Infidelity OPSEC

Infidelity OPSEC

By Sally Taranto, VICE YOUR PHONE If you’re sending pics of your O-ring to the Patty Ding-Dong you met at Applebee's, do you really think your boyfriend or girlfriend or spouse isn’t going to find out? Nine times out of ten, it’s the cell phone that blows up your spot, yet idiots keep making the same stupid mistakes. According to Darrin, the first sign of an affair is when people start ... Continue Reading...

Easy Guide to Online Privacy

Easy Guide to Online Privacy

Compulsive sharing of information whether online or in public is not safe from adversaries. Your activities online are surveilled, and personally identifiable information is transmitted to websites when you visit them. You can go to such lengths as Richard Stallman to avoid online surveillance, or adopt our recommend tools and security practices. Online Privacy Have a security mindset and ... Continue Reading...

Introduction to Basic Online OPSEC

Introduction to Basic Online OPSEC

Basic Online OPSEC 1. Never assume security, assume it is unsecured. 2. When security is needed, implement proper security practices. 3. Encrypt everything... Email Security 1. Always digitally sign messages. 2. Encourage peers to sign their messages. 3. Always verify suspicious messages before acting. 4. Secure emails with digital encryption such as PGP or GnuPG. 5. Use file encryption ... Continue Reading...

Introduction to OPSEC

Introduction to OPSEC

"Whoever wishes to keep a secret must hide the fact that he possesses one." - Goethe Definition of OPSEC The USAWC Strategy Research Project, defines Operations security (OPSEC) as 1. A systematic process by which a government, organization, or individual can identify, control and protect generally unclassified information about an operation/activity and, thus deny or mitigate an ... Continue Reading...