SlideShare a Scribd company logo
OPSEC Training & Awareness  to the Army Family
What, exactly,  is OPSEC?  OPSEC is protecting certain information that will keep your loved one safe. It’s making sure to keep the right kind of secrets to protect your loved one. What kind of secrets? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],OPSEC 101
What seemed like unimportant information from one site can be the start of the Google search leading to other sites.  Remember: even items which are deleted from Web sites  can still be searched!
Using Social Media to Stay Connected Social media outlets such as Facebook or chat options such as Gmail chat can be a great way to stay connected during deployments.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ Please burglarize  my house!”  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Even if you think you’re  being “clever,”  you could  accidentally leak a  small piece of  information.
Myth #1  – “I am no one they care about.” Fact #1  – One small piece of information can be the last puzzle piece the enemy needs. 4 Myths about OPSEC
4 Myths about OPSEC Myth #2  – “I don’t have any adversaries.” Fact #2  – Think about: former boyfriends/girlfriends, angry neighbors,  identity thieves
4 Myths about OPSEC Myth #3  – “I’m smarter than the enemy.”  Fact #3  – Information theft is a good    investment for the enemy. Some    nations are willing to spend      BILLIONS of dollars for our      seemingly trivial information.    One small mistake on line can   put our Soldiers at big risk.
4 Myths about OPSEC Myth #4  – “I don’t post on the Internet.”  Fact #4  – Unencrypted emails can be misrouted, intercepted or gathered.
Don’t be sad!  ,[object Object],[object Object],[object Object],[object Object],[object Object]
It’s ALWAYS better to  be cautious!
Questions?
Lindy Kyzer [email_address] 703.697.4314 ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Day 2: Bias Lesson
Day 2: Bias LessonDay 2: Bias Lesson
Day 2: Bias Lesson
Sam Spurlin
 
Keep your teens safe on the internet
Keep your teens safe on the internetKeep your teens safe on the internet
Keep your teens safe on the internet
Deborah Brown
 
Full Funnel Marketing for Facebook and LinkedIn
Full Funnel Marketing for Facebook and LinkedInFull Funnel Marketing for Facebook and LinkedIn
Full Funnel Marketing for Facebook and LinkedIn
Damon Gochneaur
 
Conspiracy Theories and Explanations
Conspiracy Theories and ExplanationsConspiracy Theories and Explanations
Conspiracy Theories and Explanations
dyeakel
 
Fake news? Protect yourself.
Fake news? Protect yourself.Fake news? Protect yourself.
Fake news? Protect yourself.
Amy LC
 
Twitter ye Not - A journalist view of Twitter
Twitter ye Not - A journalist view of TwitterTwitter ye Not - A journalist view of Twitter
Twitter ye Not - A journalist view of Twitter
Porter Novelli
 
2015 AppSecUSA 2015 - Wait wait... don't pwn me!
2015 AppSecUSA 2015 - Wait wait... don't pwn me!2015 AppSecUSA 2015 - Wait wait... don't pwn me!
2015 AppSecUSA 2015 - Wait wait... don't pwn me!
Mark Miller
 
Fa102a, assignment 3
Fa102a, assignment 3Fa102a, assignment 3
Fa102a, assignment 3
brittanywong12
 
WALT be Cyber smart
WALT be Cyber smartWALT be Cyber smart
WALT be Cyber smart
wiggit
 
EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE
EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE
EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE
LallainePetalcorin
 
Be responsibly digital in Fake News Era
Be responsibly digital in Fake News EraBe responsibly digital in Fake News Era
Be responsibly digital in Fake News Era
Kumar Manish
 
Building Community with Social Media
Building Community with Social MediaBuilding Community with Social Media
Building Community with Social Media
Bob Bertsch
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
One-IT
 
Germany Finds US Spy and Asks CIA Station Chief to Leave Country
Germany Finds US Spy and Asks CIA Station Chief to Leave CountryGermany Finds US Spy and Asks CIA Station Chief to Leave Country
Germany Finds US Spy and Asks CIA Station Chief to Leave Country
News Feather
 
Plagiarism Lesson 2018
Plagiarism Lesson 2018Plagiarism Lesson 2018
Plagiarism Lesson 2018
Elisabeth Palmer Abarbanel
 
News Literacy, Spring 2024: Week 6 Lecture
News Literacy,  Spring 2024: Week 6 LectureNews Literacy,  Spring 2024: Week 6 Lecture
News Literacy, Spring 2024: Week 6 Lecture
Steve Fox
 

What's hot (16)

Day 2: Bias Lesson
Day 2: Bias LessonDay 2: Bias Lesson
Day 2: Bias Lesson
 
Keep your teens safe on the internet
Keep your teens safe on the internetKeep your teens safe on the internet
Keep your teens safe on the internet
 
Full Funnel Marketing for Facebook and LinkedIn
Full Funnel Marketing for Facebook and LinkedInFull Funnel Marketing for Facebook and LinkedIn
Full Funnel Marketing for Facebook and LinkedIn
 
Conspiracy Theories and Explanations
Conspiracy Theories and ExplanationsConspiracy Theories and Explanations
Conspiracy Theories and Explanations
 
Fake news? Protect yourself.
Fake news? Protect yourself.Fake news? Protect yourself.
Fake news? Protect yourself.
 
Twitter ye Not - A journalist view of Twitter
Twitter ye Not - A journalist view of TwitterTwitter ye Not - A journalist view of Twitter
Twitter ye Not - A journalist view of Twitter
 
2015 AppSecUSA 2015 - Wait wait... don't pwn me!
2015 AppSecUSA 2015 - Wait wait... don't pwn me!2015 AppSecUSA 2015 - Wait wait... don't pwn me!
2015 AppSecUSA 2015 - Wait wait... don't pwn me!
 
Fa102a, assignment 3
Fa102a, assignment 3Fa102a, assignment 3
Fa102a, assignment 3
 
WALT be Cyber smart
WALT be Cyber smartWALT be Cyber smart
WALT be Cyber smart
 
EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE
EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE
EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE
 
Be responsibly digital in Fake News Era
Be responsibly digital in Fake News EraBe responsibly digital in Fake News Era
Be responsibly digital in Fake News Era
 
Building Community with Social Media
Building Community with Social MediaBuilding Community with Social Media
Building Community with Social Media
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
 
Germany Finds US Spy and Asks CIA Station Chief to Leave Country
Germany Finds US Spy and Asks CIA Station Chief to Leave CountryGermany Finds US Spy and Asks CIA Station Chief to Leave Country
Germany Finds US Spy and Asks CIA Station Chief to Leave Country
 
Plagiarism Lesson 2018
Plagiarism Lesson 2018Plagiarism Lesson 2018
Plagiarism Lesson 2018
 
News Literacy, Spring 2024: Week 6 Lecture
News Literacy,  Spring 2024: Week 6 LectureNews Literacy,  Spring 2024: Week 6 Lecture
News Literacy, Spring 2024: Week 6 Lecture
 

Viewers also liked

OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
grugq
 
An Underground education
An Underground educationAn Underground education
An Underground education
grugq
 
Global privacy research
Global privacy researchGlobal privacy research
Global privacy research
bbw1984
 
Catch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingCatch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hacking
Jan Seidl
 
NSA-Proof communications (mostly)
NSA-Proof communications (mostly)NSA-Proof communications (mostly)
NSA-Proof communications (mostly)
Jan Seidl
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)
Naval OPSEC
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentation
guest019923
 
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsReducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutions
Jan Seidl
 
An Underground education
An Underground educationAn Underground education
An Underground education
grugq
 
Social Media - Privacy and Settings
Social Media -  Privacy and SettingsSocial Media -  Privacy and Settings
Social Media - Privacy and Settings
Vanguard Leadership
 
Personal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy WorkshopPersonal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy Workshop
Kaliya "Identity Woman" Young
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015
Naval OPSEC
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
grugq
 
On Cyber
On Cyber  On Cyber
On Cyber
grugq
 
OPSEC Vulnerabilities And Indicators
OPSEC Vulnerabilities And IndicatorsOPSEC Vulnerabilities And Indicators
OPSEC Vulnerabilities And Indicators
Department of Defense
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Cain Ransbottyn
 

Viewers also liked (16)

OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
Global privacy research
Global privacy researchGlobal privacy research
Global privacy research
 
Catch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingCatch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hacking
 
NSA-Proof communications (mostly)
NSA-Proof communications (mostly)NSA-Proof communications (mostly)
NSA-Proof communications (mostly)
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentation
 
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsReducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutions
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
Social Media - Privacy and Settings
Social Media -  Privacy and SettingsSocial Media -  Privacy and Settings
Social Media - Privacy and Settings
 
Personal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy WorkshopPersonal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy Workshop
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
 
On Cyber
On Cyber  On Cyber
On Cyber
 
OPSEC Vulnerabilities And Indicators
OPSEC Vulnerabilities And IndicatorsOPSEC Vulnerabilities And Indicators
OPSEC Vulnerabilities And Indicators
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 

Similar to Opsec for families

Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
jesusmlaz
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
 
Internet safety
Internet safetyInternet safety
Internet safety
Sofia Cennini Zezere
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
apieper
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
Carolina Chapter of STC
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
jessa451416
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
Ben Woelk, CISSP, CPTC
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
MelchorTolentino2
 
Document
DocumentDocument
Document
kiiik1
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015
Bernard Charlebois
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
megg16
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Karan Veer Singh
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
Grayzon Gonzales, LPT
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
Simpliv LLC
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
robert mota
 
Top Ten Tips to Shockproof Your Use of Social Media 2012
Top Ten Tips to Shockproof Your Use of Social Media 2012Top Ten Tips to Shockproof Your Use of Social Media 2012
Top Ten Tips to Shockproof Your Use of Social Media 2012
Ben Woelk, CISSP, CPTC
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Heads up!
Heads up!Heads up!

Similar to Opsec for families (20)

Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Document
DocumentDocument
Document
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Top Ten Tips to Shockproof Your Use of Social Media 2012
Top Ten Tips to Shockproof Your Use of Social Media 2012Top Ten Tips to Shockproof Your Use of Social Media 2012
Top Ten Tips to Shockproof Your Use of Social Media 2012
 
Users guide
Users guideUsers guide
Users guide
 
Heads up!
Heads up!Heads up!
Heads up!
 

More from Lindy Kyzer

Digital Media from Washington, D.C.
Digital Media from Washington, D.C.Digital Media from Washington, D.C.
Digital Media from Washington, D.C.
Lindy Kyzer
 
Social media considerations
Social media considerationsSocial media considerations
Social media considerations
Lindy Kyzer
 
Social media tip sheet
Social media tip sheetSocial media tip sheet
Social media tip sheet
Lindy Kyzer
 
Army social media best practices
Army social media best practicesArmy social media best practices
Army social media best practices
Lindy Kyzer
 
Harnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organizationHarnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organization
Lindy Kyzer
 
Harnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organizationHarnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organization
Lindy Kyzer
 
Army bands social media presentation
Army bands social media presentationArmy bands social media presentation
Army bands social media presentation
Lindy Kyzer
 

More from Lindy Kyzer (7)

Digital Media from Washington, D.C.
Digital Media from Washington, D.C.Digital Media from Washington, D.C.
Digital Media from Washington, D.C.
 
Social media considerations
Social media considerationsSocial media considerations
Social media considerations
 
Social media tip sheet
Social media tip sheetSocial media tip sheet
Social media tip sheet
 
Army social media best practices
Army social media best practicesArmy social media best practices
Army social media best practices
 
Harnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organizationHarnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organization
 
Harnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organizationHarnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organization
 
Army bands social media presentation
Army bands social media presentationArmy bands social media presentation
Army bands social media presentation
 

Recently uploaded

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 

Opsec for families

  • 1. OPSEC Training & Awareness to the Army Family
  • 2.
  • 3. What seemed like unimportant information from one site can be the start of the Google search leading to other sites. Remember: even items which are deleted from Web sites can still be searched!
  • 4.
  • 5.
  • 6. Even if you think you’re being “clever,” you could accidentally leak a small piece of information.
  • 7. Myth #1 – “I am no one they care about.” Fact #1 – One small piece of information can be the last puzzle piece the enemy needs. 4 Myths about OPSEC
  • 8. 4 Myths about OPSEC Myth #2 – “I don’t have any adversaries.” Fact #2 – Think about: former boyfriends/girlfriends, angry neighbors, identity thieves
  • 9. 4 Myths about OPSEC Myth #3 – “I’m smarter than the enemy.” Fact #3 – Information theft is a good investment for the enemy. Some nations are willing to spend BILLIONS of dollars for our seemingly trivial information. One small mistake on line can put our Soldiers at big risk.
  • 10. 4 Myths about OPSEC Myth #4 – “I don’t post on the Internet.” Fact #4 – Unencrypted emails can be misrouted, intercepted or gathered.
  • 11.
  • 12. It’s ALWAYS better to be cautious!
  • 14.

Editor's Notes

  1. OPSEC information should be shared with your families. Explain why you can’t ask or talk about certain things and make sure your family understands.
  2. Google is a great Internet tool but it also remembers EVERYTHING! Even items and searches that have been deleted from search history or your browsing cache can be searched on Google.
  3. Social media allows for a more instantaneous way to communicated with your Soldier while he or she is deployed. However, just like conversations on the phone or by letter, watch what you say. Even a simple questions like “What’s work like over there?” could be useful to the enemy.
  4. Be smart about what you post on social media sites. Posting things such as “Going on vacation for two weeks” is really like telling people, “My house will be COMPLETELY empty for two weeks!” If it isn’t already, make your Facebook and Twitter accounts private and then you can ensure only your friends see the information. Don’t friend everyone who asks… make sure you know who that person is!
  5. Trying to be clever or speaking in code really doesn’t work. It can also lead to slip-ups. Be safe and just avoid talking about subjects that can lead to OPSEC violations.
  6. That may be true at the moment but you never know when you will accidentally bringing yourself to attention. Remember, it is difficult to know exactly what an adversary is looking for and if what you have may be of benefit.
  7. Anyone who might want a little bit of information about you can be an adversary.
  8. It’s a common feeling. People interviewed often say they know more than “some guy sitting in a cave, hiding out.” But, our adversaries are willing to spend BILLIONS of dollars to gain an advantage. They are willing to spend money on information. Some agencies train young people in info gathering.
  9. Not posting on the Internet doesn’t mean you don’t leave information on the Internet. Most people email now and unencrypted emails can be used in a negative way. Intercepting emails is the tech equivalent of dumpster diving.
  10. Always remember to be savvy with your conversations and avoid certain topics. That way, you won’t leak information!