The digital domain presents a threat surface that most people interact with constantly but few think about deliberately. Every smartphone carried daily, every unencrypted message sent, every Wi-Fi network joined, and every radio transmission keyed represents a potential point of compromise. For the prepared citizen, operational security does not end with physical gear — it extends to every device, every account, and every signal emitted into the electromagnetic spectrum. This directory addresses the knowledge required to understand, evaluate, and mitigate digital vulnerabilities across personal electronics, radio communications, and broader infrastructure dependencies.
The foundational concepts of digital operational security are covered in a comprehensive treatment of how OPSEC principles apply to the civilian’s daily digital life. This includes understanding threat modeling, encryption fundamentals, and the discipline required to maintain a secure posture across devices and platforms. Thinking about OPSEC as a continuous practice rather than a one-time configuration is essential to meaningful protection. Digital OPSEC, Privacy, and Encryption
Beyond basic OPSEC awareness, the prepared citizen must consider what happens when mainstream platforms and services become unavailable, untrustworthy, or actively hostile to user privacy. Building alternative digital infrastructure — from privacy-respecting operating systems to decentralized communication tools — is as much a preparedness concern as stocking food or water. This material examines how to take individual ownership of digital security rather than outsourcing it to corporations or government entities. Digital Security, Privacy, and Alternative Infrastructure
The electromagnetic spectrum is a contested space, and understanding electronic warfare principles is no longer the exclusive province of nation-state military units. Cheap software-defined radios and consumer-grade tools have democratized the ability to intercept, locate, and exploit signals. This section covers the fundamentals of signal security, direction finding, and how to reduce one’s electronic signature in an environment where adversaries may be listening. Electronic Warfare, OPSEC, and Signal Security
Digital security does not exist in a vacuum — it intersects directly with supply chains, industrial infrastructure, and the broader preparedness ecosystem. Understanding how digital systems underpin physical logistics, how industrial dependencies create fragility, and how information systems can be both powerful enablers and critical vulnerabilities gives the prepared citizen a more complete picture of the modern threat landscape. Preparedness, Industry & Digital Security
Radio communications demand specific attention to encryption and transmission security, because every emission is inherently public unless deliberately protected. Whether operating on amateur bands, GMRS, or more capable tactical radios, understanding the options and limitations for encrypting voice and data traffic is a non-negotiable part of any serious communication plan. This material covers the practical realities of radio encryption, including legal considerations, hardware capabilities, and the trade-offs involved in securing the radio link. Radio Encryption and Security
These topics connect directly to the broader communications framework covered across this hub, from the practical radio hardware discussed under Radio Fundamentals, Protocols, and Programming to the PACE planning methodology in PACE Planning Framework and Communication Precedence. They also complement the mobile digital security practices addressed in Mobile Digital OPSEC and App Security. A communication plan that ignores digital security is incomplete — the same signal that connects an operator to allies can betray that operator’s position, intentions, and identity to adversaries.