Presented by the Ordnance Center & Schools Security Office.
INTERNET SAFETY FOR STUDENTS
Internet Safety.
Military families and Operational Security. Family members are vital to the success of our military. You may not know it, but you play a crucial role.
UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking.
Presented by the 1st Information Operations Command.
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name)
Operational Security PCC. VII-F.1.
Media Guidance and Talking Points for Arrowhead Spouses Part 1: Guidance When the Media Calls You.
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Operational Security Awareness
OPSEC for Families. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know.
Provided by OSPA ( Operations Security (OPSEC)
Netiquette and Online Safety By: H F. Netiquette Netiquette is the do’s and don’ts of the internet. Basically netiquette is the rules of online communication.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Online Reputation A guide for children aged 7+
Internet Safety.
INTERNET SAFETY FOR EVERYONE
Introduction to Privacy
Internet Safety How to stay safe online.
i-SAFE’s Internet Safety Review Game
Creating your online identity
Protecting Your Privacy Online
2.02 Remember the rules of online safety.
Operations Security (OPSEC) For New Hires
Information Security.
Safe Internet Mechatronika Budapest.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Netiquette and Online Safety
Remember the rules of online safety.
Digital Citizenship for Students and Educators
Online Safety.
Safe Online Dating – Tips Every Women Should Know
2.02 Remember the rules of online safety.
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Command Indoctrination Operations Security DD MMM YY
Internet Safety for Everyone
JEB – Little Creek (Bldg 1126)
Continuing Education Module
Internet Safety for Everyone
OPSEC and Children.
Operations Security (OPSEC)
Here are some good questions to start out the presentation:
Overall Classification of this Briefing is UNCLASSIFIED
Online Safety! Created by Educational Technology Network
OPSEC and Children Presented by: (Presenter’s Name) Provided by OSPA (
“Seven-minute Safeguarding Staff Meeting”
OPSEC and the World Wide Web
Internet Safety – Social Media
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Command Indoctrination Operations Security DD MMM YY
Overview OPSEC Threat Critical Information Indicators Data Aggregation
Presentation transcript:

Provided by OSPA (www.opsecprofessionals.org) OPSEC for Families Presented by: (Presenter’s Name) Provided by OSPA (www.opsecprofessionals.org)

Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that you’re half of the team? The military provides certain training and equipment designed to keep your loved one safe. You may not know it, but you play a critical role in your loved one’s safety just by protecting what you know about their day to day and operations. This is known as OPSEC.

What is OPSEC? Operations Security (or OPSEC), for a family member, is simply denying any enemies access to information. The information that you have ALREADY, such as mission, vehicle capabilities, location and tactics are considered intelligence by enemies of the US. By not allowing the information that you have to get out, you help make sure that your soldier can maintain the upper hand.

What OPSEC is: Denying any useful information to the enemy A mindset, a way of thinking Applied to web pages, blogs, emails A standard that can be applied to any situation

What OPSEC is NOT: A collection of specific rules to cover every possible situation

Every piece of information is like a piece of a puzzle Every piece of information is like a piece of a puzzle. The type of vehicle your soldier drives might not seem like important intelligence, but when combined with other pieces of information, such as location, unit name, unit structure and mission, an enemy can begin to build a profile of the organization.

This manual was captured in a home raid in Iraq, and is only one of countless copies. According to this manual, 80% of military intelligence can be collected from legal sources, including websites, blogs, newspapers and online.

Who would try to get information from a spouse? Foreign intelligence US citizens Terrorists Criminals Coalition partners Computer hackers Military spouses have been target of attempts to gain intelligence through active means, such as fraud, overhearing public conversations, computer hacking or false friendships, as well as passive means such as monitoring a blog, military-spouse themed chat rooms and personal websites.

“On the internet, nobody knows you’re a dog” Readers of your blog or forum posting might appear very friendly. They might claim to be stationed near your spouse, or to have a loved one deployed as well. No matter the technique, the underlying goal may be to make you comfortable enough to reveal things that you otherwise would not.

What information are they looking for? Military movement information, such as dates and locations Unit issues, especially morale or dissatisfaction Security issues, such as tactics or defenses Equipment issues Specific location of unit Pictures of successful attacks (both ours and theirs) Pictures that could be interpreted differently than intended Equipment issues: In OIF III, a well meaning spouse sent a letter that got leaked detailing vehicle armor, unit mission and specific vehicle capabilities on mission. The unit responded appropriately before the information became a threat, but it could have been far worse. Specific location of unit: It’s okay to say that the unit is in Iraq or Kuwait, for instance, it is not okay to name the FOB or city.

If you were an enemy, could you use this picture If you were an enemy, could you use this picture? Perception is OPSEC’s worst enemy. In reality, these two Iraqis were caught allegedly looting gasoline from a burning building, and the 12 year old pictured was quickly released. No matter how you describe the picture on your personal website or blog, the picture can often be used against the US! It’s not that you should avoid the web altogether. You’re going to be proud of your spouse, and will probably want to talk to others about them. It is important, though, to understand the risks associated with any public medium and adjust accordingly.

What you can do Ensure that the information posted has no significant value to the enemy Always assume that the enemy is reading what you’re writing Be careful about discussing information in public settings (Clubs, airports, gyms) Avoid publically (online or real life) speculation about future missions (“they’ll probably start building up here, next”)

What you can do Be especially careful to safeguard “indicators”, pieces of information that provide clues about future activities Railhead dates Increase in field exercises Ceremonies POV storage Increase in financial activity, such as wills and power of attorneys

A note on telephones Remember that cordless phones and cell phones are NOT completely secure! Anything you say is transmitted over the airwaves and can be intercepted Same is true with landline phones! Lines can be crossed or intentionally intercepted!

The bottom line Think like the “bad guy” before you post something online or have a public conversation. Ask yourself: Who is the adversary? What does that person/organization need to know about my organization? What can he do with it? How can it affect the mission? It’s not just what the adversary can learn from one site, but what can be pieced together from many sites.

Questions?