WEBVTT 00:13.090 --> 00:16.920 I just tonight set of terror attacks here on us always until 00:16.920 --> 00:19.920 the service members in their own land speed had them in the role 00:19.920 --> 00:23.750 melts the information doesn't appear to have been hacked from 00:23.820 --> 00:24.930 government servers. 00:25.640 --> 00:28.410 The Islamic state in a rectangle of all of the was known as I 00:28.410 --> 00:32.130 sold recently pope was it was considered an names photos and 00:32.130 --> 00:35.870 alleged addresses yuccas molds or personnel with a call to kill 00:35.870 --> 00:37.090 the and their own lance. 00:38.130 --> 00:41.120 This information was not the other is results affecting do was 00:41.120 --> 00:43.930 attain from public internet sites that are frequent in ever day 00:43.930 --> 00:47.260 by marines sailors and civilian duty personnel. 00:48.660 --> 00:52.960 The Terrorist dolphin use the information they gain for extortion 00:53.190 --> 00:58.060 coercion for a smooth poll would shaving or even to incite vigilante. Justice. 01:03.260 --> 01:07.350 My face but he didn't tragic family a Francisco way to know what's 01:07.350 --> 01:10.680 going on when each it be it home to whatever that is. Doing. 01:13.040 --> 01:16.370 I found out that someone was using my photos on my my akhbar 01:16.370 --> 01:20.430 try to sign and actually sent me waned and alerted me to what 01:20.430 --> 01:21.280 was going on. 01:22.210 --> 01:24.970 And I was pretty surprise because I never thought that someone 01:24.970 --> 01:26.700 but still mind and any on. Line. 01:29.230 --> 01:32.260 Well the naval criminal investigative service continues to actively 01:32.260 --> 01:35.190 of all you it does turret and work with law enforcement and intelligence 01:35.190 --> 01:38.970 borders to reduce its affects is importing that everyone routinely 01:38.970 --> 01:42.590 reviews all Mann and social media presence of behavior two-incher. 01:42.590 --> 01:47.010 We're not putting ourselves our families four-fold altered personally. Risk. 01:49.340 --> 01:52.600 Rains or courage to make personal unofficial close regarding 01:52.600 --> 01:55.740 the Molycorp and like for related topics base on their professional 01:55.740 --> 01:59.070 expertise personal expereinces personal knowledge. 02:00.640 --> 02:03.650 Isn't wine from ranks image of the way they behave I wine because 02:03.650 --> 02:06.380 they need to understand and not just reflecting themselves. 02:06.380 --> 02:09.950 They reflect an organization that the joint so if you say something 02:09.950 --> 02:12.200 negative what they're you're talking about them right or not 02:12.330 --> 02:14.760 it reflects the right course value seen anyway. 02:15.600 --> 02:18.540 As marines we're responsible for your aid to federal law. 02:18.570 --> 02:21.820 It's great for regulations and policies that mandate personal 02:21.820 --> 02:25.770 says of called it's all tourists security information assurance 02:25.930 --> 02:29.650 release of personally identifiable information ethics regulations 02:29.840 --> 02:33.160 and the release of information to the public even making an offer 02:33.160 --> 02:34.410 suppose on the internet. 02:34.970 --> 02:37.910 These restrictions on call sees or in committed to assure that 02:37.910 --> 02:41.910 order and discipline was essential to mission readiness success 02:41.940 --> 02:42.710 on the. Battlefield. 02:45.290 --> 02:48.450 With social media these days you can tell you where your that 02:48.450 --> 02:51.620 your location which are doing cruise there with you. 02:52.520 --> 02:54.480 Can really give a lot of information out. 02:55.010 --> 02:58.910 That we also need a monster our social media in terms of when 02:58.910 --> 02:59.640 we deploy. 03:00.210 --> 03:02.040 What's going on on our deployment everything. 03:02.720 --> 03:05.830 And how much it from a sure giving out on that its mission that 03:05.830 --> 03:06.820 we may be going on. 03:07.370 --> 03:08.920 So we don't wanna get the enemy too much. 03:09.640 --> 03:15.480 Information. Under no circumstance can you close classified controllable 03:15.480 --> 03:16.220 nicholas fun. 03:16.820 --> 03:22.370 Or sensitive information such as Tactics troop movements for SARS. 03:22.900 --> 03:24.320 Weapons system details. 03:25.010 --> 03:28.590 Additionally poster disclosing internal maureen core documents 03:28.690 --> 03:31.930 or information that is not been released a public is prohibited. 03:33.140 --> 03:34.320 Some examples include. 03:34.910 --> 03:36.810 Memos emails. 03:37.480 --> 03:38.400 Meeting notes. 03:39.050 --> 03:39.950 This is terrific. 03:40.620 --> 03:41.510 White papers. 03:42.350 --> 03:46.500 The fears that its pre does is no material. And invested a tory 03:46.500 --> 03:49.660 information your also border wooded from releasing bring court 03:49.690 --> 03:54.180 email addresses telephone numbers or fax numbers that a lot already 03:54.180 --> 03:55.720 authorize for public release. 03:57.320 --> 04:00.480 Some of the consequences of marines may face for making inappropriate 04:00.520 --> 04:04.120 posts can range from page 11 six to one of five. 04:04.710 --> 04:08.400 All the way into being involved in an investigation it just a. 04:09.310 --> 04:12.370 Depends on this a very in the post and who made sand. 04:14.390 --> 04:17.890 Stay vigilant and modest you're almost footprint and social media 04:17.890 --> 04:21.180 kelts for called sick of privacy settings to assured herb data 04:21.180 --> 04:23.060 does not fall instil wrong hands. 04:24.760 --> 04:27.660 Uh one of our zone gets Marmor aims were worked for ten. 04:27.660 --> 04:31.210 It's a social media as does actor quarterly that professional 04:31.530 --> 04:35.400 does keep in mind that things that are of course it was not going 04:35.440 --> 04:38.490 on for them. But it also kind of a polls around. 04:39.340 --> 04:43.350 The Ring core leadership has no insane to restrict use of social 04:43.350 --> 04:46.650 media all might activities those comply with existing policy. 04:47.330 --> 04:51.620 Only to prevent exploitation of debtor residing on one one social. Platforms. 04:55.130 --> 04:58.250 As marines we need to really monitor the way we behave a social media. 04:58.930 --> 05:01.710 Especially for putting ourselves out there as a representative 05:01.800 --> 05:02.680 of the marines for. 05:03.290 --> 05:05.920 Uh we're professionals will you be conductor cells professionals 05:05.920 --> 05:06.770 24 seven. 05:07.410 --> 05:10.290 If you putting something out there that may offend somebody. 05:11.570 --> 05:14.690 In you think it's okay because you can't hide behind your digital window. 05:15.830 --> 05:18.320 Think about whether you could tell it someone face-to-face are 05:18.320 --> 05:20.390 not initially with ascendant. Face-To-Face. 05:23.720 --> 05:26.230 Parade's sailor suit. So they've personnel. 05:26.820 --> 05:30.730 Each and every why you are in or go part of the trainee command mission. 05:31.330 --> 05:34.660 It is important that we remain focused and mission ready. 05:34.840 --> 05:38.560 So we can continue to provide world class training to the world's 05:38.760 --> 05:40.190 finest fighting force. 05:40.730 --> 05:44.600 To that than it is vital that we take all the necessary steps 05:44.890 --> 05:49.360 to protect ourselves against threats posed by the internet terrorist 05:49.610 --> 05:54.340 cyber criminals brother nefarious individuals se to use the information 05:54.610 --> 05:56.310 we post online to do all. 05:57.200 --> 06:00.820 The threats are real and the consequences had the potential to 06:00.820 --> 06:05.300 be fatal social media is or another battle space. We must cocker 06:05.570 --> 06:07.390 nor to win the war on terrorists. 06:08.120 --> 06:12.130 As the commanding general trainee command our directing all personnel 06:12.400 --> 06:16.920 to re watched this video take notes and put them in action and 06:16.920 --> 06:21.170 very ashore you raid understand of comply with their murray core 06:21.170 --> 06:22.610 social media policies. 06:23.120 --> 06:26.550 The attack of these policies is not the and justly limit your 06:26.550 --> 06:30.690 online activities but debrah brent the potential exploitation 06:30.930 --> 06:31.730 of information. 06:32.360 --> 06:35.800 I want you to think of these policies of a weapon the you'll 06:35.800 --> 06:39.980 use to protect yourself your family and your brothers and sisters 06:39.980 --> 06:40.430 in our. 06:41.060 --> 06:44.340 This is serious although our enemy can't be seen. 06:45.030 --> 06:46.970 But it is out there and is watching. 06:47.990 --> 06:49.000 Protector self. 06:49.580 --> 06:50.660 Protector friendly. 06:51.160 --> 06:56.010 Protect each other protective worrying core to protect our great nation. 06:56.240 --> 07:16.910 I fall and these policies soccer for them. No. PS..