Provided by OSPA (www.opsecprofessionals.org) OPSEC for Families Presented by: (Presenter’s Name)

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Fleet & Family Support Ombudsman Program & Operations Security
Cyber Safety Assessment Review
Naval OPSEC Support Team Navy Information Operations Command, Norfolk #Don’tDoThat: Social Media Trends.
Ms.Kathy. Netiquette refers to the rules of good online behaviour.
INTERNET SAFETY FOR STUDENTS
Stranger Danger: Internet Safety. Not everyone on the internet are who they say they are…  Sometimes a stranger can try to gain your trust by pretending.
What you don’t know CAN hurt you!
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
NEW YORK NATIONAL GUARD FAMILY PROGRAMS Offered & presented by CW2 Walker Family Programs OPSEC Program Manager.
OPSEC Countermeasures Michael Chesbro DES OPSEC Officer OPSEC Countermeasures Michael Chesbro DES OPSEC Officer.
TLO 2: Action: Plan operational security. Intermediate-level training.
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
UNCLASSIFIED. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that.
ONLINE SHOPPING BY ROMIL SOMAIYA FOR CLASH GROUP community LEICESTER ARTHERITIS SELF HELP ©
Do you know how to keep yourself safe?
One Team, One Fight One Mission Presented by the Ordnance Center & Schools Security Office.
INTERNET SAFETY FOR STUDENTS
Military families and Operational Security. Family members are vital to the success of our military. You may not know it, but you play a crucial role.
Develop goal setting plans for each area of your life. Activity 2 It is helpful when you are trying to create a vision of the type of person that you want.
UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking.
Following the terrorist attack on September 11, 2001 the President declared a national emergency … Secretary of Defense Donald Rumsfeld cautioned on the.
Presented by the 1st Information Operations Command.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Operational Security PCC. VII-F.1.
Healthy Relationships and Social Media (Part 2 of 2) Grade 8.
Michael S. Williams 1. “Gentlemen don’t read each other’s mail.” - Henry L. Stimson 2.
Internet Safety & Online Citizenship
[Insert your logo here] 12 th Annual Joint Services/Agency/ERC Relocation Training Conference Social Media Bruce Moody Program Communications Navy Family.
Media Guidance and Talking Points for Arrowhead Spouses Part 1: Guidance When the Media Calls You.
APAN Group Owner Training. APAN Groups Overview FOUO PII Other types Information Categories Aggregate data impacts OPSEC Group Owner Responsibilities.
 We live in an information age where it's very easy to publish on the Internet. The average person can write their own blog and add to Wikipedia. Anything.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Product Rule. Product Rule – used when functions are being multiplied Product Rule.
Provided by OSPA ( Vulnerabilities and Indicators The OPSEC Process, step 3 Presented by: (Presenter’s Name)
STOP Cyberbullying! Alex and Anika Cyber Safety Rule #1  If someone is posting mean things about you, use privacy tools to stop them. If you can’t stop.
Internet Safety Tips.
Presentation by: Jennifer Collins Roldan Padilla.
Online Safety 2.02 Remember the rules of online safety.
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Operational Security Awareness
OPSEC for Families. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know.
Provided by OSPA ( Operations Security (OPSEC)
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.
Netiquette and Online Safety By: H F. Netiquette Netiquette is the do’s and don’ts of the internet. Basically netiquette is the rules of online communication.
E-Safety Many people around the world use internet For entertainment, social lives and Work. However, nobody knows what YOU could be getting yourself.
Great Moments in Communication Created by: Savannah York.
Internet Safety Mrs. Lijó. Some Names for the Internet Cyberspace The Web The Net The Information Highway The World Wide Web.
How Can I Stay Safe When I Use The Internet?. Do Not Give Out Personal Information Your last name Your home or cell phone numbers Where you live Where.
National Security Agency (NSA) Surveillance Christopher Boyd.
Provided by OSPA ( Last Modified Nov 9, 2007 OPSEC and Children Presented by: (Presenter’s Name)
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Operations Security (OPSEC) For New Hires
Command Indoctrination
Overall Classification of this Briefing is UNCLASSIFIED
Command Indoctrination Operations Security DD MMM YY
Warrior Wednesday DIGITAL CITIZENSHIP.
JEB – Little Creek (Bldg 1126)
Operations Security (OPSEC)
CMD LOGO Operations Security (OPSEC) Assessment in-brief Presenter
Overall Classification of this Briefing is UNCLASSIFIED
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name) Provided by OSPA (
OPSEC and the World Wide Web
Ask Listen Do Space for your logo here
Command Indoctrination Operations Security DD MMM YY
Overview OPSEC Threat Critical Information Indicators Data Aggregation
Presentation transcript:

Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name)

Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that you’re half of the team?

What is OPSEC?

What OPSEC is: Denying any useful information to the enemy A mindset, a way of thinking Applied to web pages, blogs, s A standard that can be applied to any situation

What OPSEC is NOT: A collection of specific rules to cover every possible situation

Who would try to get information from a spouse? Foreign intelligence US citizens Terrorists Criminals Coalition partners Computer hackers

What information are they looking for? Military movement information, such as dates and locations Unit issues, especially morale or dissatisfaction Security issues, such as tactics or defenses Equipment issues Specific location of unit Pictures of successful attacks (both ours and theirs) Pictures that could be interpreted differently than intended

What you can do Ensure that the information posted has no significant value to the enemy Always assume that the enemy is reading what you’re writing Be careful about discussing information in public settings (Clubs, airports, gyms) Avoid publically (online or real life) speculation about future missions (“they’ll probably start building up here, next”)

What you can do Be especially careful to safeguard “indicators”, pieces of information that provide clues about future activities Railhead dates Increase in field exercises Ceremonies POV storage Increase in financial activity, such as wills and power of attorneys

A note on telephones Remember that cordless phones and cell phones are NOT completely secure! Anything you say is transmitted over the airwaves and can be intercepted Same is true with landline phones! Lines can be crossed or intentionally intercepted!

The bottom line Think like the “bad guy” before you post something online or have a public conversation.

Questions?