The Veterans' Guide to Protecting Your Privacy and Staying Safe Online


Published on

This free course developed specifically for veterans shows you how to protect your privacy, prevent getting hacked and what tools you need to stay safe. (Many of the tools are free.) It contains a combination of written tutorials and videos to show you how to get your tasks completed quickly and secure your computer and Facebook profile. Also contains a 30 minute video that shows you how to access your benefits and military records. Proceeds of the software go to Gallant Few.

Published in: Self Improvement, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

  1. 1. The Veterans' Guide to Protecting Your Privacy and Staying Safe Online JINGER JARRETT
  2. 2. Copyright 2013, Jinger Jarrett, All rights reserved. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the author. Inquiries concerning reproduction outside those terms should be sent to the author. The use of registered names, trademarks etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant laws and regulations and therefore free for general use. The publisher makes no representation, express or implied, with regard to the accuracy of the information contained in this book and cannot accept any legal responsibility or liability for any errors or omissions that may be made. Author Website:
  3. 3. Dedication This book is dedicated to my daughters: Ashley, Danielle and Alexandra. They are the most important people in my life and have done more for me than anyone. You have no idea how much I appreciate it. You are the main reason I am still here. Gallant Few Proceeds from the sale of the software with affiliate programs that are listed in this report will be donated to help the work and mission of this organization. (Please feel free to distribute this as widely as possible in support of Gallant Few. You may give it away but please do not sell it.)
  4. 4. INTRODUCTION If all that cloak and dagger stuff some veterans wanted to engage in online worked, I wouldn't have the ability to tell your life's story in 15 minutes. The problem with lying or trying to mask the details of your life without a really good cover story is that eventually it catches up with you and destroys your reputation, you get exposed, and everyone knows who you really are, or you end up compromised and hacked. If you're a veteran who owns a business, you don't want to risk having your business compromised, your reputation ruined and all your money stolen because you didn't protect yourself. There are real ways to protect your privacy online, reduce your chances of getting hacked and keep your information safe. I've been on the Internet since 1995, and I was a computer tech in the Army back in the 80s. I've learned a few things along the way, and I want to share those things with you so you stay safe and don't get ripped off, scammed or have your privacy compromised. There five lessons plus the lesson on navigating the Veterans' Affairs system to help you get your benefits. Part of the course is
  5. 5. in text to present the resources you need for your computer. The rest is presented in video to show you how to get the job done quickly and make yourself secure. Use this information for good. It is meant to protect you and keep you safe. This is my gift to the Veterans' community. I didn't serve in combat, and I was never combat arms. However, I can help protect you now if you are willing to listen. Thank you for your service. No one left behind. Not on the battlefield. Not in life. Sincerely, Jinger Jarrett
  6. 6. Lesson 1 - Secure Your Computer Starting right now let's secure your perimeter online and offline as far as protecting yourself against intruders on your computer and the internet. Although some of this information will seem basic to some of you, to others it will really open your eyes to the threats online. Use this material to your benefit and stay safe. One of the most important lessons I ever learned when I was in the Army was "hide in the open." We went to the field once when I was in Germany. The rest of the time we were working on mission, which was handling the communications for all the bases where we had detachments. Running communications, both secure and unsecure. I was a crypto tech. I worked on encryption devices like red phones. When we went to the field, we had a refresher class on camouflage training. Standing 20 feet in front of us was a soldier no one saw. Why? Because he painted his face and camouflaged his gear so well he blended right in.
  7. 7. The lesson is that if you blend right in, people don't generally mess with your stuff. The most vulnerable are those who act like they have something to hide. People will mess with you. I have been hacked twice since I came online back in the mid 90s: once on my Google account by someone in the Phillipines and once on my web hosting at Hostgator. Both were in the last 2 years. (Someone installed 100 websites on my account. Once I found out about it, I changed hosting.) Yep, I'm loud and I'm proud. I make a lot of noise because I'm a marketer, and you don't make any money if you don't market. Doesn't mean I have my stuff hanging out there for anyone to see. The first step here is to secure your computer. The easiest way for hackers to get into your computer is if you have Remote Desktop enabled. Disable Remote Desktop by going to Start (bottom left corner), Control Panel, and look for RemoteApp and Desktop Communications or something similar and disable any connections you have. Next, make sure your operating system is up to date. This is an easy one. Set automatic updates and keep it up to date. Hackers
  8. 8. exploit these security holes, and if your software is up to date, this is the easiest way to be protected. This is also on the control panel screen. Windows Update. Click on it and go to change settings and set your system to automatically update. Three is to make sure you have a good anti virus and firewall on your system. Get rid of the stuff that comes with your system because there is plenty of free stuff online that works. I use to use Avast! and it caught a trojan on Facebook for me. I changed to AVG because Phoenix said it was better at protecting your computer. It is very good and will protect you online and offline. I also use Windows Firewall. It is available through the control panel. Open control panel and then open Windows Firewall. Turn it on. Install Malware Bytes or something similar and use it to scan for viruses, adware, etc. This program is free. It is good for finding that stuff that is slowing down your computer. Next, you want to clean up your computer. Temporary files clog your computer, corrupt, and cause problems. For this I use Slim Cleaner, and I clean and defrag my computer with it about
  9. 9. once a week. You may not use your computer that much. Do it at least once a month. Make sure all the software on your system is up to date because this is also another way hackers exploit your system. Install a different browser than Internet Explorer. I use Google Chrome. It's fast, lightweight and it's backed by a multi billion dollar company run by a computer geek who loves to make tools. Firefox is also good. (Make sure you read the advice from Phoenix as he disagrees with me on this issue. Whatever you choose, it is important to me you get the protction you need.) Back up your data. If your computer crashes, you don't want to lose your valuable stuff. I use Live Drive. It is a simple to use program. Cost you about $8 a month. There's others. I like Live Drive because it's so easy to use, and they make multiple backups of your stuff so you can find stuff from up to 30 days ago. Finally, create a separate admin account. This is an account you will use to install software or work on your computer if anything goes bad. Go to the Control Panel and click on Users. Create a new user called anything but Admin. Name it something
  10. 10. that is not easy to guess. Use a secure password. Write it down if you have to. Then go to whatever user you are using and remove the admin privileges and add a password. One word about passwords here: Semper Fi, Sua Sponte or God are not good passwords. Never use words or identifying information like birthdays. Never. When we start talking about protecting yourself online, I'll show you how to handle passwords. That is all for today. Tomorrow we start working on the internet. Homework Assignment 1. Turn off Remote Desktop. 2. Update your Windows. 3. Install antivirus and firewall. 4. Install Malware Bytes or something similar and run a full scan. 4. Clean up your computer. 5. Update your software. 6. Change your browser.
  11. 11. 7. Set up a separate admin account. Here is a security checklist to help you. It provides further instructions and tutorials. If you get stuck on any step, ask. Don't minimize this step because each day we will build on this. When we're finished, we'll have you as secure as you can possibly be. All the tools included here are free.
  12. 12. Lesson 2: Usernames, Passwords, Email and Shopping Online Your next step is to examine your usernames, passwords, email and online shopping habits to see if there is a better way to make yourself secure. The equipment I worked on in the Army encrypted the data before sending it across Arpanet. It is a 128 bit random cipher, and it has never been broken by the enemy. It was compromised on the USS Pueblo, 1968. Never broken though. I mention this because this is the minimum strength encryption on your browsers. Usually when someone is compromised online, that person has inadvertently downloaded a program that records keystrokes on the computer. Downloads come from either your email or a site you have visited, so make sure your browser and antivirus are always up to date so this stuff doesn't get missed. You can look up hacking statistics in the search engines. I won't go into big details here. Knowing why it's done helps you protect yourself against it.
  13. 13. hacking-facts/ Hacking may be done by someone who knows you. That's why it's so important to secure your information in a way that you are not compromised on a personal level. Easy passwords are also a problem. The longer and the more random a password, the longer it takes to crack. When you download something in your email, make sure you run your antivirus. It's why I use AVG. It tells me if an attachment is infected before I download. Also, if you receive "official" emails, run your cursor over the links in the email to make sure they are legitimate. Not long ago I received an email from Yahoo telling me they were shutting down my account. Not so. In official emails, like Pay Pal, they know your name. The importance of usernames is in protecting your identity and privacy. If this is your concern, then make sure you don't use a username that connects you to who you are. I've done background checks on people to find out if I was being scammed, and usernames are a great way to track people down. All you
  14. 14. have to do is drop the person's username into Google and follow the trail. Since I own a business and am branding, using my name helps others find me. Same thing with email. Never post your email on a website. This is a great way for others to find out stuff about you and those sites get spidered. Your email ends up on a list, and you get tons of spam. Don't give your email to people you don't want to have it. It's a good idea to have at least 2 email addresses, one public and one private. For a public email, I usually use Gmail. With billions of dollars behind the company and a techno geek running the show, it works pretty well. My private email, which I pay for, is at Yahoo. Passwords are one of the easiest ways to get compromised. Sua Sponte, Semper Fi, God, password and any identifying information related to who you are is the first thing people use to try and hack into your accounts. More than one vindictive girlfriend or boyfriend has used this information to do deadly deeds, so make sure you use passwords that are random and
  15. 15. secure. Add an extra layer of security to protect yourself by password protecting your desktop, and if you use the tools I'm about to recommend, have a master password. Nothing is hack proof. Everything from the Marine Corps to the IRS has been successfully hacked. It doesn't mean you can't protect yourself effectively and slow them down to the point they leave you alone. If you are banking, shopping, or doing any type of activity online that has to do with money, use 17 digit random passwords for those accounts. Anything you want to really protect, use 17 digit random passwords. When you pay for your purchase, make sure it shows https:// in the browser address bar. This means that it is secure and the site has a valid security certificate. Limit your information. I use Pay Pal to shop online a lot, especially with my business, and it helps me to control where my financial information is and where it is stored. (It is also owned by Ebay, another billion dollar company, and they take compromises in security seriously.) The fewer places you have that information available, the
  16. 16. better. Control your important information. You can also buy American Express, Master Card, and Visa gift cards, as well as use a prepaid debit card online instead of your regular cards to protect yourself. This gives you an additional layer of security, especially with prepaid debits because you can buy and recharge those at a CVS or other store that sells prepaid debit. Now if you're like me, I'm too lazy to remember all those 17 digit passwords, so I use tools to help me keep track, and these have an added layer of security for you by allowing you to use a master password. This means before the password is entered into the form, you have to enter the master password into the software first. Two tools you can use, and both have free and very low cost versions and are available on multiple platforms are: I use Roboform because I can load it onto a flash drive and then take it with me. Helpful when you are on public computers and need your passwords. One caveat here: don't put your shopping information like
  17. 17. addresses, phone numbers, credit card information or anything like that into the software. Enter that manually on sites as you go. Avoid having that information available on your computer unless you absolutely have to. Some additional tips here: 1. To protect your surfing habits, set your browser to clear the history and files when you close it. Look under Settings to do this. 2. If you have sensitive files on your computer you want to make unrecoverable, then use Slim Cleaner to shred them. Periodically wipe the white space on your drive too. 3. If you need to send secure email, use secure email tools or email accounts that actually use encryption to encrypt your information before it is sent out. You can get many of these tools for free, and all these tools will keep prying eyes out. Here's a good one that's been around for years. (Make sure you read the terms and conditions on this stuff so you understand what you are getting and what they can legally do.)
  18. 18. 4. Want to surf anonymously? Many of your browsers allow you to switch to safe browsing or secure browsing. (In Google Chrome it's incognito. Use the box in the top right corner of your browser to access this feature.) You can also look at websites online without having it show up in your history. Just pop the URL in and visit the site. In the next lesson I talk about Google, and then we'll move onto Facebook. Since so much hacking goes on with Web 2.0 sites, it's a good idea to know how to protect yourself here. Google also has some great tools like email, Google Voice, Google Drive and others you can use for free. Homework Assignment 1. Download one of the tool bars and set it up on your computer. Use it to generate your passwords. Make sure you add a Master Password. 2. Update any passwords you need to update to secure your
  19. 19. accounts. 3. Remember: information control. The fewer sites where you have sensitive information, the less opportunity for compromise.
  20. 20. Lesson 3 - How to Use Google to Secure Your Privacy Today's lesson is in video. This is so I can show you all the cool tools Google has to offer to help you protect yourself online. In order to access this lesson, you will need to use the private link. I don't want everything I know to be public knowledge. Access the link here: I used BB Flashback Express to make the video. It is free. Homework 1. Sign up for a Google Account. It is free. 2. Once you have signed up and verified your account, then go to the Google search and search for Google Products. This allows you to access all the Google products and set up the measures I suggested in the video. I have included the link here.
  21. 21. However, Google often changes them without updating, so if you can't find this page, then it has been moved. Final Note: When you set up your security questions, don't use things that are easy to guess. Make it something you remember. For example, Mother's maiden name: none or some other random answer that only makes sense to you. You can also use a backup email if you forget your password.
  22. 22. Lesson 4 - Protecting Yourself Against Identity Thieves, Stalkers, and Keeping Yourself Safe This video shows you three different places to use to help you identify where your information is available online and then shows you how to erase this information to protect yourself. Sites Used Homework Sign up for a free account with My Life. Use this site to help you purge the internet of records you don't want others to have. If you have not signed up for a Google account and are using this to help you secure your identity, then make sure you do so. If you plan to use the dating section of My Life, make sure you read the online dating safety tips first.
  23. 23. Lesson 5 - Protecting Yourself on Facebook Facebook is one of the top sites on the internet. It's also one of the most dangerous if you don't understand how to protect yourself. Hackers, viruses, and other stuff can be a landmine. This video shows you how to protect yourself on Facebook.
  24. 24. Lesson 6 – Google Maps: Protecting Your Physical Location I know where you live. I know what your house looks like. Not really. If I wanted to find out though, then this is the tool I would use because it uses satellite technology, along with using a private company called Tele Atlas. The information is quite comprehensive, and as you can see in the video, reveals a lot more information than you think. That's why, if privacy and security is that important to you, make sure you only use your address as needed to do things online and always keep it secure. One suggestion I would make is to get a post office box. Have all your mail sent there. Now it may not work when you are using government agencies. It will help you cover your tracks with everything else.
  25. 25. Lesson 7 – Navigating the Ebenefits System Benefits are an important part of a veterans' life. Understanding how to get your records, find benefit information, see what benefits are available to you is crucial to your success in collecting those benefits. Here is how you access the Ebenefits system, access your military records and check to see if you have any state benefits available to you.
  26. 26. Bonus: Additional Tips to Help You Stay Secure I contacted a fellow veteran who is also a security consultant and asked him for his best advice. Here it is. If you would like to contact the Phoenix, this visit his site: 1) Touching the keyboard, can give away your 'position' so a keyscrambler is an absolute, "encrypting" every single key that is touched, so you and those that "need to know" will get your message, and those that should not, yet still try are going to have one heck of challenge breaking into an "A and B conversation," to C their way into your data. If on a budget, a free to quite pricey version can be found here. You may argue that I.E.. is lacking in many aspects, but I have taught a legion of beginners to so-called experts and even alleged elites--where the holes are that can be filled--with all of the many of 'booby-traps', alarms of a sort, and downright 'nuclear weapons' should anyone dare to even gaze at [their] servers, or
  27. 27. any one workstation that any [lazy/apathetic] user might take a seat in front of. [Civilians] can never be trusted to be completely diligent as you or I my Mistress. None. I have had to have a "Plan Bravo to Zippo" to compensate for each that I have had to protect from bodily harm to economic ruin. Including, having their own mammals that worked with them, alongside them-- stealing from them--innovative ideas that could help our wounded to those wounded in spirit. I cannot stress the importance of having encryption within the hardware that only a finite few would or should, have a need to know about. Please, consider my words... 2) As far as privacy is concerned, "Big Data" is or "Big Brother" has been alive and well, as you wrote [correctly], since the mid-1950's. And it was 'given up', "the Arpanet," or "Ape- Net," as it was known in my time "in the machine" (my military service) and in a certain circle prior to that, in the prime simply because it can never be fully secured, and hence the worst decision was made: handing it over to public sector mammals in a
  28. 28. municipality near you and I. It was "all downhill from there." To [semi-] protect each that uses this tool, like 'the Flame that can provide warmth and comfort'--and kill you--each, as you also stated correctly, must never fully rely on anyone else, as even the postal service 'sells' each of our data without our consent, and oft times without our knowledge. Hence physical 'junk mail' appearing in our mail-box at the end of our driveway's. Or 'Spam' in our most secure e-mail accounts. We are betrayed every nanosecond, every single day. So to "cover" of tracks, or obscure the trail behind us (how copy?), I would and have provided the following [options] to captains of industry, to those with children they want to protect while on any child-oriented site, a [serious] set of or multiple layers of [armor]. Most can be found here. Besides 1) "Cookienator": Automatically removes malicious 'cookies' that report your usage, or 'track' how, where, and what your
  29. 29. viewing (each "page"), and any and all "Third Party" or 'uninvited guests' that want to walk in on your [computer] system, no matter how big or small. 2) IObits' "Advanced SystemCare" (version 6.3 is the current), and the "IObit Malware Fighter": are titans that few will attempt to penetrate if they try to set a "bot" of some sort to a "Trojan" program through a provider into the systems connected to it. 'We' got burned last year via COX, as well as Yahoo, MSN, and Google, by some heavy hitters in Europe last year, and though they got busted by a collaboration of "folks with stinking badges," the 'bots' they had sent out prior to their arrests were "timed' and retrieved user data which was sent to another part, a separate server or servers, at another position in another part or region of our planet. A note regarding Advanced SystemCare: In settings, the user must take some time, and go into the setting of the software under "Ignore List," then remove the plethora of cookies 'they' believe most "go to" most often. One has to look for the 'Browser Cookies' tab, then remove what is seen from the list on the right
  30. 30. (Cookies to keep), to the left (Cookies to Delete), so any trace, anything that is overt to sublime is safely removed. Each has a scanning and defrag utility embedded that can be set up easily. And IObit has a separate 'Defrag' software package as well--that anyone--that takes I.T. security an 1/8th as seriously as 'our' cadre, and I mean you and I alone, should definitely have in their 'armory'. And each can turn off the computer they are installed on--"Off." 3) "AVG Anti-Virus Free Edition 2013," is some really hardcore, "high-speed, low-drag" [Sierra]. If you use it, I pray you will use it wisely and prudently. You can hurt somebody with [that thing] and "its all funny until some loses an eye." All are, in a way, part of a "fire and forget" 'alarm system', wholly attached to an electronic arsenal... 4) "CCleaner": (that is not a typographical error) by these [friendlies], is quite good for removing any 'junk files, including anything that is intention set by the Google browser by any that chose to use it, and any logs, or any other forensic data, that could and would be used to "sell
  31. 31. you," or persecute you, by any hacker of any skill level. There is an 'enhancement tool'--aptly known as CCleaner Enhancer for a 'military' cleaning and removal of underlying 'junk' programs on any system reach out for and take up space on anyone's system. In the 'Settings' tab, under 'Options', you should set the option for "Secure file deletion (Slower)" which makes a 35 pass--'Very Secure Overwrite'--so "bad-guys cannot even find what you have done nor where you have done it. 5) "Glary Utilities": found here, does much of the same as CCleaner, but there are a myriad of 'definitions' out there, none exactly the same, so it is prudent to-- in this case--"kill them all"--in a 'crossfire' of a sort. If one utility does not, or cannot do the job completely, another Bravo-Foxtrot- Gulf from another position probably will... I absolutely do believe in "overkill," but I believe you already knew that about your apprentice long ago... 6) "Spybot - Search & Destroy" http://www.safer- (I just love their name), found here along with a serious review, should and can, be set to "go green" as soon as the
  32. 32. user turns on their system, to just prior to connecting to the 'Net, which, in turn--SHOULD BE BEFORE THE USER CONNECTS THEIR ETHERNET CORD TO THEIR MODEM. It is designed to "cover the user" as "they go in," no matter which browser each uses, and hence, the inherent liabilities of any and all browsers-- including--Googles, which are legion (more in a minute about that version of 'Chrome'). And after disconnecting from the 'Net, a built-in "Search & Destroy" utility (you know me my dear Sister; "back up, back up, back up." Did I, or can I say "back up" or "crossfire" enough? They bring an ill-advised attack, my tripwire (think a "Claymore Mine" attached to an I.C.B.M.) goes "BOOM" and then some, incinerating anything and everything, that sets it off. 7) "Malwarbytes 'Anti-Malware' software" is a very good tool, but I 'update it no less than 3 to 7 times if I have a system attached to the 'Net, as a new version of attack is always a threat, and hence it is prudent to carry "rounds for any and all new occasions" not known before "we go outside the perimeter." So even if a 'pop-up' stating that a new definition is not shown, if you
  33. 33. [click] on the tab "Update," then the 'button' "Check for Updates," 8 out of 10 times, a slightly new version and hence definition from a wholly new threat is ready for the public should any be so diligent in their endeavor for a secure Internet experience. Hiding in the Open: "Stealth"; 'Phoenix' Style Again, I strongly suggest, no matter what software program each may be comfortable with, complacency can "leave a mark." So "Tor," and "Jon/Do", help augment your Internet presence/camouflage, and make any and all that might try to track the user more difficult. It is infinitely harder to hit something that cannot be seen in the prime... If you really 'need' to use Google, or in any other browser; 1) Abines' 'Do Not Track Me', 2) And 'Ghostery', found here, does more than help "cover you as you go in," on any and all known browsers--they have a 'plug-in' for everyone on their home site--no matter which browser each uses or is ultimately comfortable using.
  34. 34. 3) 'AVG Do Not Track' though very good, disables itself (very different than the Abine version) if you are in "InPrivate," mode in Internet Explorer, or "Incognito" mode in Google. 4) Within Googles 'Settings', the 'plug-in' 'Disconnect', an extension which stops major 'third' parties and search engines from tracking the webpages you go to and any searches you do, should absolutely be installed. And on a side note; Google keeps any and all search attempts you might make--forever--and worse, every "Tweet" has been archived at the [U.S.] Library of Congress eternally as well.
  35. 35. Get Additional Help Thank you for taking the time to read my report and watch the videos. Questions or comments? I'm always happy to help. You can contact me as follows: Facebook – Military Veterans Worldwide: Vets Serving Vets. Jobs, Benefits and More. - This is my baby. We're here to serve veterans. Tons of content and resources, as well as personalized help at the individual level to help you get what you need. We're volunteers, and this is a labor of love. Started out under a different name. Now we serve veterans worldwide. mjobs/ My Support Desk – - I'm always happy to help by asking any questions you have.
  36. 36. About the Author Jinger Jarrett is a former US Army soldier (1982 - 1986). She served with the 535th Signal Company in both Grafenwoehr and Nuremberg West Germany from 1984 – 1986 as a 32F, Fixed Ciphony Repair. Her secondary MOS was 71L, Administrative Specialist. From 1991 – 1998, she served in the Michigan Army National Guard, 1460th Transportation Company, Midland, Michigan as a 71L. She transferred to MTC at Camp Grayling where she completed the 46Q, Print Military Journalist course and then worked in the Public Affairs Office. With the help of the GI Bill, she earned a Bachelors of Applied Arts with majors in both Journalism and English Language as Literature. Since 2001 she has owned an online business. She teaches one person businesses how to start a business online and then market online for free. Her book, ”Hour of Power: When Jesus, Zen and Quantum Physics meet the US Army” is available on Amazon, as well as all major online digital bookstores and is designed to help beginners to develop the right mindset for succeeding in online business through the use of Quantum Physics and the laws of the universe. Website: Amazon: