Military families and Operational Security. Family members are vital to the success of our military. You may not know it, but you play a crucial role.

Slides:



Advertisements
Similar presentations
Be Smart on the Internet
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Fleet & Family Support Ombudsman Program & Operations Security
Internet Safety in Schools
Naval OPSEC Support Team Navy Information Operations Command, Norfolk #Don’tDoThat: Social Media Trends.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
SAFETY It’s all about you UPD Residence Life Officers (RLO) Tracy Merrill Devin Narine.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Sex Crime Prevention 1 Vermont Criminal Information Center Sex Crime Prevention.
What you don’t know CAN hurt you!
This week is anti-bullying week.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
e-safety and cyber bullying
NEW YORK NATIONAL GUARD FAMILY PROGRAMS Offered & presented by CW2 Walker Family Programs OPSEC Program Manager.
OPSEC Countermeasures Michael Chesbro DES OPSEC Officer OPSEC Countermeasures Michael Chesbro DES OPSEC Officer.
TLO 2: Action: Plan operational security. Intermediate-level training.
UNCLASSIFIED. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that.
Concept: Internet Safety Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful.
Never share your passwords. Even with your significant other or your BFF! Yes, with parents. Especially if they ask. If someone in the lab was watching.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Do you know how to keep yourself safe?
One Team, One Fight One Mission Presented by the Ordnance Center & Schools Security Office.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Technology is a wonderful thing that few of us could see ourselves doing without and when it comes to personal safety it can be of great benefit. However.
Talking Safely Online Let’s Chat!. Share Your Online Experiences! Can you ever really know if an online-only friend is male or female? Can you know for.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking.
Following the terrorist attack on September 11, 2001 the President declared a national emergency … Secretary of Defense Donald Rumsfeld cautioned on the.
Internet...? Definition: The Internet is millions of computers around the world connected to each other. Explanation: When you're on the Internet, your.
Presented by the 1st Information Operations Command.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name)
Operational Security PCC. VII-F.1.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
“It is like, totally anonymous, so no one worries about getting in trouble. Lots of kids would never do this stuff in the ‘real world.’” —13 year old boy.
Safety! Jessica Brown. What Is the Point of Having an Online Space? It needs to be Safe Clean And Efficient.
 Be a good friend  Be a mediator  Look  Listen  Tell someone who cares LOOK OUT FOR EACH OTHER. KEEP EACH OTHER SAFE. Be the change you want to see.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Internet Safety & Online Citizenship
Do pictures always give truthful information? Can publishing it be hurtful??
A How-to Guide to Social Media Marketing. Objectives What is social media? Why you need social media to market your product or service Types of social.
Internet Safety By: Mrs. Huffman & Mrs. Surich. What Is The Internet?
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Predator Identification Internet Safety Awareness.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Internet Survival Tips for Kids and Teens
UNCLASSIFIED OPSEC AND THE HOLIDAY SEASON. UNCLASSIFIED O VERVIEW What does OPSEC have to do with the holidays? OPSEC and Shopping Presents! OPSEC at.
Safety and Security Online: Private Information. Identify private information Recall that private information should not be given out in cyberspace.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Operational Security Awareness
OPSEC for Families. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know.
Safer Internet Day. What do you use the Internet for? watching TV shows watching online videos playing gamestalking to friends homeworkfinding out things.
Internet Safety 101! Instant Messaging Social Networking Sites (i.e. Facebook) Sending personal Information Sending pictures online Talking to strangers.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Freshman Seminar. Find kids through social networking, blogs, chatrooms, instant messaging, , discussion boards, and other websites. Try to seduce.
94% of teens aged 12 – 17 use the Internet. 84% of online teens have a social networking profile. 84% of teens have cell phones; more than 88% are texting.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Operations Security (OPSEC) For New Hires
Appropriate Use of Technology
Overall Classification of this Briefing is UNCLASSIFIED
Command Indoctrination Operations Security DD MMM YY
JEB – Little Creek (Bldg 1126)
Overall Classification of this Briefing is UNCLASSIFIED
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name) Provided by OSPA (
Command Indoctrination Operations Security DD MMM YY
Overview OPSEC Threat Critical Information Indicators Data Aggregation
Presentation transcript:

Military families and Operational Security

Family members are vital to the success of our military. You may not know it, but you play a crucial role in ensuring our servicemembers’ safety just by what you know of the military’s day-to- day operations. You can protect your loved ones by protecting the what you know. This is known as Operational Security or, OPSEC.

… keeping potential adversaries from discovering our critical information. As the name suggests, OPSEC protects our operations – planned, in progress or completed. Our success often depends on secrecy and surprise, so our enemies want to know what our servicemembers and family members know.

 Look at your daily activities from an enemy’s point of view  Understand what an enemy might know about you and your family  Assess risks to you and your family  Develop and apply countermeasures -- ways of preventing enemies from gaining your sensitive information

 Military movements: deployment or redeployment dates, dates of field exercises, flight information, etc. (“Next Tuesday” IS a specific date)  Any issues with the unit  Anything related to security  Equipment issues  Locations of units (It’s OK to say, “They’re in Iraq,” but not to say, “Jim’s unit is at 14 th and Ramadan in Kadamiyah.”)

That includes:  Clubs/bars  Restaurants  Gyms  Shopping  Public transportation

 Discuss future destinations  Discuss future operations or missions  Discuss dates and times of exercises  Discuss readiness issues or numbers  Discuss specific training equipment  Discuss people’s names and locations in conjunction with operations  Speculate about future operations  Spread rumors about operations  Assume the enemy is not trying to collect information on military operations or your family Don’t:

 Be aware of your surroundings  Keep sensitive discussions in designated secure areas  Keep a “need to know attitude” (If they don’t need to know, don’t tell them)  Safeguard sensitive but unclassified information

 Critical Information - Specific facts about yourself and our military intentions, capabilities, operations or activities  Indicators - Any activity that seems innocent but could point to critical information  Vulnerability - A weakness that someone can use to get critical information  Risk - The probability that someone will gain critical information, and the damage that could be caused if they are successful  Countermeasures - Things you can do to stop others from learning critical information A few OPSEC terms

 Detailed information about missions of assigned units  Details concerning locations and times of unit deployments  Personal transactions that occur in large numbers (pay information, powers of attorney, wills and deployment information)  References to trends in unit morale  Personnel problems  Details concerning security procedures

AAn increase in field exercises LLarge troop movements CCeremonies LLarge number of wills and power of attorneys being processed IIncrease in financial activity TTightened security LLots being prepared for long-term storage of privately owned vehicles

An enemy can gather information by: Physically observing daily activities such as driving children to school or shopping Listening to phone conversations Monitoring Internet activities and e- mail

If an adversary found out flight dates and times for servicemembers deploying overseas, could he use that information against them? If an enemy knew when and where your kids went to school, could he use that against you to gain any information you might know?

 Varying your routes to work, school, etc.  Varying your schedule (shop for groceries on Wednesday this week and Saturday next week)  Vary the times of your daily activities (jogging, shopping, going to the gym)  Destroy trash that has your personal information on it  Keep valuable documents and personal information in a safe or lock box

Do you have a personal web site that includes: Information strangers shouldn't know about your spouse's job? Personal information on your family? Do you have links to your personal site from other forums and sites you frequent?

 Do not discuss sensitive information in Chat rooms or instant messaging Blogs  Avoid posting excessive information such as: When spouse deploys Family members’ full names, ages or where they attend school Your address Rank and unit affiliation Servicemembers’ deployed addresses  When posting photos, remember that a picture is worth a thousand words

Remember: AnyTHING put on the Internet is available to anyONE on the Internet!

Do your friends and family who are not familiar with the military understand the importance of not revealing what you tell them? Are you sure? Talking with those close to you about your spouse's activities is a good idea. Not sharing all the details is an even better idea.

Simply put, they’re not secure. Cell phones, cordless phones and ‘land lines’ can all be compromised. Be careful what you discuss on the phone -- you never know who could be listening!

 The cashier at the grocery store  Your spotter at the gym  One of your neighbors  The person sitting behind you on the bus You NEVER know! Be careful what you talk about in public. You really don’t know if the person next to you is friendly or not.

 Hang Blue Star flags or yellow ribbons inside the house, not on your front door or in a window  If you hang yellow ribbons outdoors, hang them in a public place if possible, so your home won’t be targeted Showing the pride you have for your spouse can also show that you are home alone and make you a target.

The information in this presentation is not intended to make you paranoid or suspicious that everyone you meet is a spy or terrorist. But stay alert … if a stranger shows excessive interest in the affairs of your family members, military or not, please notify the proper authorities.