Posted on Nov 7, 2018
Open Source Monitoring of NATO Trident Juncture Exercises - bellingcat
4.97K
16
4
6
6
0
Posted 6 y ago
Responses: 3
This article ought to be passed along to every PAO.. just so they can have it for their use as a great How To article. There are times you need to track this, and times you need to optimize it when you are attempting to maximize an effort (such as this exercise). But also know that you can reverse this and apply it as IW as well.
(1)
(0)
Social media is a greater security problem than most military and civilian personnel think. A geo tagged picture (or not), tweet or liked can be tracked and filtered by fake followers or via true connections (your family, friends or colleagues). The connection between you and a tracker doesn’t need to be direct. At times, your family, friends or colleagues are greater information source than you are. This all applies to private accounts as well. You should try tracking yourself based on the information you or family members post
(1)
(0)
LTC Eric Udouj
And knowing that information - as well as maybe learning a few item from the How To aspect of articles like this -- allows you to reverse that same process if you have to run a deception operation. Importance of understanding all that communications have changed is critical to Officers and NCOs at every level of a command.
(0)
(0)
Read This Next