Think, Type, Post. Sgt. Laura Martin talks about how on-line behavior can affect our careers. For more information

SITREP: Social Media Responsibility

Think, Type, Post. Sgt. Laura Martin talks about how on-line behavior can affect our careers. For more information

WELCOME to the Official U.S. Army Reserve social media page and directory. 

Social media is all about collaboration, and we want to hear from you. Check out our pages, ask questions, provide feedback and share your thoughts.




We are are dedicated to sharing the Army Reserve story. Please join us in this mission and let your stories be heard by 
registering your unit's social media sites. We will process your request for approval and add to the list above. We have consolidated all of our official Army Reserve social media pages across various platforms for you. This site is designed to serve as a consolidated registry and resource for all information regarding official Army Reserve presences on public social media sites. All sites located on this page have been reviewed and approved by the U.S. Army Reserve Command (USARC) Public Affairs Office and are subject to all Army policies and guidelines. The registrant is responsible for the maintenance of each social media site and ensuring that it does not compromise operations security.

Check out what our Reserve Soldiers, Units and Leaders are doing around the world from our Official Social Media Directory of sites listed here.

To START AN OFFICIAL ARMY RESERVE SOCIAL MEDIA PRESENCE, please visit our registration page to learn the required step.
Information below is brought to you by the Computer Crime Investigative Unit, U.S. Army Criminal Investigation Command. Download Flyer »

Social Media allows people to interact with others with similar interests or backgrounds at a faster more convenient setting, online, underscoring the need to understand potential risks associated. A person’s online activities may inadvertently expose excessive information about their identity, location, relationships, and affiliations, creating an increased risk of identity theft, stalking, or targeted violence. A safer social networking experience is available by accepting some 
basic assumptions and following a few recommendations. 

Once something is posted on a social networking site, it can quickly spread. No amount of effort will erase it – the Internet does not forget.
• You are not anonymous on the Internet.
• There are people on the Internet who are not who they purport to be and will take advantage of you if afforded the opportunity.
• Participating in more social networking sites increases your attack surface and overall risk.
• Everyone on the Internet can see what you post, from where you post it, who your friends and associates are, the comments your friends make and your “witty” replies.
• An embarrassing comment or image will come back to haunt you…one day…when you least expect it…at the least opportune time.
• There is a complete record of your online activity...somewhere

• Do not post anything you would be embarrassed to see on the evening news.
• Do not accept friend/follower requests from anyone you do not know; independently verify identities.
• Avoid using third-party applications; if needed, do not allow them to access your social networking accounts, friends list or address books.
• Do not post personally identifiable information.
• Be cautious about the images you post. What is in them may be more revealing than who is in them. Images posted over time may form a complete mosaic of you and your family.
• Do not allow others to tag you in images they post. Doing so makes you easier to locate and accurately construct your network of friends, relatives and associates.
• Securely configure your social networking accounts to minimize who can see your information
• Do not use check-ins. If check-ins are enabled, disable them. Do not post your specific location. 
• Be cautious when accessing online accounts from public Wi-Fi connections. Someone might have installed software capable of capturing your login credentials and other sensitive information. 
• Do not use the save password, remember me or keep me logged in options from public or shared computers. 
• Limit social networking to personal use. 
• Do not use the same password for all of your accounts. Make sure the passwords for your financial sites are not permutations of your other passwords. 
• Do not use your social networking site to login to other sites. Create another user account on the new site instead. 
• Use strong, unique passwords. Consider passphrases for an additional level of safety. 
• Keep anti-virus software current. 
• Do not arrange meetings with people you meet online.


For more information about computer security and other computer related scams, we encourage readers to visit the CCIU website to review previous cyber crime alert notices and cyber crime prevention flyers.

Safer Computing and Social Networking,
• 11 Tips for Social Networking Safety, Microsoft
• Social Networking Safety, National Crime Prevention Council
• Staying Safe on Social Network Sites, United States Computer Emergency Readiness Team
• Kids and Socializing Online, 

• Children's Online Privacy Protection Rule ("COPPA") - Federal Trade Commission
Facebook Help Center Twitter Help CenterLinkedIn Help CenterGoogle+ Help Center

OPSEC awareness training – Provided by DoD Center for Development of Security Excellence
Organizational Level OPSEC: Vulnerabilities And Indicators [Slides]
Your Safety and Security Online – A “One-Pager” of Safety Tips [Slides]
Social Media Cyber Security Awareness Briefing [Slides]
OPSEC Snapshot – The threat is real [Slides]








Training Requirements:  CAC Enabled
» OPSEC for EOP Operators
» DISA Social Networking Class

It is also highly encouraged that social media managers also complete OPSEC Level II certification. This training is coordinated through your G2/S2 shop or equivalent.

OPSEC Level II training:  Per AR 530-1 (26 Sept. 14)  4-2 Training Programs (pgs. 13-14) para b. (2) OPSEC coordinators, Web masters, PAOs, FOIA, speech writers, FRSAs, or any other personnel who interact with the public on a regular basis will receive external official presence (EOP) training or attend a Level II OPSEC officers course.


ALARACT 289/2013, Army OPSEC Training for External Official Presence Operators states that all commanders will ensure that personnel who publish information on external online presences receive mandatory annual OPSEC training.

Political Activities on Social Media

Hatch Act graphic
Click image to download pdf


Army Social Media - Single source for Army Social Media

Requirements for Social Media Managers -

Social Media Toolkit - McCann Worldgroup

Army STAND-TO-Aug. 2018 - U.S. Army Online Conduct

ALARACT_014_2017_ - HQDA Professionalization for Online Conduct

Facebook Guide for Military Organizations

Political Activities by Members of the Armed Forces

Standards of Conduct as Applied to Personal Social Media Use – Office of Government Ethics Legal Advisory 15-03

Internet Social Networking Risks – FBI tips for mitigating risks when using social media

Information Assurance Education, Training and Awareness – From the Information Assurance Support Environment (IASE)

Privacy Best Practices for Social Media – Created by the Federal CIO Council [PDF]

Best Practices for Keeping Your Home Network Secure – From the Information Assurance Mission at NSA [PDF]

Social Networking – Technical & Behavioral Best Practices [PDF]

Web and Internet-based Capabilities (IbC) Policies

Facebook Privacy Settings

Twitter Privacy Settings

Instagram Privacy Settings

YouTube Privacy Settings

Pinterest Privacy Settings

LinkedIn Privacy Settings

Snapchat Privacy Settings

Google+ Privacy Settings