OPSEC - It is everyone's business!
This Resource is from the following Facebook page: https://www.facebook.com/usarmyopsec/
ARMY OPERATIONS SECURITY (OPSEC)·THURSDAY, OCTOBER 5, 2017
It is important to keep family members just as informed and up-to-date about OPSEC as the Soldiers in your unit. To assist Commanders, FRSAs and FRGs, we created this resource guide. Soldiers and family members need to know what information to protect and how to protect it. What needs to be protected? Critical Information, which is the information that the adversary needs to accomplish their goals.How can this information be protected? Countermeasures, which are the methods to maintain secrecy about critical information.
Protect Critical Information. What it is and how to protect it. (PDF)
OPSEC and Ham - A Dr. Seuss Guide to OPSEC. (Graphic - PDF) Any posting here on this page, that has symbols or characters from a copyrighted document or book etc, is used IAW a "fair use" policy. "In its most general sense, a fair use is any copying of copyrighted material done for a limited and “transformative” purpose, such as to comment upon, criticize, or parody a copyrighted work. Such uses can be done without permission from the copyright owner. Apr 4, 2013"
Deployment OPSEC. What not to discuss. [PDF]
Social Media OPSEC: What to do and what not to do. (PDF)
Facebook Note: How to Limit Data Shared on Facebook Detailed instructions with screenshots showing users how to limit data sharing, includes third-party apps.
Guide to more secure social networking (PDF)
Your Safety and Security Online: Safety Tips (PDF)
OPSEC awareness training – Provided by DoD Center for Development of Security Excellence
Organizational Level OPSEC: Vulnerabilities And Indicators [Slides]
Social Media Cyber Security Awareness Briefing [Slides]
OPSEC Snapshot – The threat is real [Slides]
OPSEC: Text, Pictures and Videos. Guide [PDF]
Soldiers and their families need to review their social media site settings and know how to limit the information visible to the public. Posting personal information or allowing public access to personal identifiable information can put you, your family, your friends and battle buddies at risk. Courses:
OPSEC Awareness for Military Members, DoD Employees and Contractors [Course]
OPSEC Fundamentals [Course]
Recommended steps to improve your online security include:
Changing account and security settings minimizing external access to your accounts
Never post information or photos that contains your address, house or street signs, phone number, e-mail address, or license plate information
Wait to post vacation/trip photos until after you return home
Only "friend" people you know
Apply all OPSEC rules to your social media communication: Text, photos and videos.
Do not use "geo-tagging" apps and limit use of other apps as they normally sell your personal information to third parties
Smart Cards explain explain best practices and provide you with instructions to adjust security settings to protect PII.
Review your own social media accounts and ask that your family members do the same. Personal security and operational security go hand in hand; they are vital to our workforce and nation's security and it is everyone's responsibility to practice OPSEC. Here are a additional relevant and up-to-date methods provided by Army Cyber Command and the Army Criminal Investigation Command’s Computer Crime Investigative Unit.
Maximizing security features on Facebook, Twitter, LinkedIn, and Google Plus.
Understanding social media imposters and how to reduce your vulnerability to social media impersonation
What are cookies and how are they used against you maliciously?
Cybersecurity for Army family members
How to best secure your online accounts
Cybersecurity tips for international travelers and troops overseas
How to better protect yourself when shopping online
How to help avoid becoming a victim of phishing and spearphishing
How to protect your home network from malware, viruses and hackers
Why you should never scan your Common Access Card (CAC)
Other resources:
Standards of Conduct as Applied to Personal Social Media Use – Office of Government Ethics Legal Advisory 15-03
OnGuardOnline.gov – Online safety portal manged by the Federal Trade Commision
Internet Social Networking Risks – FBI tips for mitigating risks when using social media
Information Assurance Education, Training and Awareness – From the Information Assurance Support Environment (IASE)
Privacy Best Practices for Social Media – Created by the Federal CIO Council [PDF]
Best Practices for Keeping Your Home Network Secure – From the Information Assurance Mission at NSA [PDF]
This Resource is from the following Facebook page: https://www.facebook.com/usarmyopsec/
ARMY OPERATIONS SECURITY (OPSEC)·THURSDAY, OCTOBER 5, 2017
It is important to keep family members just as informed and up-to-date about OPSEC as the Soldiers in your unit. To assist Commanders, FRSAs and FRGs, we created this resource guide. Soldiers and family members need to know what information to protect and how to protect it. What needs to be protected? Critical Information, which is the information that the adversary needs to accomplish their goals.How can this information be protected? Countermeasures, which are the methods to maintain secrecy about critical information.
Protect Critical Information. What it is and how to protect it. (PDF)
OPSEC and Ham - A Dr. Seuss Guide to OPSEC. (Graphic - PDF) Any posting here on this page, that has symbols or characters from a copyrighted document or book etc, is used IAW a "fair use" policy. "In its most general sense, a fair use is any copying of copyrighted material done for a limited and “transformative” purpose, such as to comment upon, criticize, or parody a copyrighted work. Such uses can be done without permission from the copyright owner. Apr 4, 2013"
Deployment OPSEC. What not to discuss. [PDF]
Social Media OPSEC: What to do and what not to do. (PDF)
Facebook Note: How to Limit Data Shared on Facebook Detailed instructions with screenshots showing users how to limit data sharing, includes third-party apps.
Guide to more secure social networking (PDF)
Your Safety and Security Online: Safety Tips (PDF)
OPSEC awareness training – Provided by DoD Center for Development of Security Excellence
Organizational Level OPSEC: Vulnerabilities And Indicators [Slides]
Social Media Cyber Security Awareness Briefing [Slides]
OPSEC Snapshot – The threat is real [Slides]
OPSEC: Text, Pictures and Videos. Guide [PDF]
Soldiers and their families need to review their social media site settings and know how to limit the information visible to the public. Posting personal information or allowing public access to personal identifiable information can put you, your family, your friends and battle buddies at risk. Courses:
OPSEC Awareness for Military Members, DoD Employees and Contractors [Course]
OPSEC Fundamentals [Course]
Recommended steps to improve your online security include:
Changing account and security settings minimizing external access to your accounts
Never post information or photos that contains your address, house or street signs, phone number, e-mail address, or license plate information
Wait to post vacation/trip photos until after you return home
Only "friend" people you know
Apply all OPSEC rules to your social media communication: Text, photos and videos.
Do not use "geo-tagging" apps and limit use of other apps as they normally sell your personal information to third parties
Smart Cards explain explain best practices and provide you with instructions to adjust security settings to protect PII.
Review your own social media accounts and ask that your family members do the same. Personal security and operational security go hand in hand; they are vital to our workforce and nation's security and it is everyone's responsibility to practice OPSEC. Here are a additional relevant and up-to-date methods provided by Army Cyber Command and the Army Criminal Investigation Command’s Computer Crime Investigative Unit.
Maximizing security features on Facebook, Twitter, LinkedIn, and Google Plus.
Understanding social media imposters and how to reduce your vulnerability to social media impersonation
What are cookies and how are they used against you maliciously?
Cybersecurity for Army family members
How to best secure your online accounts
Cybersecurity tips for international travelers and troops overseas
How to better protect yourself when shopping online
How to help avoid becoming a victim of phishing and spearphishing
How to protect your home network from malware, viruses and hackers
Why you should never scan your Common Access Card (CAC)
Other resources:
Standards of Conduct as Applied to Personal Social Media Use – Office of Government Ethics Legal Advisory 15-03
OnGuardOnline.gov – Online safety portal manged by the Federal Trade Commision
Internet Social Networking Risks – FBI tips for mitigating risks when using social media
Information Assurance Education, Training and Awareness – From the Information Assurance Support Environment (IASE)
Privacy Best Practices for Social Media – Created by the Federal CIO Council [PDF]
Best Practices for Keeping Your Home Network Secure – From the Information Assurance Mission at NSA [PDF]
This Resource is from the following Facebook page: https://www.facebook.com/usarmyopsec/
PERSEC- Personal Security