Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

OPSEC Critical Information


Published on

Protect Critical Information: Know what to protect and how to protect it.

Published in: Government & Nonprofit
  • Be the first to comment

  • Be the first to like this

OPSEC Critical Information

  1. 1. Connect online. Stay informed by liking: Critical Information Service members, government employees and family members should always be mindful about the information they share. Even though this information may not be secret, a lot of it is considered "critical information", which is information dealing with specific facts about military capabilities, activities, limitations, and intentions (CALI). If an adversary knew this detailed information, our mission and personnel safety could be jeopardized. Examples of critical information include: • Detailed information about the mission of assigned units • Details on locations and times of unit deployments • Personnel transactions that occur in large numbers (Example: pay information, powers of attorney, wills and deployment information) • References to trends in unit morale or personnel problems • Details concerning security procedures This information may seem insignificant. However, to a trained adversary, they are small pieces of a puzzle that highlight what a military unit is doing and planning.
  2. 2. Connect online. Stay informed by liking: Protecting Critical Information When it comes to protecting critical information, there are several things individuals can do. They include editing emails for operations security before sending them, using encryption emails to protect sensitive information and shredding and using burn bags to destroy notes and documents with Social Security numbers, personal records, home addresses and reports that reflect our strengths, assets and future operations. Where and how you discuss critical information is just as important as with whom you discuss it with. Adverse agents tasked with collecting information frequently visit some of the same stores, clubs, recreational areas or places of worship as you do. Determined individuals can easily collect data from trash cans, cordless and cellular phones, and even baby monitors, using inexpensive receivers available from local electronics stores.