Joni Ernst on DoD Data Security: Protecting Mission-Sensitive Information
Forbes Breaking NewsNovember 7, 20255 min1,313 views
6 connections·10 entities in this video→Evolving Threats in Digital Age
- 📱 In 2003, soldiers had limited communication options and were advised not to disclose their location; today, over 85% of service members use connected devices that collect geolocation data.
- ⚠️ This creates an exploitable surface that adversaries can leverage against both individual service members and entire units.
Operational Security (OPSEC) and Data Leverage
- 🎯 Adversaries are actively mapping and using open-source data points to target military personnel and operations.
- 🧩 Seemingly harmless personal information can be weaponized, posing a significant risk to mission security.
Department of Defense Security Disciplines
- 🛡️ While OPSEC has been quick to adapt, other security disciplines within the DoD, such as force protection and counterintelligence, have been slower to integrate new data protection measures.
- ✅ The DoD has established a structure with defined roles and responsibilities to handle these evolving threats, which is a positive step.
Training and Awareness for Service Members
- 🎓 Ubiquitous technical surveillance (UTS) training is crucial for all service members to understand their digital signature and its implications.
- 🔍 Conducting a digital mirror survey can help identify and assess the commercially available data associated with a unit or base, enabling informed decisions to alter digital footprints.
Multi-Pronged Approach to Data Security
- 💡 While training is essential for changing user behavior, especially regarding personal cell phone usage, technical solutions and policy changes are also critical.
- ⚖️ A combination of training, policy, and technological safeguards is necessary to effectively reduce the operational value of sensitive information to adversaries.
Knowledge graph10 entities · 6 connections
How they connect
An interactive map of every person, idea, and reference from this conversation. Hover to trace connections, click to explore.
Hover · drag to explore
10 entities
Chapters3 moments
Key Moments
Transcript23 segments
Full Transcript
Topics12 themes
What’s Discussed
DoD Data SecurityJoni ErnstMission Sensitive InformationOperational Security (OPSEC)Geolocation DataConnected DevicesDigital SignatureUbiquitous Technical Surveillance (UTS) TrainingAdversary TargetingData BrokersForce ProtectionCounterintelligence
Smart Objects10 · 6 links
Product· 1
Concepts· 3
People· 3
Event· 1
Companies· 2