Skip to main content (Press Enter).
U.S. Central Command
OPERATIONS AND EXERCISES
OPERATION INHERENT RESOLVE
OPERATIONAL CONTRACT SUPPORT
VISITORS AND PERSONNEL
SOCIAL MEDIA SECURITY
CENTCOM NEWCOMER INFORMATION
CENTCOM TELEWORKING GUIDE
USCENTCOM UNCLASSIFIED REGULATIONS
VISITORS AND PERSONNEL
SOCIAL MEDIA SECURITY
FAQ on Security for Social Media
Due to the widespread use of social media, the following is provided as general information about the benefits and risks of the online world. CENTCOM Personnel are reminded to use common sense when using social media.
What are social media websites?
Social media websites allow people to collaborate and connect to share information and ideas. Essentially, these sites allow people to socialize in cyberspace. Some are tailored to government and military employees. Facebook and Twitter are the most popular social media sites in the United States.
What are the benefits of using a social media website?
From a personal perspective, social media websites can be fun, exciting, entertaining, and useful for maintaining relationships. Professionally, people can use social media websites for marketing, managing their public image, connect with customers, and solicit ideas and feedback. The Federal Emergency Management Agency (FEMA), for example, uses it to issue flood warnings. For people who are home-bound due to illness, are stay-at-home parents, or retired, social media is a good way to stay connected.
What are the dangers of using social media websites?
Stalkers, thieves, hackers, phishers/scammers, militant Americans, terrorists, intelligence spies, and pedophiles also use social media.
Thieves or stalkers
may watch your updates to learn about your present location and schedule so they know when to rob or stalk you.
are using social networking to find and connect with kids. There are many well-publicized examples of kids who have been lured away be a pedophile who made friends with them through social networking. According to ABC News, MySpace kicked off 90,000 sex offenders from their site.
are con artists who send e-mails to people that appear to be authentic communication from a bank, a web service, or some other authority but are in fact a lure. The goal is usually for the user to come to a website that is linked from the e-mail in order to load malicious software on the target’s machine or entice them into entering sensitive data such as your username and password.
have said they are hunting people and their families at home. An Al Qaeda handbook tells its terrorists to seek out information about government personnel, officers, important personalities, and all matters related to those (resident, work place, times of leaving and returning, wives and children, places visited).
Military family members have received hate mail and harassing phone calls from people who don’t like the U.S. military. Government employees and military members have also had their pages raided and defaced.
What should you not share on a social media site?
What you want to keep secret and what some people want from you are not always the same.
It’s important to know what adversaries are looking for. You should be careful when sharing the names and photos of yourself, your family and your co-workers. Don’t share your usernames, passwords, or network details. Don’t share your job title, location, salary, or clearance level. Also avoid listing information about your home or work security and logistical details, like how you get to work and travel itineraries. Don’t post information about your mission or your unit’s capabilities and limitations. Posting your social security number, credit cards, or banking information also puts you at risk of identity theft. Listing your hobbies, likes, dislikes, etc., could be useful information to an enemy, especially for gaining trust and rapport before seeking other information.
More information (External Link):
The link below will take you the latest information about personal cyber and social media security on the National Security Agency’s website. It covers a wide range of topics, for example: how to implement Full Disk Encryption (FDE) on laptops; enable data protection on the iPad; the storage of personal information on the Internet; email best practices; and password management.
What can I do to protect myself, my information, and my personal home network?