Image OPSEC Header | OPSEC
OPSEC Material for Family Members
*Info provided via Army Operations Security (OPSEC):   www.Facebook.com/USArmyOpsec  
It is important to keep family members just as informed and up-to-date about OPSEC as the Soldiers in your unit. To assist Commanders, FRSAs and FRGs, we created this resource guide. Soldiers and family members need to know what information to protect and how to protect it.
 
What needs to be protected? Critical Information, which is the information that the adversary needs to accomplish their goals.
How can this information be protected? Countermeasures, which are the methods to maintain secrecy about critical information.
 

 
Soldiers and their families need to review their social media site settings and know how to limit the information visible to the public. Posting personal information or allowing public access to personal identifiable information can put you, your family, your friends and battle buddies at risk.
Courses:
Recommended steps to improve your online security include:
  • Changing account and security settings minimizing external access to your accounts
  • Never post information or photos that contains your address, house or street signs, phone number, e-mail address, or license plate information
  • Wait to post vacation/trip photos until after you return home
  • Only "friend" people you know
  • Apply all OPSEC rules to your social media communication: Text, photos, and videos.
  • Do not use "geo-tagging" apps and limit use of other apps as they normally sell your personal information to third parties
Smart Cards explain best practices and provide you with instructions to adjust security settings to protect PII. You can view and download them below:
Review your own social media accounts and ask that your family members do the same. Personal security and operational security go hand in hand; they are vital to our workforce and the nation's security and it is everyone's responsibility to practice OPSEC. Here are additional relevant and up-to-date methods provided by Army Cyber Command and the Army Criminal Investigation Command’s Computer Crime Investigative Unit.
Other resources:
Threats:
Geo-Tagging:

Hatch Act:

Identity Theft:

Malware: