January OPSEC "Tip of the Month"" Published Jan. 24, 2008 By Cheryl Brown 60th Air Mobility Wing OPSEC Program TRAVIS AIR FORCE BASE, Calif. -- Distinguished visitors itinerary information must be protected. One of the consistent operational security problems across the Air Force is the release of DV information. Wherever our military or civilian DV's are traveling, information concerning their itineraries and movements must be protected. Both Air Mobility Command and the 60th Air Mobility Wing have DV information listed as critical information on their respective Critical Information Lists. As such, protective means must be used when this information is transmitted. (Protective measures may also apply to associated passengers, equipment, vehicles and aircraft given the mission.) Below are a few tips when using DV information: -- Support personnel use base-encrypted land mobile radio to discuss aircraft and DV's. Personal cell phones are not to be used to discuss sensitive information. -- Encrypt all ".mil to .mil" e-mails containing sensitive critical information including DV information. -- Do not e-mail containing sensitive critical information from .mil to a .com address. The information cannot be encrypted for protection from disclosure. -- Shred hard copies of itineraries no longer needed. -- Control DV information by applying "need-to-know" filter. -- These countermeasures apply to homestation and overseas locations. For more specific information concerning DV's and OPSEC, contact Capt. Leslie Weiterhausen, 60th AMW chief of Protocol, at 424-3497 or Cheryl Brown, 60th AMW OPSEC, at 424-3345.