SlideShare a Scribd company logo
1 of 20
Ombudsman Hot Topic:
Social Media Trends

Naval OPSEC Support Team
Navy Information Operations Command, Norfolk
757-417-7100
opsec@navy.mil
OPSEC. Because you are not a
Navajo code talker, and you’re
really not fooling anyone.

Naval OPSEC

Support Team
OPSEC Best Practice
Operations Security is a 5-step process that:
1. Identifies Critical Information
2. Identifies credible threats
3. Assess vulnerabilities
4. Assess risks associated with vulnerabilities
5. Develop countermeasures
Bumper stickers. Because every random
stranger driving near you should know
exactly how many children you have
and where they go to school.

Naval OPSEC

Support Team
OPSEC Best Practice
• Look at your daily activities from the enemies’ point of view.
• Understand what an enemy might learn about you and your
family from the information and details that you make
available.
• Assess the level of risk that this places on you and your family.
• Develop and apply counter measures, which help to prevent
the enemy from obtaining your critical information and using
it against you.
Most people don’t know this, but you
don’t need to post, tweet, blog, chat, pin,
upload, whisper, snap chat, text, email,
Skype, or facetime every time you go to
the gym.

Naval OPSEC

Support Team
OPSEC Best Practice
What you really learn from Facebook pages and profiles:
• Average income
• Security clearance level
• Family makeup
• Current psychological state
• Current location and contact information
• Ships roster
• Sensitive deployment dates and locations
• Relative readiness condition
“Well here is your problem!
Privacy never includes the
internet.”

Naval OPSEC

Support Team
OPSEC Best Practice
• Your security settings are only as good as your most public
friend
• One persons private tweet is another persons public post
• Security settings are often underutilized and easy to bypass
Who needs your home address
when I have access to your
Instagram?

Naval OPSEC

Support Team
OPSEC Best Practice
• Understand your technology
• Always consider how else this information can be used
The smarter the phone the
greater the risk.

Naval OPSEC

Support Team
OPSEC Best Practice
•
•
•
•

Anti virus?
Password protected
Malware: there’s an app for that
Convenience vs. vulnerability
SnapChat. Because anything
that needs to be deleted
after 15 seconds is never a
bad idea.

Naval OPSEC

Support Team
OPSEC Best Practice
• If it sounds too good to be true, it is. Every single time.
• Don’t trust third party applications with personal, private or
critical information
• There is no such thing as private online
• Consider how your content can be used against you
• There is no true delete function on the internet
If you have to ask
“can I post…”, the
answer is always no.

Naval OPSEC

Support Team
OPSEC Best Practice
• Never share anything you would not tell directly to the enemy
• Never post private or personal information
• Assume any information you share will be made public
Loose lips still sink ships…
And rob homes,
compromise personal
information and drain
bank accounts.

Naval OPSEC

Support Team
OPSEC Best Practice
Knowledge is power …. for both you and the adversary
• Understand the value of your information
• Be suspicious of unsolicited phone calls, online requests, or
emails
• Be suspicious when information about you and your family is
requested
• Always ask yourself, do they have the “need to know”
• Share the OPSEC message with friends and extended family
members
Questions?
www.facebook.com/navalOPSEC
www.twitter.com/navalOPSEC
www.slideshare.net/navalOPSEC
www.youtube.com/USNopsec

Naval OPSEC Support Team
Navy Information Operations Command, Norfolk
757-417-7100
opsec@navy.mil
Ombudsman Hot Topic- Social Media Trends

More Related Content

What's hot

Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
Marco Morana
 
The Cross Site Scripting Guide
The Cross Site Scripting GuideThe Cross Site Scripting Guide
The Cross Site Scripting Guide
Daisuke_Dan
 
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike
 

What's hot (20)

An Inside Look At The WannaCry Ransomware Outbreak
An Inside Look At The WannaCry Ransomware OutbreakAn Inside Look At The WannaCry Ransomware Outbreak
An Inside Look At The WannaCry Ransomware Outbreak
 
Ransomware
RansomwareRansomware
Ransomware
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
 
Ransomware
RansomwareRansomware
Ransomware
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
 
Mapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE Activities
 
Ransomeware
RansomewareRansomeware
Ransomeware
 
The Cross Site Scripting Guide
The Cross Site Scripting GuideThe Cross Site Scripting Guide
The Cross Site Scripting Guide
 
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
 
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence Matrix
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 

Viewers also liked

Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
Fort Rucker FRSA
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_online
Ftlwood Families
 

Viewers also liked (16)

FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015
 
Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Securing home wifi 16 mar15
Securing home wifi 16 mar15Securing home wifi 16 mar15
Securing home wifi 16 mar15
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
 
Conley Group Opsec Presentation
Conley Group Opsec PresentationConley Group Opsec Presentation
Conley Group Opsec Presentation
 
Analogic Opsec 101
Analogic Opsec 101Analogic Opsec 101
Analogic Opsec 101
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_online
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Facebook Privacy and Account Settings - Navy OPSEC
Facebook Privacy and Account Settings - Navy OPSECFacebook Privacy and Account Settings - Navy OPSEC
Facebook Privacy and Account Settings - Navy OPSEC
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)
 
Phishing
PhishingPhishing
Phishing
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 

Similar to OPSEC for OMBUDSMEN

Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
Blitzing with your defense bea con
Blitzing with your defense bea conBlitzing with your defense bea con
Blitzing with your defense bea con
Innismir
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
icts-uct
 

Similar to OPSEC for OMBUDSMEN (20)

Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Blitzing with your defense bea con
Blitzing with your defense bea conBlitzing with your defense bea con
Blitzing with your defense bea con
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Security Awareness - Defined, Managed and Measured
Security Awareness - Defined, Managed and MeasuredSecurity Awareness - Defined, Managed and Measured
Security Awareness - Defined, Managed and Measured
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousness
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

More from Naval OPSEC (16)

Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Opsec SNS
Opsec SNSOpsec SNS
Opsec SNS
 
Opsec Heart Breaker
Opsec Heart BreakerOpsec Heart Breaker
Opsec Heart Breaker
 
Trash as Treasure
Trash as TreasureTrash as Treasure
Trash as Treasure
 
Don't Get Blindsided
Don't Get BlindsidedDon't Get Blindsided
Don't Get Blindsided
 
Picture is worth a thousand lives
Picture is worth a thousand livesPicture is worth a thousand lives
Picture is worth a thousand lives
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

OPSEC for OMBUDSMEN

  • 1. Ombudsman Hot Topic: Social Media Trends Naval OPSEC Support Team Navy Information Operations Command, Norfolk 757-417-7100 opsec@navy.mil
  • 2. OPSEC. Because you are not a Navajo code talker, and you’re really not fooling anyone. Naval OPSEC Support Team
  • 3. OPSEC Best Practice Operations Security is a 5-step process that: 1. Identifies Critical Information 2. Identifies credible threats 3. Assess vulnerabilities 4. Assess risks associated with vulnerabilities 5. Develop countermeasures
  • 4. Bumper stickers. Because every random stranger driving near you should know exactly how many children you have and where they go to school. Naval OPSEC Support Team
  • 5. OPSEC Best Practice • Look at your daily activities from the enemies’ point of view. • Understand what an enemy might learn about you and your family from the information and details that you make available. • Assess the level of risk that this places on you and your family. • Develop and apply counter measures, which help to prevent the enemy from obtaining your critical information and using it against you.
  • 6. Most people don’t know this, but you don’t need to post, tweet, blog, chat, pin, upload, whisper, snap chat, text, email, Skype, or facetime every time you go to the gym. Naval OPSEC Support Team
  • 7. OPSEC Best Practice What you really learn from Facebook pages and profiles: • Average income • Security clearance level • Family makeup • Current psychological state • Current location and contact information • Ships roster • Sensitive deployment dates and locations • Relative readiness condition
  • 8. “Well here is your problem! Privacy never includes the internet.” Naval OPSEC Support Team
  • 9. OPSEC Best Practice • Your security settings are only as good as your most public friend • One persons private tweet is another persons public post • Security settings are often underutilized and easy to bypass
  • 10. Who needs your home address when I have access to your Instagram? Naval OPSEC Support Team
  • 11. OPSEC Best Practice • Understand your technology • Always consider how else this information can be used
  • 12. The smarter the phone the greater the risk. Naval OPSEC Support Team
  • 13. OPSEC Best Practice • • • • Anti virus? Password protected Malware: there’s an app for that Convenience vs. vulnerability
  • 14. SnapChat. Because anything that needs to be deleted after 15 seconds is never a bad idea. Naval OPSEC Support Team
  • 15. OPSEC Best Practice • If it sounds too good to be true, it is. Every single time. • Don’t trust third party applications with personal, private or critical information • There is no such thing as private online • Consider how your content can be used against you • There is no true delete function on the internet
  • 16. If you have to ask “can I post…”, the answer is always no. Naval OPSEC Support Team
  • 17. OPSEC Best Practice • Never share anything you would not tell directly to the enemy • Never post private or personal information • Assume any information you share will be made public
  • 18. Loose lips still sink ships… And rob homes, compromise personal information and drain bank accounts. Naval OPSEC Support Team
  • 19. OPSEC Best Practice Knowledge is power …. for both you and the adversary • Understand the value of your information • Be suspicious of unsolicited phone calls, online requests, or emails • Be suspicious when information about you and your family is requested • Always ask yourself, do they have the “need to know” • Share the OPSEC message with friends and extended family members
  • 20. Questions? www.facebook.com/navalOPSEC www.twitter.com/navalOPSEC www.slideshare.net/navalOPSEC www.youtube.com/USNopsec Naval OPSEC Support Team Navy Information Operations Command, Norfolk 757-417-7100 opsec@navy.mil Ombudsman Hot Topic- Social Media Trends