OPSEC Precautions For This Site

Source: http://news.nationalpost.com/arts/movies/jason-bourne-proves-why-computers-are-the-worst-thing-to-happen-to-the-spy-thriller-since-no-more-day-to-day-formalwear

Things to keep in mind when interacting with The Lint Center, particularly when leaving comments or uploading photos:

  1. Defense conditions are classified secret, while force protection conditions are unclassified.
  2. Vulnerability of oconus installations to sabotage or penetration is classified secret if U.S. Intelligence information is made.
  3. The identity of units planned for deployment is confidential until an official announcement of the deployment is made.
  4. General geographic location of units deployed ( I.E. City, Country or Area) is unclassified.
  5. Specific geographic location of units deployed is confidential.
  6. Details of allied military participation in operations are secret.

The Global reach of the World Wide Web requires special precautions to be taken when posting information. The following types of information will not be posted publicly on WarriorLodge.com and will be taken down immediately:

  • Information that is for official use only (FOUO). This type of information would pose an unacceptable risk to the US Military, especially in electronically aggregated form. While records containing FOUO information will normally be marked at the time of their creation, records that do not bare such markings shall be assumed to contain FOUO information.
  • Analysis and recommendations concerning lessons learned which would reveal sensitive military operations, exercises or vulnerabilities.
  • Reference to unclassified information that would reveal sensitive movements of military assets or the location of units, installations, or personnel where uncertainty regarding location is an element of a military plan or program.
  • Personal information including compilations of names or personnel assigned overseas, sensitive, or routinely deployable units.
  • Names, locations, and specific identifying information about family members of military and government employees.
  • Highly technical information that can be used or be adapted for use to design, engineer, product, manufacture, operate, repair, overhaul, or reproduce any military or space equipment or technology concerning such equipment.
  • Unclassified information pertaining to classified programs. The clearance review procedures for unclassified information pertaining to classified programs proposed for posting to a publicly accessible web sites must take into account the likelihoods of classification compilation.

So, let’s review…

  1. Don’t discuss current or future deployment destinations.
  2. Don’t discuss current or future operations or missions.
  3. Don’t discuss current or future dates and times of when service members will be in deployed, in-port or conducting exercises.
  4. Don’t discuss readiness issues and numbers.
  5. Don’t discuss specific training equipment.
  6. Don’t discuss people’s names and billets in conjunction with operations.
  7. Don’t speculate about current or future operations.
  8. Don’t spread rumors about current, future, or past operations or movements.
  9. Don’t assume the enemy is not trying to collect information on you; they are… right now.  Seriously.
  10. Be smart, use your head, and always think OPSEC when using email, phone, chat rooms and message boards.

dia

Operations Security: 1. A systematic, proven process by which a government, organization, or individual can identify, control, and protect generally unclassified information about an operation/activity and, thus, deny or mitigate an adversary’s/competitor’s ability to compromise or interrupt said operation/activity (NSC 1988). 2. OPSEC is a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities to (a) identify those actions that can be observed by adversary intelligence systems, (b) determine indicators adversary intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries, and select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation (DOD JP 1994; JCS 1997).

Operations Security process: An analytical process that involves five components: identification of critical information, analysis of threats, analysis of vulnerabilities, assessment of risks, and application of appropriate countermeasures (NSC 1988).

Source: http://www.ioss.gov/glossary.html#o