CL: CUI
Assume that if you send information on the internet, someone can retrieve and store that information forever.
["EDC" Counterintelligence]
The art of knowing what your adversaries knows about your operations
The Office of the Director of National Intelligence (ODNI) & the National Counterintelligence and Security Center (NCSC) produced a series of documents on countering the threat of Foreign Intelligence Services (FISs) gathering classified information from those with access to such material. These tips have been adapted to suit protecting an individual’s privacy, information that is still “classified” in a sense but isn’t a threat to national security. Some blanket tips include:
Use secure passwords & a password manager
Avoid public Wi-Fi
Do not click links in or engage with unsolicited messages from untrusted sources
Reducing a Digital Footprint
It is important to understand the Digital Footprint (DF) one is leaving on the various data servers around the world. A DF is the trail of data that is knowingly and unknowingly left behind during normal operations. The data consists of two parts, the Active Digital Footprint (ADF) & the Passive Digital Footprint (PDF).
An active digital footprint is information intentionally shared online and includes status updates, tweets, photos & other actively shared data. Location data can also be considered a part of this list that can be a part of or separate from the previous items in this list as well as a part of a passive footprint. Disparate pieces of information within that collection of personal data can be extracted & utilized to give infer or insight into an individual’s interests, hobbies, schedule patterns & routines. That personal information can then be used to exploit the individual using the various tracking points and threat surfaces gathered from items the individual willingly shared.
ADFs can be reduced by ensuring that status updates & tweets only contain information relating to the message & not the sender of that message. Additionally, confirm that location data is not being unintentionally shared as many applications & devices embed that data into statuses & photos by default.
Information that is collected and shared without the individual’s intervention is considered a passive footprint. This includes background tracking from installed apps, geolocation Metadata, web and search history, purchase history, etc. This data is harder to counter completely, fortunately, whilst reviewing to reduce an ADF some elements of a PDF are reduced as well. For example, using a VPN can mask an IP address but that does little good if the same use patterns are still present, the adversary will still know who is visiting the same coffee shop every Tuesday morning to do all of their crypto transactions “in secret.”
Reveal as little personal data as possible
Personally Identifiable Information (PII) or an individual’s private data includes phone numbers, email addresses, birthdates, plans & physical addresses. All of this information can be included on a social media profile & accidentally revealed via a misclick or incorrectly configured privacy setting. It is vital to review these settings as well as observe what kind of PII is visible to others. This can be done by navigating to the profile in question using the “private mode” that most modern browsers come equipped with.
Device Security tips
The mere operation of an electronic device is a large source of active and passive personal data. Even without any applications installed most devices have globally unique identifiers attached to them & various parts that interact with the electromagnetic spectrum in ways that can pinpoint the precise location of that device to within mere centimeters. It gets easier & easier every day for adversaries to exploit those features & components. Take the time to review the vulnerabilities of the device(s) used during normal operations as well as what that device(s) know(s) about said normal operations.
DYOR - Do your Own Research
Trust is earned, not given by default
What sort of personal data and information can this app/device access?
Is it reasonable for the app/device to have access to that data?
Who developed this app/device?
Who owns this app/device?
What do they do with the data that can be collected from the app/device?
Update Software regularly
Software updates for supported devices are sent out routinely along with a list of what is in the new update, commonly referred to as the patch notes. These updates contain new features, security fixes & usually a few hundred new attack surfaces to be exploited and subsequently resolved in the next update. It is generally advised to be running the latest software possible but depending on the circumstances it might be necessary to be 2 or 3 updates behind the latest build, reasons for this could include:
The latest version has a security flaw that the current version does not
Software that is vital to your operations is incompatible with the latest version
It is advised to have a vetted source that keeps up on the latest updates and beta or early versions of updates given to insiders. Make the habit of at least skimming the patch notes for updates before installing them.
[Invest In Your Expenses To Create Money Freedom // 👋 Sine Wave]
This publication is not financial advice and should not be considered financial advice. The included content is for informational purposes only.
In the time between this video being viewed and selected for inclusion in this briefing, the creator of the video has since made the video private, however, the topic is of importance so it is being included anyway. In the age of trillion-dollar Repos propping up Wall Street and individuals turning $8,000 into $5.7 billion in a little over a year using something that is still valued at $.00003 at the time of writing (that is not a typo, that actually happened) it can be inferred that there is tremendous risk and opportunity in the current financial ecosystem. With inflation currently hovering around anywhere between 5-15% depending on the source, there is no doubt that expenses have risen and will continue to rise now is the time to figure how to invest in those expenses to reduce them or figure out a way to turn that expense into a source of income.
Investing your money is about making your money work for you instead of the other way around
Invest in things that reduce expenses while also making passive income
[It’s Time to Make Big Changes - The US Dollar is Plummeting]
Whether you like it or not The Great Reset is real and your life will never be the same as it was before "The Crisis". Work will never be the same, now is the time to take advantage of the current opportunities present to turn skills, hobbies & passions into sources of income. Having a degree is becoming less & less of a requirement to get or forge a quality well-paying job that pays in more than just money. Skills, drive & merit are becoming the most important criteria.
What do you know that others will pay for?
What problems can you solve that others will pay for?
What can you do that others will pay for?
[TMYK]
[Community News]
We would like to welcome the new subscribers that have joined since the last briefing, JANN is now approaching 30 subscribers. Our platform is a little over a month old & has the lofty objective of unseating (even if it’s on a little) traditional “news” organizations which cannot be achieved without your support. We here at JANN thank you for your current & continued support as this space grows & changes to better suit the needs of its community.