Title: OPERATIONS SECURITY OPSEC
1OPERATIONS SECURITYOPSEC
Jiraporn Simpson OPSEC Intern
2What is OPSEC?
- Operations Security, or OPSEC, is keeping
potential adversaries from discovering our
critical information - Our adversaries want our information, and they
dont concentrate on only soldiers to get it.
They want you, the family member. - The goal of OPSEC, as a countermeasures program,
is to deny an adversary pieces of the
intelligence puzzle
3History of OPSEC
- The OPSEC process was conceived over thirty
years ago during the Vietnam War. In the early
days of the Vietnam War, the U.S. lost an
alarming number of pilots and aircraft.
4History of OPSEC
- To reverse that trend, a team was assigned to
analyze U.S. military operations. The team,
"Purple Dragon," discovered that crucial planning
information was being disclosed through routine
patterns of behavior. Countermeasures were
quickly initiated.
5OPSEC PROCESS
5 STEP OPSEC PROCESS
- Identify Critical Information
- Assess the Threat
- Analyze Vulnerabilities
- Assess Risk
- Apply Countermeasures
6How Does OPSEC Apply to you?
7What is online social networking?
- These websites offer a virtual space where people
can share information and communicate with other
people. This is usually in the form of a personal
profile, elements of which other people,
friends, can see. - A social network service focuses on building
online communities of people who share interests
and activities. - Popular websites include Facebook, MySpace, Bebo,
Orkut, Hi5, and Friendster.
8Myspace
In September, a 16-year-old girl in Port
Washington, N.Y., was molested after a man she
met on MySpace tracked her down because she had
listed her workplace on her online profile,
according to a USA Today article.
Last login 4/24/08 Dustin, Ohio
MySpace has 61 million registered users and is
growing at a pace of about 220,000 per day.
MySpace is 50.2 male, 49.8 female. It is the
second largest destination on the entire Web.
9Myspace
- MySpace is one of the fastest growing websites of
all time,launched January 1 2004 - A valid e-mail is the only requirement for
membership on MySpace and any other identifying
information can be faked. - The Center for Missing and exploited children
reported more than 2,600 incidents last year of
adults using the Internet to entice children. - A 15-year-old California girl was abducted in
December and found murdered in January. Her
MySpace page included personal contact
information and lots of activity. - In Lafayette, La., four teen girls were sexually
assaulted by a local pedophile who found them on
MySpace. - In February, a 14-year-old New Jersey girl was
found dead in a dumpster after arranging a
meeting with a stranger on MySpace.
10Facebook
- Launched on February 4, 2004
- Two in five Facebook profiles reveal information
that can be used to set up bank accounts and so
on - Facebook is the sixth-most trafficked site in the
United States (comScore) - More than 14 million photos are uploaded to
Facebook every day
- Facebook has seen an average of 250,000 new
registrations per day since Jan. 2007, with an
average of 3 weekly growth since Jan. 2007. - Due to the issue of privacy, Facebook has been
blocked by many universities, work places, the
Ontario Government, and even countries like
Syria, Iran, and the United Arab Emirates.
11Facebook
12Blogs
JuicyCampus.com is a rapidly growing gossip site
that solicits content with the promise of
anonymity. But what began as fun and gamesand
now has spin-offs on seven college campuses,
including Duke University, where it beganhas
turned ugly and, in many cases, flatly
defamatory. The posts have devolved from
innocuous tales of secret crushes to racist
tirades and lurid finger-pointing about drug use
and sex, often with the alleged culprit
identified by first and last name.
13Blogs
- More than 8 million U.S. citizens had created a
Web-based diary, and 1 in 10, or around 14
million U.S. Internet users, had contributed
comments to a blog.
14Chat Rooms
15Chat Rooms
- The most dangerous area by far is chat.
- Online harassment also increased to 9 of youth
Internet users - 45 have been asked for personal information by
someone they dont know. - 30 have considered meeting someone that theyve
only talked to online - 14 have actually met a person face-to-face they
theyve only spoken to over the Internet (9 of
13-15s 22 of 16-17s).
20 of teens report that it is safe (i.e.
somewhat or very safe) to share personal
information on a public blog or networking site.
As well, 37 of 13- to 17-year-olds said they
are not very concerned or not at all
concerned about someone using information
theyve posted online in ways they dont want.
16Webcams
- Webcams are video cameras, usually attached
directly to a computer, that send images to the
World Wide Web. - Each webcam has a Web address
- Trojan horse programs
- Predators scan webcam sites
- Burn entire video chat to a CD
- Instant messaging
17YouTube
- YouTube is a video sharing website where users
can upload, view and share video clips. - YouTube was created in February 2005
- 70 of YouTubes registered users are American
and roughly half are under 20 years of age. - The total time the people of the world spent
watching YouTube is 9,305 years.
VIDEO CLIP
18Food For Thought
?? 81 of parents of online teens say that teens
arent careful enough when giving out information
about themselves online. ?? 79 of online teens
agree that teens arent careful enough when
sharing personal information online. ?? 65 of
all parents and 64 of all teens say that teens
do things online that they wouldnt want their
parents to know about.
19Identity Theft
Lots of places- your doctor, dentist, school,
place of work, health insurance carrier, and many
others have your identifying information. If some
criminally minded person is working at the office
(or just visiting) decides to use this
information to assume your identity, you would
not know it.
20Identity Theft
- Also if this information is not disposed
properly, a "dumpster-diver" could pick up the
information and begin the crime against you. You
do not need to lose your wallet or have anything
tangible stolen from you for someone to take your
identity.
21Identity Theft
- Teenagers and young people are more vulnerable
to identity theft than adults because most have
not established credit records that can be
monitored.
22Security Awareness
- Consider restricting access to your profile.
- Keep your private information private.
- Choose a screen name that is different from your
real name. - Think twice before posting your photo.
- Dont post information that makes you vulnerable
to a physical attack. - Use your common sense.
- Trust your instincts.
- Be suspicious.
23Why our best defense is education
- Our defense lies not only in getting the message
out to parents and children, but also in a
mission to educate the predators themselves,
because far fewer of them would be trolling
online for victims if they knew how easily they
are identified and caught by software.
24Internet Safety
- iSafe
- Stay Safe Online!
- Safekids.com
- Disney OnlineCyberNetiquette Comix
- Parents Guide to the Internet
- The Police Notebook Safety on the Internet
- SafeTeens.com
- Yahooligans! Parents' Guide Safe Surfing with
Your Family - Core Rules of Netiquette
- Wiredsafety.org
25Operations SecurityOPSEC