Difference between revisions of "OPSEC"
Line 25: | Line 25: | ||
== Further Reading == | == Further Reading == | ||
− | * [https:// | + | * [https://media.defense.gov/2020/Oct/28/2002524944/-1/-1/0/JP%203-13.3-OPSEC.PDF DoD Joint Publication 3-13.3 – Operations Security (PDF)] |
− | * [https://www. | + | * [https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-53r4.pdf NIST SP 800-53 Rev. 4 – Security & Privacy Controls (PDF)] |
− | * [https://ssd.eff.org/ Surveillance Self-Defense Toolkit – | + | * [https://www.cisa.gov/sites/default/files/2024-08/Guide%20to%20Operations%20Security%20for%20Election%20Officials.pdf CISA Guide to Operations Security for Election Officials (PDF)] |
+ | * [https://www.dni.gov/index.php/ncsc-what-we-do/operations-security ODNI OPSEC Overview – National Counterintelligence & Security Center] | ||
+ | * [https://www.cdse.edu/Portals/124/Documents/student-guides/GS130-guide.pdf CDSE OPSEC Awareness Guide for DoD & Contractors (PDF)] | ||
+ | * [https://ssd.eff.org/ EFF: Surveillance Self-Defense Toolkit] | ||
+ | * [https://www.nsa.gov/press-room/cybersecurity-advisories-guidance/ NSA Cybersecurity Advisories & Technical Reports] | ||
+ | * [https://www.nsa.gov/Helpful-Links/NSA-FOIA/Declassification-Transparency-Initiatives/Internal-Periodicals-Publications/Legacy-Periodicals-Lists/igphoto/2002751705/ NSA Legacy OPSEC Publications – NSA.gov] | ||
* [https://en.wikipedia.org/wiki/Operations_security Wikipedia: OPSEC] | * [https://en.wikipedia.org/wiki/Operations_security Wikipedia: OPSEC] |
Revision as of 09:04, 21 April 2025
OPSEC
Operational Security is not paranoia — it's pattern awareness.
This page serves as the main hub for OPSEC practices and philosophies across both physical and digital environments. Whether you're an activist, sysadmin, whistleblower, or just someone who values sovereignty in the modern surveillance state — this is your jump-off point.
What is OPSEC?
OPSEC (Operational Security) is the practice of identifying and protecting critical information from adversarial observation. It’s not just about encryption or burner phones — it’s about behavioral patterns, hardware trust, environmental awareness, and long-term risk reduction.
Modern threats are persistent and often built into the tools we use every day. True OPSEC starts by understanding the entire surface: from BIOS to browser, from speech patterns to USB ports.
Projects and Guides
Projects and Guides
- Discord-cutters – How to minimize risk and prevent doxxing on Discord through identity discipline and behavioral awareness.
- Burner Discipline – Step-by-step instructions on maintaining anonymity using ProtonMail, Mullvad VPN, and operational compartmentalization.
- Ghost VM Ops – Best practices for creating, managing, and isolating virtual machines for security and privacy.
- Sandbox Rituals – A guide to using Windows Sandbox for safely executing untrusted programs in a disposable environment.
- Titus Cleanse – How to use Chris Titus’s Windows utility to debloat and secure your system with minimal configuration.
- WPD Blackout – Detailed usage of WPD.app to disable Windows telemetry, background data collection, and unwanted services.
- Pyongyang Night – A comprehensive guide to disabling Intel ME and AMD PSP for hardware-level OPSEC.
Further Reading
- DoD Joint Publication 3-13.3 – Operations Security (PDF)
- NIST SP 800-53 Rev. 4 – Security & Privacy Controls (PDF)
- CISA Guide to Operations Security for Election Officials (PDF)
- ODNI OPSEC Overview – National Counterintelligence & Security Center
- CDSE OPSEC Awareness Guide for DoD & Contractors (PDF)
- EFF: Surveillance Self-Defense Toolkit
- NSA Cybersecurity Advisories & Technical Reports
- NSA Legacy OPSEC Publications – NSA.gov
- Wikipedia: OPSEC