Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Hacker Group Anonymous Vows To Destroy Facebook On November 5
Village Voice Blog copied onto Business Insider ^ | August 9, 2011 | By Rosie Gray on Village Voice

Posted on 08/10/2011 12:16:59 AM PDT by tlb

Anonymous, which has been responsible for cyber-attacks on the Pentagon, News Corp, and others, has vowed to destroy Facebook on November 5th (which should ring a bell).

Citing privacy concerns and the difficulty involved in deleting a Facebook account, Anonymous hopes to "kill Facebook."

The full text of the announcement, made on YouTube and reported by Village Voice, is below:

Operation Facebook

DATE: November 5, 2011

Attention citizens of the world,

We wish to get your attention, hoping you heed the warnings as follows:

Your medium of communication you all so dearly adore will be destroyed. If you are a willing hacktivist or a guy who just wants to protect the freedom of information then join the cause and kill facebook for the sake of your own privacy.

Facebook has been selling information to government agencies and giving clandestine access to information security firms so that they can spy on people from all around the world. Some of these so-called whitehat infosec firms are working for authoritarian governments, such as those of Egypt and Syria.

Everything you do on Facebook stays on Facebook regardless of your "privacy" settings, and deleting your account is impossible, even if you "delete" your account, all your personal info stays on Facebook and can be recovered at any time. Changing the privacy settings to make your Facebook account more "private" is also a delusion. Facebook knows more about you than your family.

This is our world now. We exist without nationality, without religious bias. We have the right to not be surveilled, not be stalked, and not be used for profit. We have the right to not live as slaves.

We are anonymous We are legion We do not forgive We do not forget Expect us

(Excerpt) Read more at businessinsider.com ...


TOPICS:
KEYWORDS: cyberterrorism; facebook; hackers; nutjobs; threat; tinfoil
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 141 next last
To: Eaker



Click the Pic!
Sign up to donate monthly
and a sponsoring FReeper will contribute $10


41 posted on 08/10/2011 11:24:00 AM PDT by TheOldLady (FReepmail me to get ON or OFF the ZOT LIGHTNING ping list.)
[ Post Reply | Private Reply | View Replies]

To: Eaker

You’re projecting.

Conservatives are going defend the Constitution, not ‘chase the almighty buck’.

The corrupt globalists chase the almighty buck at the expense of our nation and Constitution.

Oh and if you read my post,I said the white house was forcing the agencies to create accounts.

I also said that even if someone was a total idiot, that doesn’t mean that Facebook can violate his constitutional rights.

When good men do nothing, evil will reign. Your comments reflect the global communist agenda.


42 posted on 08/10/2011 1:51:56 PM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 38 | View Replies]

To: Eaker

DEPUTY SECRETARY OF DEFENSE
1010 DEFENSE PENTAGON
WASHINGTON, D.C. 20301-1010
February 25, 2010
Change 2, February 22, 2011
MEMORANDUM FOR: SEE DISTRIBUTION
SUBJECT: Directive-Type Memorandum (DTM) 09-026 - Responsible and Effective Use
of Internet-based Capabilities
References: See Attachment 1
Purpose. This memorandum establishes DoD policy and assigns responsibilities for
responsible and effective use of Internet-based capabilities, including social networking services
(SNS). This policy recognizes that Internet-based capabilities are integral to operations across
the Department of Defense. This DTM is effective immediately; it will be converted to a new
DoD issuance. This DTM shall expire effective 1 March, 2011 January 2012.
Applicability. This DTM applies to:
• OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of
Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector
General of the Department of Defense, the Defense Agencies, the DoD Field
Activities, and all other organizational entities within the Department of Defense
(hereafter referred to collectively as the “DoD Components”).
• All authorized users of the Non-Classified Internet Protocol Router Network
(NIPRNET).
Definitions. Unless otherwise stated, these terms and their definitions are for the purpose
of this DTM.
• Internet-based capabilities. All publicly accessible information capabilities and
applications available across the Internet in locations not owned, operated, or
controlled by the Department of Defense or the Federal Government. Internet-
based capabilities include collaborative tools such as SNS, social media, user-
generated content, social software, e-mail, instant messaging, and discussion
forums (e.g., YouTube, Facebook, MySpace, Twitter, Google Apps).
• external official presences. Official public affairs activities conducted on non-
DoD sites on the Internet (e.g., Combatant Commands on Facebook, Chairman of
the Joint Chiefs of Staff on Twitter).
Page 2
DTM 09-026, February 25, 2010
2
• official public affairs activities. Defined in DoD Instruction (DoDI) 5400.13
(Reference (a)).
Policy. It is DoD policy that:
• The NIPRNET shall be configured to provide access to Internet-based capabilities
across all DoD Components.
• Commanders at all levels and Heads of DoD Components shall continue to defend
against malicious activity affecting DoD networks (e.g., distributed denial of
service attacks, intrusions) and take immediate and commensurate actions, as
required, to safeguard missions (e.g., temporarily limiting access to the Internet to
preserve operations security or to address bandwidth constraints).
• Commanders at all levels and Heads of DoD Components shall continue to deny
access to sites with prohibited content and to prohibit users from engaging in
prohibited activity via social media sites (e.g., pornography, gambling, hate-crime
related activities).
• All use of Internet-based capabilities shall comply with paragraph 2-301of Chapter
2 of the Joint Ethics Regulation (Reference (b)) and the guidelines set forth in
Attachment 2.
Responsibilities. See Attachment 3.
Releasability. UNLIMITED. This DTM is approved for public release and is available
on the Internet from the DoD Issuances Website at http://www.dtic.mil/whs/directives.
Attachments:
As stated
Change 2, 02/22/2011
Page 3
DTM 09-026, February 25, 2010
3
Change 2, 02/22/2011
DISTRIBUTION:
SECRETARIES OF THE MILITARY DEPARTMENTS
CHAIRMAN OF THE JOINT CHIEFS OF STAFF
UNDER SECRETARIES OF DEFENSE
DEPUTY CHIEF MANAGEMENT OFFICER
COMMANDERS OF THE COMBATANT COMMANDS
ASSISTANT SECRETARIES OF DEFENSE
GENERAL COUNSEL OF THE DEPARTMENT OF DEFENSE
DIRECTOR, OPERATIONAL TEST AND EVALUATION
DIRECTOR, COST ASSESSMENT AND PROGRAM
EVALUATION
INSPECTOR GENERAL OF THE DEPARTMENT OF DEFENSE
ASSISTANTS TO THE SECRETARY OF DEFENSE
DIRECTOR, ADMINISTRATION AND MANAGEMENT
DIRECTOR, NET ASSESSMENT
DIRECTORS OF THE DEFENSE AGENCIES
DIRECTORS OF THE DoD FIELD ACTIVITIES
Page 4
DTM 09-026, February 25, 2010
ATTACHMENT 1
REFERENCES
(a) DoD Instruction 5400.13, “Public Affairs (PA) Operations,” October 15, 2008
(b) DoD 5500.7-R, “Joint Ethics Regulation,” August 1, 1993
(c) DoD Directive 8500.01E, “Information Assurance (IA),” October 24, 2002
(d) DoD Instruction 8500.2, “Information Assurance (IA) Implementation,”
February 6, 2003
(e) DoD Directive 5400.11, “DoD Privacy Program,” May 8, 2007
(f) DoD Directive 5230.09, “Clearance of DoD Information for Public Release,”
August 22, 2008
(g) DoD Manual 5205.02-M, “DoD Operations Security (OPSEC) Program Manual,”
November 3, 2008
(h) DoD Directive 5015.2, “DoD Records Management Program,” March 6, 2000
(i) DoD 5200.1-R, “Information Security Program,” January 14, 1997
(j) DoD 5240.1-R, “Procedures Governing the Activities of DoD Intelligence
Components That Affect United States Persons,” December 1, 1982
(k) DoD Instruction O-8530.2, “Support to Computer Network Defense (CND),”
March 9, 2001
(l) Unified Command Plan, “Unified Command Plan 2008 (UCP),” December 17, 2008
Change 2, 02/22/2011
4
Attachment 1
Page 5
DTM 09-026, February 25, 2010
ATTACHMENT 2
GUIDELINES FOR USE OF INTERNET-BASED CAPABILITIES
1. GENERAL. This attachment applies to the official and/or authorized use of Internet-
based capabilities by DoD personnel and all authorized users of the NIPRNET.
Examples include, but are not limited to:
a. SNS.
b. Image- and video-hosting web services.
c. Wikis.
d. Personal, corporate, or subject-specific blogs.
e. Data mashups that combine similar types of media and information from
multiple sources into a single representation.
f. Similar collaborative, information sharing-driven Internet-based capabilities
where users are encouraged to add and/or generate content.
2. OFFICIAL PRESENCES. External official presences shall comply with Reference
(a) and clearly identify that the Department of Defense provides their content. In
addition, external official presences shall:
a. Receive approval from the responsible OSD or DoD Component Head.
Approval signifies that the Component Head concurs with the planned use and has
assessed risks to be at an acceptable level for using Internet-based capabilities.
b. Be registered on the external official presences list, maintained by the Assistant
Secretary of Defense for Public Affairs (ASD(PA)), on www.Defense.gov.
c. Comply with References (a) and (b) as well as DoD Directive (DoDD)
8500.01E, DoDI 8500.2, DoDD 5400.11, DoDD 5230.09, DoD Manual 5205.02-M,
DoDD 5015.2, DoD 5200.1-R, and DoD 5240.1-R (References (c) through (j),
respectively).
d. Use official DoD and command seals and logos as well as other official
command identifying material per ASD(PA) guidance.
Change 2, 02/22/2011
5
Attachment 2
Page 6
DTM 09-026, February 25, 2010
6
Attachment 2
Change 2, 02/22/2011
e. Clearly indicate the role and scope of the external official presence.
f. Provide links to the organization’s official public website.
g. Be actively monitored and evaluated by DoD Components for compliance with
security requirements and for fraudulent or objectionable use (References (d), (g), and
(i)).
3. OFFICIAL USE. Official uses of Internet-based capabilities unrelated to public
affairs are permitted. However, because these interactions take place in a public venue,
personnel acting in their official capacity shall maintain liaison with public affairs and
operations security staff to ensure organizational awareness. Use of Internet-based
capabilities for official purposes shall:
a. Comply with References (b) through (j).
b. Ensure that the information posted is relevant and accurate, and provides no
information not approved for public release, including personally identifiable information
(PII) as defined in Reference (e).
c. Provide links to official DoD content hosted on DoD-owned, -operated, or
-controlled sites where applicable.
d. Include a disclaimer when personal opinions are expressed (e.g., “This
statement is my own and does not constitute an endorsement by or opinion of the
Department of Defense”).
4. RECORDS MANAGEMENT. Internet-based capabilities used to transact business
are subject to records management policy in accordance with Reference (h). All users of
these Internet-based capabilities must be aware of the potential record value of their
content, including content that may originate outside the agency.
5. LIMITED AUTHORIZED PERSONAL USE. Paragraph 2-301 of Reference (b)
permits limited personal use of Federal Government resources when authorized by the
agency designee on a non-interference basis. When accessing Internet-based capabilities
using Federal Government resources in an authorized personal or unofficial capacity,
individuals shall employ sound operations security (OPSEC) measures in accordance
with Reference (g) and shall not represent the policies or official position of the
Department of Defense.
Page 7
DTM 09-026, February 25, 2010
ATTACHMENT 3
RESPONSIBILITIES
1. ASSISTANT SECRETARY OF DEFENSE FOR NETWORKS AND
INFORMATION INTEGRATION/DoD CHIEF INFORMATION OFFICER
(ASD(NII)/DoD CIO). The ASD(NII)/DoD CIO, in addition to the responsibilities in
section 4 of this attachment, shall:
a. Establish and maintain policy and procedures regarding Internet-based
capabilities use, risk management, and compliance oversight.
b. Provide implementation guidance for responsible and effective use of
Internet-based capabilities.
c. Integrate guidance regarding the proper use of Internet-based capabilities with
information assurance (IA) education, training, and awareness activities.
d. Establish mechanisms to monitor emerging Internet-based capabilities in order
to identify opportunities for use and assess risks.
e. In coordination with the Heads of the OSD and DoD Components, develop a
process for establishing enterprise-wide terms of service agreements for Internet-based
capabilities when required.
2. UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE (USD(I)). The
USD(I), in addition to the responsibilities in section 4 of this attachment, shall:
a. Develop procedures and guidelines to be implemented by the OSD and DoD
Components for OPSEC reviews of DoD information shared via Internet-based
capabilities.
b. Develop and maintain threat estimates on current and emerging Internet-based
capabilities.
c. Integrate guidance regarding the proper use of Internet-based capabilities into
OPSEC education, training, and awareness activities.
d. Ensure that all use of Internet-based capabilities that collect user or other
information is consistent with DoD 5240.1-R (Reference (j)).
Change 2, 02/22/2011
7
Page 8
DTM 09-026, February 25, 2010
3. ASD(PA). The ASD(PA), in addition to the responsibilities in section 4 of this
attachment, shall:
a. Maintain a registry of external official presences.
b. Provide policy for news, information, photographs, editorial, community
relations activities, and other materials distributed via external official presences.
c. Provide guidance for official identifiers for external official presences.
4. HEADS OF THE OSD AND DoD COMPONENTS. The Heads of the OSD and DoD
Components shall, within their respective Components:
a. Approve the establishment of external official presences.
b. Ensure the implementation, validation, and maintenance of applicable IA
controls, information security procedures, and OPSEC measures.
c. Ensure that computer network defense mechanisms that provide adequate
security for access to Internet-based capabilities from the NIPRNET are in place,
effective, and compliant with DoD Instruction O-8530.2 (Reference (k)).
d. Educate, train, and promote awareness for the responsible and effective use of
Internet-based capabilities.
e. Monitor and evaluate the use of Internet-based capabilities to ensure
compliance with this DTM.
f. Coordinate with USD(I) regarding the use of all Internet-based capabilities that
collect user or other information, to ensure compliance with Reference (j).
5. DoD COMPONENT CHIEF INFORMATION OFFICERS (CIOs). The DoD
Component CIOs shall:
a. Advise the ASD(NII)/DoD CIO and ensure that the policies and guidance for
use of Internet-based capabilities issued by ASD(NII)/DoD CIO are implemented within
their Component.
b. In coordination with Component OPSEC and Public Affairs offices, provide
advice, guidance, and other assistance to their respective Component Heads and other
Change 2, 02/22/2011
8
Page 9
DTM 09-026, February 25, 2010
9
Change 2, 02/22/2011
Component senior management personnel to ensure that Internet-based capabilities are
used responsibly and effectively.
c. Assist their respective Component Head to ensure effective implementation of
computer network defense mechanisms as well as the proper use of Internet-based
capabilities through the use of existing IA education, training, and awareness activities.
d. Establish risk assessment procedures to evaluate and monitor current and
emerging Component Internet-based capabilities in order to identify opportunities for use
and assess risks.
e. In coordination with the Component Public Affairs Office, assist their
respective Component Head in evaluating external official presences’ intended use.
6. COMMANDER, UNITED STATES STRATEGIC COMMAND
(CDRUSSTRATCOM). The CDRUSSTRATCOM, in addition to the responsibilities in
section 4 of this attachment, shall:
a. In accordance with Unified Command Plan 2008 (Reference (l)), direct the
defense and operation of the DoD Global Information Grid (GIG).
b. Assess risks associated with the use of Internet-based capabilities, identify
operational vulnerabilities, and work with the ASD(NII)/DoD CIO to mitigate risks to the
GIG.


43 posted on 08/10/2011 1:59:45 PM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 39 | View Replies]

To: hedgetrimmer

Okay, where does it say that every government employee MUST set up and USE a personal Face Book account?

Please underline it for me and leave out the bullshit.


44 posted on 08/10/2011 4:18:46 PM PDT by Eaker ("If someone misquotes you, it's because they know you're right.")
[ Post Reply | Private Reply | To 43 | View Replies]

To: hedgetrimmer
You’re projecting.

You’re brain damaged.

45 posted on 08/10/2011 4:20:22 PM PDT by Eaker ("If someone misquotes you, it's because they know you're right.")
[ Post Reply | Private Reply | To 42 | View Replies]

To: hedgetrimmer
government can require all its employees and the military to create facebook pages, which they have done.

I am sure they could do this but the part about they have done is absolutely not true.

46 posted on 08/10/2011 4:26:50 PM PDT by Tammy8 (~Secure the border and deport all illegals- do it now! ~ Support our Troops!~)
[ Post Reply | Private Reply | To 30 | View Replies]

To: Eaker

You are clearly using Alinsky tactics which is a favorite method of the global communists to stop any sort of political discussion that contradicts their agenda.

Your comments are not conservative, they are remarkably similar to the opinions of a corporatist fascist or a global communist.


47 posted on 08/10/2011 5:26:19 PM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 45 | View Replies]

To: tlb
Goodbye Fakebook, it's been nice not to know you!


48 posted on 08/10/2011 5:35:16 PM PDT by Revolting cat! (Let us prey!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eaker

I’m already brain damaged.

I’m not sure where the so called “Conservative” should side?

On one hand we have an anonymous hacker, who could actually be called terrorist unlike The T Party, and then like another poster mentioned, what if the hacker said Free Republic rather than FaceBook?

What about the government forcing Jim FReeper Republic to hold these type of social networking files?

What then?


49 posted on 08/10/2011 5:42:18 PM PDT by Herbster
[ Post Reply | Private Reply | To 45 | View Replies]

To: Gabz

1. The people of the United States must revoke the conveyance of personhood to corporations. That is, they must not be able to, in any form, donate money to political campaigns or to political action committees.

2. The people of the United States must force all government agencies from federal to state to county and below, to withdraw from all public-private partnerships, which is another name for corporatist fascism.

3. The people of the United States must insist on full disclosure of the abuse of power between the corporations involved and the federal government, and try and convict persons involved in the corruption schemes.

4. The people of the United States must insist that the government run their own websites, no third party interests should be allowed to have access to government information more easily than an American citizen should. Citizens need to have access to government information, records and data to be informed, and when a third party, a so called ‘private’ corporation has first access to it, all kinds of shenanigans can occur.

I personally think that companies providing ‘free’ apps and webspace should pay the people they are ripping off for their private information, and also be made to clearly instruct everyone signing up to know that they will be used for generating income for the company, and what the value of their information is, so they can decide to sell it elsewhere, if they want to. Your information is your personal private property and as an indivdiual you should have the first right of sale to it, before a company like Facebook can sell it to someone else.

There is also a great danger here, in that communist China is about to become, if not already, a very large shareholder of this company. That means all the government agencies, anyone with information on facebook, must realize that their information will be the property of China, in a manner of speaking. As a shareholder, I am sure China will insist on the full benefits of spying on unsuspecting americans through facebook and ripping them off of their private information.


50 posted on 08/10/2011 5:43:55 PM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 37 | View Replies]

To: Tammy8
Government on Facebook

I see the Army the Navy the Air Force the Coast Guard the US Treasury Department, the Department of Defense, the GSA the department of Justice

What do you see?

I am sure communist China is very glad for the agencies listed above and all the others.
51 posted on 08/10/2011 5:50:34 PM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 46 | View Replies]

To: hedgetrimmer

” personally think that companies providing ‘free’ apps and webspace should pay the people they are ripping off for their private information, and also be made to clearly instruct everyone signing up to know that they will be used for generating income for the company, and what the value of their information is, so they can decide to sell it elsewhere, if they want to. Your information is your personal private property and as an indivdiual you should have the first right of sale to it, before a company like Facebook can sell it to someone else.


I’m pretty sure you may not use said company’s software without agreeing to them raping your information.

I guess I already signed it all away...

Did I sign any inheritance away as well?

Your China comment has me in deep thought which I never post. ;0)


52 posted on 08/10/2011 5:52:57 PM PDT by Herbster
[ Post Reply | Private Reply | To 50 | View Replies]

To: hedgetrimmer
Okay, where does it say that every government employee MUST set up and USE a personal Face Book account?

Please underline it for me and leave out the bullshit.

How the hell is this an Alinsky tactic?

You need a dictionary too.

Now back your BS up or STFU.

53 posted on 08/10/2011 5:56:46 PM PDT by Eaker ("If someone misquotes you, it's because they know you're right.")
[ Post Reply | Private Reply | To 47 | View Replies]

To: hedgetrimmer
I am sure communist China is very glad for the agencies listed above and all the others.

You are nuts!

There are Chinese spies in the US military. Do you really think they are relying on Face Book?

You are so damn naive!

54 posted on 08/10/2011 6:03:14 PM PDT by Eaker ("If someone misquotes you, it's because they know you're right.")
[ Post Reply | Private Reply | To 51 | View Replies]

To: hedgetrimmer

You never did explain how the government forced you to sign up for Face Book and make you participate and share the contents of your diary.

Did they threaten to drink your root beer?

LOL!


55 posted on 08/10/2011 6:07:04 PM PDT by Eaker ("If someone misquotes you, it's because they know you're right.")
[ Post Reply | Private Reply | To 51 | View Replies]

To: Eaker

I believe not using Face Book would be naive.


56 posted on 08/10/2011 6:08:44 PM PDT by Herbster
[ Post Reply | Private Reply | To 54 | View Replies]

To: tlb

I’m anticipating the day one can’t get hired without a facebook page.


57 posted on 08/10/2011 6:10:59 PM PDT by Rebelbase
[ Post Reply | Private Reply | To 1 | View Replies]

To: hedgetrimmer; Eaker

I’m with Eaker. No where in that convoluted government speak does it require any DoD employee to sign up with Facebook or any other social media. All it does is lay out guidelines for use of social networking sites and other internet sites.


58 posted on 08/10/2011 6:11:02 PM PDT by Gabz (Democrats for Voldemort.)
[ Post Reply | Private Reply | To 43 | View Replies]

To: hedgetrimmer

There are no black helicopters circling my house.


59 posted on 08/10/2011 6:13:08 PM PDT by Gabz (Democrats for Voldemort.)
[ Post Reply | Private Reply | To 50 | View Replies]

To: Eaker

They will have access to the Facebook data mine.

There is so much information in there its incredible.

You are the Pollyana. Chins plays hardball and they love how the ignorant Americans refuse to defend themselves.

They are making BILLIONS off their deals. Its the MONEY, Eaker! Making China wealthy does NOT make America a free country!


60 posted on 08/10/2011 6:17:08 PM PDT by hedgetrimmer
[ Post Reply | Private Reply | To 54 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 141 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson