UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking.

Slides:



Advertisements
Similar presentations
Fleet & Family Support Ombudsman Program & Operations Security
Advertisements

Presented by the San Diego Industrial CI Awareness Working Group, an Affiliate of the Industrial Security Awareness Council.
Cyber Safety Assessment Review
Part I: Making Good Online Choices
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Naval OPSEC Support Team Navy Information Operations Command, Norfolk #Don’tDoThat: Social Media Trends.
Learning Lab - Social Media for the Civil Air Patrol What PAOs and commanders need to know to make these free delivery platforms work for their units,
THE FOLLOWING MINI PRESENTATION ON OPSEC IS TAKEN FROM A US AIR FORCE BRIEFING. ALTHOUGH THIS IS A MILITARY PRESENTATION, IT PROVIDES A GOOD OVERVIEW OF.
Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
NEW YORK NATIONAL GUARD FAMILY PROGRAMS Offered & presented by CW2 Walker Family Programs OPSEC Program Manager.
Follow Surface Warriors on: Facebook Twitter YouTube Flickr WordPress Ombudsman Social Media Training Updated 1/25/12.
OPSEC Countermeasures Michael Chesbro DES OPSEC Officer OPSEC Countermeasures Michael Chesbro DES OPSEC Officer.
TLO 2: Action: Plan operational security. Intermediate-level training.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
UNCLASSIFIED. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
OPSEC and Social Networking
One Team, One Fight One Mission Presented by the Ordnance Center & Schools Security Office.
Online Information Services and Social Media Social Networking.
Military families and Operational Security. Family members are vital to the success of our military. You may not know it, but you play a crucial role.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Following the terrorist attack on September 11, 2001 the President declared a national emergency … Secretary of Defense Donald Rumsfeld cautioned on the.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Presented by the 1st Information Operations Command.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name)
Operational Security PCC. VII-F.1.
Safe Use of Social Media Cadets – Air Force’s Future.
Twitter.com/DOTLebanon facebook.com/DOTLebanon‎ A presentation about social media with emphasis on facebook.
Protecting Your Personal Information November 15, 2013.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Provided by OSPA ( Vulnerabilities and Indicators The OPSEC Process, step 3 Presented by: (Presenter’s Name)
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Website that support online communities 1. Wikis 2. Blogs 3. Forums 4. Social networking sites.
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Dangers of Online Media and Social Networking By: Micah Cochrane Maurice Gamble Shenne Howell Elvyn Morales.
OPSEC & Social Media dd mmm yy Overall Classification of this Briefing is UNCLASSIFIED//FOUO FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH.
Operational Security Awareness
OPSEC for Families. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know.
Policies and Security for Internet Access
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
DIGITAL CITIZENSHIP ED 505 TECHNOLOGY AND EDUCATION (REVISION)
Creating your online identity
Operations Security (OPSEC) For New Hires
University of west Alabama Ed 505 Tasha Vaughn
Command Indoctrination
Overall Classification of this Briefing is UNCLASSIFIED
Ombudsman Social Media Training
OPSEC General Military Training DD MMM YY
Command Indoctrination Operations Security DD MMM YY
JEB – Little Creek (Bldg 1126)
Operations Security (OPSEC)
CMD LOGO Operations Security (OPSEC) Assessment in-brief Presenter
Overall Classification of this Briefing is UNCLASSIFIED
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name) Provided by OSPA (
Internet Safety – Social Media
INTERNATIONAL MARITIME SECURITY.
OPSEC General Military Training DD MMM YY
Command Indoctrination Operations Security DD MMM YY
Overview OPSEC Threat Critical Information Indicators Data Aggregation
Presentation transcript:

UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking

UNCLASSIFIED OPSEC and Social Networking Naval OPSEC Support Team (NOST) Navy Information Operations Command (NIOC) (757) DSN

UNCLASSIFIED OPSEC is a process that identifies critical information, outlines potential threats and risks and develops counter measures to safeguard critical information Operations Security OPSEC

UNCLASSIFIED Information the adversary needs to prevent our success. Critical Information Information we must protect to ensure success. - Names and photos of you, your family and co-workers - Usernames, passwords, network details - Job title, location, salary, clearances - Physical security and logistics - Position, mission capabilities and limitations - Operations & missions - Schedules and travel itineraries - Social security number, credit cards, banking information - Hobbies, likes, dislikes, etc.

UNCLASSIFIED Data Aggregation Information collection from multiple sources Al Qaeda handbook: open and legal public sources accounts for 80% of all information collected Legal and illegal collection methods

UNCLASSIFIED Methods used to obtain Critical Information: Unprotected communications Sharing too much with strangers HUMINT Observations Technology Trash Media Web pages Social Networking Sites Potential Vulnerabilities Illegal methods are OK with adversaries!!!

UNCLASSIFIED Social Networking Social Networking Sites (SNS) allow people to network, interact and collaborate to share information, data and ideas without geographic boundaries.

UNCLASSIFIED The Danger Al-Qaeda communiqué December 2009: “The affair with the U.S. Navy began several years ago, when the lions of Al-Qaeda struck the destroyer U.S.S. Cole, in Yemen; now, with Allah’s help, all the American vessels in the seas and oceans, including aircraft carriers, submarines, and all naval military equipment deployed here and there that is within range of Al-Qaeda’s fire, will be destroyed… “To this end, information on every U.S. naval unit – and only U.S. [units]!! – should be quietly gathered [as follows:] [the vessel's] name, the missions it is assigned; its current location, including notation of the spot in accordance with international maritime standards; the advantages of this naval unit; the number of U.S. troops on board, including if possible their ranks, and what state they are from, their family situation, and where their family members (wife and children) live; what kind of weapons they carry; the [vessel's] destination…; which naval units are closest to Islamic countries; which naval units are close to Western countries in general; searching all naval websites in order to gather as much information as possible, and translating it into Arabic; search for the easiest ways of striking these ships… “My Muslim brothers, do not underestimate the importance of any piece of information, as simple as it may seem; the mujahedeen, the lions of monotheism, may be able to use it in ways that have not occurred to you.” …. Do not underestimate the importance of any piece of information, as simple as it may seem…. Information on every U.S. Naval unit should be quietly gathered…what state they are from, their family situation, and where their family members live… …search for the easiest ways of striking these ships…

UNCLASSIFIED DO’S & DON’TS of SOCIAL NETWORKING

UNCLASSIFIED “Do” Do: Verify All Friend Requests Social engineering and “conning” starts with a friend request Adversaries can get the data from: Free people search engines Other SNS’s Your posts/profile Your friends posts/profile Verify Requests Before Approving! Adversary

UNCLASSIFIED Avoid details, don’t get personal Who is reading your blog? Lessons learned 101 for the adversary “Do” Do: Blog with Caution

UNCLASSIFIED “Do” Do: Be an Informed User of a SNS How much personal information do you broadcast? Are you very careful about what details you post? Do you understand data aggregation issues? Are you willing to find and learn all the security settings and keep up with them as they change? Are you willing to accept the risk?

UNCLASSIFIED “Do” Do: Assume the Internet is FOREVER There is no true delete on the internet WWW means World Wide Web Every Picture Every Post Every Detail

UNCLASSIFIED “Don’t” Don’t: Discuss Details Never post anything you would not tell directly to the enemy Never post private or personal information - no matter how secure you think your settings are Assume the information you share will be made public Details make you vulnerable

UNCLASSIFIED “Don’t” Do NOT post exact deployment dates –Avoid the use of count-up or count-down tickers Don’t speculate about future operations If posting pictures, don’t post anything that could be misconstrued or used for propaganda purposes Do not pass on rumors

UNCLASSIFIED “Do NOT discuss ” Flight routes, flight schedules Detailed information on the mission, capabilities or morale of a unit Do not post deployment locations or detachment sites – After the deployment is officially announced by Military officials, you may discuss locations that have been released, normally on the Country level Security procedures, response times, tactics Equipment or lack thereof, to include training equipment

UNCLASSIFIEDQuestions?