OPSEC Guides

Last Updated: April 6, 2025

A Guide to Operational Security

Operational Security (OPSEC) is the practice of safeguarding sensitive information from adversaries. Rooted in military strategy, it now applies to both digital and physical realms, making it essential for anyone seeking to protect their privacy or activities.

1. Introduction to OPSEC

What is OPSEC?

OPSEC is a systematic process aimed at preventing adversaries from accessing critical information. It involves identifying sensitive data, evaluating threats, and implementing protective measures.

Key Domains:

  • Digital Security: Protecting your online presence
  • Physical Security: Securing tangible assets and environments

2. Misinformation Warfare: The Digital Front

Sun Tzu's Wisdom:

"All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near."

How Are You Being Tracked?

Today's adversaries—governments, corporations, and data miners—employ sophisticated tracking methods. Just two correlated data points can unmask your identity. Here are the primary tracking vectors:

Real-World Tracking Example:

A German vendor ("Shiny Flakes") was caught because he consistently shipped packages from the same DHL location and stored customer data in plaintext on his personal computer. This demonstrates how physical and digital OPSEC failures compound each other.

Names/Usernames
IP Addresses
Browser Fingerprints
Emails
Location Data
Phone Numbers
PII/Date of Birth
Stylometry

Just two correlated data points (e.g., an IP and an email) can unmask you. Your mission is to break these links.

Using Misinformation to Your Advantage

Historical precedents show misinformation's power. Octavian defeated Mark Antony by spreading rumors about his affair with Cleopatra. Modern darknet markets similarly fake "technical issues" during exit scams. Apply these deception tactics:

Practical Stylometry Example:

To obscure your writing style, alternate between:

  • Formal vs. casual language
  • American vs. British spelling
  • Different punctuation styles
  • Translation chain method (English → Russian → Spanish → Finnish → English)

> Names: Use aliases, never your real identity

> IPs: Hide with Tor, VPNs, VPS, RDP, or proxies—layer them

> Browser Fingerprints: Switch browsers and tweak plugins

> Phone Numbers: Use VOIP numbers (bought with crypto)

> Emails: Create separate accounts under aliases

> Stylometry: Alter writing style or run text through translations

> Deception: Plant subtle falsehoods to mislead trackers

Sun Tzu's Advice:

"Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment—that which they cannot anticipate."

3. Physical OPSEC: The D.U.M.B. Principle

Digital protections are meaningless if your physical defenses fail. The acronym D.U.M.B. (Deep Underground Military Bases) represents the impregnable security you should aim for.

OPSEC Failures Case Studies:

Ross Ulbricht (Silk Road)

Multiple critical failures:

  • Used personal Gmail for business communications
  • Shipped packages to his home address
  • Kept detailed, unencrypted logs of operations
  • Worked in public with his back to the door
  • Failed to properly configure CAPTCHA security

Alexandre Cazes (AlphaBay)

Used personal email for password resets, stored unencrypted data, and hosted servers under his name

Shiny Flakes

German vendor who shipped from one DHL outpost and stored plaintext data in his bedroom

Sabu (LulzSec)

Skipped Tor once, revealing his IP to the FBI, then turned informant

Inevitable Mistakes and Cleanup

Errors are inevitable—how you respond matters. Take a controlled delivery scenario:

What It Is:

Law enforcement intercepts a package but delivers it to catch you. Watch for delays or odd tracking stops.

Choices:

Sign for it and risk arrest—or refuse it, leaving them empty-handed.

Cleanup:

Erase evidence fast. Use data shredders (7+ passes) and destroy drives physically (e.g., burn them). No device outweighs your freedom.

4. Community Insights

Encrypted Thumb Drives

Use drives with numeric keypads (10-16 digit codes) for secure storage

Gut Instinct

Read "The Gift of Fear" by Gavin de Becker—your intuition often spots danger first

Empty Fort Strategy

From Sun Tzu, deploy vulnerable decoys to distract from your real operations

Escobar's Lesson

Pablo Escobar's phone chatter led to his demise—another OPSEC failure worth remembering

Final Thoughts

Key OPSEC Principles:

  • Compartmentalization: Keep different activities completely separate (Qubes OS model)
  • Plausible Deniability: Maintain cover stories and alternative explanations
  • Operational Silence: "A fish with its mouth closed never gets caught"
  • Redundancy: Multiple layers of protection (Tor + VPN + Proxy)
  • Adaptability: Regularly update methods as tracking evolves

OPSEC is your shield in an age of relentless surveillance. It's an evolving discipline—stay proactive and quiet. This guide equips you with the knowledge and mindset to protect yourself. Remember: Your freedom depends on your vigilance.