- SurvivalBlog.com - https://survivalblog.com -

What? SurvivalBlog Has a FaceBook Page?

Anyone who has been a follower of SurvivalBlog for any time understands the distaste that the editors have for Facebook and other forms of social media. We make no secret of the fact that we know the primary purpose of these sites is to produce a viable database that can be mined for marketing purposes (and ofttimes other nefarious reasons). We have long stayed away from these OPSEC nightmares and have encouraged our readers to do likewise. However, we have watched these social media sites become giants in the communications industry, and it became obvious to us that we had to do something to protect our intellectual property rights. In addition, these platforms provide the ability to spread our message to potential readers who would not normally seek access to our website.

As a result, SurvivalBlog has started a social media presence. We would like our readers to understand that SurvivalBlog does not keep “lists” of people, even for marketing purposes. The only contact information we retain is that which is necessary for the operation of the blog. If you submit an article to the contest, we will keep your email so that we have a way of contacting you if we need you to make changes to the article, to be able to contact the winners of the contest, and to forward any correspondence that our readers may wish to send to the authors of those articles. We also keep contact information for our advertisers and those with whom we correspond regularly. SurvivalBlog does not keep a list of who reads or accesses the blog, and we operate on the principle that it is not a crime to refuse to turn over what we don’t have or keep to any entity who demands access to it, legally or otherwise.

With those caveats in mind, understand that contact information is a large part of social media networking. While your “liking” the Facebook page or “following” us on any of the social media platforms that we may participate in helps us, in terms of gaining control of our intellectual property and/or spreading the word to those who would not normally visit the website, you would be putting yourself on a list that we have no control over. With regards to social media, every post you view, every video you watch, every response/comment you make, and even every “private message” you send or receive is tracked in their database and is available to whatever entity gains access to that database. The most common accesses are for marketing purposes, but we also know that government entities (both domestic and foreign), corporations, and yes, even criminals use this information to make decisions about you. Social media has become such a large part of our culture that many feel that they must use social media. For that reason, we have prepared some guidelines for you to help you minimize OPSEC violations that can put you, your family, or your business/home at risk.

SurvivalBlog’s Social Media Footprint:

We will add more to this list if we decide to participate in them.

OPSEC Issues

If you are being targeted, constant updates to your social media account can alert the observer to your location as well as other critical information:

Even though many people believe that they don’t give any critical information away, it can be considered a case of “death by a thousand cuts.” Each individual piece of information may be meaningless in and of itself, but taken within the context of all of the information available, grievous breaches of OPSEC are easily obtained.

What can you do?

You can go on the offensive with your OPSEC as well. Some things you can consider go beyond just managing what you post on social media. You can make sure that your OPSEC is maintained quite simply:

It is also important to remember that if you post “it” and then have second thoughts and delete “it”, “it” still exists. You just can’t see “it”. The records in the database still have the original posting, any changes made to the posting, who posted “it”, who deleted “it”, and who saw or interacted with “it”. That information is then available at any time to anyone with access to the data. In this day and age, it is not inconceivable that this now deleted post could be used against you years into the future. There may come a time when “guilt by association” comes into play. Has someone else posted on your Facebook page, after which you deleted the post? You may be judged by the company you keep.

Beginning with these simple measures, you can start taking control of your digital life. Most important of all – Don’t post critical information! This can’t be repeated enough. Search engines make it super easy for adversaries to find it. If you just have to have a social presence, make it a habit to watch Enemy of the State [3] and Minority Report [4] at least on an annual basis. It is fiction, but so was a significant portion of Jules Verne’s [5] fiction…right up to the point where it became reality. (See Twenty Thousand Leagues Under the Sea [6] and From the Earth to the Moon [7])