Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

UPAR 2017 10 Social Media


Published on

UPAR 2017 10 Social Media

Published in: Government & Nonprofit
  • Be the first to comment

  • Be the first to like this

UPAR 2017 10 Social Media

  1. 1. UPAR Training Workshop 2017 Allison Joanis
  2. 2.  DOD and Social Media  Safe Social Networking  Representing the Military on Social Media  Unit Official Social Media Pages  UPAR Responsibilities  Resources and Contact Information
  3. 3.  In 2010, the DOD issued a Directive-Type Memorandum providing guidelines for military use of social media and acknowledged, “that Internet-based capabilities are integral to operations across the Department of Defense.”  Constantly develop policies, guidelines, best practices, response to current events, new ways to put out our information effectively and safely  Soldiers and Airmen are the best and most effective messengers to spread key themes and messages throughout the community  Social Media enables us to communicate quickly and using a wide range of media  We have an obligation to tell our story in the spaces and places where our community is already engaging.
  4. 4.  Social Media helps people and Organizations to share correct information to promote awareness, to gain support and to get our message out there  Where we get news, where we share news  Helps us to connect and stay in contact
  5. 5.  Social Media can be dangerous if you are not careful  Do you know what information you can post about your job or your trianing? Did you know that people can use social media to steal your identity? Did you know that you are at risk even if you don’t use social media?  OPSEC and personal privacy concerns should be paramount when using social media
  6. 6.  A U.S. Government official on sensitive travel to Iraq created a security risk for himself and others by Tweeting his location and activities every few hours.  A Family on vacation kept friends up-to-date via online profiles; their home was burglarized while they were away.  Information on social networking sites has led to people losing job offers, getting fired, and even being arrested.  Social Networking sites are a haven for con-artists, identity thieves.  Kidnapping, rape and murder cases have been linked to social networking sites where the victims first connected with their attackers.  According to Terrorist Handbooks and literature, terrorists are encouraged to use social media to find data on Government personnel and all matters related to them.
  7. 7.  Be mindful of OPSEC  Don’t share information that you don’t want public.  Adjust your privacy settings, turn off geotagging, and check often.  Be cautious when accepting friend requests and followers.  Routinely change your passwords Think before you post. If you wouldn’t put it on a sign in your front yard, don’t post it.
  8. 8.  Protection of critical and sensitive information in order to protect your organization, your missions and personnel  Five Step Process › Identify the critical information › Analyze the treats › Analyze the vulnerabilities › Assess the risks › Apply OPSEC countermeasures
  9. 9.  Personal identifiable information  Future Operations, dates, times, locations (to include deployment and training dates)  Travel Plans  Personnel information  Technical Information  Weapons systems & Equipment status and capabilities  Mission Specifics, limitations, goals & capabilities
  10. 10.  Pride and support for service, units, and service members  Generalizations about service or Duty  General status of the location of a unit › (“operating in southern Afghanistan” as opposed to “operating in the village of Hajano Kali in Arghandab district in southern Afghanistan”)  General Photos that do not depict exact locations, entrances etc.  Any other information already publicly released
  11. 11.  Understand and adjust who can see what you post  Most all major social networking sites have privacy options, but the defaults are set to public, you have to change them manually.
  12. 12.  The process of adding geographical identification to photos, videos, websites, and text messages  The equivalent of adding a 10- digit grid coordinate to everything you post on the internet.  Geotags are automatically embedded in photos taken with smartphones.  Disable GPS features on your smartphone and social media applications.
  13. 13.  September 2014 › ISIL and supporters use web forums and social media to encourage supporters in the United States to attack military, law enforcement, security, and intelligence personnel. Tweets encouraged ISIL followers to use the yellow pages and social media to identify the addresses of military families, and to “show up [at their homes] and slaughter them.”
  14. 14.  October 2014 › An Air Force Service Member posted photos to his social media from a flight over Iraq during a bombing campaign. Those photos were shared by a military website with his photo credit. Following those posts, his social media as well as the social media accounts of his family members here at home, were swarmed with offensive derogatory messages. › ISIS linked Twitter account posts; “We have a raid on an American pilot account at 9:00 evening Mecca time who is participating in the crusaders’ bombing. Retweet this if you are ready to be part of the raid.”
  15. 15.  January 2015 › Islamic State claims to hack US Central Command Social Media Sites. › Posted messages, “American Soldiers, we are coming, watch your back.” “ISIS is already here, we are in your PCs, in each military base.” › The following day, ARNG Twitter Page was tagged by an unknown account with messages and screen shots of information about military commanders, including phone numbers, email addresses and home addresses
  16. 16.  Military members are personally responsible for all content they publish on social media sites, blogs, or other websites.  Military members must be thoughtful about the non-Soldier related content they post. The lines between a Soldier’s personal and professional life often blur in the online space.  As a Soldier or Airman, it’s important to follow certain rules of conduct when interacting on social media platforms.
  17. 17.  It’s important that all Guardsmen know that once they log on to a social media platform, they still represent the National Guard, the Army, Air Force and the DOD.  A Guardsman who violates Federal law, regulations or policies through inappropriate personal online activity is subject to disciplinary action under the Uniform Code of Military Justice (UCMJ) on Title 10, and the Connecticut Code of Military Justice on Title 32.  Soldiers and Airmen are expected to maintain their military bearing both on and offline, in uniform and off duty. Appropriately representing the Military both on and off duty
  18. 18.  Guardsmen should avoid posting offensive material and photos illustrating inappropriate behavior especially in uniform or in an official capacity.  Be careful when expressing personal opinions, or even better, keep them out of print!  Do not promote personal or private fund-raising activities in uniform or in an official capacity (ALS Ice Bucket Challenge)
  19. 19. “We put the FUN in Funeral” “It’s so damn cold out...WHY have a funeral outside! Somebody’s getting a jacked up flag...” “This pic is 3 years old. I was a young airman who didn’t care (not uncommon). I was young and dumb… getting called out for a mistake that took a few second to make but a lifetime to make up for.”
  20. 20. Sgt. Gary Stein, former member of the Marine Corp received a “less that honorable discharge” in 2012 for posting negative comments about the president on his facebook page. Stein argued that he was exercising his right of free speech.
  21. 21.  What Happens online is available to everyone everywhere forever  OPSEC Process with personal and professional information  Check Privacy Settings, but don’t use as a crutch  Post appropriate behavior, especially when in uniform  Stay away from fundraising in uniform  Be careful posting personal opinions that violate your oath  Use common sense!
  22. 22.  Send Photos and cutlines to be shared on the Official State Social Media pages. Or take photos and tag our pages. Be creative!  Admin an Official Unit Social Media Page or assist your unit with in establishing one  Keep an eye out for your fellow Guardsmen  If you see something say something
  23. 23.  Obtain approval from Commander and PAO and request CTARNG Social Media Policy and Checklist and follow procedures.  Designate a minimum of THREE administrators, one being a full time unit member. PLEASE note these on provided form, and send to PAO.  Register page with CTNG PAO  Enforce OPSEC, Comply with Regulations  MODERATE, MODERATE, MODERATE! Do you think that your unit would benefit from a Public or Private Unit Social Media Page?
  24. 24.  Unit day-today activities, training, show military/guard life  Unit Events › Promotions, awards & recognitions, parties  Camaraderie (in and out of uniform when appropriate)  Posts related to holidays or national recognition days. Use trending hashtags for inspiration.  What do you post about your military life on your personal social media? Can that translate to your unit pages?
  25. 25. @The Connecticut National Guard @CTNationalGuard CT National Guard @CTNationalGuard Connecticut National Guard Connecticut National Guard CT National Guard Public Affairs
  26. 26. 130th Public Affairs Detachment 130th Public Affairs Detachment 130th PAD 103rd Airlift Wing 103rd Airlift Wing
  27. 27.  OPSEC and Safe Social Networking Training (IA training site) ›  DISA Social Networking Class ›  FBI Brief on Identity Theft › identity-theft-5278798  U.S. ARMY & Air Force Information on Slide Share › ›
  28. 28. Allison Joanis (860)524-4858 Hartford Armory Rm. 318 Master Sgt. Erin McNamara (860) 292-2460