OPSEC Countermeasures Michael Chesbro DES OPSEC Officer OPSEC Countermeasures Michael Chesbro DES OPSEC Officer.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

How to protect yourself, your computer, and others on the internet
Naval OPSEC Support Team Navy Information Operations Command, Norfolk #Don’tDoThat: Social Media Trends.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
1 Privacy at Home: Protecting Your Family’s Identity & Safety For Your Children Dara G. Murray Chief Information Security Officer Program Support Center.
Click Below to Begin the Quiz
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
e-safety and cyber bullying
NEW YORK NATIONAL GUARD FAMILY PROGRAMS Offered & presented by CW2 Walker Family Programs OPSEC Program Manager.
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
UNCLASSIFIED. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Do you know how to keep yourself safe?
One Team, One Fight One Mission Presented by the Ordnance Center & Schools Security Office.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Internet Safety Safely Navigating Uncharted Waters.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Military families and Operational Security. Family members are vital to the success of our military. You may not know it, but you play a crucial role.
Protecting Yourself Online (Information Assurance)
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Presented by the 1st Information Operations Command.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Staying Safe Online Keep your Information Secure.
PRIVACY BOOTCAMP YpJU.
IT security By Tilly Gerlack.
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name)
Operational Security PCC. VII-F.1.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
OPSEC and Geospatial Information. Five step process Our operations from an adversary point of view Compilation Indicators Operations Security.
Securing Your Facebook Identity Nicholas A. Davis, CISA, CISSP UW-Madison Division of Information Technology 11/10/2015 UNIVERSITY OF WISCONSIN1.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
OPSEC for Families. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
94% of teens aged 12 – 17 use the Internet. 84% of online teens have a social networking profile. 84% of teens have cell phones; more than 88% are texting.
 Attempts to steal your identity since most people who use Facebook post personal information and click things without thinking about it.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Online Reputation A guide for children aged 7+
Cyber Security and Computer Safety
Creating your online identity
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Overall Classification of this Briefing is UNCLASSIFIED
Command Indoctrination Operations Security DD MMM YY
Cyber Security and Computer Safety
Overall Classification of this Briefing is UNCLASSIFIED
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name) Provided by OSPA (
Internet Safety – Social Media
Command Indoctrination Operations Security DD MMM YY
Overview OPSEC Threat Critical Information Indicators Data Aggregation
Presentation transcript:

OPSEC Countermeasures Michael Chesbro DES OPSEC Officer OPSEC Countermeasures Michael Chesbro DES OPSEC Officer

Operations security (OPSEC) As defined in DOD Directive (DODD) , OPSEC is a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities to: (a) Identify those actions that can be observed by adversary intelligence systems. (b) Determine indicators that hostile intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries. (c) Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation. Operations Security

OPSEC protects critical information from adversary observation and collection in ways that traditional security programs cannot. Simply put… OPSEC are those things that we do to prevent or limit the ability of an adversary to gather information about us!

What Information Should We Protect? (Critical Information) “Information about government personnel, officers, important personalities, and all matters related to them (residence, work place, times of leaving and returning, and children).” Criminals, con-artists, identity thieves, stalkers… all want to collect information about you and your family… - Al Qaeda Handbook

What Information Should We Protect? (Critical Information) Military movements (deployment/redeployment dates, dates of field exercises, flight information etc.)… next Tuesday IS a specific date Any issues with the unit Anything concerning security Equipment issues (what, no flak vests?) Locations of units (it’s OK to say they’re in Afghanistan, but not to say that your spouse's battalion is at 14th and Ramadan in Tora Bora)

OPSEC Countermeasures Be careful what you post on social media sites (Facebook, MySpace, web-pages). Be careful what you post elsewhere (i.e. bumper stickers)

OPSEC Countermeasures Take a close look at all privacy settings. Set security options to allow visibility to “friends only.” Do not reveal sensitive information about yourself such as schedules and event locations. Ask, “What could the wrong person do with this information?” and “Could it compromise the safety of myself, my family or my unit?” Closely review photos before they go online. Make sure they do not give away sensitive information which could be dangerous if released. Make sure to talk to family about operations security and what can and cannot be posted. Videos can go viral quickly, make sure they don’t give away sensitive information.

OPSEC Countermeasures

can be intercepted and read by an adversary, unless it’s encrypted. MS Outlook can encrypt with a digital certificate. Other encryption is also an option. OPSEC Countermeasures

Telephones are NOT secure! Cell phones, cordless phones and land-lines can all be compromised. Limit what you discuss on the phone because you never know who could be listening in on you. Consider: Digital Enhanced Cordless Telecommunications (DECT) Phones

OPSEC Countermeasures Telemarketing calls may be legitimate… or they may be scams. Calls can also be attempts at information collection, or harassment. Add your telephone numbers to the ‘National Do Not Call Registry’. OPT-OUT of pre-screening of your credit reports for credit and insurance offers: OPTOUT ( )

OPSEC Countermeasures Installation Destruction Facility Last Friday of the Month Building 3152 on the corner of 3rd Division and Collier Personal Shred Day

OPSEC Countermeasures Do not use your military ID for other than military purposes. Never allow anyone to make a copy of your military ID – it’s illegal to do so.

OPSEC Countermeasures Create A PIN Lock For Your Voic - No pass code for your voic ? Then anyone with phone-number "spoofing" software can call your carrier's voic number and get right into your account. Enable the pass code, and don't stick with the carrier's default PIN, such as "1234" or "9999" — hacker and creeps already know those. Turn on encrypted social-media connections - One year ago, it was easy for cyberspies to sit in cafes and snoop on other people's social-networking posts. Today, Facebook, Twitter and Google+ all let you change your settings so that encrypted ("https") connections are always on, locking out the spies. Put a screen lock on your smartphone - Your smartphone may be valuable, but even more valuable is all the personal information you've got on it. To make sure anyone who finds or steals it can't see your data, enable the screen lock, which asks for a PIN or pattern before the phone can be used. (The phone can still be answered if it rings.) Enable wireless encryption - Most home wireless routers are set by default to transmit signals unencrypted. But that lets anyone snoop on your Internet traffic. Set your router to encrypt its transmissions, and pick a strong password so that only those machines you permit can access it.

OPSEC Questions Questions?

OPSEC Resources DES OPSEC Page: National OPSEC Program Interagency OPSEC Support Staff Michael Chesbro, DES OPSEC Officer, DES OPSEC Bulletin – Via to You!