Social Media DO's
Social Media DON'Ts
OPSEC Level 2
OPSEC Level 1
100

 You should ________ all friend requests.

What is: verify.

100

True/False

You should use the same passwords for multiple accounts.

What is: false.

100

True/False

Adversaries are authorized to use illegal means to collect information.

What is: true

100

This person owns the OPSEC Program

Who is: Capt/CO

200

True/False

Geotagging/GPS information shouldn't be disabled on your social media accounts.

What is: false.

200

This is an example of:

FB Post: I am so excited for my hubby to be home in 134 days!!!

What is: OPSEC Violation

200

Two methods used to obtain critical information

What is:

Technology, Trash, Media, Email, Web Pages, Social Networks, Unprotected Comms, Sharing Info w/ Strangers, HUMINT

200

Whidbey Island's Command OPSEC Program Manager

Who is: LT Williams or OPS

300

How long are pictures and posts available on the internet?

What is: forever.

300

True/False

Answering your friends 20 questions survey is a security tactic used by the enemy.

What is: true

300

Information collection from multiple sources

What is: Data aggragation

300

This organization can answer additional questions about OPSEC

What/Who is: Naval Information Forces (NAVIFOR)

400

The number of security settings on Facebook

What is: Over 120

400

True/False: 

All friends on social media should be treated equally.

What is: false

400

Four examples of Critical Information

What is: 

- ops and msns                    - username/pswds

- schedules/itineraries          - mission caps/lims

- physical sec/logistics          - names/photos/family

400

Friendly, detectable actions that potentially reveal Critical Information (indicators).

What is:

- Longer working hrs                  - rehearsals/drills

- sudden change in procedures    - troop movements

- predictable procedures             - troop/stores on-loads  

500

The DON ALNAV that governs unofficial internet posts

What is: ALNAV 057/10

500

Report Social Media phishing attempts to this person.

Who is: LTJG Reese/COMMO/CMD SEC MGR

500

The 5 Steps of OPSEC

What is: Identify, Analyze threat, analyze vulnerabilities, assess risk, apply countermeasures.

500

One of the three instructions that govern the OPSEC Program

What is:

NTTP 3-54

OPNAVINST 3432.1

DOD Directive 5205.2

M
e
n
u