At WarriorLodge we have taken certain "technological" precautions to make it as difficult as possible for enemies of the United States to piece together critical information from this website and potentially adversely affect national security. For instance, entire countries have been blocked completely and have no access or ability to view the content on WarriorLodge. In addition, thanks to our friends in private sector IT, we have several other countermeasures in place.
Of course, we know that a dedicated effort can and will find a way around our security... and that's where you come in.
Information that is for official use only (FOUO). This type of information would pose an unacceptable risk to the US Military, especially in electronically aggregated form. While records containing FOUO information will normally be marked at the time of their creation, records that do not bare such markings shall be assumed to contain FOUO information.
Analysis and recommendations concerning lessons learned which would reveal sensitive military operations, exercises or vulnerabilities.
Reference to unclassified information that would reveal sensitive movements of military assets or the location of units, installations, or personnel where uncertainty regarding location is an element of a military plan or program.
Personal information including compilations of names or personnel assigned overseas, sensitive, or routinely deployable units.
Names, locations, and specific identifying information about family members of military and government employees.
Highly technical information that can be used or be adapted for use to design, engineer, product, manufacture, operate, repair, overhaul, or reproduce any military or space equipment or technology concerning such equipment.
Unclassified information pertaining to classified programs. The clearance review procedures for unclassified information pertaining to classified programs proposed for posting to a publicly accessible web sites must take into account the likelihoods of classification compilation.
Don’t discuss current or future deployment destinations.
Don’t discuss current or future operations or missions.
Don’t discuss current or future dates and times of when servicemembers will be in deployed, in-port or conducting exercises.
Don’t discuss readiness issues and numbers.
Don’t discuss specific training equipment.
Don’t discuss people’s names and billets in conjunction with operations.
Don’t speculate about current or future operations.
Don’t spread rumors about current, future, or past operations or movements.
Don’t assume the enemy is not trying to collect information on you; they are... right now. Seriously.
Be smart, use your head, and always think OPSEC when using email, phone, chat rooms and message boards.
Operations Security: 1. A systematic, proven process by which a government, organization, or individual can identify, control, and protect generally unclassified information about an operation/activity and, thus, deny or mitigate an adversary's/competitor's ability to compromise or interrupt said operation/activity (NSC 1988). 2. OPSEC is a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities to (a) identify those actions that can be observed by adversary intelligence systems, (b) determine indicators adversary intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries, and select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation (DOD JP 1994; JCS 1997).
Operations Security process: An analytical process that involves five components: identification of critical information, analysis of threats, analysis of vulnerabilities, assessment of risks, and application of appropriate countermeasures (NSC 1988).