SlideShare ist ein Scribd-Unternehmen logo
1 von 15
SOCIAL MEDIA SNAPSHOT OPERATIONS SECURITY (OPSEC)
WE ALL KNOW THAT “LOOSE LIPS SINK SHIPS” AND … Social media amplifies OPSEC risks because it enables greater volume and increased speed of information shared publically.
The threat is real. The Scoop Deck blog shed light on a Dec. 2009 Al-Qaeda call for their members to monitor what we say about ourselves, our units and our families online in order to gather intelligence. “Information on every U.S. Naval unit should be quietly gathered… their ranks, what state they are from, their family situation, and where their family members live…  …search for the easiest ways of striking these ships…. Do not underestimate the importance of any piece of information, as simple as it may seem….” WHAT THEY WANTED: The call wasn’t just about unit missions, location, troop manning, weapons, movement and route. They asked for members’ names, ranks, home state, family situation and family names.
Managers of official social media presences have an added responsibility to: Identify information that may compromise OPSEC (and remove it) Inform Sailors, family members and fans/community members of OPSEC best practices So what things should you look for?
1.  Sailors or family members sharing too much information DANGEROUS: ,[object Object]
My daughter is aboard the XYZ ship heading to ABC city/country in X days.
My family is back in Union, KS.SAFER: ,[object Object]
My son is aboard the Stennis.
He is coming back sometime in May.
I’m from the Midwest.BEST PRACTICE: Protect your yourself and your family. Avoid providing details about yourself, especially related to a current deployment.  Avoid providing details about your family.
2.  Posts about scheduled movements and current or future locations of ships or units DANGEROUS: ,[object Object]
She will be back on X date from XXX city.SAFER: ,[object Object]
He is coming back sometime in May.BEST PRACTICE: To be safer, talk about events that have happened not that will happen, unless that information has been released to the media. Otherwise, don’t provide specific details ship movements.
3.  Detailed personal information BEST PRACTICE: Share information about yourself smartly and be careful what you disclose about your family and occupation. Use privacy settings to protect your personal info.
Sailors and their families should also be particularly careful not to share: Spouse’s deployment status Home address Telephone numbers Location information Schedules Your close friends and family members have this information, so there is no need to post online.

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 

Was ist angesagt? (20)

Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop ThemUnderstanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
cyber security
cyber security cyber security
cyber security
 

Andere mochten auch

Navy Command Facebook Assessment and Worksheet (March 2015)
 Navy Command Facebook Assessment and Worksheet (March 2015) Navy Command Facebook Assessment and Worksheet (March 2015)
Navy Command Facebook Assessment and Worksheet (March 2015)
US Navy Social Media
 
Neighborhood Council Budget Advocates White Paper 1 - 2012
Neighborhood Council Budget Advocates White Paper 1 - 2012Neighborhood Council Budget Advocates White Paper 1 - 2012
Neighborhood Council Budget Advocates White Paper 1 - 2012
EmpowerLA
 
50 states olivia
50 states olivia50 states olivia
50 states olivia
olivia1997
 
лоаирыаириуа
лоаирыаириуалоаирыаириуа
лоаирыаириуа
Nadia Pop
 
False cognates
False cognatesFalse cognates
False cognates
jdzafra
 

Andere mochten auch (17)

Army Social Media Presentation
Army Social Media PresentationArmy Social Media Presentation
Army Social Media Presentation
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Social Media OPSEC
Social Media OPSECSocial Media OPSEC
Social Media OPSEC
 
Navy Command Facebook Assessment and Worksheet (March 2015)
 Navy Command Facebook Assessment and Worksheet (March 2015) Navy Command Facebook Assessment and Worksheet (March 2015)
Navy Command Facebook Assessment and Worksheet (March 2015)
 
Social Media in Defence 2012
Social Media in Defence 2012Social Media in Defence 2012
Social Media in Defence 2012
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness Program
 
Wikipedia DC Briefing
Wikipedia DC BriefingWikipedia DC Briefing
Wikipedia DC Briefing
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check Point
 
Neighborhood Council Budget Advocates White Paper 1 - 2012
Neighborhood Council Budget Advocates White Paper 1 - 2012Neighborhood Council Budget Advocates White Paper 1 - 2012
Neighborhood Council Budget Advocates White Paper 1 - 2012
 
50 states olivia
50 states olivia50 states olivia
50 states olivia
 
лоаирыаириуа
лоаирыаириуалоаирыаириуа
лоаирыаириуа
 
False cognates
False cognatesFalse cognates
False cognates
 
Memorial Park Tomorrow Nov.14
Memorial Park Tomorrow Nov.14Memorial Park Tomorrow Nov.14
Memorial Park Tomorrow Nov.14
 
The 3 Insights Defining Modern Analytics
The 3 Insights Defining Modern AnalyticsThe 3 Insights Defining Modern Analytics
The 3 Insights Defining Modern Analytics
 
2. Collegio Docenti 12 ottobre
2. Collegio Docenti 12 ottobre2. Collegio Docenti 12 ottobre
2. Collegio Docenti 12 ottobre
 

Ähnlich wie OPSEC Snapshot

Talon times 3rd qtr fy2014 final version
Talon times 3rd qtr fy2014 final versionTalon times 3rd qtr fy2014 final version
Talon times 3rd qtr fy2014 final version
Jpendley
 
Unofficial posts explained
Unofficial posts explainedUnofficial posts explained
Unofficial posts explained
rr_uel
 
A unofficial posts_explained
A unofficial posts_explainedA unofficial posts_explained
A unofficial posts_explained
Alvin Faircloth
 
June 2010 Family Readiness Wire Newsletter
June 2010 Family Readiness Wire NewsletterJune 2010 Family Readiness Wire Newsletter
June 2010 Family Readiness Wire Newsletter
NEIC
 
Don guidance for_unofficial_posts_-_explained
Don guidance for_unofficial_posts_-_explainedDon guidance for_unofficial_posts_-_explained
Don guidance for_unofficial_posts_-_explained
Barbara Kessler
 
Rivron two family preparedness
Rivron two family preparednessRivron two family preparedness
Rivron two family preparedness
Alvin Faircloth
 

Ähnlich wie OPSEC Snapshot (20)

Opsec snapshot
Opsec snapshotOpsec snapshot
Opsec snapshot
 
OPSEC snapshot
OPSEC snapshotOPSEC snapshot
OPSEC snapshot
 
Social Media Operations Security
Social Media Operations SecuritySocial Media Operations Security
Social Media Operations Security
 
Talon times 3rd qtr fy2014 final version
Talon times 3rd qtr fy2014 final versionTalon times 3rd qtr fy2014 final version
Talon times 3rd qtr fy2014 final version
 
Unofficial posts explained[1]
Unofficial posts explained[1]Unofficial posts explained[1]
Unofficial posts explained[1]
 
Unofficial posts explained
Unofficial posts explainedUnofficial posts explained
Unofficial posts explained
 
DoN guidance for unofficial internet posts
DoN guidance for unofficial internet postsDoN guidance for unofficial internet posts
DoN guidance for unofficial internet posts
 
A unofficial posts_explained
A unofficial posts_explainedA unofficial posts_explained
A unofficial posts_explained
 
U.S. Navy Emerging Media (July 2013)
U.S. Navy Emerging Media  (July 2013)U.S. Navy Emerging Media  (July 2013)
U.S. Navy Emerging Media (July 2013)
 
June 2010 Family Readiness Wire Newsletter
June 2010 Family Readiness Wire NewsletterJune 2010 Family Readiness Wire Newsletter
June 2010 Family Readiness Wire Newsletter
 
Talon times 2nd quarter fy2016 (f)
Talon times 2nd quarter fy2016 (f)Talon times 2nd quarter fy2016 (f)
Talon times 2nd quarter fy2016 (f)
 
124th FW Customer Service Guide
124th FW Customer Service Guide124th FW Customer Service Guide
124th FW Customer Service Guide
 
UPAR 2017 10 Social Media
UPAR 2017 10 Social MediaUPAR 2017 10 Social Media
UPAR 2017 10 Social Media
 
MCPON Bluf 02 09
MCPON Bluf 02 09MCPON Bluf 02 09
MCPON Bluf 02 09
 
Bluf 04 09
Bluf 04 09Bluf 04 09
Bluf 04 09
 
Don guidance for_unofficial_posts_-_explained
Don guidance for_unofficial_posts_-_explainedDon guidance for_unofficial_posts_-_explained
Don guidance for_unofficial_posts_-_explained
 
Don guidance for_unofficial_posts_-_explained
Don guidance for_unofficial_posts_-_explainedDon guidance for_unofficial_posts_-_explained
Don guidance for_unofficial_posts_-_explained
 
Navy Public Affairs Guide for Ombudsmen
Navy Public Affairs Guide for Ombudsmen Navy Public Affairs Guide for Ombudsmen
Navy Public Affairs Guide for Ombudsmen
 
Rivron two family preparedness
Rivron two family preparednessRivron two family preparedness
Rivron two family preparedness
 
Unofficial Facebook Posts Explained
Unofficial Facebook Posts ExplainedUnofficial Facebook Posts Explained
Unofficial Facebook Posts Explained
 

Mehr von Department of Defense

Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
Department of Defense
 
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
Department of Defense
 
Creative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesCreative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook Pages
Department of Defense
 

Mehr von Department of Defense (20)

Invasive species commanders_guide
Invasive species commanders_guideInvasive species commanders_guide
Invasive species commanders_guide
 
DoD Cyber Strategy
DoD Cyber StrategyDoD Cyber Strategy
DoD Cyber Strategy
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011
 
National Security Space Strategy
National Security Space StrategyNational Security Space Strategy
National Security Space Strategy
 
Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011
 
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
 
Social Media Overview
Social Media OverviewSocial Media Overview
Social Media Overview
 
How To Tweet
How To TweetHow To Tweet
How To Tweet
 
Getting Started With Twitter
Getting Started With TwitterGetting Started With Twitter
Getting Started With Twitter
 
Tips And Tools For YouTube
Tips And Tools For YouTubeTips And Tools For YouTube
Tips And Tools For YouTube
 
Customizing Your YouTube Channel
Customizing Your YouTube ChannelCustomizing Your YouTube Channel
Customizing Your YouTube Channel
 
YouTube Uses In The Field
YouTube Uses In The FieldYouTube Uses In The Field
YouTube Uses In The Field
 
Army Official Social Media Policy
Army Official Social Media PolicyArmy Official Social Media Policy
Army Official Social Media Policy
 
ONR Innovation Newsletter
ONR Innovation NewsletterONR Innovation Newsletter
ONR Innovation Newsletter
 
Getting Started With You Tube
Getting Started With You TubeGetting Started With You Tube
Getting Started With You Tube
 
Creative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesCreative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook Pages
 
Designing Your Facebook Page
Designing Your Facebook Page Designing Your Facebook Page
Designing Your Facebook Page
 
Getting Started With Facebook
Getting Started With Facebook Getting Started With Facebook
Getting Started With Facebook
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

OPSEC Snapshot

  • 1. SOCIAL MEDIA SNAPSHOT OPERATIONS SECURITY (OPSEC)
  • 2. WE ALL KNOW THAT “LOOSE LIPS SINK SHIPS” AND … Social media amplifies OPSEC risks because it enables greater volume and increased speed of information shared publically.
  • 3. The threat is real. The Scoop Deck blog shed light on a Dec. 2009 Al-Qaeda call for their members to monitor what we say about ourselves, our units and our families online in order to gather intelligence. “Information on every U.S. Naval unit should be quietly gathered… their ranks, what state they are from, their family situation, and where their family members live… …search for the easiest ways of striking these ships…. Do not underestimate the importance of any piece of information, as simple as it may seem….” WHAT THEY WANTED: The call wasn’t just about unit missions, location, troop manning, weapons, movement and route. They asked for members’ names, ranks, home state, family situation and family names.
  • 4. Managers of official social media presences have an added responsibility to: Identify information that may compromise OPSEC (and remove it) Inform Sailors, family members and fans/community members of OPSEC best practices So what things should you look for?
  • 5.
  • 6. My daughter is aboard the XYZ ship heading to ABC city/country in X days.
  • 7.
  • 8. My son is aboard the Stennis.
  • 9. He is coming back sometime in May.
  • 10. I’m from the Midwest.BEST PRACTICE: Protect your yourself and your family. Avoid providing details about yourself, especially related to a current deployment. Avoid providing details about your family.
  • 11.
  • 12.
  • 13. He is coming back sometime in May.BEST PRACTICE: To be safer, talk about events that have happened not that will happen, unless that information has been released to the media. Otherwise, don’t provide specific details ship movements.
  • 14. 3. Detailed personal information BEST PRACTICE: Share information about yourself smartly and be careful what you disclose about your family and occupation. Use privacy settings to protect your personal info.
  • 15. Sailors and their families should also be particularly careful not to share: Spouse’s deployment status Home address Telephone numbers Location information Schedules Your close friends and family members have this information, so there is no need to post online.
  • 16. Other information that should not be shared: Descriptions of overseas bases Unit morale Future operations or plans Results of operations Discussions of areas frequented by service members overseas (even off-duty hangouts) Daily military activities and operations Technical information Details of weapons systems Equipment status
  • 17. Well, gosh, what’s ok to share? Pride and support for service, units, specialties, and service member Generalizations about service or duty Port call information after it has been released to media General status of the location of a ship at sea (“operating off the Coast of San Diego” as opposed to “45 nm north of San Diego”) FPO addresses for units Any other information already in the public domain
  • 18. What should you do if you identify information online that risks Operations Security? Record and archive the information and remove it if possible. Notify your command of any potential OPSEC violation. Inform the individual of the OPSEC violation. Use this as a teachable moment and provide him/her with OPSEC best practices and resources so they don’t repeat this mistake. Educate your community/fan base of what OPSEC is, why it’s important, and what they can do about it if they think they know of a violation. YOUR DUTY: As managers of official social media presences that connect our stakeholders with our commands, it is your responsibility to monitor for OPSEC issues and continue to educate audiences about OPSEC.
  • 19. Be careful who you “friend” or those who “follow” you in social media Not everyone who wants to be your “friend” or “follow” you is necessarily who they claim to be. Be mindful of others attempting to use your social presences as a means of targeting your Sailors and their families. BEST PRACTICE: Let your Sailors know that they should only allow people they actually know in real life into their social circles.
  • 20. Naval Operations Security Support Team provides educational materials you can share with your command and family members http://www.facebook.com/NavalOPSEC
  • 21. NavyForMoms also has informative OPSEC resources for families OPSEC tips from Senior Chief Tom Jones, Navy Recruiting Command: Use different screen names if you have profiles on different social networking sites Do not add names or locations to photos posted online Be careful of what images are in the background of photos posted so not to post images with Navy equipment or landmarks that could identify your location http://navyformoms.ning.com/video/opsec-internet-safety
  • 22. Additional OPSEC Resources U.S. Strategic Command (STRATCOM) -- Social Networking OPSEC Training Navy Information Operations Command (NIOC) Norfolk -- Social Networking OPSEC Brief MCPON to Sailors: Be Smart about Online Threats The Basics: Protecting Personal and DoD Information Navy Information Operations Command website CHINFO Social Media Resources Page Naval OPSEC Support team on Facebook Navy for Moms OPSEC video