- financial information
- social security numbers
- digital wallet keys
- passwords and PINs
- medical information
- political affiliation
- religious affiliation
- membership in certain organizations
- presence of valuables in the home (cash, gold, silver, antiques, guns, tools, electronics)
- purchases of large amounts of food or other supplies
- survival plans
Examples of how we give away our critical information:
- Over-sharing on social media is a major risk
- Your Discord chats, Venmo transactions, or Ring doorbell footage can all spill your secrets.
- Public conversations can be overheard by anyone nearby.
- Private conversations can be revealed, accidentally or on-purpose, by anyone involved.
- Your trash reveals your purchases, as well as financial and medical information.
- Nearby neighbors can physically see much of our activities and preparations.
- Children, especially young children, tell EVERYTHING to their friends, schoolmates, teachers, neighbors, and other parents (even if you've told them not to).
- Smart phones log all calls and texts. Even in airplane mode, phones can be tracked with the right gear—think Stingrays or rogue cell towers.
- Affinity cards, credit/debit cards, even modern library cards log all activity, which is then available to the company, government officials with, and sometimes, without, warrants, and even hackers.
What critical information is most important to protect? What threats are the most active? What vulnerabilities are the most likely to reveal private details?
Some types of information are more critical than other types—meaning it can more easily or effectively be used against you. Your crypto keys are more critical than your Costco bulk rice purchase—hackers can ruin you faster than a gossip can snitch. Focus on locking down the big stuff first. Most of the time and effort of OPSEC should be aimed at protecting the most important information against the most realistic threats. It’s your call—what’s worth guarding with your life?
Family/Tribe: Make sure everyone is on-board with what information is critical to protect, and why it is important to do so. Drill your crew like it’s a heist movie—code words for sensitive topics, and a ‘need-to-know’ vibe even at home.
Public Conversations: Avoid public conversations or comments about critical information. This includes phone conversations in public. Remember, if you are in public anyone can eavesdrop—keep it zipped.
Social Media: Going dark is unrealistic, so go fake instead—use burner accounts with no ties to your real life, as I described in Ghosting Big Tech: The Burner Rebellion (article link). Even then, avoid over-sharing. Don't tag other people in pictures, and ask that they don't tag you.Young Children: Be careful about what information you share with and around your children—they do have ears). Talk to them often about not to talk about outside the family. Make it a game: ‘Family secrets stay in the fort. Teach them to respond to questions, even from teachers, about the family's finances, religion, or politics by responding "I don't know," and "You'll have to ask Mommy or Daddy about that."Tech Hygiene: Ditch G-mail for ProtonMail or Tutanota. Wipe metadata from pics before posting. Dodge public WiFi. Realize that if you are emitting electronically, your use is being monitored, logged and stored. Keep your operating system and apps up-to-date. Used a privacy-enhanced browsers and search engines like Brave, Duck-Duck-Go, or StartPage.Physical OPSEC: Neighbors have eyes—privacy fences and heavy curtains help. Shred receipts, bills, and other documents after they are no longer needed. Break down boxes inside-out before trashing them.