CPF 00004-16-CID361-9H-Facebook* 8 March 2017
Configuring Facebook for a More Secure
Social Networking Experience
Settings
Settings are available under
the Facebook Configuration
Arrow.
General Account
Settings
Name
You can change the name
of your Facebook account
to just about anything;
however, Facebook’s rules
require that the name be
your actual name. In Facebook’s own words, “Facebook is a
community where everyone uses the name they go by in everyday life.
This makes it so that you always know who you’re connecting with and
helps keep our community safe.” Facebook, and likely every other
social networking site, does not make a serious effort to verify
anyone’s identity.
The alternate name feature can be used for an unmarried name so
friends can locate you (e.g., Susan Smith (Jones) or a nickname or
diminutive of your given name). Once a name change is made, you
are required to wait a period of time before another name change can
be made.
“DO WHAT HAS TO BE DONE”
Contact Information:
Cyber Criminal Intelligence Program
27130 Telegraph Road
Quantico, Virginia 22134
DISTRIBUTION:
This document is authorized for
wide release with no restrictions.
“DO WHAT HAS TO BE DONE”
1. Click Name.
2. Make changes as necessary
and click Review Change.
* This Facebook configuration guide is an addendum to CID Crime Prevention Flyer CPF-00004-16-CID361-9H. It
supersedes the previous Facebook configuration guide (CPF-00009-15-CID361-9H), which is obsolete.
Phone: 571.305.4482 [DSN 240]
Fax: 571.305.4189 [DSN 240]
Email
usarmy.cciuintel@mail.mil
CCIU Web Page
http://www.cid.army.mil/701st.html#sec6
3. Facebook presents a preview of how your name
change will appear on your timeline.
4. Check an acceptable variant, enter your password,
and click Save Changes.
Email
When you created your Facebook account, your registration was verified through email or text message. That
means that Facebook sent an email message to the email address you provided. That email message had a web
link you had to click to verify your email address.
This is also where you change your email address if the address you registered with Facebook is disabled or
retired for any reason or if you want to receive emails in a different mailbox.
To change your email, from the General Account Settings menu:
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
1. Click Contact. 2. Click Add another email or mobile number.
3. Enter the new email address in the box.
4. Click Add.
5. Enter your password and click Submit.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
6. Click Close.
7. Facebook will send an email message to the new
email address confirming the change and a
notification of the change to the email address of
record.
8. Check for email at the new email address. It will
look like this. Click Confirm.
9. Return to the General Settings area. If you see this
message, the changes were successful.
Delete an Existing Email
Facebook will not allow the removal of an email if it is the primary email or it is the only email. If you do not have
a secondary email, you must add one. Follow the instructions in the section immediately above to add a
secondary email address. Then, to delete an email address, from the General Settings menu:
1. Click Contact.
2. Click Remove next to the address you want to
remove.
3. Click Save Changes. If you have chosen to
remove an email address and save changes,
you will receive an email at the removed email
address notifying you of the change.
Passwords
Passwords, secret elements of authentication, are on the front line of defense preventing people and automated
tools from illegally accessing your online accounts. Therefore, your choice of password and the frequency with
which you change it are important security considerations.
A password, however, need not be limited to a word. It can be a passphrase. A passphrase is a string of characters
that form a phrase. An example might be, "The song remains the same" or "I’ll see you on the dark side of the
moon". Passphrases are generally easier to remember than complex passwords and more likely to survive a
dictionary attack than is a password.
Guidelines for passwords to avoid, especially if you are a public figure or in a situation where much of your
personal information is in the public domain, include:
 Your name or any permutation of your name
 Your user ID or any part of your user ID
 Common names
 The name of any relative, child, or pet
 Your telephone number, social security number, date of birth, or any combinations or permutations of those
 Vehicle license plate numbers, makes, or models
 The school you attended
 Work affiliation
 The word "password" or permutations including "password" prefixed or suffixed with numbers or symbols
 Common words from dictionaries, including foreign languages
 Common dictionary word permutations
 Names or types of favorite objects
 All the same digits or all the same letters or letter sequences found on keyboards (e.g., QWERTY)
1. Click Password.
2. Enter your current password.
3. Enter your new password or passphrase.
4. Re-enter it for verification.
5. Click Save Changes.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
Security Settings
Security Settings are available under the Facebook Configuration Arrow.
Login Alerts
This is an effective means to identify attempted compromises to your Facebook profile. When accessing your
profile, after correctly entering the username/password combination, Facebook checks for the presence of a
cookie on your computer. That cookie identifies the browser as one from which you have accessed Facebook
before. If the cookie is found, the login proceeds without further interaction.
If the cookie is absent or incorrect, Facebook will ask the user if information about the browser should be saved
AND sends a text message or email to the addresses of record indicating a login from an unknown browser.
If you elect to use text messages, you will be required to provide Facebook with the number of your mobile device.
This presents a separate issue. See the section labeled Who Can Look Me Up.
If this browser is unrecognized, you will encounter a Facebook challenge asking if you want to Remember
Browser. Do not save that browser information unless you are using a computer you have control over
and will use again. If by chance you mistakenly opt to save the browser or there is a browser you have previously
saved but know you will not use again in the future, you can delete that browser by following the instructions in the
section Recognized Devices.
Login Alerts is not double authentication. If the correct username/password combination is entered, the
user will be allowed access to the profile. The defensive benefit of Login Alerts is the email or text message
notifying you of the access. If you receive a login alert and did not log in, you should immediately change your
password and take immediate steps as outlined in the sections Recognized Devices and Where You’re Logged In.
Login Alerts will not work if your browser is configured to refuse cookies or if your browser clears its
cache when it closes. If your browser is set to refuse cookies or clear cache when exiting, it is best to leave these
settings as they are and not use the Login Alerts feature.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
1. Click Login Alerts.
2. Select Get notifications.
3. Select Email and click Save Changes.
4. Email notices will be sent to your email on file with
Facebook.
Login Approvals
This is the best way to prevent your Facebook account from being
accessed by someone else. Every login attempt to your Facebook
account will be interrupted and a code sent to the mobile phone on file
with Facebook. Only after that code is correctly entered into the
Facebook dialog box will the login proceed past the challenge screen.
The recipient of the text message has 20 seconds within which the
login must be completed or the code expires and the process must be
repeated.
Login Approvals, in conjunction with Login Alerts, will provide a
substantial level of protection against profile compromise.
1. Click Login Approvals.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
WARNING—If you use Login
Approvals and retire the mobile
telephone number without first
updating the default number in
Facebook you will likely lock you
out of your account forever.
Facebook support might not be
able to help you.
2. Click Enable to start Login Approvals.
3. Click Enable to use the mobile phone on
file with Facebook.
4. Click Close.
5. Check your mobile phone for a verification
text message. Follow the instructions in
that message.
Your Trusted Contacts
Facebook friends you can contact to help you access your Facebook account if you get locked out are trusted
contacts. When you select your trusted contacts, they will receive notification that they are trusted contacts so
it is best to notify them prior to enabling this feature.
Trusted contacts should be people you know well - people you can trust. Your trusted friends should be
familiar with their responsibilities and understand that if they are ever called upon to assist you, they should
verify absolutely it is you asking for their assistance. Accordingly, email is probably a poor method of verifying
identity.
If at any time you decide you no longer want to have trusted Facebook contacts or you decide one or more of
your trusted contacts can no longer be trusted, you can make those modifications in the Trusted Contacts
area of security settings. Dropping a trusted contact does not generate an email message to the dropped
friend.
Regardless of the trusted contacts
you add or remove, you cannot
have more than five nor less than
three.
1. Click Your Trusted Contacts.
2. Click Choose Trusted Contacts.
3. Click Close.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
4. Read this statement carefully.
5. Click Choose Trusted Contacts.
6. Add from three to five trusted friends. These
trusted friends must already be in your Facebook
friends list.
7. Click Confirm.
8. Review your choices and click Close.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
Where You’re Logged In
This feature can be used to end any active Facebook session, including the one from which you are accessing your
Facebook account. Like Recognized Devices, this is more of a security audit tool than a security measure. Where
You’re Logged In will identify those computers from which you might not have properly logged out of
Facebook and can tell you if unauthorized access to your account has occurred.
A generally good security practice is to log out of any internet activity that requires a login; logging out is a specific
menu choice. Closing the browser or restarting the computer may be insufficient to fully log out. In some
circumstances, like accessing your Facebook account from a public computer or any computer that multiple people
use, simply closing the browser window will not log out of Facebook. Then, quite possibly, the next person who opens
Facebook from that computer could open to your account without being challenged for a password, giving them
unintended full access.
If you see a logged in browser and believe it to be an unauthorized connection you should:
 End the session associated with that browser,
 Change your password,
 Check Recognized Devices (see below) and remove any improperly authorized browsers,
 Recheck Where You're Logged In to verify that a new session was not started.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
1. Click Where You’re Logged In.
2. Identify locations where you want to end activity and
click End Activity.
3. Verify that the session ended then click Close.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
Recognized Devices
Not so much a security setting as it is an audit tool, the list of Recognized Devices shows you the browsers with
which trusted relationship have been established, the corresponding operating system of the machine the browser
is installed on and the date trust was established.
If you use Login Alerts then you should occasionally check this list and remove any browser you no longer use,
Recognized Devices you suspect are being used by others to access your account (this forces a login
notification email the next time anyone logs in), and browsers you may have mistakenly trusted.
If you see a browser listed as a trusted browser you do not recognize, you should:
 Remove the browser
 Change your password
 Check Where You're Logged In (see above) and end activity that is not you
 Recheck Recognized Devices to verify that a new trusted browser has not been added
1. Click Recognized Devices.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
2. Identify the browser you want to un-
trust.
3. Click Remove opposite the unwanted
browser.
4. Verify that the intended browser is
about to be removed. The browser
that is about to be removed will have
Undo next to it.
5. Click Save Changes.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
Privacy
Who Can See My Future Posts
Limiting the visibility of future posts to just friends is the best way to limit access to items on your timeline to
people with whom you have a trust relationship. This assumes that people on your friends list are in fact the
people they purport to be. Social engineering is a reality and Facebook does not make a serious effort to
verify the identity of new subscribers.
You can override this setting for an individual
post by clicking on the audience button and
selecting the desired option.
WARNING—Changes made here will
automatically and without warning
change the global setting of Who Can
See My Future Posts!!!
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
1. Click Who Can See Your Future Posts?
2. Click the selection down arrow.
3. Select Friends. 4. Click Close.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
Limit the Audience for Old Posts on Your Timeline
This setting is powerful and immediate. Read the onscreen information and be sure you understand it before you
execute it. If you have opted to make all future posts visible to friends only then it does not make sense to not
make all past posts visible to friends only as well.
This option changes the setting on all posts already on your timeline so they are visible only to your friends. The
only change option is to friends. Once executed, the only way to undo the changes is by changing the Who Can
See This Post on each timeline item.
1. Click Limit the Audience for Posts You’ve
Shared with Friends of Friends or Public.
2. Click Limit Old Posts and the click Close.
The outcome of this option is that ALL past
posts on your timeline will be changed to
friends only. There is no means to select
any other outcome than friends.
Who Can Look You Up Using the Email You Provided?
and
Who Can Look You Up Using the Phone Number You Provided?
In order to create a Facebook account users must provide a valid email address or mobile number. The email
address is verified when Facebook sends an email that contains a link the user must click in order to demonstrate
the validity of the email address.
The mobile phone number is verified when Facebook sends a text message that contains a verification code and
that code is entered into Facebook a verification dialog.
However, these small steps of validation should not be interpreted to mean that Facebook user identities are
properly vetted. Anyone can use any of the free email providers to create a "single use" email address or one of
the available online disposable phone number sites to receive text messages. This creates circular verification - a
fake email address or mobile number to verify a fake social media account.
If you have enabled Login Alerts using text messaging, login approvals, or code generator then you have provided
Facebook with your telephone number.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
Do You Want Other Search Engines to Link to Your Timeline?
Your profile can be located using most internet search engines and parts of your timeline may be visible even to
those without a Facebook profile. By controlling this setting, you can reduce the possibility of your Facebook profile
being located by someone other than a Facebook user.
Users must bear in mind that, for some considerable but indeterminate period of time after the search capability is
turned off, residual records in a search engine will persist.
* Outside Search Engines re-
fers to search engines other
than the search capabilities pro-
vided within Facebook.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
Regardless of how Facebook obtained your email or telephone number, it could be possible for any Facebook user
to locate your profile using only your email address or telephone number. This option should be turned off for both
contact methods.
1. Click Who Can Look You Up Using the
Email Address You Provided?
2. Change the setting to Friends (the most restrictive).
3. Click Close.
4. Execute the same steps for Who Can Look You Up Using the
Phone Number You Provided?
1. Click Do you want search engines
outside of Facebook to link to your
profile?
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
Who Can Send You Friend Requests?
Limiting the people who can send you friend requests to friends of friends provides a little extra assurance that a
friend request is coming from someone in your personal network. But be cautious! Accepting a friend request from
someone you do not know simply because they are a friend of a friend effectively pushes the burden of vetting new
requests to your friends; their efforts might not be commensurate with the level of verification and protection your
identity requires.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
2. Deselect Allow search engines outside of Facebook
to link to your profile.
3. Click Close.
1. Click Who Can Send You Friend
Requests?
2. Click Friends of Friends (the most restrictive).
3. Click Close.
Download a Copy of Your Facebook Activity
You might find yourself in a situation where you would like to review all of your Facebook activity. Maybe you want an
archive of all images you’ve posted to Facebook but didn’t save to your local computer. Fortunately, there is a way to
do this without scrolling through innumerable Facebook pages. You can download to your local computer a copy of
your Facebook data.
A word of caution—DO NOT download a copy of your data to any computer you do not have total ownership of. Do
not download your data to a borrowed computer, a public computer like those you might use at a library, community
center or school, or your work computer.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
Before you start the download process, consider the following:
 The time required to create your downloadable content could take hours or possibly days.
 The downloadable file could be many gigabytes or even many, many gigabytes. It will be large.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
1. Click Download a Copy of Your Facebook Data.
2. Click Start My Archive.
(Clicking And More, at the bottom of this dialog
box provides, an idea of the content you can
expect. You can click this link while your down-
load is being prepared. A better plan is to look
at it before you start your archive. It will give
you insight into how big the download could
be.)
3. Enter your password to confirm your identity.
4. Click Submit.
5. Click Start My Archive.
These Facebook configuration recommendations are based upon best information available at the time of publication but are
not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users
must exercise caution whenever interacting with social media.
These Facebook configuration recommendations are based upon best information available at the time of publication
but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi-
cation. Users must exercise caution whenever interacting with social media.
6. Click Okay.
7. Periodically check your email account for a Facebook
notification that your archive is complete.
8. Review the statement in the Facebook
email and click the hyperlink.
9. Click Download Archive.
10. Enter your password and click Submit.
11. To complete the download process you will need to
navigate through several more dialog boxes. Follow
your operating system’s procedures for saving the
archive file.
The downloaded file will be compressed (e.g., zip). Save the contents of the compressed file to a new folder. Your
data will be arranged in more subfolders named for the content (e.g., profile, contact info, timeline).
Disclaimer: The appearance of hyperlinks in this Crime Prevention Flier (CPF), along with the views and opinions of authors,
products or services contained therein does not constitute endorsement by CID. These sites are used solely for authorized
activities and information that support the organization's mission. CID does not exercise any editorial control over the
information you may find at these link locations. Such links are provided consistent with the purpose of this CPF.
CCIU uses the Interactive Customer Evaluation (ICE)
system. Please click on the ICE logo and take a moment
to provide us with feedback.
Return to Social Networking Safety Tips
The Army’s Digital Detectives

More Related Content

PPTX
How to stay safe on facebook! (3)
PDF
Pegarido e tech project
PDF
Facebook Privacy and Security Guide
PPTX
How to create a yahoo and hotmail accounts and how to connect to the internet
PPTX
Introduction to Email 2016
PPTX
Facebook privacy
PPTX
How to delete instagram account?
PPTX
Tying it all together: Connecting your Social Media Websites (Cherie Dargan, ...
How to stay safe on facebook! (3)
Pegarido e tech project
Facebook Privacy and Security Guide
How to create a yahoo and hotmail accounts and how to connect to the internet
Introduction to Email 2016
Facebook privacy
How to delete instagram account?
Tying it all together: Connecting your Social Media Websites (Cherie Dargan, ...

What's hot (20)

PPTX
Facebook Security
PPTX
How to Delete yahoo account?
PDF
Green Hectares Rural Tech Factsheet – Gmail
PDF
Facebook Smart Card
DOCX
Handouts
PDF
Social media-optimization-the-first-step
PDF
Logging into edline for the first time
PDF
Step-by-step Facebook Instructions
PDF
Your small-facebook-privacy-guide
PPSX
Facebook 101
PDF
Google Plus Smart Card
PPT
Facebook
PPTX
Blogging with Tumblr - a step by step guide.
PDF
Facebook privacy setting
PDF
Log off from the internet, step by step
PDF
Linkedln Smart Card
PDF
How to Use LogMeIn -Jennefer Mercado- Empress of Helping Hand
DOC
Sign up with
PPTX
Why your email messages send are marked as Spam
PPTX
Using the Internet
Facebook Security
How to Delete yahoo account?
Green Hectares Rural Tech Factsheet – Gmail
Facebook Smart Card
Handouts
Social media-optimization-the-first-step
Logging into edline for the first time
Step-by-step Facebook Instructions
Your small-facebook-privacy-guide
Facebook 101
Google Plus Smart Card
Facebook
Blogging with Tumblr - a step by step guide.
Facebook privacy setting
Log off from the internet, step by step
Linkedln Smart Card
How to Use LogMeIn -Jennefer Mercado- Empress of Helping Hand
Sign up with
Why your email messages send are marked as Spam
Using the Internet
Ad

Viewers also liked (20)

PDF
Исследование символики Славутича v.2.1
PPTX
Aggression Replacement Training
PDF
SESION_PRESENTACION
PPTX
2. psicopedagogía 20 al 24 de marzo
PPTX
Valio竞争情报提供的投资组合服务 (chinese version) -
PPTX
Bonazzi commons bd2 k ahm 2016 v2
PDF
UX Q1 Salary Survey Across the United Kingdom
PPTX
Yüksek hızlı balistik çarpma etkisinin sonlu elemanlar yöntemiyle incelenmesi
PDF
Isolite Cleaning & Maintenance
PDF
Le travail temporaire et ses avantages
PDF
Manual de Lectura de Comederos. Ganadería. Asi Ganadero
PPTX
Deterioração microbiana de carnes (bovina e suína
PPS
3 d shapes
PDF
From User Experience to Citizen Experience
PDF
Social Media Monitoring: In welchen Bereichen bietet SMM einen Mehrwert?
PDF
The Top Clients We Work With
PPT
Anesthetics......
PPTX
Metodos contraceptivos
PDF
Revista Ch´ivit Empresarial febrero 2017
Исследование символики Славутича v.2.1
Aggression Replacement Training
SESION_PRESENTACION
2. psicopedagogía 20 al 24 de marzo
Valio竞争情报提供的投资组合服务 (chinese version) -
Bonazzi commons bd2 k ahm 2016 v2
UX Q1 Salary Survey Across the United Kingdom
Yüksek hızlı balistik çarpma etkisinin sonlu elemanlar yöntemiyle incelenmesi
Isolite Cleaning & Maintenance
Le travail temporaire et ses avantages
Manual de Lectura de Comederos. Ganadería. Asi Ganadero
Deterioração microbiana de carnes (bovina e suína
3 d shapes
From User Experience to Citizen Experience
Social Media Monitoring: In welchen Bereichen bietet SMM einen Mehrwert?
The Top Clients We Work With
Anesthetics......
Metodos contraceptivos
Revista Ch´ivit Empresarial febrero 2017
Ad

Similar to Configuring Facebook for a More Secure Social Networking Experience (20)

DOC
Facebook and Security Settings Report
PPTX
it.pptx
PPTX
Facebook Privacy Settings: A Step-By-Step Guide
PPTX
Facebook Privacy and Account Settings - Navy OPSEC
PDF
Cyber security-awareness-for-social-media-users - Devsena Mishra
PDF
obtain additional security
PDF
Social Media Safety
PPTX
Facebook Privacy and YOU
PDF
Facebook Smart Card 070314
PPTX
Facebook part 3
PDF
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
PDF
Facebook 10 mar15
PDF
DoD Social Media Guide
PDF
Facebook & Instagram Safety Guide
PDF
Can I Use Facebook Account Hacked Solution To Prevent My Account?
PDF
security procedures
PPT
Facebook Online Policy Primer
Facebook and Security Settings Report
it.pptx
Facebook Privacy Settings: A Step-By-Step Guide
Facebook Privacy and Account Settings - Navy OPSEC
Cyber security-awareness-for-social-media-users - Devsena Mishra
obtain additional security
Social Media Safety
Facebook Privacy and YOU
Facebook Smart Card 070314
Facebook part 3
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
Facebook 10 mar15
DoD Social Media Guide
Facebook & Instagram Safety Guide
Can I Use Facebook Account Hacked Solution To Prevent My Account?
security procedures
Facebook Online Policy Primer

More from Alpha Company, AFNORTH Battalion SFRG (20)

PDF
OPSEC - Pictures and Videos
PDF
PDF
Social Media for Army Families
PDF
OPSEC Secure Social Networking Tips
PDF
OPSEC Critical Information
PDF
OPSEC Guide: Your Social Media Presence
PDF
The United States Army Social Media Handbook 2016
PDF
Facebook Mobile Smart Card
PDF
Tri-Border Christmas Markets 2016
PDF
Uniform Services Blended Retirement System
PDF
Conversion Charts: US to European Measurements and Sizes
PDF
Army School Support Services Directory
PDF
Krispy Kreme Fundraiser
PDF
Sittard - Geleen - Pocket Guide
PDF
Carnaval Parades in the greater Brunssum area
PDF
Chicken Pox and Shingles: Letter to Parents
PDF
The Gazette - 3 Dec 2015
OPSEC - Pictures and Videos
Social Media for Army Families
OPSEC Secure Social Networking Tips
OPSEC Critical Information
OPSEC Guide: Your Social Media Presence
The United States Army Social Media Handbook 2016
Facebook Mobile Smart Card
Tri-Border Christmas Markets 2016
Uniform Services Blended Retirement System
Conversion Charts: US to European Measurements and Sizes
Army School Support Services Directory
Krispy Kreme Fundraiser
Sittard - Geleen - Pocket Guide
Carnaval Parades in the greater Brunssum area
Chicken Pox and Shingles: Letter to Parents
The Gazette - 3 Dec 2015

Recently uploaded (20)

PDF
Redefining Diplomacy: Françoise Joly on Navigating a Multipolar Order
PPTX
LUNG CANCER PREDICTION MODELING USING ARTIFICIAL NEURAL NETWORK.pptx
PDF
Abhay Bhutada Foundation’s Commitment to ESG Compliance
PDF
PPT Item # 10 -- Proposed 2025 Tax Rate
PPTX
cpgram enivaran cpgram enivaran cpgram enivaran
PPTX
20231018_SRP Tanzania_IRC2023 FAO side event.pptx
PDF
2024-Need-Assessment-Report-March-2025.pdf
PPTX
Parliamentary procedure in meeting that can be use
PPTX
Chapter 1: Philippines constitution laws
PPTX
ANALYSIS OF THE PROCLAMATION OF THE PHILIPPHINE INDEPENDENCE.pptx
PDF
Item # 10 -- Set Proposed 2025 Tax Rate
PDF
Dean, Jodi: Concept Paper - Multi Family Lot
PPTX
Reactivity of metals with oxygen, rusting.pptx
PPTX
SUKANYA SAMRIDDHI YOJANA RESEARCH REPORT AIMS OBJECTIVES ITS PROVISION AND IM...
PPTX
TOT Programme for Gender Champions among Colleges Students
PPTX
Water-Energy-Food (WEF) Nexus interventions, policy, and action in the MENA r...
PPTX
Introduction to the NAP Process and NAP Global Network
PPTX
International Tracking Project Unloading Guidance Manual V1 (1) 1.pptx
PDF
PPT Item # 9 - FY 2025-26 Proposed Budget.pdf
PPTX
Workshop-Session-1-LGU-WFP-Formulation.pptx
Redefining Diplomacy: Françoise Joly on Navigating a Multipolar Order
LUNG CANCER PREDICTION MODELING USING ARTIFICIAL NEURAL NETWORK.pptx
Abhay Bhutada Foundation’s Commitment to ESG Compliance
PPT Item # 10 -- Proposed 2025 Tax Rate
cpgram enivaran cpgram enivaran cpgram enivaran
20231018_SRP Tanzania_IRC2023 FAO side event.pptx
2024-Need-Assessment-Report-March-2025.pdf
Parliamentary procedure in meeting that can be use
Chapter 1: Philippines constitution laws
ANALYSIS OF THE PROCLAMATION OF THE PHILIPPHINE INDEPENDENCE.pptx
Item # 10 -- Set Proposed 2025 Tax Rate
Dean, Jodi: Concept Paper - Multi Family Lot
Reactivity of metals with oxygen, rusting.pptx
SUKANYA SAMRIDDHI YOJANA RESEARCH REPORT AIMS OBJECTIVES ITS PROVISION AND IM...
TOT Programme for Gender Champions among Colleges Students
Water-Energy-Food (WEF) Nexus interventions, policy, and action in the MENA r...
Introduction to the NAP Process and NAP Global Network
International Tracking Project Unloading Guidance Manual V1 (1) 1.pptx
PPT Item # 9 - FY 2025-26 Proposed Budget.pdf
Workshop-Session-1-LGU-WFP-Formulation.pptx

Configuring Facebook for a More Secure Social Networking Experience

  • 1. CPF 00004-16-CID361-9H-Facebook* 8 March 2017 Configuring Facebook for a More Secure Social Networking Experience Settings Settings are available under the Facebook Configuration Arrow. General Account Settings Name You can change the name of your Facebook account to just about anything; however, Facebook’s rules require that the name be your actual name. In Facebook’s own words, “Facebook is a community where everyone uses the name they go by in everyday life. This makes it so that you always know who you’re connecting with and helps keep our community safe.” Facebook, and likely every other social networking site, does not make a serious effort to verify anyone’s identity. The alternate name feature can be used for an unmarried name so friends can locate you (e.g., Susan Smith (Jones) or a nickname or diminutive of your given name). Once a name change is made, you are required to wait a period of time before another name change can be made. “DO WHAT HAS TO BE DONE” Contact Information: Cyber Criminal Intelligence Program 27130 Telegraph Road Quantico, Virginia 22134 DISTRIBUTION: This document is authorized for wide release with no restrictions. “DO WHAT HAS TO BE DONE” 1. Click Name. 2. Make changes as necessary and click Review Change. * This Facebook configuration guide is an addendum to CID Crime Prevention Flyer CPF-00004-16-CID361-9H. It supersedes the previous Facebook configuration guide (CPF-00009-15-CID361-9H), which is obsolete. Phone: 571.305.4482 [DSN 240] Fax: 571.305.4189 [DSN 240] Email usarmy.cciuintel@mail.mil CCIU Web Page http://www.cid.army.mil/701st.html#sec6
  • 2. 3. Facebook presents a preview of how your name change will appear on your timeline. 4. Check an acceptable variant, enter your password, and click Save Changes. Email When you created your Facebook account, your registration was verified through email or text message. That means that Facebook sent an email message to the email address you provided. That email message had a web link you had to click to verify your email address. This is also where you change your email address if the address you registered with Facebook is disabled or retired for any reason or if you want to receive emails in a different mailbox. To change your email, from the General Account Settings menu: These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media. 1. Click Contact. 2. Click Add another email or mobile number. 3. Enter the new email address in the box. 4. Click Add. 5. Enter your password and click Submit.
  • 3. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media. 6. Click Close. 7. Facebook will send an email message to the new email address confirming the change and a notification of the change to the email address of record. 8. Check for email at the new email address. It will look like this. Click Confirm. 9. Return to the General Settings area. If you see this message, the changes were successful. Delete an Existing Email Facebook will not allow the removal of an email if it is the primary email or it is the only email. If you do not have a secondary email, you must add one. Follow the instructions in the section immediately above to add a secondary email address. Then, to delete an email address, from the General Settings menu: 1. Click Contact. 2. Click Remove next to the address you want to remove. 3. Click Save Changes. If you have chosen to remove an email address and save changes, you will receive an email at the removed email address notifying you of the change.
  • 4. Passwords Passwords, secret elements of authentication, are on the front line of defense preventing people and automated tools from illegally accessing your online accounts. Therefore, your choice of password and the frequency with which you change it are important security considerations. A password, however, need not be limited to a word. It can be a passphrase. A passphrase is a string of characters that form a phrase. An example might be, "The song remains the same" or "I’ll see you on the dark side of the moon". Passphrases are generally easier to remember than complex passwords and more likely to survive a dictionary attack than is a password. Guidelines for passwords to avoid, especially if you are a public figure or in a situation where much of your personal information is in the public domain, include:  Your name or any permutation of your name  Your user ID or any part of your user ID  Common names  The name of any relative, child, or pet  Your telephone number, social security number, date of birth, or any combinations or permutations of those  Vehicle license plate numbers, makes, or models  The school you attended  Work affiliation  The word "password" or permutations including "password" prefixed or suffixed with numbers or symbols  Common words from dictionaries, including foreign languages  Common dictionary word permutations  Names or types of favorite objects  All the same digits or all the same letters or letter sequences found on keyboards (e.g., QWERTY) 1. Click Password. 2. Enter your current password. 3. Enter your new password or passphrase. 4. Re-enter it for verification. 5. Click Save Changes. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media.
  • 5. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. Security Settings Security Settings are available under the Facebook Configuration Arrow. Login Alerts This is an effective means to identify attempted compromises to your Facebook profile. When accessing your profile, after correctly entering the username/password combination, Facebook checks for the presence of a cookie on your computer. That cookie identifies the browser as one from which you have accessed Facebook before. If the cookie is found, the login proceeds without further interaction. If the cookie is absent or incorrect, Facebook will ask the user if information about the browser should be saved AND sends a text message or email to the addresses of record indicating a login from an unknown browser. If you elect to use text messages, you will be required to provide Facebook with the number of your mobile device. This presents a separate issue. See the section labeled Who Can Look Me Up. If this browser is unrecognized, you will encounter a Facebook challenge asking if you want to Remember Browser. Do not save that browser information unless you are using a computer you have control over and will use again. If by chance you mistakenly opt to save the browser or there is a browser you have previously saved but know you will not use again in the future, you can delete that browser by following the instructions in the section Recognized Devices. Login Alerts is not double authentication. If the correct username/password combination is entered, the user will be allowed access to the profile. The defensive benefit of Login Alerts is the email or text message notifying you of the access. If you receive a login alert and did not log in, you should immediately change your password and take immediate steps as outlined in the sections Recognized Devices and Where You’re Logged In. Login Alerts will not work if your browser is configured to refuse cookies or if your browser clears its cache when it closes. If your browser is set to refuse cookies or clear cache when exiting, it is best to leave these settings as they are and not use the Login Alerts feature. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media.
  • 6. 1. Click Login Alerts. 2. Select Get notifications. 3. Select Email and click Save Changes. 4. Email notices will be sent to your email on file with Facebook. Login Approvals This is the best way to prevent your Facebook account from being accessed by someone else. Every login attempt to your Facebook account will be interrupted and a code sent to the mobile phone on file with Facebook. Only after that code is correctly entered into the Facebook dialog box will the login proceed past the challenge screen. The recipient of the text message has 20 seconds within which the login must be completed or the code expires and the process must be repeated. Login Approvals, in conjunction with Login Alerts, will provide a substantial level of protection against profile compromise. 1. Click Login Approvals. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media. WARNING—If you use Login Approvals and retire the mobile telephone number without first updating the default number in Facebook you will likely lock you out of your account forever. Facebook support might not be able to help you.
  • 7. 2. Click Enable to start Login Approvals. 3. Click Enable to use the mobile phone on file with Facebook. 4. Click Close. 5. Check your mobile phone for a verification text message. Follow the instructions in that message. Your Trusted Contacts Facebook friends you can contact to help you access your Facebook account if you get locked out are trusted contacts. When you select your trusted contacts, they will receive notification that they are trusted contacts so it is best to notify them prior to enabling this feature. Trusted contacts should be people you know well - people you can trust. Your trusted friends should be familiar with their responsibilities and understand that if they are ever called upon to assist you, they should verify absolutely it is you asking for their assistance. Accordingly, email is probably a poor method of verifying identity. If at any time you decide you no longer want to have trusted Facebook contacts or you decide one or more of your trusted contacts can no longer be trusted, you can make those modifications in the Trusted Contacts area of security settings. Dropping a trusted contact does not generate an email message to the dropped friend. Regardless of the trusted contacts you add or remove, you cannot have more than five nor less than three. 1. Click Your Trusted Contacts. 2. Click Choose Trusted Contacts. 3. Click Close. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media.
  • 8. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. 4. Read this statement carefully. 5. Click Choose Trusted Contacts. 6. Add from three to five trusted friends. These trusted friends must already be in your Facebook friends list. 7. Click Confirm. 8. Review your choices and click Close. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media.
  • 9. Where You’re Logged In This feature can be used to end any active Facebook session, including the one from which you are accessing your Facebook account. Like Recognized Devices, this is more of a security audit tool than a security measure. Where You’re Logged In will identify those computers from which you might not have properly logged out of Facebook and can tell you if unauthorized access to your account has occurred. A generally good security practice is to log out of any internet activity that requires a login; logging out is a specific menu choice. Closing the browser or restarting the computer may be insufficient to fully log out. In some circumstances, like accessing your Facebook account from a public computer or any computer that multiple people use, simply closing the browser window will not log out of Facebook. Then, quite possibly, the next person who opens Facebook from that computer could open to your account without being challenged for a password, giving them unintended full access. If you see a logged in browser and believe it to be an unauthorized connection you should:  End the session associated with that browser,  Change your password,  Check Recognized Devices (see below) and remove any improperly authorized browsers,  Recheck Where You're Logged In to verify that a new session was not started. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media. 1. Click Where You’re Logged In. 2. Identify locations where you want to end activity and click End Activity. 3. Verify that the session ended then click Close.
  • 10. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. Recognized Devices Not so much a security setting as it is an audit tool, the list of Recognized Devices shows you the browsers with which trusted relationship have been established, the corresponding operating system of the machine the browser is installed on and the date trust was established. If you use Login Alerts then you should occasionally check this list and remove any browser you no longer use, Recognized Devices you suspect are being used by others to access your account (this forces a login notification email the next time anyone logs in), and browsers you may have mistakenly trusted. If you see a browser listed as a trusted browser you do not recognize, you should:  Remove the browser  Change your password  Check Where You're Logged In (see above) and end activity that is not you  Recheck Recognized Devices to verify that a new trusted browser has not been added 1. Click Recognized Devices. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media. 2. Identify the browser you want to un- trust. 3. Click Remove opposite the unwanted browser. 4. Verify that the intended browser is about to be removed. The browser that is about to be removed will have Undo next to it. 5. Click Save Changes.
  • 11. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. Privacy Who Can See My Future Posts Limiting the visibility of future posts to just friends is the best way to limit access to items on your timeline to people with whom you have a trust relationship. This assumes that people on your friends list are in fact the people they purport to be. Social engineering is a reality and Facebook does not make a serious effort to verify the identity of new subscribers. You can override this setting for an individual post by clicking on the audience button and selecting the desired option. WARNING—Changes made here will automatically and without warning change the global setting of Who Can See My Future Posts!!! These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media. 1. Click Who Can See Your Future Posts? 2. Click the selection down arrow. 3. Select Friends. 4. Click Close.
  • 12. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. Limit the Audience for Old Posts on Your Timeline This setting is powerful and immediate. Read the onscreen information and be sure you understand it before you execute it. If you have opted to make all future posts visible to friends only then it does not make sense to not make all past posts visible to friends only as well. This option changes the setting on all posts already on your timeline so they are visible only to your friends. The only change option is to friends. Once executed, the only way to undo the changes is by changing the Who Can See This Post on each timeline item. 1. Click Limit the Audience for Posts You’ve Shared with Friends of Friends or Public. 2. Click Limit Old Posts and the click Close. The outcome of this option is that ALL past posts on your timeline will be changed to friends only. There is no means to select any other outcome than friends. Who Can Look You Up Using the Email You Provided? and Who Can Look You Up Using the Phone Number You Provided? In order to create a Facebook account users must provide a valid email address or mobile number. The email address is verified when Facebook sends an email that contains a link the user must click in order to demonstrate the validity of the email address. The mobile phone number is verified when Facebook sends a text message that contains a verification code and that code is entered into Facebook a verification dialog. However, these small steps of validation should not be interpreted to mean that Facebook user identities are properly vetted. Anyone can use any of the free email providers to create a "single use" email address or one of the available online disposable phone number sites to receive text messages. This creates circular verification - a fake email address or mobile number to verify a fake social media account. If you have enabled Login Alerts using text messaging, login approvals, or code generator then you have provided Facebook with your telephone number. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media.
  • 13. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. Do You Want Other Search Engines to Link to Your Timeline? Your profile can be located using most internet search engines and parts of your timeline may be visible even to those without a Facebook profile. By controlling this setting, you can reduce the possibility of your Facebook profile being located by someone other than a Facebook user. Users must bear in mind that, for some considerable but indeterminate period of time after the search capability is turned off, residual records in a search engine will persist. * Outside Search Engines re- fers to search engines other than the search capabilities pro- vided within Facebook. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media. Regardless of how Facebook obtained your email or telephone number, it could be possible for any Facebook user to locate your profile using only your email address or telephone number. This option should be turned off for both contact methods. 1. Click Who Can Look You Up Using the Email Address You Provided? 2. Change the setting to Friends (the most restrictive). 3. Click Close. 4. Execute the same steps for Who Can Look You Up Using the Phone Number You Provided? 1. Click Do you want search engines outside of Facebook to link to your profile?
  • 14. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. Who Can Send You Friend Requests? Limiting the people who can send you friend requests to friends of friends provides a little extra assurance that a friend request is coming from someone in your personal network. But be cautious! Accepting a friend request from someone you do not know simply because they are a friend of a friend effectively pushes the burden of vetting new requests to your friends; their efforts might not be commensurate with the level of verification and protection your identity requires. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media. 2. Deselect Allow search engines outside of Facebook to link to your profile. 3. Click Close. 1. Click Who Can Send You Friend Requests? 2. Click Friends of Friends (the most restrictive). 3. Click Close. Download a Copy of Your Facebook Activity You might find yourself in a situation where you would like to review all of your Facebook activity. Maybe you want an archive of all images you’ve posted to Facebook but didn’t save to your local computer. Fortunately, there is a way to do this without scrolling through innumerable Facebook pages. You can download to your local computer a copy of your Facebook data. A word of caution—DO NOT download a copy of your data to any computer you do not have total ownership of. Do not download your data to a borrowed computer, a public computer like those you might use at a library, community center or school, or your work computer.
  • 15. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. Before you start the download process, consider the following:  The time required to create your downloadable content could take hours or possibly days.  The downloadable file could be many gigabytes or even many, many gigabytes. It will be large. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media. 1. Click Download a Copy of Your Facebook Data. 2. Click Start My Archive. (Clicking And More, at the bottom of this dialog box provides, an idea of the content you can expect. You can click this link while your down- load is being prepared. A better plan is to look at it before you start your archive. It will give you insight into how big the download could be.) 3. Enter your password to confirm your identity. 4. Click Submit. 5. Click Start My Archive.
  • 16. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publication. Users must exercise caution whenever interacting with social media. These Facebook configuration recommendations are based upon best information available at the time of publication but are not a guarantee of social networking safety. Facebook may have instituted configuration changes since publi- cation. Users must exercise caution whenever interacting with social media. 6. Click Okay. 7. Periodically check your email account for a Facebook notification that your archive is complete. 8. Review the statement in the Facebook email and click the hyperlink. 9. Click Download Archive. 10. Enter your password and click Submit. 11. To complete the download process you will need to navigate through several more dialog boxes. Follow your operating system’s procedures for saving the archive file. The downloaded file will be compressed (e.g., zip). Save the contents of the compressed file to a new folder. Your data will be arranged in more subfolders named for the content (e.g., profile, contact info, timeline).
  • 17. Disclaimer: The appearance of hyperlinks in this Crime Prevention Flier (CPF), along with the views and opinions of authors, products or services contained therein does not constitute endorsement by CID. These sites are used solely for authorized activities and information that support the organization's mission. CID does not exercise any editorial control over the information you may find at these link locations. Such links are provided consistent with the purpose of this CPF. CCIU uses the Interactive Customer Evaluation (ICE) system. Please click on the ICE logo and take a moment to provide us with feedback. Return to Social Networking Safety Tips The Army’s Digital Detectives