O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

OPSEC Critical Information

1.036 visualizações

Publicada em

Protect Critical Information: Know what to protect and how to protect it.

Publicada em: Governo e ONGs
  • Seja o primeiro a comentar

  • Seja a primeira pessoa a gostar disto

OPSEC Critical Information

  1. 1. Connect online. Stay informed by liking: www.facebook.com/USArmyOPSEC Critical Information Service members, government employees and family members should always be mindful about the information they share. Even though this information may not be secret, a lot of it is considered "critical information", which is information dealing with specific facts about military capabilities, activities, limitations, and intentions (CALI). If an adversary knew this detailed information, our mission and personnel safety could be jeopardized. Examples of critical information include: • Detailed information about the mission of assigned units • Details on locations and times of unit deployments • Personnel transactions that occur in large numbers (Example: pay information, powers of attorney, wills and deployment information) • References to trends in unit morale or personnel problems • Details concerning security procedures This information may seem insignificant. However, to a trained adversary, they are small pieces of a puzzle that highlight what a military unit is doing and planning.
  2. 2. Connect online. Stay informed by liking: www.facebook.com/USArmyOPSEC Protecting Critical Information When it comes to protecting critical information, there are several things individuals can do. They include editing emails for operations security before sending them, using encryption emails to protect sensitive information and shredding and using burn bags to destroy notes and documents with Social Security numbers, personal records, home addresses and reports that reflect our strengths, assets and future operations. Where and how you discuss critical information is just as important as with whom you discuss it with. Adverse agents tasked with collecting information frequently visit some of the same stores, clubs, recreational areas or places of worship as you do. Determined individuals can easily collect data from trash cans, cordless and cellular phones, and even baby monitors, using inexpensive receivers available from local electronics stores.