SlideShare a Scribd company logo
1 of 20
Ombudsman Hot Topic:
Social Media Trends

Naval OPSEC Support Team
Navy Information Operations Command, Norfolk
757-417-7100
opsec@navy.mil
OPSEC. Because you are not a
Navajo code talker, and you’re
really not fooling anyone.

Naval OPSEC

Support Team
OPSEC Best Practice
Operations Security is a 5-step process that:
1. Identifies Critical Information
2. Identifies credible threats
3. Assess vulnerabilities
4. Assess risks associated with vulnerabilities
5. Develop countermeasures
Bumper stickers. Because every random
stranger driving near you should know
exactly how many children you have
and where they go to school.

Naval OPSEC

Support Team
OPSEC Best Practice
• Look at your daily activities from the enemies’ point of view.
• Understand what an enemy might learn about you and your
family from the information and details that you make
available.
• Assess the level of risk that this places on you and your family.
• Develop and apply counter measures, which help to prevent
the enemy from obtaining your critical information and using
it against you.
Most people don’t know this, but you
don’t need to post, tweet, blog, chat, pin,
upload, whisper, snap chat, text, email,
Skype, or facetime every time you go to
the gym.

Naval OPSEC

Support Team
OPSEC Best Practice
What you really learn from Facebook pages and profiles:
• Average income
• Security clearance level
• Family makeup
• Current psychological state
• Current location and contact information
• Ships roster
• Sensitive deployment dates and locations
• Relative readiness condition
“Well here is your problem!
Privacy never includes the
internet.”

Naval OPSEC

Support Team
OPSEC Best Practice
• Your security settings are only as good as your most public
friend
• One persons private tweet is another persons public post
• Security settings are often underutilized and easy to bypass
Who needs your home address
when I have access to your
Instagram?

Naval OPSEC

Support Team
OPSEC Best Practice
• Understand your technology
• Always consider how else this information can be used
The smarter the phone the
greater the risk.

Naval OPSEC

Support Team
OPSEC Best Practice
•
•
•
•

Anti virus?
Password protected
Malware: there’s an app for that
Convenience vs. vulnerability
SnapChat. Because anything
that needs to be deleted
after 15 seconds is never a
bad idea.

Naval OPSEC

Support Team
OPSEC Best Practice
• If it sounds too good to be true, it is. Every single time.
• Don’t trust third party applications with personal, private or
critical information
• There is no such thing as private online
• Consider how your content can be used against you
• There is no true delete function on the internet
If you have to ask
“can I post…”, the
answer is always no.

Naval OPSEC

Support Team
OPSEC Best Practice
• Never share anything you would not tell directly to the enemy
• Never post private or personal information
• Assume any information you share will be made public
Loose lips still sink ships…
And rob homes,
compromise personal
information and drain
bank accounts.

Naval OPSEC

Support Team
OPSEC Best Practice
Knowledge is power …. for both you and the adversary
• Understand the value of your information
• Be suspicious of unsolicited phone calls, online requests, or
emails
• Be suspicious when information about you and your family is
requested
• Always ask yourself, do they have the “need to know”
• Share the OPSEC message with friends and extended family
members
Questions?
www.facebook.com/navalOPSEC
www.twitter.com/navalOPSEC
www.slideshare.net/navalOPSEC
www.youtube.com/USNopsec

Naval OPSEC Support Team
Navy Information Operations Command, Norfolk
757-417-7100
opsec@navy.mil
Ombudsman Hot Topic- Social Media Trends

More Related Content

What's hot

Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
CrowdStrike
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
Nicholas Poole
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
DallasHaselhorst
 

What's hot (20)

Ransomware: Wannacry
Ransomware: WannacryRansomware: Wannacry
Ransomware: Wannacry
 
WannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt RansomwareWannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt Ransomware
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
HACKING
HACKINGHACKING
HACKING
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
Ransomware
RansomwareRansomware
Ransomware
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
MODULO 27 –> Dai virus al malware
MODULO 27 –> Dai virus al malwareMODULO 27 –> Dai virus al malware
MODULO 27 –> Dai virus al malware
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Wannacry
WannacryWannacry
Wannacry
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 

Viewers also liked

Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
Fort Rucker FRSA
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_online
Ftlwood Families
 

Viewers also liked (16)

FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015
 
Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Securing home wifi 16 mar15
Securing home wifi 16 mar15Securing home wifi 16 mar15
Securing home wifi 16 mar15
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
 
Conley Group Opsec Presentation
Conley Group Opsec PresentationConley Group Opsec Presentation
Conley Group Opsec Presentation
 
Analogic Opsec 101
Analogic Opsec 101Analogic Opsec 101
Analogic Opsec 101
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_online
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Facebook Privacy and Account Settings - Navy OPSEC
Facebook Privacy and Account Settings - Navy OPSECFacebook Privacy and Account Settings - Navy OPSEC
Facebook Privacy and Account Settings - Navy OPSEC
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)
 
Phishing
PhishingPhishing
Phishing
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 

Similar to OPSEC for OMBUDSMEN

Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
Blitzing with your defense bea con
Blitzing with your defense bea conBlitzing with your defense bea con
Blitzing with your defense bea con
Innismir
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
icts-uct
 

Similar to OPSEC for OMBUDSMEN (20)

Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Blitzing with your defense bea con
Blitzing with your defense bea conBlitzing with your defense bea con
Blitzing with your defense bea con
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Security Awareness - Defined, Managed and Measured
Security Awareness - Defined, Managed and MeasuredSecurity Awareness - Defined, Managed and Measured
Security Awareness - Defined, Managed and Measured
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousness
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

More from Naval OPSEC (16)

Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Opsec SNS
Opsec SNSOpsec SNS
Opsec SNS
 
Opsec Heart Breaker
Opsec Heart BreakerOpsec Heart Breaker
Opsec Heart Breaker
 
Trash as Treasure
Trash as TreasureTrash as Treasure
Trash as Treasure
 
Don't Get Blindsided
Don't Get BlindsidedDon't Get Blindsided
Don't Get Blindsided
 
Picture is worth a thousand lives
Picture is worth a thousand livesPicture is worth a thousand lives
Picture is worth a thousand lives
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 

OPSEC for OMBUDSMEN

  • 1. Ombudsman Hot Topic: Social Media Trends Naval OPSEC Support Team Navy Information Operations Command, Norfolk 757-417-7100 opsec@navy.mil
  • 2. OPSEC. Because you are not a Navajo code talker, and you’re really not fooling anyone. Naval OPSEC Support Team
  • 3. OPSEC Best Practice Operations Security is a 5-step process that: 1. Identifies Critical Information 2. Identifies credible threats 3. Assess vulnerabilities 4. Assess risks associated with vulnerabilities 5. Develop countermeasures
  • 4. Bumper stickers. Because every random stranger driving near you should know exactly how many children you have and where they go to school. Naval OPSEC Support Team
  • 5. OPSEC Best Practice • Look at your daily activities from the enemies’ point of view. • Understand what an enemy might learn about you and your family from the information and details that you make available. • Assess the level of risk that this places on you and your family. • Develop and apply counter measures, which help to prevent the enemy from obtaining your critical information and using it against you.
  • 6. Most people don’t know this, but you don’t need to post, tweet, blog, chat, pin, upload, whisper, snap chat, text, email, Skype, or facetime every time you go to the gym. Naval OPSEC Support Team
  • 7. OPSEC Best Practice What you really learn from Facebook pages and profiles: • Average income • Security clearance level • Family makeup • Current psychological state • Current location and contact information • Ships roster • Sensitive deployment dates and locations • Relative readiness condition
  • 8. “Well here is your problem! Privacy never includes the internet.” Naval OPSEC Support Team
  • 9. OPSEC Best Practice • Your security settings are only as good as your most public friend • One persons private tweet is another persons public post • Security settings are often underutilized and easy to bypass
  • 10. Who needs your home address when I have access to your Instagram? Naval OPSEC Support Team
  • 11. OPSEC Best Practice • Understand your technology • Always consider how else this information can be used
  • 12. The smarter the phone the greater the risk. Naval OPSEC Support Team
  • 13. OPSEC Best Practice • • • • Anti virus? Password protected Malware: there’s an app for that Convenience vs. vulnerability
  • 14. SnapChat. Because anything that needs to be deleted after 15 seconds is never a bad idea. Naval OPSEC Support Team
  • 15. OPSEC Best Practice • If it sounds too good to be true, it is. Every single time. • Don’t trust third party applications with personal, private or critical information • There is no such thing as private online • Consider how your content can be used against you • There is no true delete function on the internet
  • 16. If you have to ask “can I post…”, the answer is always no. Naval OPSEC Support Team
  • 17. OPSEC Best Practice • Never share anything you would not tell directly to the enemy • Never post private or personal information • Assume any information you share will be made public
  • 18. Loose lips still sink ships… And rob homes, compromise personal information and drain bank accounts. Naval OPSEC Support Team
  • 19. OPSEC Best Practice Knowledge is power …. for both you and the adversary • Understand the value of your information • Be suspicious of unsolicited phone calls, online requests, or emails • Be suspicious when information about you and your family is requested • Always ask yourself, do they have the “need to know” • Share the OPSEC message with friends and extended family members
  • 20. Questions? www.facebook.com/navalOPSEC www.twitter.com/navalOPSEC www.slideshare.net/navalOPSEC www.youtube.com/USNopsec Naval OPSEC Support Team Navy Information Operations Command, Norfolk 757-417-7100 opsec@navy.mil Ombudsman Hot Topic- Social Media Trends