Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Hacker Group Anonymous Vows To Destroy Facebook On November 5
Village Voice Blog copied onto Business Insider ^ | August 9, 2011 | By Rosie Gray on Village Voice

Posted on 08/10/2011 12:16:59 AM PDT by tlb

Anonymous, which has been responsible for cyber-attacks on the Pentagon, News Corp, and others, has vowed to destroy Facebook on November 5th (which should ring a bell).

Citing privacy concerns and the difficulty involved in deleting a Facebook account, Anonymous hopes to "kill Facebook."

The full text of the announcement, made on YouTube and reported by Village Voice, is below:

Operation Facebook

DATE: November 5, 2011

Attention citizens of the world,

We wish to get your attention, hoping you heed the warnings as follows:

Your medium of communication you all so dearly adore will be destroyed. If you are a willing hacktivist or a guy who just wants to protect the freedom of information then join the cause and kill facebook for the sake of your own privacy.

Facebook has been selling information to government agencies and giving clandestine access to information security firms so that they can spy on people from all around the world. Some of these so-called whitehat infosec firms are working for authoritarian governments, such as those of Egypt and Syria.

Everything you do on Facebook stays on Facebook regardless of your "privacy" settings, and deleting your account is impossible, even if you "delete" your account, all your personal info stays on Facebook and can be recovered at any time. Changing the privacy settings to make your Facebook account more "private" is also a delusion. Facebook knows more about you than your family.

This is our world now. We exist without nationality, without religious bias. We have the right to not be surveilled, not be stalked, and not be used for profit. We have the right to not live as slaves.

We are anonymous We are legion We do not forgive We do not forget Expect us

(Excerpt) Read more at businessinsider.com ...


TOPICS:
KEYWORDS: cyberterrorism; facebook; hackers; nutjobs; threat; tinfoil
Navigation: use the links below to view more comments.
first 1-5051-100101-141 next last
Short of corrupting the servers AND the backups I don't really see how this could be done. But then I'm no hacker.

I'm not totally certain which side to root for.

1 posted on 08/10/2011 12:17:05 AM PDT by tlb
[ Post Reply | Private Reply | View Replies]

To: tlb
Whatever.

The country may be better off without it, whatever it is that it does. Seems to be some sort of liberal networking thing?

2 posted on 08/10/2011 12:19:34 AM PDT by doorgunner69
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb; Cacique

Just to be on the safe side, copy your list of friends so you can reconstruct your account after the hacking and the dehacking.


3 posted on 08/10/2011 12:20:24 AM PDT by firebrand (It's obscene that we have not yet impeached Obama. Can we do it now? Now?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb

This should be interesting. I wonder if HGA can pull it off.


4 posted on 08/10/2011 12:22:09 AM PDT by This Just In
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb

This is fantastic news. I am tired of people I didn’t like 20 years ago contacting me today to chat. Rock on hackers.


5 posted on 08/10/2011 12:22:46 AM PDT by Lazlo in PA (Now living in a newly minted Red State.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb

I don’t understand why people consciously enter so much of their personal information into a corporate database.


6 posted on 08/10/2011 12:26:49 AM PDT by oblomov
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb

Yeah! I waste too much time on there anyway. I just hope they don’t get mad at Free Republic.


7 posted on 08/10/2011 12:34:28 AM PDT by beaversmom
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb

Be my guest.


8 posted on 08/10/2011 12:45:38 AM PDT by BunnySlippers (I love BULL MARKETS . . .)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb
We have the right to not be surveilled, not be stalked, and not be used for profit. We have the right to not live as slaves.

Gosh, if only there was a way to not use Facebook.
9 posted on 08/10/2011 12:45:42 AM PDT by andyk (Interstate != Intrastate)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb

NSA needs to hunt them down and ex them out- toss the bodies in acid.

Messing with the net is cutting the working Joe’s only voice.


10 posted on 08/10/2011 12:55:41 AM PDT by NoLibZone (Life as Nancy Pelosi knows & wants it, must end, Life As Nancy Knows it is to raise Debt 10% annualy)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb

facebook?

oh yea. today’s version of a person FBI file... that they keep up to date themselves.

why would anyone want to keep such a thing going?


11 posted on 08/10/2011 1:01:33 AM PDT by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb

Facebook is a tottering house of cards built on MySQL, which is nowhere near robust enough to handle what it’s being asked to do. If Anon can damage the underlying database environment, it will basically be impossible to reconstruct.


12 posted on 08/10/2011 1:56:08 AM PDT by Little Pig (Vi Veri Veniversum Vivus Vici.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Lazlo in PA
"This is fantastic news. I am tired of people I didn’t like 20 years ago contacting me today to chat. Rock on hackers."

Wait until one of these hackers hits your bank account, or the computers controlling the power grid.

Once they feel the power of anonymously "sticking it to the Man" that adrenalin rush will demand to be fed.

They start with a 'righteous cause' and soon any whim of theirs will be deemed righteous.

"Power tends to corrupt, and absolute power corrupts absolutely." Lord Acton

"Unlimited power is apt to corrupt the minds of those who possess it" William Pitt the Elder

13 posted on 08/10/2011 2:29:22 AM PDT by BwanaNdege (For those who have fought for it, Life bears a savor the protected will never know.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: tlb

FB’s underlying architecture is a house of cards. It’s shouldn’t be too difficult for the hackers to accomplish their goal.


14 posted on 08/10/2011 2:52:44 AM PDT by BuckeyeTexan (Man is not free unless government is limited. ~Ronald Reagan)
[ Post Reply | Private Reply | To 1 | View Replies]

To: andyk

That’s what I can’t figure out. If you don’t like Facebook, don’t use it. Nobody is putting a gun to your head and ordering you to sign up.


15 posted on 08/10/2011 2:57:01 AM PDT by Ronin (Obamanation has replaced Bizarroworld as the most twisted place in the universe.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: tlb

Good, sometimes you have to set a backfire to stop an out of control wildfire, of which the government really is.

Its out of control searching and filing information on every square inch and minute of your life.

I am in the mood to feel some alliance with groups like this, they are acting and actually doing something, unlike a whole lot of people who are just sitting and waiting.


16 posted on 08/10/2011 2:57:19 AM PDT by Eye of Unk (Daniel J. Ramsey 1956-2012)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb

Won’t bother me a bit...don’t do FB or MySpace.


17 posted on 08/10/2011 3:07:46 AM PDT by Tainan (Cogito, Ergo Conservitus.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: NoLibZone

I agree. What they are doing is giving the State the fodder they need to demand Big-Brother control over a very powerful media that the people use to keep an eye on the State.


18 posted on 08/10/2011 3:35:50 AM PDT by Ghost of Philip Marlowe (Prepare for survival.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: tlb

The last half of the posted body gave me flashbacks to Neo (’The Matrix’) talking to the head computer thingy at the end of the movie.. lol


19 posted on 08/10/2011 3:38:47 AM PDT by Bikkuri
[ Post Reply | Private Reply | To 1 | View Replies]

To: AdmSmith; AnonymousConservative; Berosus; bigheadfred; Bockscar; ColdOne; Convert from ECUSA; ...

Thanks tlb.

The wussies in Congress (both parties, both houses) need to start hearings on THIS, NOW, and have a death penalty on the books for this type of crime.


20 posted on 08/10/2011 3:40:36 AM PDT by SunkenCiv (Yes, as a matter of fact, it is that time again -- https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | View Replies]

To: All

Oh well...(giant) sigh!!!!


21 posted on 08/10/2011 4:36:10 AM PDT by harpu ( "...it's better to be hated for who you are than loved for someone you're not!")
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb

More power to them!!!!!!!! Facebook is a total waste of time and cyberspace!


22 posted on 08/10/2011 4:39:00 AM PDT by Circle_Hook
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb
I've read some things here and elsewhere from ubergeeks who seem to know, that the code underlying (the evil) FaceButt is pretty flimsy, hence likely vulnerable.
23 posted on 08/10/2011 4:43:07 AM PDT by tomkat (Sarah '12)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb

This is someones business that you are not compelled to use which you want destroyed for no good reason.

Almost all the posts on this thread were made by liberals.


24 posted on 08/10/2011 5:12:51 AM PDT by Eaker ("If someone misquotes you, it's because they know you're right.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Circle_Hook

“Facebook is a total waste of time and cyberspace!”

If they are successful, we’ll see a 10% leap in GDP.....


25 posted on 08/10/2011 5:17:14 AM PDT by DrC
[ Post Reply | Private Reply | To 22 | View Replies]

To: tlb

I suspect FB has powerful fire walls.


26 posted on 08/10/2011 8:13:15 AM PDT by Biggirl ("Jesus talked to us as individuals"-Jim Vicevich/Thanks JimV!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BwanaNdege
Wait until one of these hackers hits your bank account...

Been there, did that. Twice in 2 years. This seems like a common occurrence anymore for a lot of people I talk to. If they are going to hack something, Face Book seems like the most innocuous.

27 posted on 08/10/2011 8:14:59 AM PDT by Lazlo in PA (Now living in a newly minted Red State.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Circle_Hook
More power to them!!!!!!!! Facebook is a total waste of time and cyberspace!

So, you support them doing the same to Free Republic since many people consider it a waste of time and cyberspace?

I can't believe the number of posters here who support this sort of attack.

28 posted on 08/10/2011 8:26:00 AM PDT by Gabz (Democrats for Voldemort.)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Eaker

It’s unbelievable. I’m truly amazed at how many posting on this thread actually are supportive of this “plan.”

Like FaceBook or not, I seriously doubt there would be any support if the message had said Free Republic instead of Face Book.


29 posted on 08/10/2011 8:29:54 AM PDT by Gabz (Democrats for Voldemort.)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Gabz

There is a problem here.

Facebook is in a partnership with the government. This allows the government to have access to personal information on people that should require a warrant under a Constitutional government.

Also, as part of this partnership the government can require all its employees and the military to create facebook pages, which they have done. This unnaturally inflates the numbers of users on facebook, so they can charge more money for selling personal property of their users (fifth amendment).

It also puts our military and other government agencies at risk, because now all the information they are posting becomes the property of facebook and can be sold to the highest paying client, globally.

Equal justice, another Constitutional protection, fails because the government is partners with a so-called private business, so there is favoritism toward the partner. This is also known as corporatist fascism.

No conservative can support facebook and their business model. But what do do about it? Most of Congress and the white house is on the take from facebook with the trainloads of cash and insider information they can get for re-election and their own personal investments.

Where do we start to clean up our country?

You can’t sweep this under the carpet, because it is one of the most insidious corruptions of our constitution and constitutional government in the history of this country.

Even if you say only idiots would post private information on facebook, it is the duty of the citizens of this country to prevent corporations like facebook to have carte blanche like they do now to abuse even the ignorant whose RIGHTS, under the fifth amendment, are supposed to be protected.


30 posted on 08/10/2011 9:17:55 AM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 28 | View Replies]

To: Ronin

The white house has forced its agencies and the US military to use facebook.


31 posted on 08/10/2011 9:20:46 AM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 15 | View Replies]

To: Eaker

It’s not a business per se.

It is an information gathering system that has contributed to the corruption of our Constitutional government.

What is the plan by American citizens to put this to rights?

You defend them, yet Facebook is as close to a criminal enterprise, when it comes to Constitutional rights of citizens, as you can get.


32 posted on 08/10/2011 9:24:23 AM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 24 | View Replies]

To: Gabz

The fourth amendment should be added to the list of abuses too, because not only can the government take your information without warrant and use it to prosecute you, the reasonable expectation of privacy is also violated, because facebook tells you you can keep your information private, or delete your account, except they lie.


33 posted on 08/10/2011 9:29:39 AM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 29 | View Replies]

To: Little Pig

So easy a Script Kiddie could do it. Must be Anon’s “B” team trying to up their creds...


34 posted on 08/10/2011 9:44:55 AM PDT by Dead Corpse (For those who fight for it, life has a flavor the sheltered will never know.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: hedgetrimmer

While I have no reason to doubt your knowledge and information, I find that to be seriously weird.


35 posted on 08/10/2011 9:52:21 AM PDT by Gabz (Democrats for Voldemort.)
[ Post Reply | Private Reply | To 30 | View Replies]

To: Gabz

My information is correct.

I think a lot of Americans don’t have the understanding of the depth of corruption here.

It is our duty to put it right.


36 posted on 08/10/2011 9:53:52 AM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 35 | View Replies]

To: hedgetrimmer

I said I didn’t doubt it.

How doe we fix it?


37 posted on 08/10/2011 9:59:06 AM PDT by Gabz (Democrats for Voldemort.)
[ Post Reply | Private Reply | To 36 | View Replies]

To: hedgetrimmer
It’s not a business per se.

Yes it is.

It is an information gathering system that has contributed to the corruption of our Constitutional government.

It is a voluntary gathering place on the Internet or did the FBI come to your house and force you to sign up and participate?

What is the plan by American citizens to put this to rights?

Conservatives are going to let them chase the almighty buck. You liberals want to stifle their free speech. Seems simple us right wing FReepers against you left wing anti-business commies.

You defend them, yet Facebook is as close to a criminal enterprise, when it comes to Constitutional rights of citizens, as you can get.

So once again they forced your ass to sign up and post that you are on your patio stinking of patchouli oil?

Grow up!

38 posted on 08/10/2011 10:01:04 AM PDT by Eaker ("If someone misquotes you, it's because they know you're right.")
[ Post Reply | Private Reply | To 32 | View Replies]

To: hedgetrimmer
That is the most misguided and left wing post I have ever seen on FR.

Show real proof that the government has forced people to sign up for and participate on Face Book.

Proof.

39 posted on 08/10/2011 10:04:34 AM PDT by Eaker ("If someone misquotes you, it's because they know you're right.")
[ Post Reply | Private Reply | To 30 | View Replies]

To: Gabz
I seriously doubt there would be any support if the message had said Free Republic instead of Face Book.

That is supposed to be one of the big differences between us and them.

40 posted on 08/10/2011 10:22:20 AM PDT by Eaker ("If someone misquotes you, it's because they know you're right.")
[ Post Reply | Private Reply | To 29 | View Replies]

To: Eaker



Click the Pic!
Sign up to donate monthly
and a sponsoring FReeper will contribute $10


41 posted on 08/10/2011 11:24:00 AM PDT by TheOldLady (FReepmail me to get ON or OFF the ZOT LIGHTNING ping list.)
[ Post Reply | Private Reply | View Replies]

To: Eaker

You’re projecting.

Conservatives are going defend the Constitution, not ‘chase the almighty buck’.

The corrupt globalists chase the almighty buck at the expense of our nation and Constitution.

Oh and if you read my post,I said the white house was forcing the agencies to create accounts.

I also said that even if someone was a total idiot, that doesn’t mean that Facebook can violate his constitutional rights.

When good men do nothing, evil will reign. Your comments reflect the global communist agenda.


42 posted on 08/10/2011 1:51:56 PM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 38 | View Replies]

To: Eaker

DEPUTY SECRETARY OF DEFENSE
1010 DEFENSE PENTAGON
WASHINGTON, D.C. 20301-1010
February 25, 2010
Change 2, February 22, 2011
MEMORANDUM FOR: SEE DISTRIBUTION
SUBJECT: Directive-Type Memorandum (DTM) 09-026 - Responsible and Effective Use
of Internet-based Capabilities
References: See Attachment 1
Purpose. This memorandum establishes DoD policy and assigns responsibilities for
responsible and effective use of Internet-based capabilities, including social networking services
(SNS). This policy recognizes that Internet-based capabilities are integral to operations across
the Department of Defense. This DTM is effective immediately; it will be converted to a new
DoD issuance. This DTM shall expire effective 1 March, 2011 January 2012.
Applicability. This DTM applies to:
• OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of
Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector
General of the Department of Defense, the Defense Agencies, the DoD Field
Activities, and all other organizational entities within the Department of Defense
(hereafter referred to collectively as the “DoD Components”).
• All authorized users of the Non-Classified Internet Protocol Router Network
(NIPRNET).
Definitions. Unless otherwise stated, these terms and their definitions are for the purpose
of this DTM.
• Internet-based capabilities. All publicly accessible information capabilities and
applications available across the Internet in locations not owned, operated, or
controlled by the Department of Defense or the Federal Government. Internet-
based capabilities include collaborative tools such as SNS, social media, user-
generated content, social software, e-mail, instant messaging, and discussion
forums (e.g., YouTube, Facebook, MySpace, Twitter, Google Apps).
• external official presences. Official public affairs activities conducted on non-
DoD sites on the Internet (e.g., Combatant Commands on Facebook, Chairman of
the Joint Chiefs of Staff on Twitter).
Page 2
DTM 09-026, February 25, 2010
2
• official public affairs activities. Defined in DoD Instruction (DoDI) 5400.13
(Reference (a)).
Policy. It is DoD policy that:
• The NIPRNET shall be configured to provide access to Internet-based capabilities
across all DoD Components.
• Commanders at all levels and Heads of DoD Components shall continue to defend
against malicious activity affecting DoD networks (e.g., distributed denial of
service attacks, intrusions) and take immediate and commensurate actions, as
required, to safeguard missions (e.g., temporarily limiting access to the Internet to
preserve operations security or to address bandwidth constraints).
• Commanders at all levels and Heads of DoD Components shall continue to deny
access to sites with prohibited content and to prohibit users from engaging in
prohibited activity via social media sites (e.g., pornography, gambling, hate-crime
related activities).
• All use of Internet-based capabilities shall comply with paragraph 2-301of Chapter
2 of the Joint Ethics Regulation (Reference (b)) and the guidelines set forth in
Attachment 2.
Responsibilities. See Attachment 3.
Releasability. UNLIMITED. This DTM is approved for public release and is available
on the Internet from the DoD Issuances Website at http://www.dtic.mil/whs/directives.
Attachments:
As stated
Change 2, 02/22/2011
Page 3
DTM 09-026, February 25, 2010
3
Change 2, 02/22/2011
DISTRIBUTION:
SECRETARIES OF THE MILITARY DEPARTMENTS
CHAIRMAN OF THE JOINT CHIEFS OF STAFF
UNDER SECRETARIES OF DEFENSE
DEPUTY CHIEF MANAGEMENT OFFICER
COMMANDERS OF THE COMBATANT COMMANDS
ASSISTANT SECRETARIES OF DEFENSE
GENERAL COUNSEL OF THE DEPARTMENT OF DEFENSE
DIRECTOR, OPERATIONAL TEST AND EVALUATION
DIRECTOR, COST ASSESSMENT AND PROGRAM
EVALUATION
INSPECTOR GENERAL OF THE DEPARTMENT OF DEFENSE
ASSISTANTS TO THE SECRETARY OF DEFENSE
DIRECTOR, ADMINISTRATION AND MANAGEMENT
DIRECTOR, NET ASSESSMENT
DIRECTORS OF THE DEFENSE AGENCIES
DIRECTORS OF THE DoD FIELD ACTIVITIES
Page 4
DTM 09-026, February 25, 2010
ATTACHMENT 1
REFERENCES
(a) DoD Instruction 5400.13, “Public Affairs (PA) Operations,” October 15, 2008
(b) DoD 5500.7-R, “Joint Ethics Regulation,” August 1, 1993
(c) DoD Directive 8500.01E, “Information Assurance (IA),” October 24, 2002
(d) DoD Instruction 8500.2, “Information Assurance (IA) Implementation,”
February 6, 2003
(e) DoD Directive 5400.11, “DoD Privacy Program,” May 8, 2007
(f) DoD Directive 5230.09, “Clearance of DoD Information for Public Release,”
August 22, 2008
(g) DoD Manual 5205.02-M, “DoD Operations Security (OPSEC) Program Manual,”
November 3, 2008
(h) DoD Directive 5015.2, “DoD Records Management Program,” March 6, 2000
(i) DoD 5200.1-R, “Information Security Program,” January 14, 1997
(j) DoD 5240.1-R, “Procedures Governing the Activities of DoD Intelligence
Components That Affect United States Persons,” December 1, 1982
(k) DoD Instruction O-8530.2, “Support to Computer Network Defense (CND),”
March 9, 2001
(l) Unified Command Plan, “Unified Command Plan 2008 (UCP),” December 17, 2008
Change 2, 02/22/2011
4
Attachment 1
Page 5
DTM 09-026, February 25, 2010
ATTACHMENT 2
GUIDELINES FOR USE OF INTERNET-BASED CAPABILITIES
1. GENERAL. This attachment applies to the official and/or authorized use of Internet-
based capabilities by DoD personnel and all authorized users of the NIPRNET.
Examples include, but are not limited to:
a. SNS.
b. Image- and video-hosting web services.
c. Wikis.
d. Personal, corporate, or subject-specific blogs.
e. Data mashups that combine similar types of media and information from
multiple sources into a single representation.
f. Similar collaborative, information sharing-driven Internet-based capabilities
where users are encouraged to add and/or generate content.
2. OFFICIAL PRESENCES. External official presences shall comply with Reference
(a) and clearly identify that the Department of Defense provides their content. In
addition, external official presences shall:
a. Receive approval from the responsible OSD or DoD Component Head.
Approval signifies that the Component Head concurs with the planned use and has
assessed risks to be at an acceptable level for using Internet-based capabilities.
b. Be registered on the external official presences list, maintained by the Assistant
Secretary of Defense for Public Affairs (ASD(PA)), on www.Defense.gov.
c. Comply with References (a) and (b) as well as DoD Directive (DoDD)
8500.01E, DoDI 8500.2, DoDD 5400.11, DoDD 5230.09, DoD Manual 5205.02-M,
DoDD 5015.2, DoD 5200.1-R, and DoD 5240.1-R (References (c) through (j),
respectively).
d. Use official DoD and command seals and logos as well as other official
command identifying material per ASD(PA) guidance.
Change 2, 02/22/2011
5
Attachment 2
Page 6
DTM 09-026, February 25, 2010
6
Attachment 2
Change 2, 02/22/2011
e. Clearly indicate the role and scope of the external official presence.
f. Provide links to the organization’s official public website.
g. Be actively monitored and evaluated by DoD Components for compliance with
security requirements and for fraudulent or objectionable use (References (d), (g), and
(i)).
3. OFFICIAL USE. Official uses of Internet-based capabilities unrelated to public
affairs are permitted. However, because these interactions take place in a public venue,
personnel acting in their official capacity shall maintain liaison with public affairs and
operations security staff to ensure organizational awareness. Use of Internet-based
capabilities for official purposes shall:
a. Comply with References (b) through (j).
b. Ensure that the information posted is relevant and accurate, and provides no
information not approved for public release, including personally identifiable information
(PII) as defined in Reference (e).
c. Provide links to official DoD content hosted on DoD-owned, -operated, or
-controlled sites where applicable.
d. Include a disclaimer when personal opinions are expressed (e.g., “This
statement is my own and does not constitute an endorsement by or opinion of the
Department of Defense”).
4. RECORDS MANAGEMENT. Internet-based capabilities used to transact business
are subject to records management policy in accordance with Reference (h). All users of
these Internet-based capabilities must be aware of the potential record value of their
content, including content that may originate outside the agency.
5. LIMITED AUTHORIZED PERSONAL USE. Paragraph 2-301 of Reference (b)
permits limited personal use of Federal Government resources when authorized by the
agency designee on a non-interference basis. When accessing Internet-based capabilities
using Federal Government resources in an authorized personal or unofficial capacity,
individuals shall employ sound operations security (OPSEC) measures in accordance
with Reference (g) and shall not represent the policies or official position of the
Department of Defense.
Page 7
DTM 09-026, February 25, 2010
ATTACHMENT 3
RESPONSIBILITIES
1. ASSISTANT SECRETARY OF DEFENSE FOR NETWORKS AND
INFORMATION INTEGRATION/DoD CHIEF INFORMATION OFFICER
(ASD(NII)/DoD CIO). The ASD(NII)/DoD CIO, in addition to the responsibilities in
section 4 of this attachment, shall:
a. Establish and maintain policy and procedures regarding Internet-based
capabilities use, risk management, and compliance oversight.
b. Provide implementation guidance for responsible and effective use of
Internet-based capabilities.
c. Integrate guidance regarding the proper use of Internet-based capabilities with
information assurance (IA) education, training, and awareness activities.
d. Establish mechanisms to monitor emerging Internet-based capabilities in order
to identify opportunities for use and assess risks.
e. In coordination with the Heads of the OSD and DoD Components, develop a
process for establishing enterprise-wide terms of service agreements for Internet-based
capabilities when required.
2. UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE (USD(I)). The
USD(I), in addition to the responsibilities in section 4 of this attachment, shall:
a. Develop procedures and guidelines to be implemented by the OSD and DoD
Components for OPSEC reviews of DoD information shared via Internet-based
capabilities.
b. Develop and maintain threat estimates on current and emerging Internet-based
capabilities.
c. Integrate guidance regarding the proper use of Internet-based capabilities into
OPSEC education, training, and awareness activities.
d. Ensure that all use of Internet-based capabilities that collect user or other
information is consistent with DoD 5240.1-R (Reference (j)).
Change 2, 02/22/2011
7
Page 8
DTM 09-026, February 25, 2010
3. ASD(PA). The ASD(PA), in addition to the responsibilities in section 4 of this
attachment, shall:
a. Maintain a registry of external official presences.
b. Provide policy for news, information, photographs, editorial, community
relations activities, and other materials distributed via external official presences.
c. Provide guidance for official identifiers for external official presences.
4. HEADS OF THE OSD AND DoD COMPONENTS. The Heads of the OSD and DoD
Components shall, within their respective Components:
a. Approve the establishment of external official presences.
b. Ensure the implementation, validation, and maintenance of applicable IA
controls, information security procedures, and OPSEC measures.
c. Ensure that computer network defense mechanisms that provide adequate
security for access to Internet-based capabilities from the NIPRNET are in place,
effective, and compliant with DoD Instruction O-8530.2 (Reference (k)).
d. Educate, train, and promote awareness for the responsible and effective use of
Internet-based capabilities.
e. Monitor and evaluate the use of Internet-based capabilities to ensure
compliance with this DTM.
f. Coordinate with USD(I) regarding the use of all Internet-based capabilities that
collect user or other information, to ensure compliance with Reference (j).
5. DoD COMPONENT CHIEF INFORMATION OFFICERS (CIOs). The DoD
Component CIOs shall:
a. Advise the ASD(NII)/DoD CIO and ensure that the policies and guidance for
use of Internet-based capabilities issued by ASD(NII)/DoD CIO are implemented within
their Component.
b. In coordination with Component OPSEC and Public Affairs offices, provide
advice, guidance, and other assistance to their respective Component Heads and other
Change 2, 02/22/2011
8
Page 9
DTM 09-026, February 25, 2010
9
Change 2, 02/22/2011
Component senior management personnel to ensure that Internet-based capabilities are
used responsibly and effectively.
c. Assist their respective Component Head to ensure effective implementation of
computer network defense mechanisms as well as the proper use of Internet-based
capabilities through the use of existing IA education, training, and awareness activities.
d. Establish risk assessment procedures to evaluate and monitor current and
emerging Component Internet-based capabilities in order to identify opportunities for use
and assess risks.
e. In coordination with the Component Public Affairs Office, assist their
respective Component Head in evaluating external official presences’ intended use.
6. COMMANDER, UNITED STATES STRATEGIC COMMAND
(CDRUSSTRATCOM). The CDRUSSTRATCOM, in addition to the responsibilities in
section 4 of this attachment, shall:
a. In accordance with Unified Command Plan 2008 (Reference (l)), direct the
defense and operation of the DoD Global Information Grid (GIG).
b. Assess risks associated with the use of Internet-based capabilities, identify
operational vulnerabilities, and work with the ASD(NII)/DoD CIO to mitigate risks to the
GIG.


43 posted on 08/10/2011 1:59:45 PM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 39 | View Replies]

To: hedgetrimmer

Okay, where does it say that every government employee MUST set up and USE a personal Face Book account?

Please underline it for me and leave out the bullshit.


44 posted on 08/10/2011 4:18:46 PM PDT by Eaker ("If someone misquotes you, it's because they know you're right.")
[ Post Reply | Private Reply | To 43 | View Replies]

To: hedgetrimmer
You’re projecting.

You’re brain damaged.

45 posted on 08/10/2011 4:20:22 PM PDT by Eaker ("If someone misquotes you, it's because they know you're right.")
[ Post Reply | Private Reply | To 42 | View Replies]

To: hedgetrimmer
government can require all its employees and the military to create facebook pages, which they have done.

I am sure they could do this but the part about they have done is absolutely not true.

46 posted on 08/10/2011 4:26:50 PM PDT by Tammy8 (~Secure the border and deport all illegals- do it now! ~ Support our Troops!~)
[ Post Reply | Private Reply | To 30 | View Replies]

To: Eaker

You are clearly using Alinsky tactics which is a favorite method of the global communists to stop any sort of political discussion that contradicts their agenda.

Your comments are not conservative, they are remarkably similar to the opinions of a corporatist fascist or a global communist.


47 posted on 08/10/2011 5:26:19 PM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 45 | View Replies]

To: tlb
Goodbye Fakebook, it's been nice not to know you!


48 posted on 08/10/2011 5:35:16 PM PDT by Revolting cat! (Let us prey!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eaker

I’m already brain damaged.

I’m not sure where the so called “Conservative” should side?

On one hand we have an anonymous hacker, who could actually be called terrorist unlike The T Party, and then like another poster mentioned, what if the hacker said Free Republic rather than FaceBook?

What about the government forcing Jim FReeper Republic to hold these type of social networking files?

What then?


49 posted on 08/10/2011 5:42:18 PM PDT by Herbster
[ Post Reply | Private Reply | To 45 | View Replies]

To: Gabz

1. The people of the United States must revoke the conveyance of personhood to corporations. That is, they must not be able to, in any form, donate money to political campaigns or to political action committees.

2. The people of the United States must force all government agencies from federal to state to county and below, to withdraw from all public-private partnerships, which is another name for corporatist fascism.

3. The people of the United States must insist on full disclosure of the abuse of power between the corporations involved and the federal government, and try and convict persons involved in the corruption schemes.

4. The people of the United States must insist that the government run their own websites, no third party interests should be allowed to have access to government information more easily than an American citizen should. Citizens need to have access to government information, records and data to be informed, and when a third party, a so called ‘private’ corporation has first access to it, all kinds of shenanigans can occur.

I personally think that companies providing ‘free’ apps and webspace should pay the people they are ripping off for their private information, and also be made to clearly instruct everyone signing up to know that they will be used for generating income for the company, and what the value of their information is, so they can decide to sell it elsewhere, if they want to. Your information is your personal private property and as an indivdiual you should have the first right of sale to it, before a company like Facebook can sell it to someone else.

There is also a great danger here, in that communist China is about to become, if not already, a very large shareholder of this company. That means all the government agencies, anyone with information on facebook, must realize that their information will be the property of China, in a manner of speaking. As a shareholder, I am sure China will insist on the full benefits of spying on unsuspecting americans through facebook and ripping them off of their private information.


50 posted on 08/10/2011 5:43:55 PM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 37 | View Replies]


Navigation: use the links below to view more comments.
first 1-5051-100101-141 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson