OPERATIONS SECURITY OPSEC - PowerPoint PPT Presentation

1 / 25
About This Presentation
Title:

OPERATIONS SECURITY OPSEC

Description:

Operations Security, or OPSEC, is keeping potential adversaries from ... Popular websites include Facebook, MySpace, Bebo, Orkut, Hi5, and Friendster. Myspace ... – PowerPoint PPT presentation

Number of Views:4539
Avg rating:3.0/5.0
Slides: 26
Provided by: jiraporn1
Category:

less

Transcript and Presenter's Notes

Title: OPERATIONS SECURITY OPSEC


1
OPERATIONS SECURITYOPSEC
Jiraporn Simpson OPSEC Intern
2
What is OPSEC?
  • Operations Security, or OPSEC, is keeping
    potential adversaries from discovering our
    critical information
  • Our adversaries want our information, and they
    dont concentrate on only soldiers to get it.
    They want you, the family member.
  • The goal of OPSEC, as a countermeasures program,
    is to deny an adversary pieces of the
    intelligence puzzle

3
History of OPSEC
  • The OPSEC process was conceived over thirty
    years ago during the Vietnam War. In the early
    days of the Vietnam War, the U.S. lost an
    alarming number of pilots and aircraft.

4
History of OPSEC
  • To reverse that trend, a team was assigned to
    analyze U.S. military operations. The team,
    "Purple Dragon," discovered that crucial planning
    information was being disclosed through routine
    patterns of behavior. Countermeasures were
    quickly initiated.

5
OPSEC PROCESS
5 STEP OPSEC PROCESS
  • Identify Critical Information
  • Assess the Threat
  • Analyze Vulnerabilities
  • Assess Risk
  • Apply Countermeasures

6
How Does OPSEC Apply to you?
7
What is online social networking?
  • These websites offer a virtual space where people
    can share information and communicate with other
    people. This is usually in the form of a personal
    profile, elements of which other people,
    friends, can see.
  • A social network service focuses on building
    online communities of people who share interests
    and activities.
  • Popular websites include Facebook, MySpace, Bebo,
    Orkut, Hi5, and Friendster.

8
Myspace
In September, a 16-year-old girl in Port
Washington, N.Y., was molested after a man she
met on MySpace tracked her down because she had
listed her workplace on her online profile,
according to a USA Today article.
Last login 4/24/08 Dustin, Ohio
MySpace has 61 million registered users and is
growing at a pace of about 220,000 per day.
MySpace is 50.2 male, 49.8 female. It is the
second largest destination on the entire Web.
9
Myspace
  • MySpace is one of the fastest growing websites of
    all time,launched January 1 2004
  • A valid e-mail is the only requirement for
    membership on MySpace and any other identifying
    information can be faked.
  • The Center for Missing and exploited children
    reported more than 2,600 incidents last year of
    adults using the Internet to entice children.
  • A 15-year-old California girl was abducted in
    December and found murdered in January. Her
    MySpace page included personal contact
    information and lots of activity.
  • In Lafayette, La., four teen girls were sexually
    assaulted by a local pedophile who found them on
    MySpace.
  • In February, a 14-year-old New Jersey girl was
    found dead in a dumpster after arranging a
    meeting with a stranger on MySpace.

10
Facebook
  • Launched on February 4, 2004
  • Two in five Facebook profiles reveal information
    that can be used to set up bank accounts and so
    on
  • Facebook is the sixth-most trafficked site in the
    United States (comScore)
  • More than 14 million photos are uploaded to
    Facebook every day
  • Facebook has seen an average of 250,000 new
    registrations per day since Jan. 2007, with an
    average of 3 weekly growth since Jan. 2007.
  • Due to the issue of privacy, Facebook has been
    blocked by many universities, work places, the
    Ontario Government, and even countries like
    Syria, Iran, and the United Arab Emirates.

11
Facebook
12
Blogs
JuicyCampus.com is a rapidly growing gossip site
that solicits content with the promise of
anonymity. But what began as fun and gamesand
now has spin-offs on seven college campuses,
including Duke University, where it beganhas
turned ugly and, in many cases, flatly
defamatory. The posts have devolved from
innocuous tales of secret crushes to racist
tirades and lurid finger-pointing about drug use
and sex, often with the alleged culprit
identified by first and last name.
13
Blogs
  • More than 8 million U.S. citizens had created a
    Web-based diary, and 1 in 10, or around 14
    million U.S. Internet users, had contributed
    comments to a blog.

14
Chat Rooms
15
Chat Rooms
  • The most dangerous area by far is chat.
  • Online harassment also increased to 9 of youth
    Internet users
  • 45 have been asked for personal information by
    someone they dont know.
  • 30 have considered meeting someone that theyve
    only talked to online
  • 14 have actually met a person face-to-face they
    theyve only spoken to over the Internet (9 of
    13-15s 22 of 16-17s).

20 of teens report that it is safe (i.e.
somewhat or very safe) to share personal
information on a public blog or networking site.
As well, 37 of 13- to 17-year-olds said they
are not very concerned or not at all
concerned about someone using information
theyve posted online in ways they dont want.
16
Webcams
  • Webcams are video cameras, usually attached
    directly to a computer, that send images to the
    World Wide Web.
  • Each webcam has a Web address
  • Trojan horse programs
  • Predators scan webcam sites
  • Burn entire video chat to a CD
  • Instant messaging

17
YouTube
  • YouTube is a video sharing website where users
    can upload, view and share video clips.
  • YouTube was created in February 2005
  • 70 of YouTubes registered users are American
    and roughly half are under 20 years of age.
  • The total time the people of the world spent
    watching YouTube is 9,305 years.

VIDEO CLIP
18
Food For Thought
?? 81 of parents of online teens say that teens
arent careful enough when giving out information
about themselves online. ?? 79 of online teens
agree that teens arent careful enough when
sharing personal information online. ?? 65 of
all parents and 64 of all teens say that teens
do things online that they wouldnt want their
parents to know about.
19
Identity Theft
Lots of places- your doctor, dentist, school,
place of work, health insurance carrier, and many
others have your identifying information. If some
criminally minded person is working at the office
(or just visiting) decides to use this
information to assume your identity, you would
not know it.
20
Identity Theft
  • Also if this information is not disposed
    properly, a "dumpster-diver" could pick up the
    information and begin the crime against you. You
    do not need to lose your wallet or have anything
    tangible stolen from you for someone to take your
    identity.

21
Identity Theft
  • Teenagers and young people are more vulnerable
    to identity theft than adults because most have
    not established credit records that can be
    monitored.

22
Security Awareness
  • Consider restricting access to your profile.
  • Keep your private information private.
  • Choose a screen name that is different from your
    real name.
  • Think twice before posting your photo.
  • Dont post information that makes you vulnerable
    to a physical attack.
  • Use your common sense.
  • Trust your instincts.
  • Be suspicious.

23
Why our best defense is education
  • Our defense lies not only in getting the message
    out to parents and children, but also in a
    mission to educate the predators themselves,
    because far fewer of them would be trolling
    online for victims if they knew how easily they
    are identified and caught by software.

24
Internet Safety
  • iSafe
  • Stay Safe Online!
  • Safekids.com
  • Disney OnlineCyberNetiquette Comix
  • Parents Guide to the Internet
  • The Police Notebook  Safety on the Internet
  • SafeTeens.com
  • Yahooligans!  Parents' Guide  Safe Surfing with
    Your Family
  • Core Rules of Netiquette
  • Wiredsafety.org

25
Operations SecurityOPSEC
Write a Comment
User Comments (0)
About PowerShow.com