 We've all heard the phrase, loose lips sink ships. To keep that from happening, follow the Operation Security Five Step process. So the five steps are identifying critical information. One of the first things that anybody should know is what information is important to them. The second step is identifying who the threat is or what the threat is, a particular adversary or it could be thieves in your neighborhood. The third step is taking a look at that critical information and who that threat is and understanding where you're vulnerable to that. The fourth step is identifying what type of risk you have associated with those particular things like your critical information. And the fifth step is applying measures or countermeasures to mitigate your particular risk. For more information about Operation Security, visit the Operation Security Facebook page.