Jump to content

Operational Security: Difference between revisions

From Archive
Create stub: Operational Security
 
Major expansion: OPSEC process, digital/physical/human security, proportionate response
 
Line 1: Line 1:
''Page under development.''
= Operational Security =


Practices for protecting sensitive information and activities.
[[File:Security camera.jpg|thumb|right|200px|The question isn't whether you're being watched, but by whom and why it matters]]


== Topics to Cover ==
'''Operational Security''' (OPSEC) is the practice of protecting sensitive information and activities from observation, analysis, and exploitation. Originally military doctrine, now essential for journalists, activists, and anyone with something worth protecting.
* Information compartmentalization
 
* Communication security
== Core Principle ==
* Physical security
 
* Pattern analysis
OPSEC isn't about paranoia - it's about understanding what you're protecting, from whom, and making rational decisions about tradeoffs.
 
'''The OPSEC Mindset:'''
* What do I need to protect?
* Who wants to access it?
* What are they capable of?
* What's the cost of compromise?
* What protection is proportionate?
 
== The OPSEC Process ==
 
=== 1. Identify Critical Information ===
 
What would harm you if exposed?
 
* '''Sources:''' Names, contact methods, identifying details
* '''Methods:''' How you gather information
* '''Plans:''' What you're working on, when you'll publish
* '''Location:''' Where you are, where you'll be
* '''Associations:''' Who you work with, who you know
 
=== 2. Analyze Threats ===
 
Who might want this information?
 
* '''Subjects of investigation:''' Most common threat
* '''Competitors:''' May want your story
* '''Governments:''' Surveillance capabilities vary
* '''Criminals:''' If your work threatens their interests
* '''Random actors:''' Stalkers, trolls, opportunists
 
=== 3. Analyze Vulnerabilities ===
 
How might information leak?
 
* '''Digital:''' Metadata, tracking, interception
* '''Physical:''' Surveillance, document theft
* '''Human:''' Social engineering, loose talk
* '''Patterns:''' Predictable behavior reveals intent
 
=== 4. Assess Risk ===
 
Probability x Impact = Priority
 
Focus protection on:
* High probability + high impact (critical)
* Low probability + high impact (worth protecting)
* High probability + low impact (nuisance)
 
=== 5. Apply Countermeasures ===
 
Match protection to threat:
 
* Don't use military-grade encryption for grocery lists
* Don't use plaintext for source communications
* Do be consistent once you've decided
 
== Digital OPSEC ==
 
=== Communication ===
 
{| class="wikitable"
! Sensitivity !! Tool !! Rationale
|-
| High || Signal (disappearing messages) || E2E encryption, minimal metadata
|-
| Medium || Encrypted email (ProtonMail) || Better than Gmail, not perfect
|-
| Low || Regular channels || Unnecessary protection draws attention
|}
 
'''Golden rule:''' Assume any unencrypted digital communication is permanent and readable.
 
=== Devices ===
 
* '''Compartmentalization:''' Separate devices for separate activities
* '''Full disk encryption:''' Always, everywhere
* '''Strong passwords:''' Unique, complex, managed
* '''Updates:''' Security patches immediately
* '''Physical security:''' Don't leave devices unattended
 
=== Metadata ===
 
Content isn't everything. Metadata reveals:
 
* '''Who you communicate with'''
* '''When and how often'''
* '''Where you are'''
* '''What devices you use'''
 
Strip metadata from shared files. Be aware of what your patterns reveal.
 
=== Accounts ===
 
* '''Unique passwords:''' Password manager, always
* '''2FA:''' Hardware keys for critical accounts
* '''Compartmentalization:''' Separate accounts for separate purposes
* '''Recovery:''' Secure backup of credentials
 
== Physical OPSEC ==
 
=== Awareness ===
 
* '''Surveillance detection:''' Know what normal looks like
* '''Counter-surveillance:''' Vary patterns when warranted
* '''Meeting security:''' Appropriate locations, no devices
 
=== Documents ===
 
* '''Secure storage:''' Locked, encrypted backups
* '''Secure disposal:''' Shredding, secure deletion
* '''Need to know:''' Don't carry what you don't need
 
=== Travel ===
 
* '''Device security:''' Burner phones, clean laptops
* '''Border crossings:''' Know your rights, minimize exposure
* '''Hotel security:''' Physical and digital
 
== Human OPSEC ==
 
The biggest vulnerability is usually human:
 
=== Personal Discipline ===
 
* '''Need to know:''' Don't share more than necessary
* '''Loose talk:''' Be aware of who's listening
* '''Social engineering:''' Verify requests through known channels
* '''Bragging:''' Resist the urge to discuss sensitive work
 
=== Social Dynamics ===
 
* '''Trust development:''' Slow, verified
* '''Compartmentalization:''' Different groups know different things
* '''Cover stories:''' Plausible explanations when needed
 
=== Pattern Discipline ===
 
Your patterns reveal intent:
 
* Suddenly visiting a location repeatedly
* Searching for specific people online
* Contacting former employees
* Requesting specific documents
 
Think about what your behavior pattern says.
 
== Proportionate Response ==
 
OPSEC should match actual threat level:
 
{| class="wikitable"
! Threat Level !! Appropriate Measures
|-
| Routine journalism || Basic digital hygiene, secure communication with sources
|-
| Sensitive investigation || Compartmentalized devices, encrypted storage, careful patterns
|-
| High-risk investigation || Air-gapped systems, counter-surveillance, legal preparation
|-
| Active threat || Physical security, professional consultation, organizational support
|}
 
'''Over-protection:'''
* Creates operational friction
* Draws attention
* Isn't sustainable
 
'''Under-protection:'''
* Exposes sources
* Compromises stories
* Endangers you
 
== Common Failures ==
 
* '''Inconsistency:''' Using Signal for sources, then discussing them on regular phone
* '''Convenience:''' Choosing easy over secure when it matters
* '''Complacency:''' Assuming past safety predicts future safety
* '''Overconfidence:''' Believing your adversary isn't capable
* '''Loose talk:''' Discussing sensitive work in inappropriate settings
 
== Integration ==
 
OPSEC connects to:
 
* '''[[Threat Modeling]]:''' Systematic risk assessment
* '''[[Source Handling]]:''' Protecting confidential sources
* '''[[PGP]]:''' Encrypted communication
* '''[[Yubikey]]:''' Hardware authentication
* '''[[Digital Security Incident Runbook]]:''' When things go wrong
 
== References ==
 
* [https://cpj.org/reports/2012/04/journalist-security-guide/ CPJ Journalist Security Guide]
* [https://ssd.eff.org/ EFF Surveillance Self-Defense]
* [https://freedom.press/training/ Freedom of the Press Foundation]
 
[[Category:Digital Security]]
[[Category:Preparedness]]
[[Category:Journalism]]


{{Navbox Security}}
{{Navbox Security}}
[[Category:Digital Security]][[Category:Preparedness]]

Latest revision as of 05:43, 15 January 2026

Operational Security

The question isn't whether you're being watched, but by whom and why it matters

Operational Security (OPSEC) is the practice of protecting sensitive information and activities from observation, analysis, and exploitation. Originally military doctrine, now essential for journalists, activists, and anyone with something worth protecting.

Core Principle

OPSEC isn't about paranoia - it's about understanding what you're protecting, from whom, and making rational decisions about tradeoffs.

The OPSEC Mindset:

  • What do I need to protect?
  • Who wants to access it?
  • What are they capable of?
  • What's the cost of compromise?
  • What protection is proportionate?

The OPSEC Process

1. Identify Critical Information

What would harm you if exposed?

  • Sources: Names, contact methods, identifying details
  • Methods: How you gather information
  • Plans: What you're working on, when you'll publish
  • Location: Where you are, where you'll be
  • Associations: Who you work with, who you know

2. Analyze Threats

Who might want this information?

  • Subjects of investigation: Most common threat
  • Competitors: May want your story
  • Governments: Surveillance capabilities vary
  • Criminals: If your work threatens their interests
  • Random actors: Stalkers, trolls, opportunists

3. Analyze Vulnerabilities

How might information leak?

  • Digital: Metadata, tracking, interception
  • Physical: Surveillance, document theft
  • Human: Social engineering, loose talk
  • Patterns: Predictable behavior reveals intent

4. Assess Risk

Probability x Impact = Priority

Focus protection on:

  • High probability + high impact (critical)
  • Low probability + high impact (worth protecting)
  • High probability + low impact (nuisance)

5. Apply Countermeasures

Match protection to threat:

  • Don't use military-grade encryption for grocery lists
  • Don't use plaintext for source communications
  • Do be consistent once you've decided

Digital OPSEC

Communication

Sensitivity Tool Rationale
High Signal (disappearing messages) E2E encryption, minimal metadata
Medium Encrypted email (ProtonMail) Better than Gmail, not perfect
Low Regular channels Unnecessary protection draws attention

Golden rule: Assume any unencrypted digital communication is permanent and readable.

Devices

  • Compartmentalization: Separate devices for separate activities
  • Full disk encryption: Always, everywhere
  • Strong passwords: Unique, complex, managed
  • Updates: Security patches immediately
  • Physical security: Don't leave devices unattended

Metadata

Content isn't everything. Metadata reveals:

  • Who you communicate with
  • When and how often
  • Where you are
  • What devices you use

Strip metadata from shared files. Be aware of what your patterns reveal.

Accounts

  • Unique passwords: Password manager, always
  • 2FA: Hardware keys for critical accounts
  • Compartmentalization: Separate accounts for separate purposes
  • Recovery: Secure backup of credentials

Physical OPSEC

Awareness

  • Surveillance detection: Know what normal looks like
  • Counter-surveillance: Vary patterns when warranted
  • Meeting security: Appropriate locations, no devices

Documents

  • Secure storage: Locked, encrypted backups
  • Secure disposal: Shredding, secure deletion
  • Need to know: Don't carry what you don't need

Travel

  • Device security: Burner phones, clean laptops
  • Border crossings: Know your rights, minimize exposure
  • Hotel security: Physical and digital

Human OPSEC

The biggest vulnerability is usually human:

Personal Discipline

  • Need to know: Don't share more than necessary
  • Loose talk: Be aware of who's listening
  • Social engineering: Verify requests through known channels
  • Bragging: Resist the urge to discuss sensitive work

Social Dynamics

  • Trust development: Slow, verified
  • Compartmentalization: Different groups know different things
  • Cover stories: Plausible explanations when needed

Pattern Discipline

Your patterns reveal intent:

  • Suddenly visiting a location repeatedly
  • Searching for specific people online
  • Contacting former employees
  • Requesting specific documents

Think about what your behavior pattern says.

Proportionate Response

OPSEC should match actual threat level:

Threat Level Appropriate Measures
Routine journalism Basic digital hygiene, secure communication with sources
Sensitive investigation Compartmentalized devices, encrypted storage, careful patterns
High-risk investigation Air-gapped systems, counter-surveillance, legal preparation
Active threat Physical security, professional consultation, organizational support

Over-protection:

  • Creates operational friction
  • Draws attention
  • Isn't sustainable

Under-protection:

  • Exposes sources
  • Compromises stories
  • Endangers you

Common Failures

  • Inconsistency: Using Signal for sources, then discussing them on regular phone
  • Convenience: Choosing easy over secure when it matters
  • Complacency: Assuming past safety predicts future safety
  • Overconfidence: Believing your adversary isn't capable
  • Loose talk: Discussing sensitive work in inappropriate settings

Integration

OPSEC connects to:

References


Security & Opsec
Crypto PGP · PGP Communication Guide · Key Management
Incident Security Incident Runbook · Threat Modeling · Account Recovery
Hardware Flipper Zero · HackRF · Yubikey
Culture Hacker Culture · Operational Security