{"id":485,"date":"2011-11-25T13:36:45","date_gmt":"2011-11-25T18:36:45","guid":{"rendered":"http:\/\/goodwin.drexel.edu\/isensor\/drho\/?p=485"},"modified":"2011-11-25T13:36:45","modified_gmt":"2011-11-25T18:36:45","slug":"hackers-leak-facebook-law-enforcement-data-access-guidelines","status":"publish","type":"post","link":"https:\/\/shuyuanmaryho.com\/?p=485","title":{"rendered":"Hackers Leak Facebook Law Enforcement Data Access Guidelines"},"content":{"rendered":"<div class=\"fcbkbttn_buttons_block\" id=\"fcbkbttn_left\"><div class=\"fcbkbttn_button\">\n                            <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">\n                                <img decoding=\"async\" src=\"https:\/\/shuyuanmaryho.com\/wp-content\/plugins\/facebook-button-plugin\/images\/standard-facebook-ico.png\" alt=\"Fb-Button\" \/>\n                            <\/a>\n                        <\/div><div class=\"fcbkbttn_like \"><fb:like href=\"https:\/\/shuyuanmaryho.com\/?p=485\" action=\"like\" colorscheme=\"light\" layout=\"standard\"  width=\"450px\" size=\"small\"><\/fb:like><\/div><\/div><p>A group of hackers claiming to represent Anonymous\u2019s Antisec movement hijacked two Gmail accounts belonging to a retired California Department of Justice cybercrimes investigator, now a private investigator, and on November 18 published 38,000 private emails and identifying contact information online. <\/p>\n<p>Among the data published by the hackers in a torrent file were two versions of what appears to be Facebook\u2019s guidelines for law enforcement agencies, according to Public Intelligence, a collaborative research website dedicated to the freedom of information. <\/p>\n<p>Specifically, the documents include instructions on how different law enforcement agencies should submit subpoenas and requests for user data from the world\u2019s largest social network. <\/p>\n<p>Sources close to Facebook told TPM that the newly revealed guideline documents are \u201coutdated,\u201d and that an updated set of law enforcement guidelines is scheduled be made publicly available to all users on Facebook\u2019s Help Center late Wednesday. <\/p>\n<p>The Obama Administration was this year supposed to submit to lawmakers a bill that would allow federal law enforcement agencies the ability to use \u201cback doors\u201d to observe all online communications under wiretap orders, even encrypted communications, according to a New York Times report in October 2010. That legislation has yet to be introduced. <\/p>\n<p>From TPM IdeaLab @: http:\/\/idealab.talkingpointsmemo.com\/2011\/11\/hackers-leak-facebook-law-enforcement-guidelines-1.php?ref=fpnewsfeed<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A group of hackers claiming to represent Anonymous\u2019s Antisec movement hijacked two Gmail accounts belonging to a retired California Department of Justice cybercrimes investigator, now a private investigator, and on November 18 published 38,000 private emails and identifying contact information &hellip; <a href=\"https:\/\/shuyuanmaryho.com\/?p=485\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[6],"class_list":["post-485","post","type-post","status-publish","format-standard","hentry","category-the-latest-news-ideas-problems-strategies-and-tactics-in-securing-cyberspace-and-virtual-organizations-discussed-by-experts-in-industries-as-well-as-academia","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=485"}],"version-history":[{"count":0,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/485\/revisions"}],"wp:attachment":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}