LE VOÎLE DÉCHIRÉ (1) Index du Forum

LE VOÎLE DÉCHIRÉ (1)
...

 FAQFAQ   RechercherRechercher   MembresMembres   GroupesGroupes   S’enregistrerS’enregistrer 
 ProfilProfil   Se connecter pour vérifier ses messages privésSe connecter pour vérifier ses messages privés   ConnexionConnexion 

RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM & HUMAN CONTROL (PARTIE 2)
Aller à la page: <  1, 2, 38, 9, 1012, 13, 14  >
 
Poster un nouveau sujet   Répondre au sujet    LE VOÎLE DÉCHIRÉ (1) Index du Forum -> NOUVELLES LOIS ANTITERRORISTES/NEW ANTITERRORIST LAWS -> RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM (PARTIE 2)
Sujet précédent :: Sujet suivant  
Auteur Message
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mer 20 Mai - 01:35 (2015)    Sujet du message: THE ARMY IS IN TALKS WITH ‘CYBER EFFECTS’ VENDORS Répondre en citant

THE ARMY IS IN TALKS WITH ‘CYBER EFFECTS’ VENDORS



By Aliya Sternstein May 17, 2015
NEXTGOV

The Army is seeking the assistance of cyberattack tool sellers, joining a growing number of Pentagon entities aiming to amass advanced cyber capabilities.

A new market survey aimed at identifying suppliers is the third Defense Department document issued over the past month that points out a need to be able to execute "cyber effects.”

A cyber effect typically refers to a hack, disruption or other impact to an adversary's network, according to security experts.

The Army's request for information, which was released Thursday afternoon, expresses interest in “existing technical capabilities to deliver cyber effects with robust and mature capabilities” that can target "telecommunications, networking, components, and protocols."

Defense and intelligence community contractors have until June 15 to submit white papers containing suggestions.

The four-page solicitation for “potential sources for the procurement of cyber capabilities” does not provide any other details about the capabilities sought. Most of the space is consumed by questions about the prospective contractor’s demographic information.

Army officials did not immediately clarify what the branch is looking for.

A basic example of a "cyber effect" would be “malicious software gets on your computer and the effect is the screen goes black,” said James Lewis, a cybersecurity analyst at the Center for Strategic and International Studies.

Last week, the Navy also announced preparations to incorporate hacking tools into its munitions store.

“The Navy as a whole must understand and embrace cyber and space effects as an integral component of our arsenal," states a five-year Navy Fleet Cyber Command strategic plan issued May 6. One of five focus areas for the Navy will be to help "commanders put cyber effects on the table while they craft operational plans."

The Pentagon, writ large, wants to speed up the provision of cyberattack technologies to geographic combatant commands. In April, Defense Secretary Ash Carter unveiled a departmentwide cyber strategy that, among many other things, discusses accelerating plans for "cyberspace effects in support of operational plans and contingency operations," as well as defining "specific cyberspace effects against targets."

Previewing the Navy’s agenda April 7, a senior official said the service is building the capacity to unleash cyberattacks from points across the globe.

“Those kinds of capabilities are leveraged from all parts of the world, predominantly ashore installations, in some cases afloat,” said Kevin Cooley, executive director and command information officer of the Fleet Cyber Command.

In popular culture, cyber capabilities that produce effects on enemies are called “cyberweapons.”

But what effects do cyberweapons actually create? That's a question bugging the military's legal advisers.

The term “cyberweapon” has been interpreted to mean anything from spyware, to malicious code for destroying nuclear power plants. Former Pentagon attorneys say militaries worldwide need clarity on the word so they don’t break international laws.

"Because both procurement and use of a 'weapon' are dependent on its first being subject to legal review, it is crucial that the proper definition for cyberweaponry be chosen," retired Col. Gary Brown, former legal adviser at U.S. Cyber Command, and Lt. Col. Andrew O. Metcalf, former legal adviser to U.S. Marine Corps Forces Cyberspace Command, write in a 2014 Journal of National Security Law and Policy article.

They note "the wrong definition could lead to a failure to comply with international legal standards, if it is too narrow," while an "overly broad definition could encompass espionage tools.”

Often, the only difference between operations to collect intelligence and operations to deliver “cyber effects is the intent – intelligence activities are done with the intent of collecting intelligence, while other military activities are done in support of operational planning or execution,” Brown and Metcalf say.

It's not even clear if Stuxnet, one of the most destructive known viruses, is a cyberweapon. Legal weapons don't self-replicate, Brown and Metcalf say. Allegedly a U.S.-Israeli invention, Stuxnet sabotaged Iranian nuclear centrifuges but also accidentally spread to systems in the United States, according to Symantec. That’s an effect the Pentagon, one would hope, is not looking for.

(Image via stockhits/Shutterstock.com)

http://www.nextgov.com/cybersecurity/2015/05/army-talks-cyber-effects-vendo…


Revenir en haut
Publicité






MessagePosté le: Mer 20 Mai - 01:35 (2015)    Sujet du message: Publicité

PublicitéSupprimer les publicités ?
Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mer 20 Mai - 01:39 (2015)    Sujet du message: CYBERCOM TO OUTSOURCE $475 MILLION WORTH OF OFFENSE AND DEFENSE WORK Répondre en citant

CYBERCOM TO OUTSOURCE $475 MILLION WORTH OF OFFENSE AND DEFENSE WORK


Defense Secretary Ash Carter // Seth Wenig/AP

By Aliya Sternstein May 1, 2015
NEXTGOV

The emerging Pentagon division that coordinates military cybersecurity and cyberattacks is asking private contractors to help finish standing up the Cyber Command. Among the tasks to be assigned under a request for proposals issued Thursday are support for eavesdropping to detect threats and assistance with repelling hacks equivalent to an armed attack against the nation.

The potentially five-year contract is capped at $475 million and covers nearly 20 task areas, according to the new performance work statement.

This is the second federal effort in a week to outsource cyber work, at a time when civilian and military agencies are hurting for experienced and talented computer whizzes. The FBI plans to contract out professional, management and support services for up to $100 million, according to a request for proposals synopsis posted April 21.

The Pentagon's business move is intended to build out the so-called Cyber National Mission Force, according to Thursday’s solicitation. The contract is designed to "to streamline USCYBERCOM’s acquisition of cyber mission support capabilities and services, information technology services, and cyber professional services" across multiple disciplines "under a centralized structure."

Companies chosen for the project will compete for the following task orders:

Knowledge management
Records management
Cyber operations
Planning
Science and technology/research and development
Cyber-focused training
Cyber exercise
International and domestic engagements
Logistics
Integrated technology support
Cybersecurity (previously called "information assurance")
Project analysis
Program Management
All-source intelligence
Business process re-engineering
Security
Strategy and policy and doctrine development
Administrative support

The cyber operations category, a controversial and highly secretive Cyber Command duty, involves synchronizing "offensive cyber operations," or hacks against adversary networks. The "contractor shall assist in providing maneuver, fires and effects through the application of capabilities in and through the cyber domain,” the solicitation states. Professionals tasked to this area also will help defend and run military networks.

The Cyber National Mission Force comprises three types of teams, focused on defending military networks, aiding troops worldwide with offensive maneuvers and deflecting hacks against U.S. organizations.

The Defense Department last week updated a 2011 cybersecurity strategy, in part, to formalize the goals and operations of the three types of teams. The new Pentagon cyber strategy envisions 133 teams, including support teams, in place by 2018.

Cyber Command is not expected to be fully operational until then and currently is roughly half-staffed.

Proposals from companies interested in working on the contract are due May 30.

One portion of the multiyear job will concentrate on creating new tools to defend and fight in cyberspace. The contractor will "test innovative technology" for "cyberspace offensive and defensive capabilities," including, among other things, evaluating sensor systems and investigating "physical science phenomena,” the solicitation states.

Defense Secretary Ash Carter unveiled the new cyber strategy last Thursday before an audience of students and Silicon Valley entrepreneurs at Stanford University. Invention is key to the cybersecurity, an area where attackers constantly outsmart the defenders.

"We're going to be increasing our fundamental research and development," with established companies and startups, Carter said. "So that together, we can create cyber capabilities that not only help DOD, but can also spin off into the wider U.S. marketplace."

Separately, contractors will facilitate training by, among other things, helping develop curricula, certification standards, and tests.

"Our cyber strategy starts with our people -- its first strategic goal is building and training our Cyber Mission Forces,” Carter said last week.

Cyber exercise contractors will help lead three capture the flag events a year with up to 400 players; five cyber guard competitions consisting of up to 300 participants; and 25 smaller table top exercises. In addition, there will be three cyber wargames, each bringing together about 150 individuals.

Project analysts and program management contractors will ensure long-term efforts do not go over budget and do not fall behind schedule.

In addition, there are assignments for industry cyberspies.

These contractors will conduct "targeting, imagery analysis, signals intelligence analysis, joint intelligence preparation of the battle space and crisis planning to standing and deployed cyberspace forces engaged in operations,” the solicitation states.

The goal here is to weed out cyber threat indicators and disseminate warnings and predictions to partners. The contractor will be "maintaining all source databases," as well as "using multiple source intelligence tools to perform all source threat force analysis,” according to the work order.

Hired hands also will help write Defensewide and governmentwide cyber policies -- maybe even the next big cyber strategy. These doctrines will guide the military services, CYBERCOM and civilian agencies. The contractors will sit on "boards, committees and working groups with DOD and interagency partners on matters related to cyberspace strategy, policy and doctrine."

http://www.nextgov.com/cybersecurity/2015/05/cybercom-outsource-475-million…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mer 20 Mai - 02:19 (2015)    Sujet du message: GLOBALIST MARK ZUCKERBERG WANTS TO REGULATE AND CONTROL THE INTERNET. Répondre en citant

GLOBALIST MARK ZUCKERBERG WANTS TO REGULATE AND CONTROL THE INTERNET.



VIDEO : https://www.youtube.com/watch?v=FWRscz_E450&hd=1


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mar 26 Mai - 22:47 (2015)    Sujet du message: JOHN KERRY IMPLIES THAT THE INTERNET BE PLACED UNDER THE AUTHORITY OF THE UNITED NATIONS Répondre en citant

JOHN KERRY IMPLIES THAT THE INTERNET BE PLACED UNDER THE AUTHORITY OF THE UNITED NATIONS

By Lauren Richardson

9:43 AM May 19, 2015

In a speech today in South Korea, Secretary of State John Kerry said that the Internet “needs rules to be able to flourish and work properly.” This, according to Kerry, is necessary even for “a technology founded on freedom.”

Speaking on behalf of the Obama administration, Kerry said that Internet policy is “a key component of our foreign policy.”


Kerry uses the alleged attack on Sony Pictures by North Korea as the backdrop to call for UN control to deal with cyber attacks by malicious nations.

The Weekly Standard reported:

Kerry made his remarks in the context of talking about how international law is applicable to the Internet. “As I’ve mentioned, the basic rules of international law apply in cyberspace. Acts of aggression are not permissible. And countries that are hurt by an attack have a right to respond in ways that are appropriate, proportional, and that minimize harm to innocent parties. We also support a set of additional principles that, if observed, can contribute substantially to conflict prevention and stability in time of peace. We view these as universal concepts that should be appealing to all responsible states, and they are already gaining traction,” said Kerry.

 “First, no country should conduct or knowingly support online activity that intentionally damages or impedes the use of another country’s critical infrastructure. Second, no country should seek either to prevent emergency teams from responding to a cybersecurity incident, or allow its own teams to cause harm. Third, no country should conduct or support cyber-enabled theft of intellectual property, trade secrets, or other confidential business information for commercial gain. Fourth, every country should mitigate malicious cyber activity emanating from its soil, and they should do so in a transparent, accountable and cooperative way. And fifth, every country should do what it can to help states that are victimized by a cyberattack.

 “I guarantee you if those five principles were genuinely and fully adopted and implemented by countries, we would be living in a far safer and far more confident cyberworld.

“To build trust, the UN Group of Governmental Experts has stressed the importance of high-level communication, transparency about national policies, dispute settlement mechanisms, and the timely sharing of information – all of them, very sound and important thoughts. The bottom line is that we who seek stability and peace in cyberspace should be clear about what we expect and intend, and those who may be tempted to cause trouble should be forewarned: they will be held accountable for their actions. The United States reserves the right to use all necessary means, including economic, trade and diplomatic tools, as appropriate in order to defend our nation and our partners, our friends, our allies. The sanctions against North Korean officials earlier this year are one example of the use of such a tool in response to DPRK’s provocative, destabilizing and repressive actions, including the cyber-attack on Sony Pictures. Now, as the international community moves towards consensus about what exactly constitutes unacceptable behavior in cyberspace, more and more responsible nations need to join together to act against disruptors and rogue actors.

Photo courtesy of Google

H/T Now The End Begins

http://truthuncensored.net/john-kerry-implies-that-the-internet-to-be-place…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Jeu 28 Mai - 03:27 (2015)    Sujet du message: LES NOUVELLES TECHNOLOGIES : INDISPENSABLES, LE DIALOGUE ET L'ENGAGEMENT MORAL Répondre en citant

LES NOUVELLES TECHNOLOGIES : INDISPENSABLES, LE DIALOGUE ET L'ENGAGEMENT MORAL

Est-ce le signal du changement qui va prendre place sur les lois du cybercrime?

Le Saint-Siège invite les utilisateurs de nouvelles technologies à « favoriser l’art du dialogue » et à prendre un « engagement » moral afin de créer un environnement sain et humain.

Marina Droujinina

Rome, 27 mai 2015 (ZENIT.org)

« Le potentiel de nouvelles technologies » ne peut pas être « réalisé » sans « dialogue » et sans « engagement» moral et éthique « de personnes et d’institutions », a déclaré Mgr Paul Tighe, secrétaire du Conseil pontifical pour les communications sociales. 

Il a présenté la position du Saint-Siège sur les technologies émergentes au Forum 2015 du Sommet mondial sur la société de l'information (SMSI) qui se déroule du 25 au 29 mai à Genève (Suisse).

Dans son discours, Mgr Tighe a souligné que « nous devons favoriser l'art du dialogue ». « Si nous sommes prêts à écouter les autres, a-t-il dit, nous apprenons à voir notre monde avec des yeux différents et nous allons grandir dans l'appréciation de la richesse de l'expérience humaine ».

Les « technologies émergentes » facilitent  « la communication humaine » et permettent « le partage des mots et des images », « avec des gens qui auraient auparavant été isolés », a noté le secrétaire du Conseil pontifical. Cependant, l’utilisation de ces technologies « ne conduira pas automatiquement à un changement pour le mieux: il faut un engagement déterminé de personnes et d'institutions ».

Il s’agit de l’engagement à promouvoir « la dignité des personnes et des peuples », d’être « inspiré  par la charité » et de se mettre au « service de la vérité, du bien et de la fraternité », a souligné Mgr Tighe.

Malheureusement, aujourd’hui, a-t-il constaté, la situation est différente : « la discrimination et la violence » sont souvent « promus en ligne » :  « Le Saint-Siège … invite tous à éviter le partage de mots et d'images dégradants pour des êtres humains, qui favorisent la haine et l'intolérance, avilit la beauté et l'intimité de la sexualité humaine ou qui exploitent les faibles et les vulnérables ».

Le secrétaire du dicastère pour les communications sociales pense qu’ « il y a une obligation morale ou éthique » de chaque utilisateur des réseaux sociaux à faire en sorte que ces environnements « soient sûrs et humainement enrichissants ».

Mgr Tighe a également souligné qu’il était nécessaire que « les avantages de la société de l'information soient accessibles à tous », « que les pays en développement ne soient pas exclus de ces réseaux numériques » et que l’accès aux nouvelles technologies ne soit pas « refusé à des personnes âgées, aux pauvres ni aux marginaux ».

Zenit
le lien ne fonctionne pas
http://www.zenit.org/fr/articles/les-nouvelles-technologies-indispensables-…





Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Jeu 28 Mai - 05:01 (2015)    Sujet du message: MARQUETTE AND PONTIFICAL SALESIAN UNIVERSITY TO SPONSOR SEMINAR FOR STUDENTS AND JOURNALISTS ON COVERING THE POPE AND CATHOLIC CHURCH Répondre en citant

MARQUETTE AND PONTIFICAL SALESIAN UNIVERSITY TO SPONSOR SEMINAR FOR STUDENTS AND JOURNALISTS ON COVERING THE POPE AND CATHOLIC CHURCH


Contact: Prof. William Thorn, 414-288-3447, william.thorn@marquette.edu  

MILWAUKEE, Wis., May 26, 2015 /Christian Newswire/ -- With Pope Francis coming to the United States this summer, a new two-week seminar to help prepare journalists cover the pope and the Catholic Church has been announced by Marquette University's Journalism Department in Milwaukee, Wis. The program will be run in coordination with the Pontifical Salesian University's School of Communication.

The program will run July 6-20, 2015.

Pope Francis has declared a Holy Year of Mercy for 2015-2016, and he will make his first visit to the United States in September 2015 with stops in New York, Washington, D.C. and Philadelphia. In Washington he will make an unprecedented address to Congress. He will also speak to the U.N. in New York, and will attend the World Meeting of Families in Philadel­phia.

This conference is designed to prepare working journalists for the pope's visit with material on American Catholics and on the Vatican. 

The two week program will have its first week at Marquette Universi­ty and will cover "The Catholic Church in America."

The second week will be held at the Pontifical Salesian Univer­sity in Rome, and will be entitled "The New Vatican Reality."

The seminar is designed to provide work­ing journalists and others with a substantive background on the characteristics, opera­tional structure of the Catholic Church in the era of Pope Francis along with the leader­ship dimensions of Pope Francis and the un­derlying dynamics of the Catholic Church.

The Marquette session will focus on the Catholic Church in America including the September 2015 visit of Pope Francis.

The Rome session at the Salesian Uni­versity will focus on the Vatican including the recent reforms along with site visits to the Vati­can's media operations, including its Press Office, Libreria Editrice Vaticana, l'Osservatore Romano, and Vatican Radio. Site visits will include a papal audience and tours of Vatican library, Secret Archives, the Sistine Chapel and the Sunday Angelus.

Participants will qualify for 2 semester credits.

Applicants accepted into the seminar must pay their own travel expenses to Milwaukee and a special group rate for the flight to Rome.

The cost is $2.640.00 includes room, breakfast, and lunches, in Milwaukee and Rome, din­ners in Rome and books.

CONTACT: william.thorn@marquette.edu

Online application:

For Professionals:
studyabroad.marquette.edu/?go=ProfessionalReporting

For Students:
studyabroad.marquette.edu/?go=CatholicChurch

http://www.christiannewswire.com/news/326676116.html

http://studyabroad.marquette.edu/?go=CatholicChurch


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mer 3 Juin - 06:20 (2015)    Sujet du message: SENATE PASSES DOMESTIC SURVEILLANCE REFORM BILL Répondre en citant

SENATE PASSES DOMESTIC SURVEILLANCE REFORM BILL

Don't be deceive by these traitors and liars.



VIDEO : https://www.youtube.com/watch?v=aPemRnuyu28


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Jeu 4 Juin - 04:21 (2015)    Sujet du message: PATRIOT ACT EXPIRES, IS REPLACES BY NSA 'SPY BILL' Répondre en citant

PATRIOT ACT EXPIRES, IS REPLACES BY NSA 'SPY BILL'



VIDEO : https://www.youtube.com/watch?v=B-x6J0Xw0xg


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Sam 6 Juin - 22:04 (2015)    Sujet du message: PROJECTED DEPOPULATION WEBSITE, Deagel.com, BANS VIEWERS! Répondre en citant

PROJECTED DEPOPULATION WEBSITE, Deagel.com, BANS VIEWERS!



VIDEO : https://www.youtube.com/watch?v=w3GkYdZpc30

Ajoutée le 6 juin 2015

First they said, we were hacked leading us to believe the info wasn't true which I debunked and they never changed the info on the site if they were really hacked and now they have done this...

I will attempt to make entry and see what is really going on here. See if any of you can make entry to site and see if there are any changes to site.

http://www.deagel.com/country/forecas...
http://www.deagel.com/country/United-...


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Dim 7 Juin - 02:34 (2015)    Sujet du message: FCC-15-24A5 Répondre en citant

FCC-15-24A5

Related Documents DISSENTING STATEMENT OF COMMISSIONER AJIT PAI


Re:

Protecting and Promoting the Open Internet, GN Docket No. 14-28.

Americans love the free and open Internet. We relish our freedom to speak, to post, to rally, to
learn, to listen, to watch, and to connect online. The Internet has become a powerful force for freedom,
both at home and abroad. So it is sad to witness the FCC’s unprecedented attempt to replace that freedom
with government control.

It shouldn’t be this way. For twenty years, there’s been a bipartisan consensus in favor of a free
and open Internet. A Republican Congress and a Democratic President enshrined in the
Telecommunications Act of 1996 the principle that the Internet should be a “vibrant and competitive free
market . . . unfettered by Federal or State regulation.”1 And dating back to the Clinton Administration,
every FCC Chairman—Republican and Democrat—has let the Internet grow free from utility-style
regulation. The result? The Internet has been an amazing success story, changing our lives and the world
in ways that would have been unimaginable when the 1996 Act was passed.

But today, the FCC abandons those policies. It reclassifies broadband Internet access service as a
Title II telecommunications service. It seizes unilateral authority to regulate Internet conduct, to direct
where Internet service providers put their investments, and to determine what service plans will be
available to the American public. This is not only a radical departure from the bipartisan, market-oriented
policies that have served us so well for the last two decades. It is also an about-face from the proposals
the FCC made just last May.

So why is the FCC changing course? Why is the FCC turning its back on Internet freedom? Is it
because we now have evidence that the Internet is not open? No. Is it because we have discovered some
problem with our prior interpretation of the law? No. We are flip-flopping for one reason and one reason
alone. President Obama told us to do so.

On November 10, President Obama asked the FCC to implement his plan for regulating the
Internet, one that favors government regulation over marketplace competition.2 As has been widely
reported in the press, the FCC has been scrambling ever since to figure out a way to do just that.

The courts will ultimately decide this Order’s fate. And I doubt they will countenance this
unlawful power grab. Litigants are already lawyering up to seek judicial review of these new rules.
Given the Order’s many glaring legal flaws, they will have plenty of fodder.

But if this Order manages to survive judicial review, these will be the consequences: higher
broadband prices, slower speeds, less broadband deployment, less innovation, and fewer options for
American consumers. To paraphrase Ronald Reagan, President Obama’s plan to regulate the Internet
isn’t the solution to a problem. His plan is the problem.

In short, because this Order imposes intrusive government regulations that won’t work to solve a
problem that doesn’t exist using legal authority the FCC doesn’t have, I dissent.

Read more : https://www.fcc.gov/article/fcc-15-24a5


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Dim 7 Juin - 02:37 (2015)    Sujet du message: FEDERAL COMMUNICATIONS COMMISSION FCC 15 Répondre en citant

FEDERAL COMMUNICATIONS COMMISSION FCC 15

Protecting and Promoting the Open Internet

Pdf document : https://apps.fcc.gov/edocs_public/attachmatch/FCC-15-24A1.pdf


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Ven 12 Juin - 05:50 (2015)    Sujet du message: NET NEUTRALITY RULES WILL TAKE EFFECT ON FRIDAY Répondre en citant

NET NEUTRALITY RULES WILL TAKE EFFECT ON FRIDAY



VIDEO : https://www.youtube.com/watch?v=qjEdt4TTtjw


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mer 17 Juin - 02:45 (2015)    Sujet du message: DIR.: SCOPE OF OPM DATA BREACH 'NOT DETERMINED' Répondre en citant

DIR.: SCOPE OF OPM DATA BREACH 'NOT DETERMINED'



VIDEO : https://www.youtube.com/watch?v=JTr23Hjfu18

The director of the Office of Personnel Management told House Committee on Oversight on Tuesday that the impact and scope of a massive data breach at the federal agency has not been determined. (June 16)


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Ven 10 Juil - 07:56 (2015)    Sujet du message: UPLOADING PROBLEMS; INTERNET SLOW FOR MANY; GUARANTEE IT'S NOT HAPPENING TO THE "ELITE" Répondre en citant

CYBERWAR

UPLOADING PROBLEMS; INTERNET SLOW FOR MANY; GUARANTEE IT'S NOT HAPPENING TO THE "ELITE"



VIDEO : https://www.youtube.com/watch?v=KtYS0A5OkCw


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Ven 10 Juil - 08:02 (2015)    Sujet du message: HACKED! OVER 21 MILLION RECORDS AFFECTED BY HACKING, INCLUDING SS NUMBERS Répondre en citant

CYBERWAR

HACKED! OVER 21 MILLION RECORDS AFFECTED BY HACKING, INCLUDING SS NUMBERS



VIDEO : https://www.youtube.com/watch?v=wMb9qtZ9dAQ

MILLIONS MORE AMERICANS HIT BY GOVERNMENT PERSONNEL DATA HACK


Illustration file picture shows a man typing on a computer keyboard in Warsaw


Reuters

By Patricia Zengerle and Megan CassellaJuly 9, 2015
By Patricia Zengerle and Megan Cassella
WASHINGTON (Reuters) - Data breaches at

the U.S. government's personnel management agency by hackers, with suspicions centering on China, involves millions more people than previously estimated, U.S. officials said on Thursday.

The Office of Personnel Management (OPM) said data stolen from its computer networks included Social Security numbers and other sensitive information on 21.5 million people who have undergone background checks for security clearances.

That is in addition to data on about 4.2 million current and former federal workers that was stolen in what the OPM called a "separate but related" hacking incident. Because many people were affected by both hacks, a total of 22.1 million people were affected, or almost 7 percent of the U.S. population.

The breach had already been considered one of the most damaging on record because of its scale and, more importantly, the sensitivity of the material taken.

Those exposed included 19.7 million who applied for the clearances - current, former, and prospective federal employees and contractors - plus 1.8 million non-applicants, mostly spouses or co-habitants of applicants, the agency said.

Lawmakers from both parties demanded OPM Director Katherine Archuleta's removal. House of Representatives Speaker John Boehner, a Republican, said President Barack Obama "must take a strong stand against incompetence in his administration and instill new leadership at OPM."

"The technological and security failures at the Office of Personnel Management predate this director’s term, but Director Archuleta's slow and uneven response has not inspired confidence that she is the right person to manage OPM through this crisis," added Virginia Democratic Senator Mark Warner.

Archuleta said neither she nor OPM chief information officer Donna Seymour would be resigning. "I am committed to the work that I am doing at OPM," Archuleta told reporters during a conference call. "I have trust in the staff that is there."

The White House said Obama retains confidence in Archuleta.

CHINESE ROLE

The United States has identified China as the leading suspect in the massive hacking of the U.S. government agency, an assertion China's Foreign Ministry dismissed as "absurd logic."

Asked during a conference call with reporters on Thursday whether China was responsible, a White House National Security Council official, Michael Daniel, said "we're not really prepared to comment at this time on the attribution behind this event."

Daniel, special assistant to the president and cybersecurity coordinator at the National Security Council, said that "at this point the investigation into the attribution of this event is still ongoing and we are exploring all of the different options that we have."

OPM said the stolen personal identification data included: Social Security numbers; residency and educational history; employment history; information about immediate family and other personal and business acquaintances; and health, criminal and financial history. Also stolen were about 1.1 million fingerprints, the agency said.

Since they were revealed last month, the hacking incidents have alarmed the millions of Americans affected. OPM said in a statement that its investigation had found no information "at this time" to suggest any misuse or further dissemination of the information stolen from its systems.

https://www.yahoo.com/tech/s/u-personnel-office-over-25-million-records-aff…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Ven 10 Juil - 08:16 (2015)    Sujet du message: JADE HELM -- US ARMY LINKED TO THE HACKING TEAM DATA BREACH Répondre en citant

CYBERWAR

JADE HELM -- US ARMY LINKED TO THE HACKING TEAM DATA BREACH



VIDEO : https://www.youtube.com/watch?v=8ZF-f2bwYgs


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mar 14 Juil - 01:39 (2015)    Sujet du message: COUNTER JADE HELM FACEBOOK PAGES GOT WIPED OUT, JUST BEFORE IT BEGINS! Répondre en citant

COUNTER JADE HELM FACEBOOK PAGES GOT WIPED OUT, JUST BEFORE IT BEGINS!



VIDEO : https://www.youtube.com/watch?v=qjRyKNJYGb0


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mar 21 Juil - 11:51 (2015)    Sujet du message: OPM CHANGES PRIVACY RULES TO LET INVESTIGATORS INSIDE ALL DATABASES Répondre en citant

ALL CONNECT TO THE ARTIFICIAL INTELLIGENCE - CERN - MASTER THE HUMAN DOMAIN

OPM CHANGES PRIVACY RULES TO LET INVESTIGATORS INSIDE ALL DATABASES



WASHINGTON, DC - JUNE 6: Sign at the Office of Personnel Management (OPM) in Washington, DC on June 6, 2015. OPM manages the civil service of the federal government. // Mark Van Scyoc / Shutterstock.com

By Aliya Sternstein July 20, 2015

The Office of Personnel Management has rewritten privacy regulations to let investigators probe all of its databases for breaches.

The move to open systems housing medical files, defense mobilization emergency personnel information, and about 40 other types of records, comes after the discovery of significant entryways for hackers in at least three databanks.

The updated so-called "routine use" allows personal information to be shared with outsiders when OPM "suspects or has confirmed" that security has been compromised and disclosure "is reasonably necessary" for responding, according to a notice published Thursday. The new access rights apply to all OPM databases. 

Agency spokesman Sam Schumach told Nextgov, "This new routine use was added as part of OPM’s continuing comprehensive review," which was announced July 9. That was the day U.S. officials divulged that two cyber assaults excised sensitive details on 21.5 million federal employees, national security personnel and their families. The review was launched to find and immediately fix any other security vulnerabilities in OPM systems.

"As items are identified we are addressing them," Schumach said. 

So far, the agency has only revealed one significant weakness, located in an online portal for submitting background check forms on people potentially privy to classified intelligence. The system, called e-QIP, was taken offline last month and remains out of service. 

Under the new rule, external agencies, firms, or any "appropriate persons and entities” can probe data repositories in response to a breach, the notice states. 

OPM says the agency's previous privacy regulations did not slow its initial probe into the attacks, which began in April.  The lack of a breach-response clause "did not impede the investigation," Schumach said.

The provision makes it possible for ID theft protection and notification firms like CSID, the company retained by OPM, to see certain agency-held personal data, such as names and email addresses, said Odia Kagan, a privacy and information security attorney at Ballard Spahr LLP. 

"OPM has been under close scrutiny in the aftermath of the breach, including with respect to the time it took to notify individuals," she said. OPM still has not begun alerting over 15 million victims. 

The intrusion was discovered in April and notifications to 4.2 million affected people began June 8. Kagan questioned whether the absence of a specific breach clause hampered the probe. Without a usage policy, an agency would need to rely on other exceptions, interpretations of existing routine uses or consent “and this would indeed slow down both the investigation process and the post-breach notification process," Kagan said.

The public has until Aug. 17 to comment on the confidentiality changes announced by OPM last week. No comments had been filed as of Sunday. 

The agency’s regulation is reminiscent of contentious information sharing legislation that would make it easier for companies to exchange threat data with the government in the event of a breach. That could include customers' personal information. The goal of the proposals is to assist victimized firms and more quickly forewarn other organizations of possible attacks. 

The Senate’s version of the bill, the Cybersecurity Information Sharing Act, or CISA, reportedly could come up for a vote in August. The House passed companion legislation in April. 

Civil liberties activists say the measures are riddled with loopholes that could expose citizens to improper surveillance. 

"CISA only requires removal of information that is not directly related to a cyberthreat, meaning that victims’ personal information -- which is generally related to the threat -- will often go unprotected," Center for Democracy and Technology fellow Jake Laperruque said in June. 

The Obama administration threatened to veto an earlier incarnation of the bill, the Cyber Intelligence Sharing and Protection Act, better known as CISPA, which lacked certain safeguards to protect personal data during the information-sharing process.

It is unclear if all federal agencies will be adding a breach-response proviso to their database privacy rules. Nextgov has requested comment from the White House.

The OPM systems covered by the privacy change include:
  • Civil Service Retirement and Insurance Records
  • Inspector General Investigations Case File
  • Privacy Act/Freedom of Information Act Case Records
  • Personnel Investigations Records
  • Presidential Management Fellows Program Records
  • Executive Personnel Records
  • Debarment or Suspension Records for Federal Employee Health Benefits
  • Health Claims Data Warehouse
  • Federal Employees Health Benefits Program Claims Data Warehouse
  • Federal Competency Assessment Tool
  • General Personnel Records
  • Employee Performance File System Records
  • Records of Adverse Actions, Performance Based Reductions In Grade and Removal Actions, and Terminations of Probationers
  • Applicant Race, Sex, National Origin, and Disability Status Records
  • Employee Medical File Systems Records 
  • Defense Mobilization Emergency Cadre Records
  • Employee Counseling Services Program Records
  • Telephone Call Detail Records
  • Photo Identification and Visitor Access Control Records
  • OPM Child Care Tuition Assistance Records
  • Investigation Training Records
(Image via Mark Van Scyoc/Shutterstock.com)

http://www.nextgov.com/cybersecurity/2015/07/opm-changes-privacy-rules-let-…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mar 21 Juil - 12:01 (2015)    Sujet du message: MASTER THE HUMAN DOMAIN : THE DOMESTIC PLAN BEHIND JADE HELM Répondre en citant

MASTER THE HUMAN DOMAIN : THE DOMESTIC PLAN BEHIND JADE HELM

 
Pentagon goal of information domination hidden in plain sight

by Infowars.com | May 10, 2015

A closer look at the upcoming Jade Helm military exercise, specifically its “master the human domain” motto, reveals a larger agenda in regards to domestic policy.




VIDEO : https://www.youtube.com/watch?v=lUe92AB9h2Y

In current military terminology, the “human domain” or “human domain analytics” refers to the “global understanding of anything associated with people.”

Breaking down into four specific categories, mastery of the human domain results from obtaining total information awareness on a mass scale.

Who You Are – Collected information includes names, addresses, biometrics, social media accounts .

What You Do – Travel history, communications, financial transactions and movement of physical assets.

Who You Know – Relational information including family, friends, associates and organizations.

Context – Contextual data such as demographics, politics, cultural norms and religion.



“The importance of understanding the Human Domain has increased significantly over the past decade and a half,” writes the US Geospatial Intelligence Foundation. “There has been a shift from concentration on Nation-States, to smaller organizations, to individuals.”

The USGIF also refers to Human Domain Analytics as “arrows in a quiver,” hence the prominent arrows on the Jade Helm logo.

“ABI and Human Domain Analytics are not the answer to every intelligence problem; they are merely new arrows in a quiver of capabilities.”

With modern technological advancements allowing anyone “with a video camera and a laptop computer” to have “worldwide impact,” the federal government has not only hyper-incentivized the collection of data, but the merging of all relevant agencies.

“They’re building an infrastructure of tyranny,” stated Infowars David Knight. “There’s a legal infrastructure with things like the NDAA, there’s a technical infrastructure with things like the capability to do dragnet surveillance, and then of course there is going to be a military and law enforcement infrastructure, and those are merging.”

In fact, James Clapper, the current director of national intelligence, has been a frequent keynote speaker at GEOINT conferences. Before famously lying to Congress on the existence of domestic NSA surveillance, Clapper was even the director of national geospatial intelligence agency.

“Activity Based Surveillance, built on a strong foundation of Human Dimension analysis, will form the intellectual underpinning of how we perform intelligence in the future,” Clapper said in 2009.

As noted on the Alex Jones Show Friday, a 2010 conference on mastering the human domain featuring high level military and intelligence officials openly discussed gathering publicly available data to create detailed maps with layered information.

“We start out with a layered group level analysis… We focus it on groups, ethnicities, religious groups and we start to map out and color code the different locations.” said Lt. Col. Al Di Leonardo. “We start to characterize the location in a color coding simple way… and then we start layering that on top of the tribal aspects and we start to see very distinct patterns…”

Stacking Leonardo’s statement up against the Jade Helm map reveals the event to be much more than a basic training drill.



“If you understand the technologies, you will see that Jade Helm is more an intelligence operation using Geospatial Intelligence mapping than a simple military exercise,” adds David Knight.

Leonardo’s speech goes on to note that the military would next focus in on “key leaders” and other members of the community, a move already being carried out by Jade Helm operatives in Texas and other participating states.

“From the very beginning this has been the NSA, the U.S. Geological Service, law enforcement, military, working to put together all this information…” David Knight said.

As information from low level surveillance technologies such as Stingrays and predictive policing programs gets siphoned up to NSA data centers, a detailed global map will continue to grow with near-endless stats on all individuals.

The military leadership’s deception regarding the exercise was on display this week when Americans confronted Col. John Petkosek on C-SPAN and demanded answers on Jade Helm. Despite the topic making international news, Petkosek alleged that he was completely unaware of the massive multi-state drill.



VIDEO : https://www.youtube.com/watch?v=VKmbLt8hV48

As Infowars has argued for weeks, Jade Helm will not result in martial law, but will move Americans one step closer to the larger agenda of total domination by the surveillance state and military industrial complex.

http://www.infowars.com/master-the-human-domain-the-domestic-plan-behind-ja…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Ven 31 Juil - 11:25 (2015)    Sujet du message: BILL TO LET DHS MONITOR INTERNET TRAFFIC ON GOVERNMENT SYSTEMS ADVANCES Répondre en citant

BILL TO LET DHS MONITOR INTERNET TRAFFIC ON GOVERNMENT SYSTEMS ADVANCES



A view of the National Cybersecurity and Communications Integration Center before remarks by President Barack Obama, on Tuesday, Jan. 13, 2015, in Arlington, Va. Obama renewed his call for Congress to pass cybersecurity legislation, including a proposal t


By Aliya Sternstein July 30, 2015
NEXTGOV

related stories
Senate Committee Poised to Upgrade Agency Anti-Hacking Laws, Again
Senators Want to Give DHS New CYBERCOM-Like Powers to Thwart Civilian Agency Hacks
There’s A Plan to Immediately Purge Some Governmentwide Network Surveillance Data
House Panel Dents Budget for Cyber Tool That Scoped out OPM Breaches

A Senate panel on Wednesday voted to set into law the Department of the Homeland Security's responsibility to monitor public Internet traffic on all government systems. The bill is designed to minimize the harm from breaches like those that hit the Office of Personnel Management. 

The federal government was admittedly slow to scan OPM networks for signs of threats that ultimately manifested in the loss of confidential records on 21.5 million federal employees, national security personnel and their families. Even after the attack, only 45 percent of agencies are using DHS’s network-surveillance technology, according to lawmakers. 

Under the new Federal Cybersecurity Enhancement Act of 2015, DHS would be allowed to override an agency's objections to using the tool, called EINSTEIN.

Within a year, DHS would have to deploy the technology "to detect cybersecurity risks in network traffic transiting or traveling to or from an agency information system," and to block that problematic Internet traffic, according to the bill. 

During a meeting on Wednesday, the Homeland Security and Governmental Affairs Committee made a few changes to the legislation, including adding privacy protections. Then, without objection, members passed the proposal by a roll call vote. The bill was introduced on Monday by committee Chairman Sen. Ron Johnson, R-Wisc., and ranking Democrat Sen. Tom Carper, D-Del.

There now are more civil liberties clauses in the bill.  Within six months after being signed into law, DHS would have to report to Congress on "privacy controls" for the intrusion prevention technology, according to the legislation. And the department must "periodically update" a privacy impact assessment of the surveillance technology, the legislation states.

One amendment would bake several privacy and transparency measures into EINSTEIN.

Another adjustment would require DHS to report any personal information caught by the monitoring system that has nothing to do with a threat. The department has said it plans to immediately purge any EINSTEIN records netted that do not trigger alarms. The tool sweeps up bulk traffic containing, among other things, emails and Web-surfing habits, including online banking sessions. 

Some departments have questioned how EINSTEIN surveillance complies with legal restrictions against disclosing agency data. And privacy activists have been wary about widespread activation of the tool.

Is EINSTEIN Smart Enough?

The technology is informed by technical "indicators" of attacks that are discovered by the National Security Agency, as well as other government and industry organizations that study threats.

The legislation would require the government to tell Congress how successful EINSTEIN has been by reporting the number of times the tool thwarted threats and the types of indicators that were used to detect the dangers. Critics questioned the usefulness of the intelligence that has been fueling the system.

The new bill would make EINSTEIN try tactics other than indicator-detection as well as incorporate cutting-edge commercial technologies to improve success.  

One provision unrelated to EINSTEIN would involve identifying all unclassified data on networks, that, when combined with other unclassified information, could produce a piece of classified intelligence. Another item would require a report to Congress on the damage to national security caused by the OPM data breaches. 

Certain agency computer users would be obligated to sign in with a stronger form of identification. So-called multi-factor authentication -- which requires a password and something else like a smart card or text-message code -- is becoming standard for banking transactions and other online activities. Various toothless White House polices requiring smart card verification that date back to 2004 have not compelled agencies to upgrade system logins.

To the extent possible, criteria that measure an agency's security posture, such as "intrusion and incident detection and response times," would be published on a federal performance website.  It took OPM until April to discover a breach that began around June 2014.

Agencies within a year would have to encrypt all mission-critical and sensitive data so that attackers cannot read any intercepted information.

In addition, the bill would make permanent a program begun in recent years called Continuous Diagnostics and Mitigation that provides agencies with sensors to improve visibility into their own networks.

The amended bill subsumes a similar Senate proposal introduced last week that would further empower Homeland Security. 

According to a Senate aide, the whole package could be attached to a controversial House-passed cybersecurity bill that would exchange threat indicators -- including, sometimes, personal data -- between government and industry.

The committee’s provisions would expire in seven years.

"Had the powers of this bill been implemented already, they likely would have stopped the hack of the Office of Personnel Management," Johnson said in a statement upon introducing the bill. "They will make it far more difficult for our adversaries to steal our private data and to penetrate government networks."

http://www.nextgov.com/cybersecurity/2015/07/bill-let-dhs-monitor-internet-…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Ven 31 Juil - 11:36 (2015)    Sujet du message: MICROSOFT PROPOSE UNE MIGRATION GRATUITE VERS WINDOWS 10... EN ECHANGE DE VOTRE VIE PRIVEE Répondre en citant

MICROSOFT PROPOSE UNE MIGRATION GRATUITE VERS WINDOWS 10... EN ECHANGE DE VOTRE VIE PRIVEE

jeudi 30 juillet 2015

Saviez-vous qu’en utilisant Windows 10, un identifiant publicitaire unique vous est attribué, exploitable par les développeurs et les annonceurs ? Ou que par défaut, Microsoft envoie tous vos mots de passe vers ses serveurs lorsque vous associez l’ordinateur à un compte Microsoft ? Ce sont quelques unes des informations figurant dans la nouvelle Déclaration de Confidentialité de Microsoft, dont nous citons les principaux extraits.



Microsoft a écrit ce jeudi à ses clients français pour leur annoncer qu’il avait mis à jour son Contrat de Services et sa Déclaration de Confidentialité, non seulement pour rendre les informations plus accessibles en un seul endroit, de façon visible et plus précise, mais également pour ajouter « plusieurs informations supplémentaires en matière de confidentialité relatives aux nouvelles fonctionnalités que nous proposerons bientôt, telles que celles disponibles sous Windows 10« . Elles prendront effet au 1er août 2015.


Nous avons donc lu l’intégralité de la nouvelle Déclaration de Confidentialité (qu’il nous a été impossible de comparer à l’ancienne, faute de réussir à mettre la main dessus), pour en ressortir les passages qui nous semblent les plus importants à connaître. Il faut reconnaître à Microsoft un effort que nous n’avions jamais vu jusqu’ici, conforme à la législation européenne, de précision sur les données collectées et l’utilisation qui en est faite. C’est encore parfois perfectible, mais beaucoup mieux que le flou que l’on trouve dans les conditions de Google, par exemple.

Il n’y a aucune prétention à l’exhaustivité dans notre sélection forcément subjective des passages clés, mais elle nous semble instructive. Elle concerne aussi bien les services de Microsoft dans leur quasi intégralité, que le système Windows 10 qui débarque le 29 juillet prochain.

Plutôt qu’un long commentaire, le mieux est de copier-coller les extraits qui parlent d’eux-mêmes.


L’ESSENTIEL A SAVOIR
  • Par défaut, « lorsque vous vous connectez à Windows grâce à un compte Microsoft,Windows synchronise certains de vos paramètres et de vos données avec les serveurs Microsoft« , dont « l’historique de votre navigateur, vos favoris et les sites web que vous avez ouverts » ainsi que « les noms et mots de passe pour la sauvegarde de vos applis, sites web, borne portables et réseau Wi-Fi« . Pour désactiver ce transfert vers les serveurs de Microsoft, il faut penser à se rendre dans la section « Comptes de Paramètres / Paramètres de synchronisation ».
  • « Windows génère un identifiant publicitaire unique pour chaque utilisateur d’un appareil. Votre identifiant publicitaire peut être utilisé par les développeurs d’applications et les réseaux publicitaires pour proposer des publicités plus pertinentes » ;
  • « Lorsque le dispositif de cryptage est activé, Windows chiffre automatiquement le disque dur sur lequel Windows est installé et génère une clé de récupération. La clé de récupération de BitLocker pour votre appareil est automatiquement sauvegardée en ligne dans votre compte Microsoft OneDrive » (en clair, si vous utilisez l’outil de chiffrement fourni par Microsoft, Microsoft conserve la clé chez lui, et pourra donc la mettre à disposition de toute autorité publique qui demande par voie légale à y avoir accès) ;
  • « Microsoft recueille régulièrement des informations basiques à propos de votre appareil Windows. (…) Ces données sont transmises à Microsoft et stockées à l’aide d’un ou plusieurs identifiants uniques« . Il s’agit notamment « données d’utilisation des applis pour les applis qui fonctionnent sur Windows », ou des « données sur les réseaux auxquels vous vous connectez, comme les réseaux mobiles, Bluetooth, les identifiants (BSSID et SSID), les critères de connexion et la vitesse des réseaux Wi-Fi auxquels vous êtes connecté« . Microsoft précise que « certaines données diagnostiques sont essentielles au fonctionnement de Windows et ne peuvent pas être désactivéessi vous utilisez Windows » ;
  • Dans le nouveau navigateur Microsoft Edge, lorsque AutoSearch et Search Suggestions sont activés, le navigateur envoie à Bing « les informations que vous entrez dans la barre d’adresse du navigateur« , « même si vous avez sélectionné un autre fournisseur de recherche par défaut« . Microsoft ajoute que « les données de navigation recueillies en relation avec ces fonctionnalités sontutilisées dans les données globales« , c’est-à-dire qu’elles participent à établir le profil publicitaire de l’utilisateur
 
DIVERS SUR CORTANA, WINDOWS 10, MICROSOFT EDGE, OUTLOOK…
  • « Pour permettre à Cortana de fournir des expériences personnalisées et des suggestions pertinentes, Microsoft recueille et utilise différents types de données, comme la localisation de votre appareil, les données de votre calendrier, les applis que vous utilisez, les données de vos emails et de vos messages textes, les personnes que vous appelez, vos contacts et la fréquence de vos interactions avec eux sur votre appareil. Cortana en apprend également à votre sujet en recueillant des données sur votre manière d’utiliser votre appareil et d’autres services Microsoft, comme votre musique, vos réglages d’alarme, si l’écran verrouillé est activé, ce que vous regardez et achetez, votre historique de navigation et de recherche Bing, et bien plus.« 
  • « Lorsque vous utilisez OneDrive, nous recueillons des données sur votre utilisation du service, ainsi que sur le contenu que vous stockez » (c’est ici très flou sur ce qu’il fait des « informations sur le contenu) ;
  • « Pour fournir une reconnaissance vocale personnalisée, nous enregistrons l’entrée de votre voix, ainsi que vos nom et surnom, les événements récents de votre calendrier et les noms des personnes avec qui vous avez rendez-vous, et des informations sur vos contacts, notamment leurs noms et surnoms » ;
  • « Microsoft n’utilise pas ce que vous dites dans les emails, les discussions, les appels vidéo ou la messagerie vocale, ni vos documents, photos ou autres fichiers personnels pour vous envoyer des annonces ciblées« , mais il utilise tout de même « d’autres informations que nous recueillons à votre sujet au fil du temps en utilisant vos données démographiques, vos requêtes de recherche, vos centres d’intérêt et vos favoris, vos données d’utilisation, et vos données de localisation » ;
  • « Nous accéderons à, divulguerons et préserverons les données personnelles, notamment votre contenu (comme le contenu de vos emails, d’autres communications privées ou des fichiers de dossiers privés), lorsque nous pensons de bonne foi qu’il est nécessaire de le faire« , notamment pour « répondre à des requêtes légales valides »;
  • « Les données personnelles recueillies par Microsoft peuvent être stockées et traitées aux États-Unis ou dans tout autre pays dans lequel Microsoft, ses filiales ou prestataires de services sont implantés » ;
  • « Dans Outlook.com, lorsque votre dossier Éléments supprimés est vidé, ces éléments effacés restent dans notre système pendant 30 jours maximum avant suppression définitive » ;
http://www.chaos-controle.com/archives/2015/07/30/32425742.html


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Ven 31 Juil - 11:52 (2015)    Sujet du message: CYBER WAR LIVE - WATCH CYBER WARFARE LIVE IN REAL TIME Répondre en citant

CYBER WAR LIVE - WATCH CYBER WARFARE LIVE IN REAL TIME



VIDEO : https://www.youtube.com/watch?v=JH6RVjtU2Gw


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mer 5 Aoû - 12:53 (2015)    Sujet du message: WINDOWS 10 EXPOSED! EYE OF SAURON COMPLETELY REVEALED! IMPORTANT INFO! Répondre en citant

WINDOWS 10 EXPOSED! EYE OF SAURON COMPLETELY REVEALED! IMPORTANT INFO!



VIDEO : https://www.youtube.com/watch?v=coyCYHJw3bU

THE SURVEILLANCE STATE GOES MAINSTREAM : WINDOWS 10 IS WATCHING (& LOGGING) EVERYTHING


Submitted by Tyler Durden on 08/02/2015 15:55 -0400

If Edward Snowden's patriotic exposure of all things 'super secret surveillance state' in America were not enough, Newsweek reports that, as 10s of millions of hungry PC users download the free upgrade, Windows 10 is watching - and logging and sharing - everything users do... and we mean everything.
  
Thomas Fuchs @thomasfuchs


Windows 10 should be renamed to Spyware OS
https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/ …

12:22 PM - 31 Jul 2015

From the moment an account is created, Microsoft begins watching. The company saves customers' basic information - name, contact details, passwords, demographic data and credit card specifics - but it also digs a bit deeper... and finding answers is not easy, as one privacy expert exclaimed, "there is no world in which 45 pages of policy documents and opt-out settings split across 13 different Settings screens and an external website constitutes 'real transparency'."

As NewsWeek reports,

More than 14 million devices are already running Microsoft’s Windows 10 after its global launch on Wednesday, but it’s unclear how many of their users read the company’s Privacy Policy and Service Agreement before downloading. Tucked away in the 45 pages’ worth of terms and conditions (effective August 1) is a substantial power grab: The company is collecting data on much of what you do while using its new software.
 
From the moment an account is created, Microsoft begins watching. The company saves customers’ basic information - name, contact details, passwords, demographic data and credit card specifics - but it also digs a bit deeper.

 Other information Microsoft saves includes Bing search queries and conversations with the new digital personal assistant Cortana; contents of private communications such as email; websites and apps visited (including features accessed and length of time used); and contents of private folders. Furthermore, “your typed and handwritten words are collected,” the Privacy Statement says, which many online observers liken to a keylogger. Microsoft says they collect the information “to provide you a personalized user dictionary, help you type and write on your device with better character recognition, and provide you with text suggestions as you type or write.”

 All this information doesn’t necessarily remain with just Microsoft. The company says it uses the data collected for three purposes: to provide and improve its services; to send customers personalized promotions; and to display targeted advertising, which sometimes requires the information be shared with third parties.

Though possibly surprising to some, the company’s data collection practices fit within the industry’s new normal.

 ...

 Also like its competitors, Microsoft says it will disclose content of private communications or files in saved documents to “respond to valid legal process.” In the company’s latest bi-annual transparency report released in late March, it disclosed that of the 31,002 government requests for information received between June and December 2014, it disclosed content of personal communications in 3.36 percent of cases and non-content data in 73.17 percent.

...
 
Microsoft didn’t respond to requests for comment about specifics of the privacy terms, but in a blog post introducing them, Microsoft’s deputy general counsel, Horacio Gutierrez, calls the Privacy Statement a “straightforward resource for understanding Microsoft’s commitments for protecting individual privacy.” Alex Meer of the gaming website Rock Paper Shotgun countered, “There is no world in which 45 pages of policy documents and opt-out settings split across 13 different Settings screens and an external website constitutes ‘real transparency’.”

 Read more here...

http://www.zerohedge.com/news/2015-08-02/surveillance-state-goes-mainstream…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mer 5 Aoû - 13:04 (2015)    Sujet du message: 4 CHARTS THAT EXPLAIN THE STATE OF AGENCY CYBERSECURITY AFTER THE OPM HACK Répondre en citant

4 CHARTS THAT EXPLAIN THE STATE OF AGENCY CYBERSECURITY AFTER THE OPM HACK


jijomathaidesigners/Shutterstock.com

Following the massive breach of federal employee files precipitated by a series of cyberintrusions at the Office of Personnel Management, the Obama administration ordered agencies to immediately tighten network defenses during a 30-day “cybersecurity sprint.”

The results are now in. The White House posted details from the cyber review online last week.

Here are a few key takeaways with charts.

First, it’s clear agencies made great strides during the sprint. Across government, agencies increased their use of two-factor authentication.
Overall, the percentage of federal employees required to use a smart card in addition to a password to log on to federal computer networks increased from about 42 percent to more than 72 percent during the cyber sprint, according to new OMB statistics. That’s the single biggest quarterly increase since OMB began tracking the use of two-factor authentication in 2011 when the use of stronger sign-on techniques barely scraped 5 percent.


Still, some agencies made only limited progress during the latest cyber push and, somewhat inexplicably, some agencies’ use of two-factor authentication even backslid during the White House’s big cyber push.

The administration’s long-term goal has been to increase the use of two-factor to 75 percent for all users, including those with broad system privileges. After the month-long sprint, 14 agencies made the grade, including OPM and the Interior Department -- both caught up in the recent series of cyberintrusions .
At OPM, the percentage of computers required to use two-factor catapulted from 42 percent before the sprint to 97 percent afterward.

The chart below shows the five agencies with the highest percentage of employees using two-factor sign-ons after the cyber sprint.

Despite the high-profile cyber push by federal Chief Information Officer Tony Scott and the harsh political fallout of the OPM hack -- the agency’s director, Katherine Archulet a;resigned last month -- some agencies continue to lag behind when it comes to implementing stronger sign-ons.

At the agencies below, fell well below the administration’s two-factor targets. At the Energy Department, just 12 percent of users are required to sign on with using two-factor methods.

Somewhat inexplicably, some agencies actually backslid during the cyber sprint when it came to the percentage of employees using strong authentication techniques. Before the big push, for example, 32 percent of Energy employees used two-factor sign-ons. That dropped to 12 percent during the White House-mandated cyber review. The departments of Justice, Education and Defense also reported drops.

Still, some agencies reported massive leaps forward in implementing stronger sign-on measures. The Nuclear Regulatory Commission shot up by nearly 80 percent, for example. Transportation surged from just 32 percent two-factor coverage to 97 percent -- the second highest overall.

(Image via jijomathaidesigners/ Shutterstock.com)

By Caitlin Fairchild and Jack Moore August 4, 2015

http://www.nextgov.com/cybersecurity/2015/08/4-charts-explain-state-agency-…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Jeu 20 Aoû - 11:31 (2015)    Sujet du message: LA COMMISSION FEDERALE DES COMMUNICATIONS DES ETATS-UNIS DENIE AUX FOURNISSEURS INTERNET LE DROIT A LA LIBERTE D'EXPRESSION Répondre en citant

LA COMMISSION FEDERALE DES COMMUNICATIONS DES ETATS-UNIS DENIE AUX FOURNISSEURS INTERNET LE DROIT A LA LIBERTE D'EXPRESSION

Un pas de plus vers cet âge de grande noirceur, sous contrôle militaire.


17 août 2015 16 h 30 min·



 
Les nouvelles lois de neutralité adoptées à la majorité par la Commission fédérale des communications (FCC) des Etats-Unis en février ont dénié aux fournisseurs d’Internet à haut débit le droit constitutionnel à la liberté d’expression, faisant naître des craintes de censure chez des représentants de l’opposition. Même des sites majeurs comme Drudge Report et Fox News pourraient voir leur liberté « encadrée » par les pouvoirs publics américains.
 
C’est au motif de la protection de la « neutralité » que le vote de février a décidé de considérer les « providers » comme des « conduits, et non des lieux d’expression » : les nouvelles règles sont présentées dans ce contexte comme un moyen de protéger « l’intérêt du gouvernement à maintenir un Internat ouvert en tant que plateforme d’expression ».
 

Les fournisseurs Internet considérés comme des télécoms : ils n’ont pas droit à la liberté d’expression
 
La nouvelle directive est entrée en vigueur en juin et fait l’objet d’une procédure de contestation qui donnera lieu à une audience en décembre prochain. En attentant, elle oblige les fournisseurs comme Verizon ou Comcast à donner accès à l’ensemble des contenus légaux sur internet – contrairement aux « fournisseurs à la marge » (edge providers) tels Google et Netflix qui ne sont pas soumis aux mêmes règles.
 
Sous couleur de protéger la liberté, les pouvoirs publics s’arrogent en réalité le droit de « réguler » l’activité des fournisseurs d’Internet, jouant à la fois sur le débit et sur leur activité, en les considérant comme de simples fournisseurs de télécommunications.
 

La Commission fédérale des communications (FCC) des Etats-Unis sous le coup d’une procédure
 
Ce que pointent les opposants, c’est qu’en augmentant les droits des pouvoirs publics sur la régulation d’Internet, on ouvre en même temps la porte à la censure. « Si la cour confirme les directives de la FCC, l’autorité de l’agence sur l’Internet s’étendrait d’un bout de la chaîne à l’autre », a déclaré Fred Campbell, président du « Centre pour l’innovation sans bornes dans la technologie ». Les principes qui justifient les régulations actuelles, en somme, pourront être utilisés tous azimuts à l’avenir.
 

Anne Dolhein


http://reinformation.tv/commission-federale-communications-fcc-etats-unis-fournisseurs-internet-liberte-expression-dolhein-40846/


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mar 1 Sep - 12:24 (2015)    Sujet du message: OMB, TREASURY HAMMER OUT FINAL DATA ACT STANDARDS Répondre en citant

OMB, TREASURY HAMMER OUT FINAL DATA ACT STANDARDS


Melpomene/Shutterstock.com

By Jack Moore August 31, 2015
NEXTGOV

The federal government has finalized more than four dozen data standards that agencies will use to more consistently report federal spending information.

The new data standards -- a key part of the Digital Accountability and Transparency Act, or DATA Act -- also aim to make it easier for the public and good-government groups to track federal dollars.  

The Office of Management and Budget and the Treasury Department first introduced standardized definitions for 57 different data elements as part of preliminary guidance issued to agencies in May. The standards were finalized Aug. 31, “following a robust engagement with stakeholders,” according to a new blog post from David Mader, the controller of the Office of Federal Financial Management, and David Lebryk, commissioner of Treasury Department’s Bureau of the Fiscal Service.

Unanimously approved by Congress in May 2014, the DATA Act, tasked OMB and Treasury with first coming up with governmentwide data standards and, later, devising a method for agencies to electronically submit data directly to the USASpending.gov website in machine-readable formats.

Up to now, the billions spent each year on federal contracts and grants have not been uniformly tracked and remain “housed in disconnected and siloed systems under various formats using different standards,” Mader and Lebryk noted in their blog post.

“By standardizing what is published on USAspending.gov and providing context and a user-friendly format, we have taken an important step to provide valuable, usable information on how tax dollars are spent, who they are spent on and for what purpose,” the blog post stated.

Still, some thorny issues remain surrounding the new data standards .

The preliminary standards published in May drew the ire of data transparency advocates for retaining the use of Dun & Bradstreet’s proprietary identification codes, known as DUNS numbers, to track recipients of federal spending.

Since 1995, the government has used DUNS numbers to identify federal contractors, a practice that eventually embedded itself into the procurement process -- much to the chagrin of open data advocates, who fear the potential effects of the company’s monopoly on the availability of government data.

Despite opposition in public comments to the continued use of DUNS numbers in, the final standards say OMB and Treasury are still only exploring possible alternatives to the proprietary identifiers.

“Changes to standards require significant resources (time and funding) and ongoing analyses will include consideration of these issues,” a July 2015 update on the new standards stated.

For now, that means a tacit endorsement of the continued use of DUNS numbers.

(Image via Melpomene/ Shutterstock.com)


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Lun 21 Sep - 09:50 (2015)    Sujet du message: ECLAIRAGE UW – LA GUERRE CONTRE LES SITES DE LA REINFORMATION EST OUVERTE – 14.09.2015 Répondre en citant

ECLAIRAGE UW – LA GUERRE CONTRE LES SITES DE LA REINFORMATION EST OUVERTE – 14.09.2015


Uli Windisch
Rédacteur responsable



Article publié le 15.09.2015

Aspects traités par Uli Windisch:
  • Le concert stratégique des médias dominants contre les sites de la Réinformation, et son évolution
  • La guerre symbolique par la diffamation, le dénigrement et les accusations infondées contre les sites qui proposent un autre regard sur l'actualité*
  • Le problème de la ré-utilisation des images pour souligner la disproportion dans les moyens à disposition et pour mettre en lumière le succès inversement proportionnel des sites dits de la  Réinformation"
  • Des exemples flagrants de manipulation médiatiques et les possibilités de caricature qui sont disponibles pour les adversaires du Système, en particulier au regard de la bien-pensance de gauche qui sévit en sous-main dans les médias dominants
  propos recueillis le 14 septembre 2015

*notamment pour faire suite aux attaques de la Radio-Télévision Belge (RTBF), qui a cité lesobservateurs.ch dans un reportage calomnieux sur les médias "alternatifs".

+ AUDIO : http://www.lesobservateurs.ch/2015/09/15/eclairage-uw-guerre-contre-sites-de-reinformation-ouverte-14-09-2015/


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mar 22 Sep - 11:46 (2015)    Sujet du message: LE PAPE FRANCOIS ENCOURAGE LA PRESSE INTERNATIONALE A CONSTRUIRE DES PONTS Répondre en citant

LE PAPE FRANCOIS ENCOURAGE LA PRESSE INTERNATIONALE A CONSTRUIRE DES PONTS

Sur le vol Rome-La Havane, le pape François a salué les journalistes, pour leur parler de la paix. Il a évoqué la famille de réfugiés accueillie au Vatican.

Rome, 21 septembre 2015 (ZENIT.org) Anita Bourdin 


Le pape François encourage la presse internationale à « construire des ponts », devant les journalistes admis sur le vol papal Rome-La Havane : « Je vous remercie pour tout ce que vous ferez dans votre travail pour construire des ponts : de petits ponts, petits, mais un petit pont et un autre et un autre et un autre, font le grand pont de la paix. »

A bord de l’avion entre Rome et Cuba, le pape François, comme à l’accoutumée, est allé saluer les journalistes présents dans l’avion, et il leur a parlé après une introduction du directeur de la salle de presse du Saint-Siège, le P. Federico Lombardi, SJ.

 « Le monde est aujourd’hui assoiffé de paix. Il y a les guerres, les migrants qui fuient, cette vague de migration qui vient des guerres, pour fuir la mort, pour chercher la vie », diagnostique le pape.

« Aujourd’hui, a confié le pape, je me suis ému car une des deux familles qui sont à la paroisse Sainte-Anne au Vatican, est venue me saluer devant la Maison Sainte-Marthe. Ce sont des Syriens, des réfugiés, accueillis ici… ils portaient sur leur visage la souffrance de leur soif de paix ! Ce mot de "paix"…  »

Voici notre traduction intégrale des paroles du pape et du P. Lombardi.

P. Federico Lombardi

Saint-Père bienvenue parmi nous. Nous voici à nouveau en vol pour le début d’un grand voyage apostolique. Un voyage très attendu comme vous le savez. La couverture médiatique de ce voyage est très grande déjà depuis quelques jours, je dirais même quelques semaines : disons plus que d’habitude par rapport aux autres voyages. Et au sol vous attendent des milliers de journalistes accrédités dans les différentes localités où vous passerez durant votre voyage.

Ici nous sommes 76 : nous avions reçu  plus de 140 demandes pour être présent à bord, nous avons donc été obligés de restreindre. Mais les autres collègues suivent avec beaucoup d’attention, naturellement selon les divers points qui caractérisent ce voyage. La communauté ici présente, comme d’habitude, représente différentes langues et divers pays. Mais il est compréhensible qu’il y ait cette fois-ci plus de journalistes et représentants de médias américains : environ un tiers des collègues ici présents sont des représentants de télévisions, journaux, agences des États-Unis : plus de 20 sur 76.

Mais nous avons aussi une journaliste cubaine avec nous, elle s’appelle Rosa Miriam Elizalde : la voici. Vous pourrez la saluer lorsque vous passerez. Nous vous souhaitons la bienvenue parmi nous. Nous vous promettons de suivre ce voyage avec une extrême attention, conscients de la grande importance que celui-ci représente pour le monde entier : vous aurez l’occasion de donner des messages de paix pour toutes les nations dans des circonstances absolument exceptionnelles. Si vous souhaitez, Saint-Père, dire quelques mots avant de saluer les collègues… mille mercis !!

Pape François

Merci pour ces mots d’accueil ! Bonjour. Je vous souhaite bon voyage et bon travail. Si je ne me trompe pas je crois que ce voyage est le plus long de tous ceux que j’ai faits, un jour de plus qu’au Brésil… Vous aurez du travail ! Je vous remercie infiniment pour le travail que vous faites et que vous ferez.

Le père Lombardi a prononcé le mot « paix ». Je crois que le monde aujourd’hui est assoiffé de paix. Il y a les guerres, les migrants qui fuient, cette vague de migration qui vient des guerres, pour fuir la mort, pour chercher la vie…

Aujourd’hui je me suis ému car une des deux familles qui sont à la paroisse Sainte-Anne au Vatican, est venue me saluer devant la Maison Sainte-Marthe. Ce sont des Syriens, des réfugiés, accueillis ici… ils portaient sur leur visage la souffrance de leur soif de paix !

Ce mot… « paix »… Je vous remercie pour tout ce que vous ferez dans votre travail pour construire des ponts : de petits ponts, petits, mais un petit pont et un autre et un autre et un autre, font le grand pont de la paix.

Bon voyage, bon travail. Priez pour moi. Merci.

Une dernière chose, dont le père Lombardi a parlé. Et qu’un de vous a souligné : il est juste que je salue aussi tous vos collègues qui, en ce moment, travaillent et travailleront dans les bureaux.

© Traduction de Zenit, Océane Le Gall

(21 septembre 2015) © Innovative Media Inc.

http://www.zenit.org/fr/articles/le-pape-francois-encourage-la-presse-inter…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Jeu 24 Sep - 12:53 (2015)    Sujet du message: U.S. AND CHINA COMPETE FOR HACKING PERSONNEL Répondre en citant

U.S. AND CHINA COMPETE FOR HACKING PERSONNEL 

by Ryan Maass
Washington (UPI) Sep 21, 2015



A new kind of arms race is underway between the United States and China, potentially involving 9th grade soldiers.

As American and Chinese officials are set to discuss what is in effect a disarmament deal in cyberspace, each country prepares to recruit more hackers to stand ready on the front lines.

The United States is comparatively late to the cyber war game, with the People's Liberation Army reportedly boasting for a hacking force 100,000 strong, 20 years in the making. By contrast, the U.S. Cyber Command started in 2010, and aims to employ 6,200 coders by 2016.

Many U.S. military officials are worried that the process is actually too fast, with concerns over vetting the right employees being a top concern.

"As we have continued to grow the cyber mission force, we're getting the right numbers of people," said Vice Adm. Jan Tighe, commander of U.S. Fleet Cyber Command, in a statement, "whether we are getting the right people is still yet to be determined."

Cyber troop recruits are a lot younger than their conventional military counterparts.

"We bring them out of high school, " said Lt. Gen. Kevin McLaughlin, deputy commander of CYBERCOM, "the military services are training them to be world-class, advanced cyber operators."

While each country continues to bolster their forces behind a keyboard, political leaders from each country will soon engage in talks about limiting global cyber war.

According to officials familiar with the talks, each country will commit to not being the first country to use cyber assets to attack another's infrastructure and economy during peacetime.

China President Xi Jingping is scheduled to visit the United States and meet with President Obama on September 24.

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

http://www.spacewar.com/reports/US_and_China_compete_for_hacking_personnel_…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 645
Féminin

MessagePosté le: Mar 6 Oct - 04:06 (2015)    Sujet du message: THE CYBER THREAT IS REAL Répondre en citant

THE CYBER THREAT IS REAL

Story Number: NNS151005-20Release Date: 10/5/2015 3:10:00 PM 

From the Office of the Deputy Chief of Naval Operations for Information Dominance (N2/N6)

150414-N-XL102-008 ANNAPOLIS, Md. (April 15, 2015) Vice Adm. Walter E. Carter, superintendent of the U.S. Naval Academy, observes a team of midshipmen during the 15th annual Cyber Defense Exercise hosted by the National Security Agency. (U.S. Navy photo by Mass Communication Specialist 2nd Class Tyler Caswell/Released)


WASHINGTON (NNS) -- The cyber threat is real. Cyber attackers have evolved from pranksters, lone wolves and organized gangs to nation-states and hacktivist groups. While the damage used to be limited to simple disruptions in service, today's cyber-attacks are leading to global, political and commercial uncertainty. These increasing attacks have resulted in significant losses of intellectual property, private data and national secrets.

Early attacks of viruses and worms, malware and Trojans have grown in complexity and sophistication to cross over into the physical world as hackers try to infiltrate and control computers within cars, generators, energy grids and other everyday systems.

Personal information is more susceptible than ever to hacking as more personal information is stored digitally. This vulnerability was most dramatically exposed when the Office of Personnel Management suffered a breach compromising millions of government employees' personal information.

The Department of Defense alone experiences 41 million scans, probes and attacks per month.

"The Navy Networking Environment consists of more than 500,000 end user devices; an estimated 75,000 network devices (servers, domain controllers); and approximately 45,000 applications and systems across three security enclaves," said Vice Adm. Jan Tighe, commander of U.S. Fleet Cyber Command, in a statement provided earlier this year to Congress.

Vice Adm. Tighe explained that the greater the attack surface or vulnerabilities in our systems, then the greater the risk to the mission.

Recent real world events and attacks on Navy systems, such as the 2013 hack into the Navy-Marine Corps Intranet that resulted in a significant Navy-wide effort to close vulnerabilities (Operation Rolling Tide), make clear that the cyber threat is increasing.

The reliance on connected capabilities has significantly increased the potential consequences of a cyber compromise. Once independent or isolated systems now rely on each other to link together our warfighters, ships, submarines, aircraft, land-based command centers and distant satellites.

The threat is personally and operationally real for every member of the Navy. It only takes one act to wreak havoc on the entire network and expose an opening to a cyber attacker.

Attacks are evolving as cyber attackers get smarter and more resourceful. Constant vigilance is the key to protecting the Navy from serious operational impacts as a result of cyber-attacks.

http://www.navy.mil/submit/display.asp?story_id=91375


Revenir en haut
Contenu Sponsorisé






MessagePosté le: Aujourd’hui à 02:20 (2016)    Sujet du message: RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM & HUMAN CONTROL (PARTIE 2)

Revenir en haut
Montrer les messages depuis:   
Poster un nouveau sujet   Répondre au sujet    LE VOÎLE DÉCHIRÉ (1) Index du Forum -> NOUVELLES LOIS ANTITERRORISTES/NEW ANTITERRORIST LAWS -> RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM (PARTIE 2) Toutes les heures sont au format GMT + 2 Heures
Aller à la page: <  1, 2, 38, 9, 1012, 13, 14  >
Page 9 sur 14

 
Sauter vers:  

Portail | Index | Creer un forum | Forum gratuit d’entraide | Annuaire des forums gratuits | Signaler une violation | Conditions générales d'utilisation
Powered by phpBB © 2001, 2005 phpBB Group
Traduction par : phpBB-fr.com