The enemy aggressively 'reads' our open source and continues to exploit such information for use against our forces, ... Some soldiers continue to post sensitive information to Internet websites and blogs, e.g., photos depicting weapon system vulnerabilities and tactics, techniques, and procedures. Such OPSEC [operational security] violations needlessly place lives at risk and degrade the effectiveness of our operations.  -   Peter Schoomaker     Quotes
The enemy aggressively 'reads' our open source and continues to exploit such information for use against our forces, ... Some soldiers continue to post sensitive information to Internet websites and blogs, e.g., photos depicting weapon system vulnerabilities and tactics, techniques, and procedures. Such OPSEC [operational security] violations needlessly place lives at risk and degrade the effectiveness of our operations. Peter Schoomaker
 Information