Commentary

October 11, 2012

Frank’s OPSEC “Put that Stuff on Everything”

Commentary by Major Kenneth Knox
355th Fighter Wing XP

Have you ever had the hair on the back of your neck stand up just before you hit the send button on the old e-mail machine? If you haven’t, you may just be unaware of the troublesome issues that go along with transmitting information across the ether space.

With the amount and types of information we share every day, have you considered that what goes on the internet is fair game for our adversaries and once it’s out there, it’s out there for good.

So what do you need to know to stay inbounds with the law and more important, keep yourselves and families safe?

First off, know what information is critical information. Air Force Instruction 10-701 states that critical information is “unclassified but sensitive information” that individually or in aggregate paints a picture to our enemies that helps them and hurts us.

The 355th Fighter Wing commander has published a 355th FW critical information list that everyone needs to know. It provides you with what types of information are considered CI and a list of countermeasures used to protect them. It is every Airman’s responsibility to know what CI is and to protect that information from unauthorized release. This list is available on the XP SharePoint page, posted in your units and available through your unit Operations Security coordinator.

One key piece of CI is personal privacy act data, or Personally Identifiable Information. When a person’s PII is compromised, it can have serious, lifelong impacts. Identity theft can clean out your bank account, wreck your credit, and ruin your security clearance. Most importantly, it puts you and your family in harm’s way.

So how do you protect PII? According to the 355th FW CIL, our countermeasures include use of personal identity information only when required in an official capacity, use of a PII cover sheet when physically transferring PII and digital encryption of electronic forms of PII communication.

First off, understand that to transmit PII, there needs to be a valid official use for this data. That’s why PII will always be handled as for official use only at a minimum. If there isn’t an official need for PII, don’t disclose, transmit or store it. If there is an official need, then it needs to be protected in transit (physically or electronically). To determine how to appropriately protect or label PII, refer to the Department of Defense directive 5200.01 Volume 4.

If you are sending PII via electronic media, you must encrypt it to protect the message by converting it from a readable plain text into scrambled cipher text. In order to encrypt the message you are sending click the lock-box envelope button in the options ribbon within the message you are composing.

Ask yourself before you send any PII; would I want this information to be in the hands of someone who wants to do my family harm?

If you don’t think this information gets out, think again. The Air Force has put in place an organization called the Telecommunications Monitoring and Assessment Program, whose goal is to scan our networks looking for performance with the respect to OPSEC and Information Security.

If you are the unlucky person who sends that unencrypted CI message out, the men and women at TMAP will find you and report the incident. Their goal is not to provide fodder for punishment but to correct the deficiency and train our people how to do it right.

Make no mistake, unauthorized disclosure of CI or PII can be prosecuted under the Uniform Code of Military Justice and can carry stiff civil penalties. Our goal is to ensure we don’t do the enemy’s job for them.

Operations Security is like Frank’s Hot Sauce slogan “put that stuff on everything.” If you have any questions concerning OPSEC, PII, FOUO or Critical Information, first contact your unit OPSEC coordinator. If they can’t answer your questions call the 355th FW signature management officers, Maj. Ken Knox or the signature management noncommissioned officer Tech. Sgt. Christopher Poole at 228-1236 or e-mail to DMOPSEC@dm.af.mil




All of this week's top headlines to your email every Friday.


 
 

 
(U.S. Air Force Illustration by Airman 1st Class Cheyenne Morigeau)

Don’t become a target

Considering recent threats against Americans and the exponential growth of social media use, becoming a target of an adversary is easier than ever. Operations Security is a process that identifies unclassified, critical informa...
 
 
BreastCancerAwareness_pict

An Airman’s story: My mother didn’t fight alone

MOODY AIR FORCE BASE, Ga. – His green eyes frantically searched the crowd for his dying mother. During his final pass and review at basic military training (BMT) he saw her in the stands, cheering him on. A year later, ...
 
 

Fire Prevention Week 2014

(U.S. Air Force photo by Airman 1st Class Chris Drzazgowski) Sparky the Fire Dog, National Fire Protection Association spokesdog, and members from the 355th Fire Emergency Services flight taught children from the Child Development Center how to stop, drop and roll at Davis-Monthan, Oct. 8. The 355th FES conducted several events in conjunction with Fire...
 

 

Troops to Teachers helps Airmen serve after separation

NELLIS AIR FORCE BASE, Nev. – For many service members who are separating from the military, finding employment that utilizes prior training or skills gained while serving can be difficult. For Airmen who are honorably discharged from their military commitment and have an interest in ‘serving’ again as an educational instructor, the Troops to Teachers program is...
 
 

Military Tuition Assistance Program implements changes for FY15

HOLLOMAN AIR FORCE BASE, N.M. – Air Force active duty Airmen who want to take advantage of the military assistance programs for voluntary education in the coming academic year can expect several changes that were implemented on Oct. 1, 2014. The new Air Force Credentialing Opportunities Online, also referred to as AF COOL, will take the place...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin