LE VOÎLE DÉCHIRÉ (1) Index du Forum

LE VOÎLE DÉCHIRÉ (1)
...

 FAQFAQ   RechercherRechercher   MembresMembres   GroupesGroupes   S’enregistrerS’enregistrer 
 ProfilProfil   Se connecter pour vérifier ses messages privésSe connecter pour vérifier ses messages privés   ConnexionConnexion 

RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM & HUMAN CONTROL (PARTIE 2)
Aller à la page: <  1, 2, 39, 10, 11, 12, 13, 14  >
 
Poster un nouveau sujet   Répondre au sujet    LE VOÎLE DÉCHIRÉ (1) Index du Forum -> NOUVELLES LOIS ANTITERRORISTES/NEW ANTITERRORIST LAWS -> RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM (PARTIE 2)
Sujet précédent :: Sujet suivant  
Auteur Message
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Mer 7 Oct - 03:28 (2015)    Sujet du message: $460 MILLION CYBERCOM CONTRACT COMING THIS MONTH; ‘CYBER JOINT MUNITIONS’ HELP WANTED Répondre en citant

$460 MILLION CYBERCOM CONTRACT COMING THIS MONTH; ‘CYBER JOINT MUNITIONS’ HELP WANTED


AP Photo/Patrick Semansky, File

By Aliya Sternstein October 5, 2015

The first job under a forthcoming $460 million U.S. Cyber Command contract to outsource all mission support involves, among other activities, a lot of digital munitions-making.

An 84-page draft task order released Sept. 30 runs the gamut of hacking and counterhacking work, plus traditional IT support activities.

The proposed solicitation was accompanied by a 114-page draft of the full 5-year contract. In May, CYBERCOM officials cancelled a similar $475 million project announced earlier that month. At the time, officials explained a reorganized request for bids with more details would be out in the fall. 

The initial work order will support "cyber joint munitions effectiveness" -- by developing and deploying -- "cyber weapons" and coordinating with "tool developers" in the spy community, the documents state. In addition, the prospective vendor will plan and execute joint “cyber fires.” 

CYBERCOM is in the midst of recruiting 6,200 cyberwarriors for teams positioned around the world. The command’s duty is to thwart foreign hackers targeting the United States, aid U.S. combat troops overseas and protect the dot-mil network.  

In the past, some military academics have voiced concerns about the unintended outcomes of such maneuvers. Malicious code released into networks could backfire and harm U.S. individuals or allies, they warned.

"Due to the 'system of systems' nature" of cyberspace, it is very difficult to know exactly what effect" defensive or offensive actions will have on U.S. and ally assets "since we can’t be sure exactly how far out the cyber action might spread," Dee Andrews and Kamal Jabbour wrote in a 2011 article for Air Force Space Command's Journal for Space & Missile Professionals. "The difficulty in doing a damage estimate before cyber action is taken makes cyber friendly fire difficult to identify and mitigate." 

There are dozens of bullet points on training support work in the contracting documents.

For example, the hired contractor will run exercises on "USCYBERCOM Fires processes" with the Joint Advanced Cyber Warfare Course, the Army Cyberspace Operations Course, the Air Force Weapons School, the Joint Targeting School and other outside groups, the documents state. 

Certain contract personnel supporting these so-called cyber fires will be subjected to additional background reviews and will have to comply with "need-to-know" classification rules, according to officials. 

Beyond unleashing malware, the chosen contract employees will help repel attacks on Defense Department smartphones housing sensitive data, according to the government. This assignment involves analyzing forensics reports on hacked mobile devices and conducting security assessments of mobile apps, among other things. 

There also is some cyber espionage work entailed. The selected contractor will aid the "fusion," or correlation of clues, from "reliable sources," network sensors, network scans, open source information, and "situational awareness of known adversary activities,” the documents state 

The professionals hired will probe lurking, well-resourced threats inside military networks and identify "signatures" of the hacker footprints discovered, they add. The signatures, such as IP addresses and strings of code, will be used to determine if there is malicious activity elsewhere inside Pentagon and defense industry networks, according to officials. 

Another CYBERCOM duty will be proposing procedures for facilitating "all-source intelligence analysis of the foreign threat picture" -- information collected from spies, data surveillance, public information and other inputs.

A final comprehensive solicitation and task order are scheduled to be released later this month. The government is accepting questions about the drafts from companies until Oct. 7.

http://www.nextgov.com/cybersecurity/2015/10/460-million-cybercom-contract-…


Revenir en haut
Publicité






MessagePosté le: Mer 7 Oct - 03:28 (2015)    Sujet du message: Publicité

PublicitéSupprimer les publicités ?
Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Ven 9 Oct - 03:18 (2015)    Sujet du message: TPP WILL KILL THE INTERNET, ALLOW SECRET FOREIGN TRIBUNALS Répondre en citant

TPP WILL KILL THE INTERNET, ALLOW SECRET FOREIGN TRIBUNALS



VIDEO :
https://www.youtube.com/watch?v=xCvK7P3o-vc


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Jeu 29 Oct - 05:42 (2015)    Sujet du message: CIA EXPOSED PLANTING DISINFO IN MEDIA 1975 Répondre en citant

CIA EXPOSED PLANTING DISINFO IN MEDIA 1975



VIDEO : https://www.youtube.com/watch?v=KO-SnltjCos


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Dim 1 Nov - 02:55 (2015)    Sujet du message: WHITE HOUSE ISSUES GOVERNMENTWIDE CYBER ACTION PLAN Répondre en citant

WHITE HOUSE ISSUES GOVERNMENTWIDE CYBER ACTION PLAN
 

Office of Management and Budget Director Shaun Donovan // Susan Walsh/AP

By Aliya Sternstein and Jack Moore October 30, 2015
NEXTGOV

The White House on Friday issued a broad new plan designed to better respond to cybersecurity incidents such as those that exposed secrets on millions of citizens as well as government operations.

The new guidance, which aims to protect the most high-value information assets the federal government holds, is the latest step in the months-long fallout from the devastating hack of sensitive federal employee files from the Office of Personnel Management revealed this summer. 

“We must continue to double down on this administration’s broad strategy to enhance federal cybersecurity and fundamentally overhaul information security practices, policies, and governance,” said federal Chief Information Officer Tony Scott in an Office of Management and Budget blog post Friday.

The new plan -- a memorandum to the heads of federal agencies and departments from Scott and OMB Director Shaun Donovan -- builds on a 30-day “cybersecurity sprint” this summer, during which Scott’s office called on agencies to immediately tighten online defenses in the wake of the OPM breach. Agency deputy secretaries will be in charge of implementing the plan, according to the document.

The plan lays out an initial set of deadlines. By the end of the year,
  • OMB will issue new “incident response best practices” to agencies;
  • The Department of Homeland Security will extend the protections under its intrusion-detection system known as EINSTEIN. A new DHS contract will equip all agencies with updated “EINSTEIN 3A” email and network surveillance technology that also blocks certain malicious activities;
  • Agencies will be required to report all cyber positions to OPM and a group of agency CIOs will create a special subcommittee focused on rapid deployment of emerging technology.
During the cyber sprint, agencies were directed to identify and review the security of their high-value assets -- those containing sensitive or critical data that, presumably, would be of high-value to hackers, too.

By Dec. 31, the director of national intelligence will lead a threat assessment of those assets “that are at high-risk of targeting by adversaries,” according to the plan. DHS will lead a separate team -- made up of personnel from the Pentagon, the intelligence community and others -- to “continuously diagnose and mitigate the cybersecurity protections” for the high-value assets.

The DHS team will continue to conduct “proactive assessments on a rolling basis” as officials identify new threats, the plan stated.
Longer-term deadlines include:
  • By Jan. 31, OMB will release a plan for implementing new cybersecurity shared services;
  • By March 31, OMB will release new guidance on safeguarding personally identifiable information;
  • By the end of April, GSA will finalize a contract vehicle for pre-vetted services for incident response services that can quickly be leveraged by agencies in the wake of a breach;
  • By June 30, the National Institute of Standards and Technology will issue new guidance to agencies on recovering from cyber events.

DHS is also expected to expand a suite of tools to help agencies continuously monitor and respond to threats on their networks. Full deployment of “Phase 2” capabilities under the Continuous Diagnostics and Mitigation program -- dealing with access control and authentication -- should be completed by the end of fiscal 2016.

In addition, the action plan itself pushes agencies to implement stronger identity management for users seeking wide access to federal networks. The percentage of federal employees required to use a smart card in addition to a password to log on to computer networks increased from about 42 percent to more than 72 percent during the cyber sprint, OMB said at the time. That’s continued to grow and is now about 80 percent, according to Scott.

Thanks to the cyber sprint and other action taken by the administration, the state of federal cybersecurity “is stronger than ever before,” Scott said in the blog post.

But Scott, who has frequently described the federal government’s cybersecurity challenges as more akin to a marathon than a sprint, also hinted at deep challenges that remain.

“Cyberthreats cannot be eliminated entirely, but they can be managed much more effectively,” he said.

Agencies sometimes neglect to patch security holes identified half a decade ago, and struggle to take inventory of information and devices connected to the Internet, according to numerous Government Accountability Office reports.

“Across the federal government, a broad surface area of legacy systems with thousands of different hardware and software configurations contains vulnerabilities and opportunities for exploitation,” Scott said in the blog post.

The new plan, he added, “helps get our current federal house in order, but it does not re-architect the house.”

Scott and OMB Director Shaun Donovan also issued updated guidance under the annual Federal Information Security Management Act.

This year’s guidance, for the first time, defines a “major” cyberincident and mandates agencies report these incidents to Congress within seven days.

The new cyber action plan comes a week after Scott’s office proposed a broad rewrite of the federal government’s strategy for buying, managing and securing agency IT systems, known as Circular A-130.

Over the summer, the administration also issued updated guidance on how contractors should secure government data.

http://www.nextgov.com/cybersecurity/2015/10/white-house-issues-governmentw…



Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Sam 7 Nov - 01:02 (2015)    Sujet du message: CYBERSAFE TEAM CONDUCTS INITIAL PILOT AT SPAWAR Répondre en citant

CYBERSAFE TEAM CONDUCTS INITIAL PILOT AT SPAWAR

Story Number: NNS151106-19Release Date: 11/6/2015 5:04:00 PM 

By Tina C. Stillions, Space and Naval Warfare Systems Command Public Affairs

SAN DIEGO (NNS) -- A multi-disciplined Navy audit team conducted a CYBERSAFE initial pilot at the Space and Naval Warfare Systems Command (SPAWAR) during the week of Nov. 2-6.

The week long effort was a two-phased process that included a "functional audit" of the Office of the Chief of Naval Operations (OPNAV), Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) and SPAWAR to make certain the organizations have identified the right personnel, granted sufficient authority and established through processes to execute the CYBERSAFE program. The second phase of the "test-drive" was an end-to-end review of each organization's processes to ensure program managers understood and were able to identify, develop and certify CYBERSAFE material solutions, as well as identify and modify in-service programs through material or non-material solutions.

"The purpose of the CYBERSAFE program is to provide maximum reasonable assurance of the survivability and resiliency of critical warfighting information systems and platforms," said Ed Lazarski, SPAWAR Office of the Chief Engineer and director of Cybersecurity for PEO C4I. "The joint effort addresses the security controls for a subset of mission-critical Navy systems. The result will be more secure Navy networks."

CYBERSAFE is modeled after SUBSAFE which is the rigorous submarine safety program begun after the loss of the USS Thresher in 1963. Like the submarine program, CYBERSAFE will harden a critical subset of warfighting components, which could be certain computer systems or parts of the network. CYBERSAFE will apply more stringent requirements to these components before and after fielding to ensure they are secure. CYBERSAFE will also require changes in crew proficiency and culture to implement these requirements.

As a first test case, the audit team used PEO C4I's Automated Digital Network System (ADNS) to walk through the process, which helped them identify how existing procedures, such as the Enterprise Change Request process, can be used to implement new security controls. During the exercise, the team assessed the processes for CYBERSAFE certification to include establishing the CYBERSAFE grade, identifying and implementing security controls, certifying CYBERSAFE and continuously monitoring CYBERSAFE compliance.

"Because of the interconnected nature of today's Navy systems, a new approach is required," said Lazarski. "Adversaries are able to exploit weaknesses in any of these systems, including the cyber gaps between them, to access weapons and platforms tasked with network security. In order to ensure comprehensive protection, the Navy needs to protect all the critical systems from the various forms of attack."

To accomplish that goal, material and software solutions, plus procedural compliance, must be instituted so that cyber incidents are adequately prevented, detected, analyzed, reported, responded to and restored from without abruptly or unexpectedly impacting mission capability, in other words that they are CYBERSAFE.

According to SPAWAR CYBERSAFE Program Director Sudha Vyas, the audit helped determine the level of readiness for the organization, the first of the Navy systems commands to take a program like ADNS and put it through a CYBERSAFE test drive.

"We selected ADNS as the first program to put through the audit process, because we wanted to identify who has a role in execution and what their role would be," said Vyas. "The functional audit included leveraging draft policies into auditable attributes in order to demonstrate that the necessary authorities are in place. Although we may not have enough people yet, the test drive showed us that we have enough structure to implement CYBERSAFE."

The team conducted individual functional audits of OPNAV, SPAWAR and PEO C4I to assess compliance with the draft CYBERSAFE Instruction. During their review, they uncovered no major process deficiencies and determined that all three organizations are positioned to begin execution of the CYBERSAFE program.

"The team was great. At one point, we had 40-50 people in the room working through the various processes," said Vyas. "SPAWAR did much of the initial heavy lifting and we found no major deficiencies or roadblocks to prevent implementation and execution of CYBERSAFE."

As the Navy's Information Dominance systems command, SPAWAR designs, develops and deploys advanced cyber communications and information capabilities. With more than 8,900 active duty military and civil service professionals located around the world and close to the fleet, SPAWAR is at the forefront of research, engineering, acquisition and support services that provide vital decision superiority to our forces at the right time and for the right cost.

For more news from Space and Naval Warfare Systems Command, visit www.navy.mil/local/spawar/.


http://www.navy.mil/submit/display.asp?story_id=91905



Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Dim 8 Nov - 04:25 (2015)    Sujet du message: CONGRESS TO REVIEW FITARA SCORECARDS NEXT WEEK Répondre en citant

CONGRESS TO REVIEW FITARA SCORECARDS NEXT WEEK

Information technology
 
From Wikipedia, the free encyclopedia
"IT" redirects here. For other uses, see It (disambiguation).
Information technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data,[1] often in the context of a business or other enterprise.[2]
Read more : https://en.wikipedia.org/wiki/Information_technology

-----



House Oversight and Government Reform Committee member Rep. Will Hurd, R-Texas // Cliff Owen/AP

By Frank Konkel October 29, 2015

Correction: An earlier version of this article provided the wrong date for the hearing. The hearing is slated for Nov. 4.

Several agency chief information officers are expected to testify next week before the House Oversight and Government Reform Committee to discuss how their agencies are implementing sweeping federal IT reform legislation passed by Congress last year.

The hearing, on implementation of the 2014 Federal IT Acquisition Reform Act https://www.congress.gov/bill/113th-congress/house-bill/1232 , is tentatively slated for Nov. 4 before the IT subcommittee.

The chairman of the subcommittee, Rep. Will Hurd, R-Texas, previewed the hearing during remarks last month at the Nextgov Prime event. The hearing will mark the release of a FITARA scorecard that effectively grades federal agencies on their implementation so far, Hurd said.

“We're coming up with a FITARA scorecard to make sure that Congress uses its oversight role to ensure that these agencies are implementing FITARA the way they're supposed to,” Hurd told reporters after his remarks. “We are going to bring every agency in front of the subcommittee and ask the same questions. And guess what? This is going to be boring. It will not be must-watch TV. But these are the kinds of things we need to do to make sure the government is spending the taxpayers’ money wisely and also being efficient because the gains that we get from increasing efficiency is huge.”

The hearing is likely to include a representative from the Government Accountability Office, which is compiling the score cards, as well as U.S. CIO Tony Scott and several agency CIOs. An oversight committee spokesperson told Nextgov the official witness list has not been confirmed and noted the hearing is subject to change.

The FITARA scorecard and subsequent discussion will go a long way toward showcasing how far agencies have come since FITARA became law almost a year ago. The Office of Management and Budget and GAO have played significant roles offering guidance and insight, but ultimately each agency is responsible for implementation on its own.

One of the most noteworthy aspects of the legislation is the expanded authorities CIOs now wield to own IT budgets. Expect that to be one of the main talking points next week.

Separately, OMB is planning to release a public dashboard tracking agencies’ progress implementing key parts FITARA.

Agencies over the summer submitted initial plans to OMB detailing concrete steps they’ve taken for boosting the authority of CIOs.

"By and large, most agencies met our expectations,” Scott said last week at a federal IT acquisition event hosted by FCW. “Overall, I was very pleased with the plans submitted. None were perfect, I will say.”

Jack Moore contributed to this report.

http://www.nextgov.com/cio-briefing/2015/10/congress-review-fitara-scorecar…

Article : FITARA Analysis: Will CIOs Use Their New Powers for Good?
http://www.nextgov.com/cio-briefing/2014/12/fitara-analysis-will-cios-use-t…



Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Lun 9 Nov - 04:32 (2015)    Sujet du message: THE SECRET PENTAGON PUSH FOR LETHAL CYBER WEAPONS Répondre en citant

THE SECRET PENTAGON PUSH FOR LETHAL CYBER WEAPONS



VIDEO : https://www.youtube.com/watch?v=KEn3fnKl9uI

Under a forthcoming nearly half-billion-dollar military contract, computer code capable of killing adversaries is expected to be developed and deployed if necessary, according to contractors vying for the work and former Pentagon officials.

http://www.defenseone.com

http://map.norsecorp.com


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Mer 11 Nov - 05:24 (2015)    Sujet du message: ALERT NEWS HEADS UP! EUROPE TO MAKE LINKING TO OTHER WEBSITES 'ILLEGAL' Répondre en citant

ALERT NEWS HEADS UP! EUROPE TO MAKE LINKING TO OTHER WEBSITES 'ILLEGAL'
 



VIDEO : https://www.youtube.com/watch?v=xez54epk4yM


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Dim 15 Nov - 12:02 (2015)    Sujet du message: CARTER : UNITED STATES STANDS WITH FRANCE IN WAKE OF ATTACKS Répondre en citant




CYBERWAR

CARTER : UNITED STATES STANDS WITH FRANCE IN WAKE OF ATTACKS


Story Number: NNS151114-01Release Date: 11/14/2015 8:43:00 PM
  
From DoD News, Defense Media Activity

WASHINGTON (NNS) -- The United States stands with France in the wake of today's terrorist attacks in Paris, Defense Secretary Ash Carter said.

"This evening's horrific and barbaric attacks in Paris were more than an attack on the nation or people of France," Carter said in a statement. "They were an assault on our common human dignity."

Estimates of the number of people killed vary in reports, but range in the dozens.

Carter noted the close relationship between the United States and France, including their roles in the NATO alliance and in the fight against the Islamic State of Iraq and the Levant.

Strengthened Resolve

"As NATO allies, as leaders of the counter-ISIL coalition, as nations working shoulder to shoulder from West Africa to the Indian Ocean, the United States and France will only strengthen our resolve," the secretary said. Earlier, President Barack Obama pledged U.S. assistance to French authorities and vowed to join France and other nations to bring the terrorists to justice and to "go after any terrorist networks that go after our people."

"As the president said tonight, in this moment of tragedy the United States stands with the people of France and its vibrant, multi-cultural democracy," Carter said in his statement. "For more than 200 years, the United States and France have stood together in friendship. We have stood for the common good and security of all nations. We have never stood closer than we do now. Vive la France."


http://www.navy.mil/submit/display.asp?story_id=92024



Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Jeu 19 Nov - 07:34 (2015)    Sujet du message: NAVY IT NETWORKS EVOLVING INTO WARFIGHTING PLATFORMS Répondre en citant

WAR

NAVY IT NETWORKS EVOLVING INTO WARFIGHTING PLATFORMS


Story Number: NNS151118-07Release Date: 11/18/2015 10:49:00 AM


WASHINGTON (NNS) -- Tomahawk. MK48. Aegis: These are weapons systems employed by the Navy to achieve decisive effects in locales far and wide.

With the increase of cyber threats across the globe, the Navy is hardening another weapons system essential for effective operations: its information technology networks, both afloat and ashore.

The Navy must "operate the network as a warfighting platform," said Vice Adm. Jan Tighe, U.S. Fleet Cyber Command-U.S. 10th Fleet earlier this year at the Sea-Air-Space conference. "It's not a service provider. It's not a support capability. We know that our operational network is under fire every day; we have to defend it."

CANES, which stands for Consolidated Afloat Networks and Enterprise Services, represents a key aspect of the Navy's modernization planning. It provides an enhancement to cybersecurity, command and control, communications and intelligence systems afloat by establishing the network as the Navy's cyber platform. CANES brings significant advances in application hosting and system management, as well as reducing the number of network variants by ship class across the fleet.

With CANES, the network is firmly part of the Navy's combat capability.

In addition to a planned technology refresh cycle to pace emerging cyber threats, CANES' integrated voice, video, data and system-management functions optimizes and streamlines network system administrator workload. Reduced hardware requirements also decrease system vulnerabilities and threat attack surface area.

The network serves as the cyber platform for more than 200 applications and connected systems, including data, transport, systems management and voice and video services.

To date, the Navy has completed installation of CANES on 25 ships with 153 remaining and due to be complete by 2024. Installed systems are performing operational missions and have supported information dominance missions across the globe.

Equally essential for Navy is the reliability of its ashore networks: Navy Marine Corps Intranet (NMCI) and OCONUS Navy Enterprise Network (ONE-Net.)

NMCI is the Navy's shore-based enterprise network in the continental United States and Hawaii, providing a single integrated, secure information technology environment for reliable, stable information transfer. NMCI serves 700,000 users in 2,500 locations that send more than 33 million weekly email messages.

ONE-Net delivers comprehensive, end-to-end information and telecommunication services to OCONUS Navy shore commands by using a common computing environment for both the Non-secure IP Router Network (NIPRNet) and Secure IP Router Network (SIPRNet). Together, these systems serve as not only IT assets, but as information weapons systems in and of themselves.

To this end, both NMCI and ONE-Net operators are vigilant about cybersecurity and defending the Navy's systems against attacks to ensure user access and to protect the Navy's data and applications.

NMCI alone relies on 10 classified and 25 unclassified server farms, and 30 microserver farms to deliver enterprise network IT services to its more than 700,000 users. NMCI blocks 231 million unauthorized intrusion attempts, detects 26 million threats and blocks 3.5 million spam messages per month.

In the not too distant past, Navy networks were viewed as delivery systems for email and administrative actions. With the evolution of cyberspace capabilities and vulnerabilities, Navy networks can be viewed as cyber platforms that deliver decisive effects from seabed to space.

http://www.navy.mil/submit/display.asp?story_id=92072


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Mer 25 Nov - 05:27 (2015)    Sujet du message: LIBERTE D'EXPRESSION A LA FRANCAISE : LE SITE ALTERNATIF WeAreChange.org BLOQUE EN FRANCE Répondre en citant

LIBERTE D'EXPRESSION A LA FRANCAISE : LE SITE ALTERNATIF WeAreChange.org BLOQUE EN FRANCE

ENGLISH : Independent Media Censored Because Of New Law



VIDEO : https://www.youtube.com/watch?v=2BPNzxLcF08

Publié par wikistrike.com sur 24 Novembre 2015, 19:53pm

http://www.wikistrike.com/tag/culture%20-%20medias%20-%20livres%20-%20expos…


Le site WeAreChange.org, média indépendant centré sur l'actualité politique, sociale et culturelle, a été bloqué en France en vertu d’une loi antiterroriste adoptée récemment par le gouvernement français.

Le site a été censuré suite aux attentats de Paris perpétrés dans la nuit du 13 au 14 novembre sous prétexte de la propagation de données susceptibles de nuire à la sécurité nationale du pays. Cependant, le créateur du site, Luke Rudkowski, a affirmé que la réalité était tout autre. Selon lui, le gouvernement français cherchait à "bannir" le média qui le représentait sous un jour non-favorable.

"Les autorités françaises étaient bel et bien au courant des attaques à venir. Dans une vidéo publiée sur notre site, nous avons révélé toutes les "coïncidences" étranges survenues au cours de cette journée fatidique. Loin d'accuser qui que soit, nous n'avons fait que relater des faits bien étayés", a-t-il relevé.

Et d'ajouter: "La loi adoptée, permettant au ministre de l'Intérieur de censurer n'importe quel site Internet, constitue sans aucun doute un coup bas porté à la liberté d'expression en France".

Cependant, M. Rudkowski s'est empressé d'assurer à ses lecteurs que le site continuerait à éclairer leur lanterne sur les actualités mondiales.

A titre d'exemple, il a mis en avant une vidéo récente démontrant que les Etats-Unis auraient favorisé l'émergence de l'Etat islamique (EI) en Syrie. En outre, Washington aurait prévenu d'avance les djihadistes d'attaques à venir contre leurs camions-citernes transportant du pétrole, les Etats-Unis étant l'importateur principal de cette ressource naturelle. Détail important, il a rappelé que la chaîne américaine PBS NewsHour avait "diffusé" en direct les frappes aériennes russes contre l'EI, en les faisant passer pour des frappes américaines.

"La vérité est unique et inaltérable. Et rien au monde ne saura l'anéantir", a-t-il fustigé.

Plusieurs fusillades et attentats-suicides quasi simultanés ont visé six points de Paris et sa proche banlieue le 13 novembre 2015. Les attentats ont fait au moins 129 morts et 350 blessés. Le président Hollande a décrété l'état d'urgence.

Source

http://www.wikistrike.com/2015/11/liberte-d-expression-a-la-francaise-le-si…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Dim 29 Nov - 05:12 (2015)    Sujet du message: FRANCE STARTS SHUTTING DOWN ALTERNATIVE MEDIA SITES Répondre en citant

FRANCE STARTS SHUTTING DOWN ALTERNATIVE MEDIA SITES



VIDEO : https://www.youtube.com/watch?v=jf7GR9y_8LI


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Ven 4 Déc - 06:16 (2015)    Sujet du message: AHMET INSEL : «LA PRESSE D'OPPOSITION TURQUE EST SYSTEMATIQUEMENT REPRIMEE» Répondre en citant

AHMET INSEL : «LA PRESSE D'OPPOSITION TURQUE EST SYSTEMATIQUEMENT REPRIMEE»
 
3 déc. 2015


  Source: Reuters

Protestation contre l'arrêstation des journalsites de Cumhuriyet à Istanbul

Deux dirigeants du journal turc Cumhuriyet sont détenus pour avoir publié des informations sur les livraisons d'armes par la Turquie à des islamistes syriens. Professeur à l’université de Galatasaray et chroniqueur à Cumhuriyet, Ahmet Insel commente.

Professeur à l’université Paris 1 Panthéon-Sorbonne et à l’université de Galatasaray à Istanbul, économiste et politologue, Ahmet Insel est l’un des fondateurs de la maison d’édition turque Iletisim et l’éditeur de l’écrivain Orhan Pamuk, prix Nobel de littérature. En décembre 2008, il est l’un des quatre intellectuels turcs initiateurs de la pétition d’excuses aux Arméniens. Il est l’auteur de plusieurs ouvrages dont «La nouvelle Turquie d’Erdogan» (La Découverte, 2015). Ahmet Insel contribue à plusieurs journaux turcs dont Radikal, Birikim et Cumhuriyet.

«Les pouvoirs autoritaires n’aiment pas quand on révèle la vérité de leurs mensonges», s’indigne Ahmet Insel.

Les journalistes sont accusés d'«espionnage» par le pouvoir turc, de «trahison» et de «divulgation de secrets d'Etat» pour avoir publié en mai 2015 un article sur de possibles livraisons d'armes par les services secrets turcs (MIT) à des islamistes en Syrie. Les faits remontent à janvier 2014, le journal les a publiés 15 mois plus tard.

Dans l’article il ne s’agit pas de Daesh, mais des preuves sont fournies concernant les livraisons d’armes vers des groupes d’opposition syriens. «A l’époque Daesh n’était pas si puissant», affirme l’universitaire.

Avec l'UE préoccupée par l’affaire des journalistes d’opposition arrêtés, Monsieur Insel pense qu’en Turquie «on continue à parler librement». Le journal Cumhuriyet, a notamment publié aujourd’hui les révélations du ministère de la défense russe concernant l’implication de la famille Erdogan dans la vente du pétrole de Daesh. «C’est à la une du journal aujourd’hui», indique Ahmet Insel.

Le chroniqueur de Cumhuriyet estime que le journal va probablement encore subir des représailles de la part des autorités. «Nous avons appris que les inspecteurs des finances ont décidé d’entamer un contrôle fiscal du journal sur un an, s’inquiète Ahmet Insel., il va probablement y avoir des pressions de ce type, et cela va continuer».

Quant à la détention des journalistes de Cumhuriyet, qui risquent 45 ans de prison, l’universitaire n’est pas persuadé qu’ils vont réellement purger la totalité de cette peine : «En Turquie, nous sommes spécialistes des procès qui ouvrent en annonçant une peine de 45 ans pour ce genre de choses, mais après le ton change», confie Ahmet Insel. «Par contre, ils peuvent malheureusement rester en détention provisoire un bon bout de temps avant d’être déférés devant le tribunal. C’est déjà inadmissible».



Un rédacteur turc poursuivi pour avoir révélé des livraisons d'armes aux combattant syriens


Cumhuriyet n’est pas le seul journal à subir des pressions de la part des autorités turques. Selon Ahmet Insel, la presse appartenant à la communauté Gülen endure des représailles «parce que Recep Tayyip Erdogan a décidé que la communauté Gülen était son ennemie». Le président turc l’accuse notamment d’avoir révélé des informations sur la corruption en décembre 2013. «Ils ont saisi les biens appartenant aux membres de cette communauté et ils les accusent d’être une organisation terroriste», déplore l’universitaire. Les autorités ont saisi des journaux et ont fermé des chaînes de télévision. Cela révèle la tendance générale en ce qui concerne la presse d’opposition, d’extrême gauche qui est «systématiquement réprimée» : «Il y a environ 23 journalistes en prison en Turquie, soit en détention provisoire, soit condamnés», conclut Ahmet Insel.

Les opinions, assertions et points de vue exprimés dans cette section sont le fait de leur auteur et ne peuvent en aucun cas être imputés à RT.

https://francais.rt.com/opinions/11507-ahmet-insel-presse-opposition-turque…



Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Lun 7 Déc - 04:12 (2015)    Sujet du message: FACEBOOK SHUTTING 1,000’S OF TRUTHERS DOWN & WHAT WAS SEEN IN THEIR OFFICE WILL SHOCK YOU Répondre en citant

FACEBOOK SHUTTING 1,000’S OF TRUTHERS DOWN & WHAT WAS SEEN IN THEIR OFFICE WILL SHOCK YOU 



VIDEO : https://www.youtube.com/watch?v=Wgd4UHEWZ3Y


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Mar 8 Déc - 00:00 (2015)    Sujet du message: LA FRANCE VEUT BLOQUER LES WIFI PUBLICS Répondre en citant

LA FRANCE VEUT BLOQUER LES WIFI PUBLICS

© AFP 2015. Michael Cizek

France
20:31 07.12.2015(mis à jour 21:02 07.12.2015) 

Dans le cadre de la politique anti-terroriste le ministère français de l'Intérieur propose plusieurs mesures permettant de mieux identifier les internautes et de capter leurs échanges. Coupure obligatoire de tout réseau Wifi public et blocage des réseaux d'anonymisation font partie des pistes soumises à arbitrage.


Le journal Le Monde a publié cette semaine une liste de mesures législatives, établie par la Direction des libertés publiques et des affaires juridiques (DLPAJ), que le ministère français de l’Intérieur aimerait faire passer dans les projets de loi en cours d’élaboration.


© Flickr/ Youssef Hanna

Blocage des sites Internet en France: lutte antiterroriste ou censure?

Parmi ces mesures hypothétiques figure une série de nouvelles restrictions des libertés sur Internet:

"Interdire les connexions Wifi libres et partagées"
durant l'état d'urgence et supprimer les "connexions Wifi publiques". La fermeture de toute connexion permettra à la police de s’assurer d’avoir un identifiant précis pour chaque adresse IP, ou au moins de réduire la liste des suspects possibles dans un même foyer.Mais comment le gouvernement mettra-t-il en œuvre cette idée? Il s'agirait d'une mesure sans précédent dans un pays comme la France où les réseaux ouverts sont extrêmement nombreux: aujourd’hui la France possède le réseau le plus développé au monde de Wifi avec plus de 13 millions de bornes publiques, selon l’étude du cabinet spécialisé Maravedis Rethink pour la société iPass

"Interdire et bloquer les communications des réseaux Tor en France". Ce logiciel est utilisé par une minorité particulièrement sensible à l'anonymat. Tor n’a pas bonne presse partout: il est souvent cité par Interpol dans des affaires de pédopornographie, les cybercriminels et les terroristes utilisent aussi souvent ce réseau d'anonymisation. Cette mesure totalement disproportionnée ferait franchement mauvais genre alors que Tor aide beaucoup d'autres individus comme les journalistes, les lanceurs d'alerte ou les défenseurs des droits à diffuser des informations importantes. De plus, si la France bloquait Tor, elle deviendrait le troisième pays à le faire après l’Iran et la Chine.  
     

© Photo. Pixabay

La Chine renforce son contrôle sur Internet

Il n’y a aucune preuve que les auteurs des attentats aient communiqué à l’aide d’un quelconque Wifi public ou via Tor. Il est fort probable qu’ils aient juste échangé de banals SMS. Et après, bloquer les SMS? Bloquons La Poste aussi alors. Les terroristes peuvent échanger des lettres et des CD-Rom par courrier. Faire d’Internet une plateforme plus sûre et transparente est un but louable, mais est-ce que ça en vaut vraiment le coup?

Lire aussi:

Blocage des sites Internet en France: lutte antiterroriste ou censure?Lutte contre l'EI: l'Inde se décide à renforcer son contrôle sur Internet?L'internet russe ne peut être isolé de la toile mondiale

http://fr.sputniknews.com/france/20151207/1020122506/tor-wifi-blocage.html#…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Sam 12 Déc - 19:17 (2015)    Sujet du message: VOUS AVEZ TELECHARGE ILLEGALEMENT UN FILM, UNE SERIE OU DE LA MUSIQUE? VOUS ÊTES DONC CYBERDELINQUANT ET SEREZ FICHE AVEC LES TERRORISTES Répondre en citant



VOUS AVEZ TELECHARGE ILLEGALEMENT UN FILM, UNE SERIE OU DE LA MUSIQUE? VOUS ÊTES DONC CYBERDELINQUANT ET SEREZ FICHE AVEC LES TERRORISTES

Croyez-vous encore que l'état d'urgence, en France, sera enlevé dans 3 mois avec toutes ses nouvelles lois qui prennent place pour nous opprimer et nous criminaliser encore plus?
Cela implique entre autre que la plupart des blogs de ré-information sont également dans l’illégalité, et que les auteurs sont donc fichés et considérés comme étant des criminels au même titre qu’un terroriste. Car oui, nous reprenons des articles soit partiellement soit dans leur intégralité, et que de ce fait nous touchons aux droits de reproduction, en clair, du piratage, même si tout cela n’est pas signalé dans l’article qui suit, c’est un fait. Je doit donc être fiché, et ceux qui s’intéressent à ma vie doivent sacrément se faire ch*** tant elle est palpitante…

Nous sommes en plein Big Brother, et le seul véritable droit, c’est celui de rapporter un maximum d’argent à certaines multinationales, et en aucun cas de leur en faire perdre…



Citation:


Adoptée en commission par le Parlement européen et demandée avec insistance par la France au prétexte de la lutte contre le terrorisme, la directive PNR (Passenger Name Records) permettra à l’État de connaître les déplacements en avion de très nombreux Européens et de les exploiter y compris pour des infractions graves », dont le piratage.

Jeudi, la Commission des libertés civiles du Parlement européen a adopté la directive PNR (Passenger Name Record) qui, si elle est confirmée en séance plénière du PE au début de l’année 2016, permettra aux états membres de l’Union européenne de collecter toutes les informations liées aux « vols extra-UE » voire à certains vols intra-UE. Ces informations comprendront notamment le nom des passagers, les dates de voyage, l’itinéraire prévu, les moyens de paiement utilisés, les coordonnées des voyageurs, les bagages enregistrés, etc., etc.

Le PNR européen est une demande insistante de certains gouvernements, et notamment de la France, qui revient comme une antienne à chaque attentat. Elle est donc logiquement revenue — et avec force — dans les discours de Manuel Valls après les tragiques attentats du 13 novembre 2015 à Paris. « Je ne comprends pas que des parlementaires européens, y compris des Français, s’opposent à cet instrument indispensable pour lutter contre le terrorisme », avait-il déclaré devant le Sénat le 20 novembre dernier.

« Ceci nous permettra de disposer d’un fichier garantissant la traçabilité des déplacements, y compris à l’intérieur de l’Union. C’est une condition de notre sécurité collective », avait plaidé le Premier ministre français. Mais il n’a jamais expliqué en quoi le PNR généralisé à l’ensemble des passagers des vols européens aurait aidé à éviter les événements tragiques de novembre, alors-même que les auteurs étaient déjà fichés et pouvaient donc faire l’objet de signalements individualisés lors de leurs passages aux frontières. Les experts de l’anti-terrorisme sont d’ailleurs très réservés sur l’utilité réelle du PNR, et encore plus sur sa nécessité.

Le PNR pourra servir contre « la contrefaçon et le piratage de produits »
 
Mais un esprit suspicieux comme le nôtre ne peut s’empêcher de faire remarquer que le PNR européen est loin d’être réservé au terrorisme. La directive projetée dispose que les données liées aux vols conservées pendant 5 ans (dont 6 mois sans restrictions d’accès) peuvent être traitées par les autorités pour « la prévention et la détection d’infractions terroristes et de certains types d’infractions transnationales graves ». Or la liste de ces dernières est longue :
  • Participation à une organisation criminelle,
  • Traite des êtres humains, aide à l’entrée et au séjour irréguliers, trafic illicite d’organes et de tissus humains,
  • exploitation sexuelle des enfants et pédopornographie, viol, mutilation génitale féminine,
  • trafic illicite de stupéfiants et de substances psychotropes,
  • trafic illicite d’armes, de munitions et d’explosifs,
  • fraude grave, fraude portant atteinte aux intérêts financiers de l’Union, blanchiment du produit du crime, blanchiment d’argent et faux monnayage,
  • homicide volontaire, coups et blessures graves, enlèvement, séquestration et prise d’otage, vol avec arme,
  • infractions informatiques graves et cybercriminalité,
  • crimes contre l’environnement, y compris le trafic illicite d’espèces animales menacées et le trafic illicite d’espèces et d’essences végétales menacées,
  • falsification de documents administratifs et trafic de faux, trafic de biens culturels, y compris d’antiquités et d’œuvres d’art, contrefaçon et piratage de produits,
  • détournement d’avion / de navire,
  • espionnage et trahison,
  • trafic et commerce illicites de matières nucléaires et radioactives et de leurs précurseurs et, à cet égard, infractions à la non-prolifération,
  • crimes contre l’environnement, y compris le trafic illicite d’espèces animales menacées et le trafic illicite d’espèces et d’essences végétales menacées,
  • crimes relevant de la juridiction de la Cour pénale internationale.
Ainsi le fait de télécharger des séries TV illégalement et de les partager sur BitTorrent pourrait théoriquement justifier d’accéder aux données PNR du suspect pour savoir où il se balade en Europe ou en dehors de l’Europe, tout comme n’importe quelle « cybercriminalité », qui regroupe en principe l’ensemble des infractions pénales commises sur Internet.

La directive demande simplement qu’il s’agisse d’actes de cybercriminalité punissables d’au moins de 3 ans de prison, ce qui est le cas en France de nombreuses atteintes aux systèmes informatiques, y compris « le fait d’entraver ou de fausser le fonctionnement d’un système de traitement automatisé de données » (puni de 5 ans), ce qui peut être fait avec une simple attaque DDOS.

Une fois adoptée par le Parlement, la directive devra être adoptée formellement par les états membres au sein du Conseil du ministres, puis les états membres auront deux ans pour transposer le texte en droit national.

Source: Numérama via Sott.net

http://lesmoutonsenrages.fr/2015/12/11/vous-avez-telecharge-illegalement-un-film-une-serie-ou-de-la-musique-vous-etes-donc-un-cyberdelinquant-et-serez-fiche-avec-les-terroristes/



Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Sam 19 Déc - 08:12 (2015)    Sujet du message: CONGRESS SLIPS CISA INTO A BUDGET BILL THAT'S SURE TO PASS Répondre en citant

CONGRESS SLIPS CISA INTO A BUDGET BILL THAT'S SURE TO PASS
  • ndy Greenberg Security
  • Date of Publication: 12.16.15. 12.16.15
  • Time of Publication: 12:24 pm. 12:24 pm

Chip Somodevilla/Getty Images
Update 12/18/2015 12pm: The House and Senate have now passed the omnibus bill, including the new version of CISA.

Privacy advocates were aghast in October when the Senate passed the Cybersecurity Information Sharing Act by a vote of 74 to 21, leaving intact portions of the law they say make it more amenable to surveillance than actual security. Now, as CISA gets closer to the President’s desk, those privacy critics argue that Congress has quietly stripped out even more of its remaining privacy protections.

In a late-night session of Congress, House Speaker Paul Ryan announced a new version of the “omnibus” bill, a massive piece of legislation that deals with much of the federal government’s funding. It now includes a version of CISA as well. Lumping CISA in with the omnibus bill further reduces any chance for debate over its surveillance-friendly provisions, or a White House veto. And the latest version actually chips away even further at the remaining personal information protections that privacy advocates had fought for in the version of the bill that passed the Senate.

“They took a bad bill, and they made it worse,” says Robyn Greene, policy counsel for the Open Technology Institute.

CISA had alarmed the privacy community by giving companies the ability to share cybersecurity information with federal agencies, including the NSA, “notwithstanding any other provision of law.” That means CISA’s information-sharing channel, ostensibly created for responding quickly to hacks and breaches, could also provide a loophole in privacy laws that enabled intelligence and law enforcement surveillance without a warrant.

The latest version of the bill appended to the omnibus legislation seems to exacerbate that problem. It creates the ability for the president to set up “portals” for agencies like the FBI and the Office of the Director of National Intelligence, so that companies hand information directly to law enforcement and intelligence agencies instead of to the Department of Homeland Security. And it also changes when information shared for cybersecurity reasons can be used for law enforcement investigations. The earlier bill had only allowed that backchannel use of the data for law enforcement in cases of “imminent threats,” while the new bill requires just a “specific threat,” potentially allowing the search of the data for any specific terms regardless of timeliness.

Senator Ron Wyden also spoke out against the changes to the bill in a press statement, writing they’d worsened a bill he already opposed as a surveillance bill in the guise of cybersecurity protections. “Americans deserve policies that protect both their security and their liberty,” he wrote. “This bill fails on both counts.” Senator Richard Burr, who had introduced the earlier version of bill, didn’t immediately respond to a request for comment.

Even in its earlier version, CISA had drawn the opposition of tech firms including Apple, Twitter, and Reddit, as well as the Business Software Alliance and the Computer and Communications Industry Association. In April, a coalition of 55 civil liberties groups and security experts signed onto an open letter opposing it. In July, the Department of Homeland Security itself warned that the bill could overwhelm the agency with data of “dubious value” at the same time as it “sweep away privacy protections.”

That Senate CISA bill was already likely on its way to become law. The White House expressed its support for the bill in August, despite its threat to veto similar legislation in the past. But the inclusion of CISA in the omnibus package may make it even more likely to be signed into law in its current form. Any “nay” vote in the house—or President Obama’s veto—would also threaten the entire budget of the federal government.

They’re kind of pulling a Patriot Act,” says OTI’s Greene. “They’ve got this bill that’s kicked around for years and had been too controversial to pass, so they’ve seen an opportunity to push it through without debate. And they’re taking that opportunity.”

http://www.wired.com/2015/12/congress-slips-cisa-into-omnibus-bill-thats-sure-to-pass/


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Dim 20 Déc - 05:49 (2015)    Sujet du message: CONGRESS PASSES LONG-STALLED CYBERSECURITY BILL Répondre en citant

CONGRESS PASSES LONG-STALLED CYBERSECURITY BILL

By Rob Lever
Washington (AFP) Dec 18, 2015



Congress on Friday passed legislation to fight cyber threats, pushing the measure through by tucking it into a sprawling government funding bill, after earlier failed attempts.

The measure was inserted into the massive $1.1 trillion spending package that funds the government through next September, tightens visa requirements, and ends a longstanding oil export ban, among other moves.

The so-called "omnibus" funding bill, which easily passed in the Senate, also in the process gave congressional approval to the landmark Cybersecurity Act.

The measure was approved with blessings from the White House, over objections of privacy activists.
Officials with the House Homeland Security Committee said in a statement that the bill would protect America's private sector and federal networks "which are under continuous threat from foreign hackers and cyber terrorists."

Separate versions of the bill were approved earlier this year by the Senate and House of Representatives.
Passage of the measure "ensures our federal cyber networks are able to defend against nation-states like China, Russia, Iran, and North Korea and terrorist threats," said Congressman Michael McCaul, chairman of the homeland security panel.

"This streamlines the federal government's ability to more effectively identify and thwart cyber-attacks," he said.

President Barack Obama would get a victory with the approval after several years of seeking legislation to boost cybersecurity. Previous efforts were bogged down by opposition from activists who feared it would result in excessive government intrusion, and conservatives who argue it would create a new bureaucracy.

Obama welcomed the measure, a senior US official said. "The president has long called on Congress to pass cybersecurity information-sharing legislation that will help the private sector and government share more cyber threat information by providing for targeted liability protections while carefully safeguarding privacy, confidentiality, and civil liberties," the official said.

House intelligence committee chairman Devin Nunes said the measure was "vital for protecting America's digital networks," and added that it was part of a broader effort "giving our intelligence community the tools it needs to identify, disrupt, and defeat threats to the homeland and our infrastructure."

A key element in the legislation would shield private companies from liability if they report or share information about cyber threats.

The measure would establish the Department of Homeland Security as a "portal" for cyber threat information sharing. It would also authorize "defensive measures" that could disable or counter a cybersecurity threat.

The action comes amid growing concerns over threats to so-called critical infrastructure, which includes power grids, water systems, key industrial controls and especially the US financial system, which has been hit by numerous cyber attacks in recent months.

- New NSA tool? -

The compromise comes just months after Congress voted to rein in the powers of the National Security Agency, following revelations of vast surveillance programs in documents leaked by former intelligence contractor Edward Snowden.

Critics said the latest version of the bill is the result of secret negotiations which stripped out nearly all privacy protections, and that the definition of cyber threat is so vague that it would encourage companies to report many activities to law enforcement.

Fifty-one groups active on privacy and digital rights signed a letter Thursday opposing the bill, saying it "seriously threatens privacy, civil liberties, and government accountability, and would undermine cybersecurity, rather than enhance it."

Robyn Greene of the New America Foundation's Open Technology Institute said the political maneuvering underscored how controversial the legislation is.
"Sponsors (of the bill) and congressional leadership are choosing to force its passage without debate or a vote by attaching it to a must-pass spending bill," she said.
The American Civil Liberties Union said the measure "would allow companies to share large amounts of private consumer information with government agencies, including possibly the FBI and NSA."

This could be used for criminal prosecutions unrelated to cybersecurity, "including the targeting of whistleblowers under the Espionage Act," an ACLU statement said.

A large number of Silicon Valley companies such as Apple, Yelp and Dropbox have publicly opposed earlier versions of the legislation, but some tech firms involved in cybersecurity such as IBM have supported the effort.

Senator Ron Wyden, who opposed the bill passed in the Senate, said the latest version was worse from a privacy perspective.

"This 'cybersecurity' bill was a bad bill when it passed the Senate and it is an even worse bill today," he said in a statement.

"Americans deserve policies that protect both their security and their liberty. This bill fails on both counts."

rl-sg/jm
YELP
APPLE INC.

http://www.spacewar.com/reports/Congress_passes_long-stalled_cybersecurity_bill_999.html


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Lun 21 Déc - 03:12 (2015)    Sujet du message: UPDATE: CYBERWARFARE, WE'RE ATTACKING OURSELVES, WILL OUR BANKS GO DOWN? Répondre en citant

CYBERWAR

UPDATE: CYBERWARFARE, WE'RE ATTACKING OURSELVES, WILL OUR BANKS GO DOWN?




VIDEO : https://www.youtube.com/watch?v=tfgAH7Xw5Yg


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Mer 23 Déc - 06:59 (2015)    Sujet du message: TROIS NOMINATIONS DE NOËL DU PAPE FRANCOIS Répondre en citant

TROIS NOMINATIONS DE NOËL DU PAPE FRANCOIS

ENGLISH :POPE APPOINTS DIRECTOR OF VATICAN TELEVISION, DEPUTY DIRECTOR OF PRESS OFFICE 
http://www.zenit.org/en/articles/pope-appoints-director-of-vatican-television-deputy-director-of-press-office


 
Reference: ZENIT, Wlodzimierz Redzioch

Communication et culture

Anita Bourdin | 22 déc. | ZENIT.org | Pape François | Rome 

Le pape François a effectué trois nominations qui commencent à remodeler la communication du Saint-Siège, en ces derniers jours de préparation à Noël.

Première nomination : Mgr Paul Tighe, Irlandais, secrétaire du Conseil pontifical pour les communications sociales, est nommé Secrétaire adjoint du Conseil pontifical pour la culture, avec le rang d’évêque, donc aux côtés du Secrétaire, Mgr Barthélémy Adoukonou, du Bénin.

Deuxième nomination: Greg Burke, 56 ans, consultant pour la communication au sein de la section pour les Affaires générales de la Secrétairerie d’Etat depuis 2012, est nommé vice-directeur de la Salle de presse du Saint-Siège: il prendra ses fonctions le 1er février 2016. Journaliste américain, Greg Burke a été correspondant à Rome et au Vatican de Time Magazine et de Fox News. Il est membre numéraire de l’Opus Dei.

Troisième nomination: comme nouveau directeur du Centre de télévision du Vatican, le pape a nommé M. Stefano D’Agostini, jusqu’ici responsable technique du CTV. Depuis 1983, il réalise les principales “directes” de la télévision du Vatican. Il succède à Mgr Dario Vigano nommé en juin dernier à la tête du Secrétariat pour l’information, chargé de la réforme de la communication et de l’information du Vatican.

http://www.zenit.org/fr/articles/trois-nominations-de-noel-du-pape-francois?utm_campaign=francaishtml&utm_content=[ZF151222]%20Le%20monde%20vu%20de%20Rome&utm_medium=email&utm_source=dispatch&utm_term=Image


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Ven 25 Déc - 07:27 (2015)    Sujet du message: FIN DE LA LIBERTE D'EXPRESSION SUR INTERNET : Erreur 451 – LE CODE DE CENSURE WEB PAR L'INTERNET ENGINEERING TASK FORCE Répondre en citant





FIN DE LA LIBERTE D'EXPRESSION SUR INTERNET : Erreur 451 – LE CODE DE CENSURE WEB PAR L'INTERNET ENGINEERING TASK FORCE



Nous y sommes, désormais... Vic.




L’Internet Engineering Task Force vient de confirmer la création d’un tout nouveau code erreur pour les sites censurés par les autorités : ces derniers pourront afficher « Erreur 451 ». La proposition a été votée et l’Internet Engineering Task Force (IETF) et plus particulièrement l’Internet Engineering Steering Group vient de confirmer l’arrivée d’un nouveau message d’erreur Internet. Après les erreurs 404, 500 ou encore 503, voici venu l’erreur 451.

http://lesmoutonsenrages.fr/2015/12/24/erreur-451-le-code-de-censure-web-pa…Pour rappel, les codes sont tous référencés sur cette page.

VIDEO : http://www.dailymotion.com/video/x3iwk19_451-le-chiffre-qui-denonce-la-cens…

Ce nouveau code HTTP est inspiré par un des romans les plus célèbres de toute l’histoire de la SF, à savoir le fameux Farenheit 451 de Ray Bradbury. Il signifiera que le site visité a été interdit par les autorités et censuré, plus explicite que la classique erreur 404, indiquant que le site est inaccessible, message bien plus précis donc et explicatif, indiquant clairement que le site n’est pas victime d’un problème technique ou d’un piratage, mais bien d’une décision gouvernementale.




Citation:


Widgets Amazon.fr
« Dans certaines juridictions, je pense que des gouvernements restrictifs vont refuser l’utilisation du code 451 pour cacher ce qu’ils font. Nous ne pouvons pas stopper ça, mais si des gouvernements vont dans ce sens, ils enverront un signal fort à leurs citoyens sur leur intention« , commente Mark Nottingham, président du groupe de travail HTTP au sein de l’IETF.





Il est clair que les pays qui pratiquent la censure à grande échelle, comme la Chine, l’Iran ou la Turquie, pourraient bien décider de bannir ce nouveau message « Erreur 451« , bien trop précis pour eux et leurs enjeux… ayant la dénomination complète « 451 Unavailable For Legal Reasons ».

  
Crédits image : 451unavailable.org

http://www.undernews.fr/libertes-neutralite/erreur-451-le-code-de-censure-web-par-linternet-engineering-task-force.html


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Ven 1 Jan - 07:04 (2016)    Sujet du message: TWITTER PROMET DE LIMITER LES PROPOS «VIOLENTS» ET «HAINEUX» Répondre en citant

TWITTER PROMET DE LIMITER LES PROPOS «VIOLENTS» ET «HAINEUX»

 

Twitter a expliqué qu'il souhaitait ainsi «mettre davantage de transparence dans le dialogue avec l'opinion».
PHOTO ARCHIVES AFP



Agence France-Presse
Washington


Le réseau social Twitter a déclaré mardi qu'il allait prendre des mesures pour endiguer «les comportements violents et les propos haineux» sur sa plateforme.

Cette décision intervient après des critiques émanant de plusieurs pays, dont les États-Unis, à l'encontre des réseaux sociaux et du rôle qu'ils ont pu jouer lors des attentats de Paris et de San Bernardino, en Californie.

«Protéger les gens face aux insultes et au harcèlement est quelque chose de vital pour qu'ils puissent s'exprimer librement sur Twitter», a déclaré Megan Cristina, responsable de la sécurité en ligne de Twitter.

«Nous poursuivons nos efforts pour combattre les abus et mettons à jour les règles de Twitter pour expliciter clairement ce que nous considérons être des comportements violents et des propos haineux», a-t-elle ajouté dans un communiqué.

Les nouvelles règles de Twitter expliquent que les utilisateurs «ne doivent pas proférer de menaces ni inciter quiconque à la violence, ce qui inclut les menaces terroristes et l'apologie du terrorisme», et qu'ils ne doivent pas se livrer «au harcèlement d'autres personnes, ni inciter à le faire».

Il est également précisé que les internautes «ne doivent pas directement attaquer ni menacer d'autres personnes, ni inciter à la violence envers elles sur la base des critères suivants: race, origine ethnique, nationalité, orientation sexuelle, sexe, identité sexuelle, appartenance religieuse, âge, handicap ou maladie».

Les dirigeants américains et européens ont appelé les réseaux sociaux à faire plus d'efforts face aux utilisateurs qui projetteraient de mener des attaques.

La Maison-Blanche avait demandé il y a quelques semaines «un dialogue» avec la Silicon Valley sur ce sujet, en expliquant qu'il fallait que plus de mesures soient prises «quand l'usage fait des réseaux sociaux passe de la communication à la préparation d'attaques terroristes».

La Commission européenne a également appelé à plus de dialogues avec les responsables des principaux réseaux sociaux.

En France, des mesures d'urgence permettant la fermeture de sites ou de comptes encourageant des activités terroristes ont été prises par le gouvernement.

http://techno.lapresse.ca/nouvelles/internet/201512/29/01-4935298-twitter-p…



Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Ven 1 Jan - 07:09 (2016)    Sujet du message: LE PATRON DE FACEBOOK S'ELEVE CONTRE LE DISCOURS ANTI-MUSULMANS Répondre en citant

LE PATRON DE FACEBOOK S'ELEVE CONTRE LE DISCOURS ANTI-MUSULMANS


Agrandir
Mark Zuckerberg
PHOTO AP



Agence France-Presse
San Francisco


Le patron de Facebook, Mark Zuckerberg, s'est élevé publiquement mercredi contre le discours anti-musulmans entendu depuis les attentats de Paris et l'attaque de San Bernardino en Californie, l'Américain Donald Trump voulant notamment leur interdire l'entrée aux États-Unis.

«Je veux joindre ma voix à celles qui soutiennent les musulmans de notre pays et du monde entier», écrit Mark Zuckerberg sur sa page Facebook.
«Après les attentats de Paris et la haine vue cette semaine, je ne peux qu'imaginer la peur que les musulmans peuvent ressentir d'être persécutés à cause d'actes commis par d'autres», ajoute-t-il.

«En tant que juif, mes parents m'ont appris que nous devons nous élever contre les attaques visant n'importe quelle communauté. Même si l'attaque ne vous vise pas aujourd'hui, les attaques contre la liberté de quiconque finissent par nuire à tous», poursuit le patron de Facebook.

«Si vous êtes musulmans dans ce pays, en tant que chef de Facebook, je veux que vous sachiez que vous serez toujours les bienvenus ici et que nous nous battrons pour protéger vos droits et vous créer un environnement sûr et pacifique», dit-il encore.

Insensible aux condamnations internationales, le favori pour l'investiture du parti républicain à la Maison Blanche Donald Trump a défendu depuis lundi son idée de barrer l'entrée des musulmans aux Etats-Unis, présentée après la tuerie de San Bernardino en Californie, survenue le 2 décembre, et les attentats du 13 novembre à Paris.

Citation:

I want to add my voice in support of Muslims in our community and around the world.After the Paris attacks and hate...
Posted by Mark Zuckerberg on Wednesday, December 9, 2015


http://techno.lapresse.ca/nouvelles/internet/201512/09/01-4929580-le-patron…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Sam 2 Jan - 04:24 (2016)    Sujet du message: ENGAGING THE INTERNATIONAL COMMUNITY ON CYBERSECURITY STANDARDS Répondre en citant

ENGAGING THE INTERNATIONAL COMMUNITY ON CYBERSECURITY STANDARDS

December 23, 2015 at 5:51 PM ET by J. Michael Daniel

Summary: 
The administration releases a new strategy to improve the U.S. government’s participation in the development and use of international standards for cybersecurity.

U.S. companies are most effective when they can rely on the same cybersecurity standards overseas as they do in the United States. Not only do common standards make it easier for product development and sales, companies can more easily maintain and enhance network defense and resilience, which are vital in today’s world of diverse cyber threats.  That’s why I am pleased to announce the release of a new strategy to improve the U.S. government’s participation in the development and use of international standards for cybersecurity. This new report, entitled “Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity ” and “Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity,” articulates U.S. government strategic objectives and outlines recommendations to achieve those objectives.

The U.S. approach to developing international standards relies on hundreds of mostly non-governmental organizations to develop standards and specifications and to provide the infrastructure for the preparation of standards documents.  This approach allows the users of standards, as well as representatives from industry, academia, and government, to all participate in the standards development process. The U.S. Government receives no preferential treatment in this process. This non-governmental approach yields standards of better technical rigor and industry uptake, helps support innovation, and enables the rapid adaptation and evolution of standards.

When used to support cybersecurity standards, this development structure helps improve the effectiveness of those standards in promoting security and resiliency of critical information and communications infrastructure internationally.  The process also builds trust among those creating and those using the solutions throughout the world.  These standards include cybersecurity measures that are necessary to protect everyday applications such as online commerce, smart electricity meters, networked medical devices, and online banking.  Simply put, we believe that a consensus-based, private sector-driven international standards development process, with input from all interested stakeholders, is superior to a top-down, national government-controlled approach to standards.  We are committed to advocating for the adoption of a global approach to standards development around the world.

The report supports the 2010 United States Standards Strategy, which was developed through a public-private partnership coordinated by the American National Standards Institute, and outlines the contribution of private-sector led standards development to competition and innovation in the U.S. economy and the imperative of public and private-sector participation and collaboration. The strategy is also fully consistent with the standards-related provisions of the National Technology Transfer and Advancement Act, as well as OMB Circular A-119, which sets out Federal standards policy.

The Cybersecurity Enhancement Act of 2014 directed the National Institute of Standards and Technology (NIST) to work with relevant federal agencies to ensure interagency coordination in “the development of international technical standards related to information system security” and to “ensure consultation with appropriate private sector stakeholders.” NIST worked with those agencies, and consulted with the private sector, in the development of a strategy to implement the Act via a newly established International Cybersecurity Standards (ICS) Working Group. The ICS Working Group has now been asked to coordinate implementation of the recommendations in the report.  The Working Group looks forward to working with private sector partners on implementation in 2016.

J. Michael Daniel is Special Assistant to the President and Cybersecurity Coordinator

https://www.whitehouse.gov/blog/2015/12/23/engaging-international-community…



Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Sam 9 Jan - 05:42 (2016)    Sujet du message: LES ETATS-UNIS VONT CREER UNE CELLULE ANTI-RADICALISATION DJIHADISTE, SELON LA MAISON BLANCHE Répondre en citant

LES ETATS-UNIS VONT CREER UNE CELLULE ANTI-RADICALISATION DJIHADISTE, SELON LA MAISON BLANCHE

Ici, quelques documents nous démontrant que cette cellule anti-radicalisation sera utilisée afin de criminaliser ceux qui se tiennent debout pour la vérité et non contre les dihadistes. Le projet de loi H.Res 569 nous montre très bien qui pousse cette criminalisation. Les attentats servent de prétextes afin de mettre en place la dictature globale.

DEM'S H.RES 569 FURTHERS CLINTON-OIC CAUSE TO CRIMINALIZE CRITICISM OF ISLAM IN U.S.
Loi qui va criminaliser toute critique contre l'islam aux Etats-Unis -Hillary Clinton et l'OCI impliqués

http://rightwingnews.com/top-news/no-house-dems-strike-to-implement-first-s…

http://www.newenglishreview.org/blog_direct_link.cfm/blog_id/63216/HRes--569-Furthers-Cause-of-Organization-of-Islamic-Cooperation--to-Criminalize-Criticism-of-Islam-in-US

UNITED NATIONS’ OIC HEAD : FREE SPEECH THAT CRITICIZES ISLAM IS TOTALLY UNACCEPTABLE!

L'OCI, à l'Unesco dit que les critiques contre l'Islam sont inacceptables

http://www.dcclothesline.com/2015/12/26/united-nations-oic-head-free-speech…

WILL TWITTER DECLARE WAR ON RELIGIOUS CONSERVATIVES?
Twitter déclarera-t-elle la guerre contre les conservateurs religieux?

Nous ne tolérons pas les comportements qui franchit la ligne en abus, y compris le comportement qui harcèle, intimide ou utilise la peur pour faire taire la voix d'un autre utilisateur ».
"Vous ne pouvez pas promouvoir la violence contre ou directement attaquer ou menacer d'autres personnes sur la base de la race, l'ethnie, l'origine nationale, l'orientation sexuelle, le sexe, l'identité de genre, l'appartenance religieuse, l'âge, le handicap ou la maladie." Considérez comme 'micro-agression".

Cet article est en rapport avec ceux qui sont contre tout ce mouvement du LGBT et contre l'ismamophobie (Israël et Palestine). Les comptes dénonçant le comportement des musulmans en Israël et ailleurs sont de plus en plus fermés.

http://www.charismanews.com/opinion/in-the-line-of-fire/54221-will-twitter-declare-war-on-religious-conservatives

IS FACEBOOK BIASED?
Est-ce que Facebook est biaisé?

Deux comptes ont été ouverts un pour la Palestine et un pour Israël. Celui de la Palestine est resté ouvert, alors que celui d'Israël condamnant les actes terroristes a été fermé, car il contrevenait aux règles établies par Facebook.

VIDEO : http://www.sendspace.com/file/59o2eq

-----

8 janv. 2016, 21:17

- Avec AFP


 © Wikipédia
La Maison Blanche à Washington.

La Maison Blanche a annoncé vendredi la mise en place d'une cellule destinée à lutter contre l'extrémisme violent et la radicalisation d'individus aux Etats-Unis après les attentats djihadistes de Paris et San Bernardino (Californie).

Cette cellule aura pour objectif d'«intégrer et harmoniser» les efforts engagés en ce sens sur le territoire américain par différentes agences fédérales, a précisé Ned Price, porte-parole du Conseil de sécurité nationale (NSC).



«Les terribles attentats de Paris et San Bernardino cet hiver ont mis en lumière la nécessité pour les Etats-Unis (...) de priver les extrémistes violents tels que ceux de l'organisation Etat islamique d'un terreau fertile de recrutement», a indiqué Ned Price.


Un New-Yorkais inculpé pour avoir préparé une attaque terroriste le soir du nouvel an

Cette annonce intervient alors que plusieurs haut responsables de la Maison Blanche rencontrent dans la Silicon Valley (Californie) les géants de l'internet (Facebook, Google, Twitter, YouTube...) pour étudier avec eux comment riposter à l'utilisation par l'EI des réseaux sociaux.

Ces différentes initiatives reflètent «l'engagement du président Obama à prendre toutes les mesures possibles pour faire face aux activités terroristes et les interdire où qu'elles soient, y compris en ligne», a ajouté le porte-parole du NSC dans un communiqué.

https://francais.rt.com/international/13527-maison-blanche-cellule-anti-dji…



Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Dim 10 Jan - 03:54 (2016)    Sujet du message: AFTER MUSLIM RAPES (AND POLICE COVER UP), GERMANY TEAMS WITH FACEBOOK, GOOGLE AND TWITTER TO CENSOR CITIZENS -- IS CANADA NEXT? Répondre en citant

AFTER MUSLIM RAPES (AND POLICE COVER UP), GERMANY TEAMS WITH FACEBOOK, GOOGLE AND TWITTER TO CENSOR CITIZENS -- IS CANADA NEXT?

January 08, 2016

Ezra Levant
Rebel Commander




VIDEO : https://www.youtube.com/watch?v=XrqxOAGfyGg

The police chief of Cologne, Germany has been suspended.

On his watch, on New Year’s Eve, a mob of 1,000 Muslim migrants swarmed German women and beat them, robbed them, sexually assaulted them, and in some cases, raped them.

I agree that he should be fired. But not because 1,000 Muslim men rioted and raped in his city on his watch.

He should have been fired is because he lied. It wasn't just him, though.

The media lied. The Justice Minister lied too. The mayor lied (and advised women to "stay arm's length" from rapists.)

The same German government that lets rapists go free from custody, that writes false press releases, that sits on the news, is now censoring ordinary Germans who want to talk about what happened, and who did it, and why.

Here's the Washington Post:
Citation:


"German authorities, meanwhile, have reached a deal with Facebook, Google and Twitter to get tougher on offensive content, with the outlets agreeing to apply domestic laws, rather than their own corporate policies, to reviews of posts.”



That’s actually more terrifying than 1,000 Muslim sexual assaulters in a swarm.

What are the odds that Canadian and American police are covering up Islamic crimes, like in Rotherham or Cologne? What are the odds that facts about Muslim refugees are being ignored by the media? And how long until Canadians and Americans are subjected to the same kind of censorship that rape-weary Germans are, too?

It's no secret that I'm a fan of Uber. Now Ontario Progressive Conservative MPP Tim Hudak has tabled a private members bill to encourage people to engage in "the sharing economy" without dealing with unneeded bureaucracy.

He came on the show to say that, with the rise of Uber and AirBnB, we need to put legal and licensing frameworks in place to protect consumers while making Ontario a friendlier business environment for developers.

Despite their name, the UK's Global Warming Policy Foundation is dedicated to supporting climate change skepticism. Now a Canadian, Dr. Christopher Essex
, has been appointed the chairman of their academic advisory panel.

Dr. Essex tells me about the Foundation's mission to educate journalists, policy makers and average people about the real scientific facts about climate rather than the political slogans surrounding it. "The science isn't settled," says Essex, who talks about being a skeptic in academia.

Finally, I read some of your viewer feedback, including a tweet from @FakeEzraLevant! Remember to tell me your thoughts in the comments below or by social media.

http://www.therebel.media/muslim_rapes_police_cover_up_germany_facebook_goo…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Ven 15 Jan - 12:25 (2016)    Sujet du message: MICROSOFT ISSUES SECURITY WARNING FOR ALL WINDOWS USERS RE: INTERNET EXPLORER Répondre en citant

MICROSOFT ISSUES SECURITY WARNING FOR ALL WINDOWS USERS RE: INTERNET EXPLORER



VIDEO : https://www.youtube.com/watch?v=u_rTBR8UXJM

Even if you don't use IE browser, your computer will be vulnerable to viruses and malware attacks if you don't remove Internet Explorer 8, 9, or 10, an upgrade to IE 11.


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Mar 19 Jan - 05:16 (2016)    Sujet du message: GERMAN ELITES TARGET 'HATE SPEECH' AFTER MIGRANT RAPE SPREE 'WE DON'T HAVE FREEDOM OF OPINION ANYMORE' Répondre en citant

GERMAN ELITES TARGET 'HATE SPEECH' AFTER MIGRANT RAPE SPREE  'WE DON'T HAVE FREEDOM OF OPINION ANYMORE'

Published: 01/07/2016 at 3:28 PM

Douglas Ernst

Douglas Ernst is a staff writer for WND. He formerly wrote for the Washington Times. He also worked at The Heritage Foundation in its Young Leaders Program.


German Chancellor Angela Merkel

German elites are responding to a wave of sexual assaults by Arab and North African migrants on New Year’s Eve by cracking down on alleged hate speech.

Facebook, Google and Twitter are working with German authorities to control speech as angry citizens react to the chaos caused by refugees. The deal with social-media giants comes as Germans fume over 100 sexual assaults and robberies perpetrated by migrants last Friday in Cologne.

“We’ve looked at our general rules and understand that very specific forms of language may constitute hate speech,” Richard Allan, Facebook’s vice president of public policy in Europe, told the Washington Post on Thursday. “Our German reviewers are reviewing the meanings of German words and trying to understand what language crosses the line.”

Politicians and activists insinuate that heated rhetoric matches intensity last observed during the creation of the National Socialist German Workers’ Party in the 1920s. Chancellor Angela Merkel welcomed 1.1 million migrants into Germany in 2015.

Merkel gave a speech Dec. 30 warning Germans to shun “those with coldness, or even hate in their hearts, and who claim the right to be called German for themselves alone and seek to marginalize others,” Deutsche Welle reported.

Germany’s enforcement-blitz on speech laws in recent months include a police raid on a 26-year-old man from Berlin who said he celebrated when refugees drowned on the way to Europe. Another man in Wismar was given five months probation and a $325 fine by a judge for making similar comments, the Post reported.

Reactions by German citizens to speech codes echo those by Americans after U.S. Attorney General Loretta Lynch said the Justice Department would prosecute “anti-Muslim rhetoric.”

“When we are ruled by fear, we are not making ourselves safe,” Lynch said Dec. 3 at a dinner held by the Muslim Advocates, a national legal advocacy group, WND reported.

“It’s not politically correct to say anything against migrants. We don’t have freedom of opinion anymore. #Cologne,” a German Twitter user said Dec. 5 in regard to the Lynch-like policies of European politicians.

Stefan Körner, chairman of Germany’s liberal Pirate Party, told the Post that deals reached with social media outlets reeked of “creeping censorship.”

“House of War: Islam’s Jihad Against the World” conveys what the West needs to know about Islam and the violent, expansionary ideology that seeks the subjugation and destruction of other faiths, cultures and systems of government

A police officer in Cologne told Express.de on Thursday that 15 suspects from the New Year’s Eve attacks have been taken into custody; 14 came from Syria and 1 from Afghanistan.

“Residence certificates for carrying out the asylum procedure were in their possession,” the source said.

The slow arrests and four days of silence by Germany’s nation media prompted citizens to take matters into their own hands.

Breitbart London reported Friday that a group called “Dusseldorf is Watching” attracted 2,300 members in less than 24 hours. Its members plan to attend major events to protect women from gangs of migrants.

“For public security in Germany the police are responsible. Deliberately searching for offenders is not a job for the citizen,” a spokesman for Dusseldorf police told local media when asked about the group, the website reported.



A German sex-assault victim told Radio Television Lëtzebuerg that police in Cologne were overwhelmed on New Year’s Eve and could not help everyone who needed protection from gangs of African and Arabic men.

Victims of the Cologne attacks told Radio Television Lëtzebuerg on Wednesday that police were overwhelmed by the sheer volume of attackers, CNN reported.

“We then walked through this group of men. [They] opened up a lane, which we walked through. Suddenly, I felt a hand on my buttocks, then on my breasts, in the end, I was groped everywhere,” a victim identified as Katja L told Der Express Jan. 3. “It was a nightmare. Although we shouted and beat them, the guys did not stop. I was desperate and think I was touched around 100 times in the 200 meters. Fortunately, I wore a jacket and trousers. A skirt probably would have been torn off.”

Cologne Mayor Henriette Reker encouraged women to adopt a “code of conduct” to discourage African and Arabic men from such attack. Some of her suggestions include keeping “at arm’s length” from strangers, traveling in groups, and asking bystanders for help.

“It is important to prevent such incidents from ever happening again,” Reker said, the Independent reported Wednesday.

Huffington Post Deutschland reporter Anabel Schunke called the national response to migrant attacks “a slap in the face for every victim,” on Monday.

http://www.wnd.com/2016/01/german-elites-target-hate-speech-after-migrant-sex-attacks/


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Mer 20 Jan - 04:03 (2016)    Sujet du message: SHERYL SANDBERG (CHIEF OPERATING OFFICER, FACEBOOK) : WE WILL DELETE HATE SPEECH TOWARDS REFUGEES Répondre en citant

SHERYL SANDBERG (CHIEF OPERATING OFFICER, FACEBOOK) : WE WILL DELETE HATE SPEECH TOWARDS REFUGEES



Sheryl Sandberg (COO Facebook)from Berlin, Gremany writes: The internet gives voice. It helps people share the moments that matter to them – and stand up for the things they believe in. In the past year, we've seen millions of people come together online to support refugees and stand in solidarity with the victims of terror attacks. But we’ve also heard voices of hate growing louder.

With extremism damaging lives and societies across the world, challenging those voices has never been more important. Deleting content won't make the hatred go away. We can't just treat the symptoms - we have to treat the cause.

We need the voices of tolerance and love to ring out across the world, because the best remedy to bad speech is more speech. Today Facebook joined Peter Neumann, The Institute for Strategic Dialogue and the Amadeu Antonio Stiftung to launch the Online Civil Courage Initiative – a joint project to encourage people to speak up against hate.

Thank you to State Secretary Gerd Billen and the Ministry of Justice (Bundesministerium der Justiz und für Verbraucherschutz) for your support and leadership. Hate speech has no place online – or in society. Together, we can make sure the voices of peace, truth and tolerance are heard. Love is louder than hate. #zivilcourage #civilcourage

http://redstatewatcher.com/article.asp?id=3696



Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 24 678
Féminin

MessagePosté le: Ven 22 Jan - 08:19 (2016)    Sujet du message: BILL H4702 WOULD REQUIRE JOURNALISTS TO REGISTER WITH GOVERNMENT Répondre en citant

BILL H4702 WOULD REQUIRE JOURNALISTS TO REGISTER WITH GOVERNMENT



VIDEO : https://www.youtube.com/watch?v=zigTRJO5taE

Mike Pitts, a Republican in the South Carolina House is sponsoring a bill that would establish a “responsible journalism registry” that would charge fees to journalists and authorize the state to fine and levy criminal penalties for breaking the rules of the registry.

In this video Dan Dicks of Press For Truth not only breaks down the ridiculousness of this bill but he also provides a better option when it comes to becoming an independent journalist.


Revenir en haut
Contenu Sponsorisé






MessagePosté le: Aujourd’hui à 10:12 (2016)    Sujet du message: RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM & HUMAN CONTROL (PARTIE 2)

Revenir en haut
Montrer les messages depuis:   
Poster un nouveau sujet   Répondre au sujet    LE VOÎLE DÉCHIRÉ (1) Index du Forum -> NOUVELLES LOIS ANTITERRORISTES/NEW ANTITERRORIST LAWS -> RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM (PARTIE 2) Toutes les heures sont au format GMT + 2 Heures
Aller à la page: <  1, 2, 39, 10, 11, 12, 13, 14  >
Page 10 sur 14

 
Sauter vers:  

Portail | Index | Creer un forum | Forum gratuit d’entraide | Annuaire des forums gratuits | Signaler une violation | Conditions générales d'utilisation
Powered by phpBB © 2001, 2005 phpBB Group
Traduction par : phpBB-fr.com