LE VOÎLE DÉCHIRÉ (1) Index du Forum

LE VOÎLE DÉCHIRÉ (1)
...

 FAQFAQ   RechercherRechercher   MembresMembres   GroupesGroupes   S’enregistrerS’enregistrer 
 ProfilProfil   Se connecter pour vérifier ses messages privésSe connecter pour vérifier ses messages privés   ConnexionConnexion 

RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM & HUMAN CONTROL (PARTIE 2)
Aller à la page: <  1, 2, 316, 17, 18
 
Poster un nouveau sujet   Répondre au sujet    LE VOÎLE DÉCHIRÉ (1) Index du Forum -> NOUVELLES LOIS ANTITERRORISTES/NEW ANTITERRORIST LAWS -> RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM (PARTIE 2)
Sujet précédent :: Sujet suivant  
Auteur Message
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Sam 12 Aoû - 03:39 (2017)    Sujet du message: ARTIFICIAL INTELLIGENCE HAS THE POWER TO DESTROY OR SAVE DEMOCRACY Répondre en citant



from Net Politics and Digital and Cyberspace Policy Program
 
ARTIFICIAL INTELLIGENCE HAS THE POWER TO DESTROY OR SAVE DEMOCRACY


Artificial intelligence has helped politicians get elected, but what effect is it having on democracy?

Blog Post by Guest Blogger for Adam Segal
August 07, 2017


The Twitter logo in front of 0s and 1s. Dado Ruvic/Reuters

Vyacheslav Polonski is a PhD student at the Oxford Internet Institute and the co-founder of Avantgarde Analytics. You can follow him @avantanalytics.

It’s a great time to be a politician and an even better one for engineers that specialize in machine learning that work for them.

Throughout history, candidates for office have always had limited tools to hone their message and secure votes (aside from outright bribing). Anecdotal evidence is not representative and surveys are imperfect. More often than not, politicians relied more on instinct rather than insight when campaigning.

Today, campaigns have the ability to comb large swaths of data to micro-target specific categories of voters, and develop messaging that will resonate most with them. These efforts began in earnest with the 2008 U.S. presidential election and were honed in 2012 and 2016.

What is good for a politician and their engineers, however, is not necessarily good for a democracy. There is evidence to suggest that artificial intelligence-powered technologies have been systematically misused to manipulate citizens in recent elections.

One example of such manipulation is the use of political bots to spread right-wing propaganda and fake news on social media. Bots are autonomous accounts that are programmed to aggressively spread one-sided political messages to manufacture the illusion of public support. This is an increasingly wide-spread tactic that attempts to shape public discourse and distort political sentiment.

Typically disguised as ordinary human accounts, bots have been responsible for spreading misinformation and contributing to an acrimonious political climate on sites like Twitter, Facebook, and Reddit. They are very effective at attacking voters from the opposing camp and even discouraging them from going to the voting booth.
For example, Pro-Trump bots regularly infiltrated the online spaces used by pro-Clinton campaigners to spread highly automated content, generating one quarter of Twitter traffic about the 2016 election.

Bots were also largely responsible for popularizing #MacronLeaks on social media just days before the French presidential election. They swarmed Facebook and Twitter with leaked information that was mixed with falsified reports, to build a narrative that Emmanuel Macron was a fraud and hypocrite—a common tactic used by bots to push trending topics and dominate social feeds while giving the impression that the messages promoted are from genuine people.

In addition to shaping online debate, AI can also be used to target and manipulate individual voters: during the U.S. presidential election, the data science firm Cambridge Analytica rolled out an extensive advertising campaign that targeted persuadable voters based on their individual psychology. This highly sophisticated micro-targeting operation relied on big data and machine learning to influence people’s emotions.

The problem with using AI in political campaigns is not the technology itself, but rather the covert nature of its use and the targeted messages that preyed on individuals’ psychological vulnerabilities. Different voters received different messages based on predictions about their susceptibility to different arguments. The paranoid received ads with messages that were mostly fear-based. People with a conservative pre-disposition received ads with arguments based on tradition and community.

The micro-targeting was possible thanks to voter data available from social media and data miners, which can often include lifestyle attributes, consumption patterns and social relationships. Every click online generates signals that could be readily accessed and analyzed to build unique behavioral and psychographic profiles.

A presidential candidate with flexible campaign promises like Donald Trump was, of course, particularly well-suited for this tactic. Every voter could receive a tailored message that emphasised a different side of the argument. There was a different Trump for every voter—the Trump campaign just needed to find the right emotional triggers for each person to drive them to action.

This is a disquieting trend. A representative democracy depends on free and fair elections in which citizens can vote their conscience, free of manipulation. Yet AI and related technologies threaten to undermine fair elections if it continues to be methodically used to manipulate voters and promote extreme narratives.

All is not lost. AI itself is not harmful. The same algorithmic tools used to mislead, misinform and confuse can be re-purposed to support democracy and increase civic engagement. An ethical approach to AI can work to inform and serve an electorate. New AI startups like Factmata and Avantgarde Analytics are already providing these technological solutions. For example, political bots can be programmed to spread information debunking known falsehoods, like the infamous WTOE 5 News article that falsely claimed the pope had endorsed Donald Trump. Similarly, micro-targeting campaigns can educate voters on a variety of political issues to help them make up their own mind. And most importantly, AI can be used to listen to an electorate to ensure their elected representatives can hear them.

The use of AI techniques in politics is not going away anytime soon—it is simply too valuable to politicians and their campaigns. However, they should commit to use AI as ethically and judiciously as possible to ensure that their attempts to sway voters do not undermine democracy as a whole.

https://www.cfr.org/blog/artificial-intelligence-has-power-destroy-or-save-…


Revenir en haut
Publicité






MessagePosté le: Sam 12 Aoû - 03:39 (2017)    Sujet du message: Publicité

PublicitéSupprimer les publicités ?
Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Dim 13 Aoû - 03:11 (2017)    Sujet du message: GOOGLE’S NEW POLICIES ARE STRAIGHT OUT OF ORWELL’S 1984 / THE YouTube PURGE AGAINST INDEPENDENT NEWS IS HERE Répondre en citant



GOOGLE’S NEW POLICIES ARE STRAIGHT OUT OF ORWELL’S 1984


Aug 9, 2017
Melissa Dykes




Aug 9, 2017
Melissa Dykes

Remember 1984? In Orwell’s dystopic vision of the future, there was a huge difference between “truth” — what actually is — and “facts” — what a consensus has been led to believe.

Now the search engine giant Google will be delisting and censoring content that doesn’t follow “well-established” scientific, medical, or historical “facts”. Check out the company’s newly updated quality raters guidelines.

While you may think of all the links returned to you in a Google search as “information choices,” Google’s Eric Schmidt (annual Bilderberg attendee) thinks of them as “bugs” that need to be eradicated from their system, and that users should be given one “right” answer. In that case, these new guidelines are the extermination squad.

On one page, it refers to “Expertise, Authoritativeness, and Trustworthiness (EAT)” regarding on what constitutes “expertise” on a topic in the eyes of Google, then proceeds to link to the BBC and USA Today as “high quality news sources”.

It also notes, High quality information pages on scientific topics should represent well-established scientific consensus on issues where such consensus exists.” Medical information will be ranked and listed the same way. Take a guess what the prescribed “consensus” is there…

The guide also specifically mentions giving the lowest rankings to what they deem “conspiracy theories”.

VIDEO : http://truthstreammedia.com/2017/08/09/googles-new-policies-straight-orwell…

Welcome to 1984. Is anyone going to say anything?

And if they do, will anyone hear us?

(Some in the comments have suggested DuckDuckGo which claims not to track and Startpage. At least there are alternatives out there, but more people need to start using them en masse to really effect change.)

http://truthstreammedia.com/2017/08/09/googles-new-policies-straight-orwell…


THE YouTube PURGE AGAINST INDEPENDENT NEWS IS HERE





VIDEO : https://www.youtube.com/watch?v=GOkeJo2Tye8


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Ven 18 Aoû - 05:59 (2017)    Sujet du message: ‘EVERY COUNTRY SHOULD HAVE A CYBER WAR’: WHAT ESTONIA LEARNED FROM RUSSIAN HACKING Répondre en citant

‘EVERY COUNTRY SHOULD HAVE A CYBER WAR’: WHAT ESTONIA LEARNED FROM RUSSIAN HACKING


August 14, 2017
Markus Schreiber/AP

Estonia’s steps have certainly been radical, and other countries can learn lessons from them about how to defend themselves.

In 1991, Estonia was part of the dying communist empire. Its economy was run by central planners in Moscow, less than half of all households had a phone line, and goods were so scarce that people had to line up for food.

Skip ahead 26 years, and Estonians don’t even have to queue to vote. They do that online.

In just over two decades, Estonia has become one of the world’s most digitally innovative and efficient countries. In fact, Estonians conduct all their civic responsibilities online.

Offices and paper forms have become obsolete as state-issued digital identities allow all citizens to carry out any financial or government transaction from their laptops or cellphones. And that gives them an edge when it comes to cybersecurity.

Estonia’s journey down the digital road has been astonishingly fast. When it gained independence from the Soviet Union in 1991, it had almost no money and few natural resources. But it did have one advantage: It was the designated center for software and computer production for the USSR. After achieving independence, the country had a pool of tech expertise for them to build on.

During these early years of independence, Estonia needed to create the means for a new economy. And it wasn’t going to be easy. The country’s tiny population of just 1.3 million is spread over a relatively vast countryside. Outside the capital Tallinn, there’s an average of just four people per square kilometer. The new government didn’t have the resources to extend government offices or banking facilities to small towns and villages, so it decided to encourage self-service, and spread internet access across the country in order to do so. :roll:

To achieve this, the government set up an investment group to build computer networking and infrastructure. By 1997, almost every school was connected to the internet, and by 2004, 300 wifi access points had been established, bringing the internet even to small villages—and mostly for free.

But this was just laying the groundwork. Estonia’s biggest turning point was 10 years ago, when the country came under sustained cyberattack.

In 2007, Estonia was in the middle of a political fight with Moscow over plans to remove a Soviet war memorial from a park in Tallinn. Suddenly, it was hit with three weeks of D-DoS (designated denial of service) attacks. When this happens, multiple sources send multiple online requests, flooding a service or system and making it unable to function. It’s the digital equivalent of crowding an entrance to a building so that no one can come in or out.

Read more Which Cyberattacks Should the United States Deter, and How?

See also US Cyber Diplomacy Has Bigger Problems Than the Closure of its Coordination Office

And Counties Are on the Front Lines of Cyber War

As a result, the internet shut down as websites were bombarded with traffic. Russia denied any involvement, but Estonia didn’t believe it.

“War is the continuation of policy by other means,” Estonian president Kersti Kaljulaid told a NATO cyber-conference in Tallinn in June 2017. “Ten years on, it is clear that the decision made by Estonia not to withdraw but stay and fight for the security of our cyberspace was indeed the right one.”

The attacks made Estonia more determined than ever to develop its digital economy and make it safe from future attacks. “I think every country should have a cyber war,” says Taavi Kotka, the government’s former chief information officer. “Citizens get knowledge about what an attack means, about how phishing works, how D-DoS works, and they start to understand and live with that. People aren’t afraid if they know they can survive something. It’s the same thing as electricity going off: Okay, it’s an inconvenience, but you know how to deal with it.”

In Estonia, people are not afraid of cyber warfare, nor are they afraid of sharing personal data across public and private institutions. Go to a hospital, and the nurse or doctor can call up your entire health records from any doctor you ever visited without the need to call their offices and asking them to send files.

Full marks for convenience, simplicity, and efficiency. But what about the dangers of nameless bureaucrats accessing your personal data? Isn’t there a risk of future governments abusing the system and using your intimate details against you? Isn’t this inviting an Orwellian nightmare?

Estonia says no. Unlike an authoritarian state like the old Soviet Union, government transparency is built into the system. While all your private data is online, only you can give permission for any data to be accessed. And you can check who has accessed what. If a doctor you don’t know has viewed your records, it will be traceable, and you can have them sacked. As one software developer Quartz spoke to said, “You become your own Big Brother.” = Lies. We don't have any control about our data and we can't see it and they don't ask to us permission who should be access to our data.

Data is protected through a framework known as X-road, which helps exchange decentralized data between big government databases. X-road has built-in security measures that encrypt traffic and time-stamps so that the data cannot be manipulated. = Lie, they can change and manipulate anything they want in our data and be use against us if we don't submit to their agenda.

Taimar Peterkop, from Estonia’s Information System Authority, says that the security measures built into E-identity databases are all but impenetrable by outsiders. “Estonia takes data integrity very seriously because our society is so digitized,” he says. “If someone manipulates citizens’ data, that’s a challenge for us. We use blockchain-based technology to ensure the data is as it should be.”

When it comes to security, Peterkop says humans are usually the weak link. “Cybersecurity starts with us. If you have weak cyber hygiene, that’s a problem. We need to raise awareness and educate people about using strong authentication methods,” he says. For example, Estonia has public-education campaigns about how to use your smart devices wisely.

It seems like glaringly obvious advice, but a look at the recent US election shows that basic cyber hygiene has been an after-thought, even for the powerful. When Democratic nominee Hilary Clinton’s campaign chief John Podesta’s Gmail account was hacked, Wikileaks founder Julian Assange claimed Podesta’s password was simply the word “password.” The campaign denied this claim and said they fell victim to a phishing scam. Whatever the case, it was an avoidable security breach that should never have occurred.

Peterkop also says that consumers need to ask more questions about the Internet of Things, especially when it comes to everyday household products and devices. “There is so much pressure to come up with new products in a hurry, so security measures are an after-thought,” he says. “As consumers, it’s essential that we start paying attention to it. We don’t do enough risk mitigation. Basically every TV is a computer now.” These issues are present already: recent document dump from Wikileaks points to hacking tools that directly relate to Samsung televisions.

Estonians don’t see cybersecurity as a phenomenon, and they know that good cyber hygiene isn’t just about strong passwords: It’s about being empowered by technology, not controlled by it.

Estonia’s steps have certainly been radical, and other countries can learn lessons from them about how to defend themselves. As well as creating a paperless public service,

Estonia is now backing up government data on secure servers offsite in Luxembourg. It has also prioritized tougher international action for cyber-crime and encouraged private companies to review security measures and have stronger agreements with server providers.

The shock of a cyberwar united the community to take action. The challenge for other countries is to take action without one.


http://www.defenseone.com/technology/2017/08/every-country-should-have-cybe…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Sam 19 Aoû - 23:34 (2017)    Sujet du message: FOCUSED ON SECURITY, TRUMP ELEVATES CYBERCOM Répondre en citant

FOCUSED ON SECURITY, TRUMP ELEVATES CYBERCOM



VIDEO : https://www.youtube.com/watch?v=FU4aKdbvkoA


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Dim 20 Aoû - 01:50 (2017)    Sujet du message: WEEKEND READ : IT TOOK CHARLOTTESVILLE FOR SILICON VALLEY TO STAND UP TO HATE Répondre en citant



WEEKEND READ : IT TOOK CHARLOTTESVILLE FOR SILICON VALLEY TO STAND UP TO HATE 

August 19, 2017

Silicon Valley has a reputation as a liberal place, but it was a critical partner in the deadly “Unite the Right” rally that cost a counter-protestor her life.

Hate groups of all stripes used their websites to advertise their participation in the rally. They turned to social media to urge their followers to join them. And they used services like PayPal and Patreon to fund their invasion of Charlottesville, Virginia.

Such partnerships may soon be a thing of the past. By Monday morning, service providers had begun to pull the plug on hate groups and individual extremists alike.

“I woke up this morning in a bad mood and decided to kick them off the internet,” Cloudflare Chief Executive Matthew Prince wrote in an email to employees announcing his suspension of the neo-Nazi website The Daily Stormer.

The Daily Stormer became the top hate site in America last year, but it struggled to stay online this week after its long-time host, GoDaddy, delisted its domain on Monday.

Over the course of the week, The Daily Stormer transferred its registration to Google and even to the Russian Network Information Center, only to be kicked off each provider.

“Charlottesville has definitely lit a fire under some people,” SPLC Intelligence Project Director Heidi Beirich told USA Today. “I wonder if the violence marks a sea change.”

Beirich is right that tech companies have been stubbornly hands-off in the past. Despite policies that are ostensibly “anti-hate,” they have rarely taken action to remove hateful content or users from their platforms.

But as the nation grapples with the violent coordination of hate groups across the far-right spectrum in Charlottesville, Facebook has shut down at least nine pages connected to the rally; Twitter, YouTube, and LinkedIn have suspended several extremist accounts; Reddit has eliminated one discussion community that supported “Unite the Right,” and even OKCupid has kicked white nationalist Christopher Cantwell off the dating site.

By far, the biggest sweep came from PayPal, which agreed to block at least 34 organizations from using its services after an SPLC report highlighted how extremists used the platform to fund the rally in Charlottesville.

“For the longest time, PayPal has essentially been the banking system for white nationalism,” the SPLC’s Keegan Hankes told The Washington Post. “It’s a shame it took Charlottesville for them to take it seriously.”

It is good news that PayPal, Pateron, and other tech companies are finally taking steps to curb the hate on their platforms. But to truly make a dent in the hate and bigotry online, tech companies must be more cognizant of the role their services play in spreading hate.

“If you’re not outraged, you’re not paying attention,” Heather Heyer, 32, posted on Facebook before she was killed by an alleged Nazi sympathizer in Charlottesville.
It's wise advice for tech firms in Silicon Valley and beyond.

The Editors.

PS Here are some other pieces we think are worthwhile:
SPLC’s Weekend Readings are a weekly summary of the most important news reporting and commentary from around the country on civil rights, economic and racial inequality, and hate and extremism. Sign up to receive Weekend Readings every Saturday morning.

https://www.splcenter.org/news/2017/08/19/weekend-read-it-took-charlottesvi…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Dim 20 Aoû - 01:56 (2017)    Sujet du message: GOOGLE CENSURE-T-IL LES SITES SOCIALISTES ET ANTI-MILITARISTES? Répondre en citant

GOOGLE CENSURE-T-IL LES SITES SOCIALISTES ET ANTI-MILITARISTES?

il y a 15 heures
19 août 2017



19/08/2017 – 08h00 San Francisco (Breizh-info.com) – Un certain nombre de sites ont confirmé que leur fréquentation en provenance de Google a chuté très fortement ces derniers mois. Leur point commun ? Etre de gauche et anti-militaristes. Ils accusent Google de mettre en place, sous couvert de lutter contre les fake news, une censure politique qui a pour effet de les effacer des premiers résultats de recherche.

 « Quelque chose s’est passé avec Google à tous les niveaux qui affecte grandement les médias de gauche », a déclaré Scott LaMorte, le développeur de sites web pour Truthout et The Real News. Il constate une « baisse inédite » de l’audience des deux sites, depuis mai 2017, ce qui n’a jamais été le cas auparavant.

Robert Epstein, expert de Google et ancien rédacteur en chef de Psychology Today, relaie ces accusations en déclarant : « C’est le pire des cas de la censure politique ; c’est juste une excuse pour supprimer des points de vue politiques ».

Justement, le 25 avril dernier, Ben Gomes, vice-président de l’ingénierie de Google, a déclaré que la mise à jour du moteur de recherche Google bloquerait l’accès à des sites «offensants» tout en s’efforçant de faire ressortir le «contenu faisant autorité».

En l’occurrence, il y a plus d’une douzaine de sites impactés depuis cette date. Au premier plan, le Word socialist web site (WSWS), qui a vu sa fréquentation depuis Google chuter de 67% en provenance des recherches Google. Ce site dresse la liste des autres victimes : alternet.org (-63%), globalresearch.ca (-62%), consortiumnews.com et socialistworker.org (-47%), mediamattters.org (-42%), commondreams.org (-37%), internationalviewpoint.org et democracynow.org (-36%), wikileaks.org (-30%), truth-out.org (-25%), counterpunch.org (-21%), theintercept.com (-19%).

Ce sont bien les recherches Google qui sont en cause. Alors que le trafic n’a cessé d’augmenter depuis douze mois avant le printemps 2017, avec un point d’orgue en avril 2017, «fin mai, les modifications apportées à l’algorithme de Google ont eu une incidence négative sur le volume de trafic vers le site web Common Dreams provenant de recherches Google organiques», a déclaré Aaron Kaufman, directeur du développement au site d’actualités progressiste Common Dreams. «Depuis mai, le trafic de Google Search en pourcentage du trafic total vers le site Common Dreams a diminué de près de 50% ».

Le WSWS affirme de son côté que la stratégie de Google consiste à bloquer dans ses recherches le renvoi vers les articles du site pour les 45 premiers mots de recherche vers celui-ci. L’effet serait radical : « plus de 90 % des utilisateurs du moteur de recherche de Google ne cliquent pas sur les résultats après la première page, et plus de 99 % ne cliquent pas sur les liens après la 10ᵉ page. Cela signifie que si un résultat est refoulé au-delà des 100 premiers résultats, il est effectivement inaccessible », explique le WSWS.
Ainsi, le site a constaté que « les utilisateurs de Google pourront trouver le WSWS s’ils incluent spécifiquement le « World Socialist Web Site » dans leur demande. Mais si leur requête comprend simplement des termes tels que « Trotsky », « Trotskysme », « Marxisme », « socialisme » ou « inégalité », ils ne trouveront pas le site ». De même, les « termes « socialisme contre capitalisme », « soins de santé socialistes », « lutte des classes sociales » et « manifeste du parti socialiste », qui ont tous renvoyé vers des articles WSWS dès la première page dans le passé, ne renvoient maintenant pas vers le WSWS dans les 100 premiers résultats. Les termes « socialisme », « socialiste », « mouvement socialiste » et « conflit de classe », pour lesquels le WSWS apparaissait auparavant dans les quatre premières pages, ne renvoient plus vers des articles du WSWS ».

D’autres termes ont été mis sur liste noire, notamment « UAW » [United auto workers, syndicat de l’automobile], « Révolution russe », « Révolution d’octobre », « inégalités sociales dans le monde », etc. alors qu’ils pointaient auparavant vers le WSWS dans les 100 premiers résultats. Difficile de croire au hasard : « Le terme « Flint Michigan », qui avait amené la deuxième fréquentation la plus élevée au WSWS parmi tous les mots-clés a de même connu la suppression des articles du WSWS de ses 100 premières entrées ».

Le fonds de la culture stratégique, fondsk.ru (Russie) cite les recherches faites par Andre Damon et Niles Miemuth qui tendent à démontrer que l’effondrement des visites des sites socialistes et alter-mondialistes depuis Google présente un caractère organisé. Pour David North, président du conseil de rédaction international du WSWS « il n’y a pas d’explication innocente pour la chute extraordinairement forte du lectorat, pratiquement du jour au lendemain, en provenance des recherches Google. L’affirmation de Google selon laquelle il protège ses lecteurs contre les « fausses nouvelles » est un mensonge politique.

Google, un monopole massif, avec les liens les plus étroits avec les agences de l’état et du renseignement, bloque l’accès au WSWS et à d’autres sites Web progressistes et de gauche grâce à un système de recherches biaisé 
».

Entre censure d’État, grands monopoles et contrôle de l’information, l’utopie d’un web neutre et mondialisé continue de s’éloigner.

Louis-Benoît Greffe
Crédit photo : DR

[cc] Breizh-info.com, 2017, dépêches libres de copie et de diffusion sous réserve de mention et de lien vers la source d’origine

http://www.breizh-info.com/2017/08/19/75870/google-censure-t-sites-socialistes-anti-militaristes


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Mar 22 Aoû - 22:41 (2017)    Sujet du message: LA REGULATION DU TRAVAIL JOURNALISTIQUE DANS DIX PAYS, DONT LE CANADA / (PRESS SELF-REGULATION IN 10 COUNTRIES INCLUDING CANADA) Répondre en citant

LA REGULATION DU TRAVAIL JOURNALISTIQUE DANS DIX PAYS, DONT LE CANADA (PRESS SELF-REGULATION IN 10 COUNTRIES INCLUDING CANADA)

French and english

The Council for mass media 


Pdf document : http://www.cem.ulaval.ca/pdf/Regulation journalisme.pdf




https://www.google.fr/search?q=the council for mass media council pontifica…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Sam 26 Aoû - 00:09 (2017)    Sujet du message: SOUTHCOM COMMANDER HIGHLIGHTS SECURITY COOPERATION WITH REGIONAL PARTNERS Répondre en citant

SOUTHCOM COMMANDER HIGHLIGHTS SECURITY COOPERATION WITH REGIONAL PARTNERS

By Lisa Ferdinando DoD News, Defense Media Activity
 
WASHINGTON, Aug. 24, 2017 — The United States and its South American partners are committed to working together in addressing the security challenges impacting Latin America and beyond, the U.S. Southern Command commander said in Lima, Peru, yesterday.



Navy Adm. Kurt Tidd, commander of U.S. Southern Command, meets with Adm. José Paredes, chief of the Peruvian Armed Forces Joint Staff, during the South American Defense Conference in Lima, Peru, Aug. 23, 2017. The conference, cohosted by Tidd and Paredes, brought together military leaders from nine other countries for discussions on defeating illicit networks and responding to cyberattacks and humanitarian crises. Photo courtesy of the Peruvian Armed Forces Joint Staff

Navy Adm. Kurt W. Tidd joined South American security leaders for discussions on defense support to humanitarian and disaster relief efforts and cooperation to detect, disrupt and dismantle threat networks in the Western Hemisphere

"This conference is symbolic of our hemisphere's tradition of collaboration," Tidd said in opening remarks at the South American Defense Conference. He is cohosting the Aug. 22-24 event with Peru's Adm. José Paredes, chief of the Peruvian Armed Forces Joint Staff.

The conference, which includes military leaders from nine other nations, also symbolizes the shared understanding of the "challenges of the modern security environment and our willingness to face them together," Tidd said.

Regional, Global Cooperation

Discussions are focusing on truly global issues, including defeating illicit networks and responding to cyberattacks and humanitarian crises, he said. "This means there's not a single country or military out there able to solve them by acting alone," he added. "We all have to work together, sharing information freely and trusting one another implicitly."

He underscored the importance of the partner countries examining how they can hone or focus security cooperation efforts to help mitigate or possibly avert regional crises and large-scale emergencies.

Tidd advocated for going beyond bilateral partnerships, and working as "one network, united in purpose and unified in action" to defeat illicit networks, strengthen defenses against cyberattacks, and build regional resilience against crises.

"This conference represents the potential of a hemisphere that pools its resources and collaborates freely to face new and old challenges alike," he said.

Tidd pointed out many South American nations have been affected by natural disasters in recent years and tested by "increasingly sophisticated illicit actors who do not respect our national boundaries, laws or sovereignty."

The United States and its regional partners remain united in facing challenges in South America, he said. The conference, he added, is an important forum to discuss key cooperation to deal with threats in the region.

"We have a priceless opportunity during this conference not only to build upon past successes, but also to enrich our dialogue with these recent experiences," he said.

(Follow Lisa Ferdinando on Twitter: @FerdinandoDoD)

https://www.defense.gov/News/Article/Article/1287945/southcom-commander-hig…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Sam 26 Aoû - 12:22 (2017)    Sujet du message: CHINE : LES INTERNAUTES SOMMES DE S'IDENTIFIER POUR POSTER DES COMMENTAIRES EN LIGNE Répondre en citant

CHINE : LES INTERNAUTES SOMMES DE S'IDENTIFIER POUR POSTER DES COMMENTAIRES EN LIGNE

Pékin - Les plateformes internet chinoises devront impérativement vérifier l'identité de leurs usagers avant de les laisser poster des commentaires en ligne, a indiqué Pékin, confirmant le tour de vis de la censure imposée par le régime communiste.

A partir du 1er octobre, tous les opérateurs de réseaux sociaux ou forums de discussion devront "s'assurer de la véritable identité" de leurs utilisateurs avant de leur permettre de poster des contenus et commentaires en ligne, selon un règlement publié vendredi par l'Administration chinoise de l'internet, un organisme gouvernemental.

De même, les plateformes du web se voient sommées de "renforcer la supervision des informations diffusées" ; si elles découvrent des contenus "interdits par la loi", elles devront ainsi "immédiatement agir pour les supprimer" tout en "avertissant les autorités".

L'internet local est déjà encadré de façon drastique par un système ("la Grande muraille électronique") qui bloque les réseaux sociaux Facebook et Twitter, YouTube, Google, ainsi que de nombreux médias occidentaux.

Les plateformes chinoises comme le site de microblogs Weibo ou la populaire messagerie WeChat font par ailleurs l'objet d'une censure étroite, les contenus jugés "sensibles" étant promptement supprimés et certaines recherches bloquées.

Mais l'enregistrement obligatoire des internautes --avec probable envoi d'un scan d'une pièce d'identité pour s'authentifier-- marque un nouveau durcissement en facilitant les poursuites judiciaires. Depuis 2013, des peines de prison sont prévues pour les messages jugés "diffamatoires".

Ce nouveau règlement s'inscrit dans le cadre d'une grande loi sur la "cybersécurité" entrée en vigueur en juin. Celle-ci interdit notamment la publication de contenus portant atteinte à "l'honneur national", "troublant l'ordre social" ou destinés à "renverser le système socialiste".

En juillet, Pékin a ordonné aux grands groupes technologiques de fermer les sites publiant des informations politiquement sensibles, des "mauvaises interprétations" des directives du pouvoir et autres "déformations" de l'histoire du Parti.

Le régime a également intensifié sa campagne contre les VPN, ces logiciels permettant de contourner la "muraille informatique", puis a lancé début août des enquêtes contre trois grandes plateformes internet pour "propagation de contenus violents et obscènes".

(©AFP / 26 août 2017 11h23)

https://www.romandie.com/news/Chine-les-internautes-sommes-de-s-identifier-…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Mar 29 Aoû - 17:11 (2017)    Sujet du message: CYBERSECURITY IS 2017’S VERSION OF THE WHITE WALKERS—AND YOU DON'T WANT TO BE A NON-BELIEVER Répondre en citant

CYBERSECURITY IS 2017’S VERSION OF THE WHITE WALKERS—AND YOU DON'T WANT TO BE A NON-BELIEVER


Fan Christopher Lomas, dressed as the Night King, asks a question at the "Game of Thrones" panel on day two of Comic-Con International on Friday, July 21, 2017. // Al Powers/Invision/AP

By Jamie Butler Quartz August 28, 2017
NEXTGOV

The trials and tribulations of Jon, Daenerys, and co. against the impending undead army of White Walkers share a lot of similarities with the evolution of cyberthreats over the last several years.

In Westeros, amidst the constant warring between the Lannisters, Starks, and Targaryens, a few small groups have seen the real threat facing the entire human race, the White Walkers. Despite Jon Snow’s borderline-obsessive urgings and warnings, many dismiss the White Walkers as stuff of fairytales or distant history. Among those who do recognize the threat, no one has a clear strategy to stop the enemy. Even with the new plans to harvest dragonglass (which appear to have been more-or-less abandoned) and unite the feuding houses, the Night King’s army is growing larger and looming closer every day.

A similar set of circumstances are ensnaring our digital security. Despite existing for many years, cyberattacks have only recently begun to gain the notoriety they deserve due to the kinetic consequences they pose. However, like the small contingent of Jon Snow’s followers (the Night’s Watch, the armies of the North, Samwell Tarly, etc.), many organizations fail to understand that attacks are now customized to penetrate their specific defenses—to breach fire-Walls—and hackers now have access to tools that were previously only available to national governments—like fire-breathing dragons.

Neither the White Walkers nor digital weapons started as destructive. The White Walkers used to be humanoids whom the Children of the Forest created with magic to protect themselves from the First Men; they were defense weapons created with good intentions that eventually became so powerful that they threatened all of humanity. Similarly, cyberweapons like StuxNet were most likely originally developed as tools of defense to limit Iran’s nuclear proliferation abilities, but have since become tools of third-party criminal groups who’ve accessed the techniques that made Stuxnet possible. From Russia to North Korea, China to profit-driven criminal organizations, many groups are now all capable of developing digital weapons that could take down a power grid or control a nuclear facility.

This has lead to organizations increasing their cybersecurity defenses through investments and research. In 2015 alone, more than $75 billion was spent on enterprise security products and services, and that number is expected to top $100 billion by 2020—that’s an Iron Bank-level of cash. But a stronger defense isn’t always enough when the attackers are also highly motivated and well-funded.

While swooping in with her dragons to rescue the "A-Team"-like search party in the penultimate episode for Season 7, Daenerys clearly thought she had the upper hand. But when the Night King threw his ice spear at one of her dragons, everything changed. Not only had Daenerys lost one of her most powerful (and beloved) assets, but the Night King was then able to reanimate Viserion as a Wight dragon, turning the tables entirely. Even when you think you have the upper hand, things can quickly change.

Similarly, despite all the spending and assurances of increased security, last year there was a record 1,093 breaches of U.S. companies and government agencies, up 40% from 2015. And even though many security experts recognize the threat of advanced adversaries, security programs must still be properly designed to account for the adversary’s strategy, techniques and technology, and organizations need the right technology and team to respond to these threats in real time. Though many realize this, unfortunately the vast majority of security funding still goes to the perimeter to fight the same basic adversaries of yesteryear, not the advanced adversaries—in other words, leaders focus on taking the half-abandoned Casterly Rock, not the White Walkers of the digital domain.

As we saw at Hardhome and elsewhere, the Night King’s army is seemingly endless and can be reanimated at the flick of a wrist. Where one wight goes down, many more are ready to take its place and cause great harm in the process. As malware is spread around the internet, cyberattacks have only become more prevalent, and it’s become easier to inflict major damage. It’s a (Jon) snowball effect.

In just the past few months, the WannaCry and NotPetya ransomware strains turned the world on its head, and a massive hack of HBO has led to "Game of Thrones" episodes being leaked and the theft of a whole bunch of IP. Before that, the Shadow Brokers released a trove of powerful “zero day” attacks allegedly stolen from the NSA, each of which can be very dangerous.

In "Game of Thrones," the leaders of Westros are finally realizing that the White Walkers are real and the threats they pose are existentially dangerous. But unless they work together and realize that their petty politics are a distraction from the real threat at hand, the realm will cease to exist. In the digital domain, advanced adversaries present a similar existential threat to businesses and organizations that don’t re-evaluate investment for modern era of targeted attacks.

Unless we recognize who and what the real threats are, and establish strong security systems that face the threats head-on, cutting them off before they have a chance to overtake our systems, the digital domain is in as much trouble as the realm of men.

http://www.nextgov.com/cybersecurity/2017/08/cybersecurity-2017s-version-wh…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Dim 17 Sep - 01:51 (2017)    Sujet du message: FALSE FLAG THIS JUST HAPPENED IN LONDON AND YOU'LL PROBABLY PAY FOR IT...(SEPTEMBER 2017) [flash width=425 height=350 loop=true flashvars=]http://www.youtube.com/v/meGGZvpTyLE[/flash] VIDEO : https://www.youtube.com/watch?v=meGGZvpTyLE Répondre en citant

FALSE FLAG

 THIS JUST HAPPENED IN LONDON AND YOU'LL PROBABLY PAY FOR IT...(SEPTEMBER 2017)



VIDEO : https://www.youtube.com/watch?v=meGGZvpTyLE


  


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Mer 27 Sep - 20:07 (2017)    Sujet du message: THE COUNTDOWN TO NATIONAL CYBER SECURITY AWARENESS MONTH BEGINS! / NATIONAL CYBER SECURITY AWARENESS MONTH Répondre en citant

THE COUNTDOWN TO NATIONAL CYBER SECURITY AWARENESS MONTH BEGINS!

The National Cyber Security Alliance Encourages You to Get #CyberAware and Share the Responsibility of Protecting the Internet



News provided by
National Cyber Security Alliance
Sep 05, 2017, 09:00 ET

WASHINGTON, Sept. 5, 2017 /PRNewswire-USNewswire/ -- National Cyber Security Awareness Month (NCSAM) 2017 is quickly approaching. Now in its 14th year, Oct. 1 marks the kickoff of this annual event dedicated to reminding all digital citizens and businesses that protecting the internet is "Our Shared Responsibility," and that everyone plays a critical role in promoting a safer internet.


(PRNewsfoto/National Cyber Security Alliance)...


National Cyber Security Awareness Month Logo. (PRNewsFoto/National Cyber Security Alliance)




A widespread, impactful and growing campaign, NCSAM was co-founded and is co-led by the National Cyber Security Alliance (NCSA) and the U.S. Department of Homeland Security (DHS). The month's primary goal is to provide internet users and businesses with the information and tools they need to be safer and more secure online and to educate them on how to protect personal information in today's highly connected world.

Everyone can join in and be a part of the something big by becoming a NCSAM 2017 Champion – organizations and individuals that have officially signed on to support the month. NCSAM Champions strengthen and boost the greater effort by spreading the word about online safety at home, at work and in the community and by hosting NCSAM Partner Events. To date, close to 500 organizational Champions and more than 215 individuals are paving the way to make NCSAM 2017 the most successful yet. Champions receive weekly emails during October with user-friendly materials – such as infographics, memes and sample social media posts – to stay involved with the month's activities. This year, organizations that become Champions will also have the opportunity to co-brand an activity or engagement they may be planning as a NCSAM Partner Event.

"Early NCSAM involvement is greater than ever before. The basis of NCSAM's success is the high level of collaboration among industry, government, academia and nonprofit organizations nationwide. And, this year, our network supporters and their active involvement have grown tremendously," said Michael Kaiser, NCSA's executive director. "NCSA and DHS strongly urge all organizations to protect themselves and all internet users by taking simple, actionable steps this October and throughout the year. Only by working together and sharing the responsibility to educate different groups about online safety, security and privacy will we make a dramatic difference in protecting the internet."

NCSA's core messaging campaign ‒ shared consistently throughout October and year-round ‒ is STOP. THINK. CONNECT.™, simple and actionable advice for every digital citizen. STOP: make sure security measures are in place. THINK: about the consequences of your actions and behaviors online. CONNECT: and enjoy the internet. STOP. THINK. CONNECT.™ is a global online safety awareness and education campaign with hundreds of partner organizations around the world. STOP. THINK. CONNECT.™ was co-founded by NCSA and the Anti-Phishing Working Group and is amplified through a partner network of almost 700 organizations that integrate the campaign into their education and awareness efforts and share the message in their communities. It's easy (and free) to sign up as a STOP. THINK. CONNECT.™ partner; learn more here.

In order to reach a variety of audiences and tackle the most timely cybersecurity topics, each week in October is devoted to a unique theme. The NCSAM 2017 themes are:
  • Week 1: Oct. 2-6 STOP. THINK. CONNECT.™: Simple Steps to Online Safety
  • Week 2: Oct. 9-13 Cybersecurity in the Workplace Is Everyone's Business
  • Week 3: Oct. 16-20 Today's Predictions for Tomorrow's Internet
  • Week 4: Oct. 23-27 The Internet Wants You: Consider a Career in Cybersecurity
  • Week 5: Oct. 30-31 Protecting Critical Infrastructure From Cyber Threats
To learn more about the themes and how to join in and support NCSAM 2017, check out NCSA's newest infographic. Keep in mind that on a weekly basis, NCSA and partners will distribute materials to make it easy to share valuable NCSAM 2017 information that supports the varying topics. Connect with us on social media and learn the latest NCSAM news by following and using the hashtag #CyberAware. Get involved in the conversation by participating in our weekly #ChatSTC Twitter chats, which take place every Thursday in October at 3 p.m. EDT/noon PDT (you can learn more about the October #ChatSTC chats and other NCSAM events – and submit your own event – here). NCSA has also created sample social media content that you can download and share leading up to and throughout the month. Additional information about NCSAM, along with resources like infographics, posters and social media content, can be found at staysafeonline.org/ncsam.

About National Cyber Security Awareness Month

National Cyber Security Awareness Month (NCSAM) was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Now in its 14th year, NCSAM was co-founded and is co-led by the Department of Homeland Security and the National Cyber Security Alliance, the nation's leading nonprofit public-private partnership promoting the safe and secure use of the internet and digital privacy. Recognized annually in October, NCSAM involves the participation of a multitude of industry leaders ‒ mobilizing individuals, small and medium-sized businesses, nonprofits, academia, multinational corporations and governments. Encouraging digital citizens around the globe to STOP. THINK. CONNECT.™, NCSAM is harnessing the collective impact of its programs and resources to increase awareness about today's ever-evolving cybersecurity landscape. Visit the NCSAM media room: staysafeonline.org/about-us/news/media-room/.

About the National Cyber Security Alliance  

The National Cyber Security Alliance (NCSA) is the nation's leading nonprofit, public-private partnership promoting cybersecurity and privacy education and awareness. NCSA works with a broad array of stakeholders in government, industry and civil society. NCSA's primary partners are the U.S. Department of Homeland Security (DHS) and NCSA's Board of Directors, which includes representatives from ADP; Aetna; AT&T Services Inc.; Bank of America; Barclays; CDK Global, LLC; Cisco; Comcast Corporation; ESET North America; Google; Facebook; LifeLock, Inc.; Logical Operations; NXP Semiconductors; RSA, the Security Division of EMC; Symantec Corporation; Intel Corporation; MasterCard; Microsoft Corporation; PayPal; Raytheon; PKWARE; Salesforce; SANS Institute; TeleSign; Visa and Wells Fargo. NCSA's core efforts include National Cyber Security Awareness Month (October); Data Privacy Day (January 28) and STOP. THINK. CONNECT.™, the global online safety awareness and education campaign co-founded by NCSA and the Anti Phishing Working Group, with federal government leadership from DHS. For more information on NCSA, please visit staysafeonline.org/about-us/overview/

About STOP. THINK. CONNECT.

STOP. THINK. CONNECT. is the global cybersecurity education and awareness campaign. The campaign was created by an unprecedented coalition of private companies, nonprofits and government organizations with leadership provided by the National Cyber Security Alliance and the Anti-Phishing Working Group. The U.S. Department of Homeland Security leads the federal engagement in the campaign. Learn how to get involved at stopthinkconnect.org.

SOURCE National Cyber Security Alliance

Related Links
http://www.staysafeonline.org
 
08:00 ET
Preview: On October 1, Digital Citizens Worldwide Will Be Reminded of Our Shared Global Responsibility to Secure the Internet

Jun 14, 2017, 06:00 ET
Preview: NCSA and Nasdaq Cybersecurity Summit Tackles Cyber-Related "People Problems" in the Workplace


Also from this source 

08:00 ET On October 1, Digital Citizens Worldwide Will Be Reminded of Our...
 
Jun 14, 2017, 06:00 ET NCSA and Nasdaq Cybersecurity Summit Tackles Cyber-Related...

Explore

More news releases in similar topics
You just read:

The Countdown to National Cyber Security Awareness Month Begins!

News provided by
National Cyber Security Alliance
Sep 05, 2017, 09:00 ET

http://www.prnewswire.com/news-releases/the-countdown-to-national-cyber-sec…


NATIONAL CYBER SECURITY AWARENESS MONTH

October is National Cyber Security Awareness Month which is an annual campaign to raise awareness about the importance of cybersecurity. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. National Cyber Security Awareness Month (NCSAM) is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about the importance of cybersecurity, provide them with tools and resources needed to stay safe online, and increase the resiliency of the Nation in the event of a cyber incident.

Expand All Sections

NCSAM 2017
NCSAM 2016 in Review Get Involved Stop.Think.Connect. Toolkit
 Past NCSAM Resources

https://www.dhs.gov/national-cyber-security-awareness-month


CYBERSECURITY AWARENESS MONTH BEGINS


09/27/2017 10:34 AM CDT

Contact: Wisconsin Department of Military Affairs

    
...These and many other topics will be discussed at Wisconsin's 5th Annual Governor's Cybersecurity Summit, Monday, Oct. 16 at the Gordon Event Center, UW-Madison. Learn more about the Summit and register online at http://cybersummit.wisconsin.gov   

Current News Releases available at http://readywisconsin.wi.gov    
- 30 -

   
To see this content online, copy the following link and paste in your browser: http://dma.wi.gov/DMA/news/2017news/17128
Story Online 

http://dma.wi.gov/DMA/news/2017news/17128   


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Jeu 28 Sep - 03:27 (2017)    Sujet du message: CHINA FINES TECH FIRMS OVER ONLINE CONTENT Répondre en citant

CHINA FINES TECH FIRMS OVER ONLINE CONTENT

by Staff Writers
Beijing (AFP) Sept 26, 2017

China has fined several of the country's biggest technology firms for failing to remove illegal online content as the authorities intensify their policing of the internet.

Three web giants operating popular social media services have received "maximum penalties" for allowing the publication of pornographic, violent and other sorts of banned material, the Cyberspace Administration of China said.

Internet users had shared the content on Baidu's online forum Tieba, the microblogging site Weibo, and Tencent's WeChat application, according to the watchdog.

The companies also failed to block content that "promoted ethnic hatred," it said in a statement on Monday.

The amounts of the fines were not made public. The companies were also ordered to immediately remove illegal content as well as increase platform management measures.

A Baidu spokeswoman told AFP the company is "actively cooperating with the government" to "purge bad information" from its Tieba forum.

Regulations in force since 2000 say websites are responsible for ensuring the legality of any information posted on their platforms.

China has tightened online policing this year, enacting new rules that require tech companies to store user data inside the country as well as restrictions on what is permissible content.

The fines were handed down ahead of the Communist Party congress on October 18, when President Xi Jinping is expected to be given a second five-year term as the party's general secretary.

In the past few days, Chinese authorities appear to have severely disrupted Facebook's WhatsApp messaging app.

China usually steps up surveillance around major events.

Foreign websites such as Facebook, Twitter, Pinterest and a slew of overseas media have been blocked for years.

http://www.spacewar.com/reports/China_fines_tech_firms_over_online_content_999.html


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Ven 29 Sep - 15:30 (2017)    Sujet du message: USA CONTRE SPUTNIK ET RT: LES OCCIDENTAUX «ENTERRENT LA LIBERTE D'EXPRESSION» Répondre en citant

USA CONTRE SPUTNIK ET RT: LES OCCIDENTAUX «ENTERRENT LA LIBERTE D'EXPRESSION»


CC BY 2.0 / Graham C99 / bcn4161
International
12:46 29.09.2017(mis à jour 13:58 29.09.2017)

«Les partenaires occidentaux» traquant Sputnik et RT ont enterré toute liberté d’expression, estime Margarita Simonian, rédactrice en chef de Sputnik. Elle commentant la demande de la partie américaine d'enregistrer l'entreprise, qui sert à la chaîne RT America aux États-Unis, en tant qu'agent étranger.

Margarita Simonian, rédactrice en chef de Sputnik et de RT, a évoqué la «chasse» contre Sputnik et RT menée par des «partenaires occidentaux», qui ont par leurs actions enterré toute liberté d'expression. Elle commentait le fait que les USA exigent que le prestataire de services de la chaîne RT America aux États-Unis soit enregistré en tant qu'agent étranger.

«On exige que nous nous enregistrions en tant qu'agent étranger. Cela peut impliquer de telles restrictions que nous ne serons plus autorisés à travailler dans le pays. C'est le prix de la liberté de parole dont on parle beaucoup, cette liberté de parole inventée par nos partenaires occidentaux, qui l'ont eux-mêmes enterrée au son des fanfares», s'est indignée Mme Simonian.

© Sputnik. Vladimir Trefilov
Rédactrice en chef de Sputnik: «Voilà pourquoi tous doivent craindre la propagande russe»

Elle est en outre persuadée que la Russie adopterait des mesures similaires, ce qui ne «ne serait profitable» à aucune des parties. Margarita Simonian a également souligné qu'«il n'y a aucun doute que ces décisions sont de nature politique», ajoutant que toutes les tentatives de nuire à Sputnik et à RT avaient échoué.

Elle a notamment évoqué la manière d'essayer d'entraver les médias russes, dont des actions visant à entacher leur réputation en évoquant une «propagande russe» et parlant de la «Main du Kremlin».

Qui plus est, on a essayé de mettre les bâtons dans les roues des médias russes en tentant d'exercer des pressions sur leurs invités en les appelants à ne pas participer aux émissions.

«Cela n'a pas non plus fonctionné. Certaines personnes ont cessé de venir, mais d'autres se sont mises à venir chez nous avec enthousiasme, car on ne leur donnait pas la possibilité de s'exprimer dans d'autres médias», selon Margarita Simonian.

https://fr.sputniknews.com/international/201709291033252537-medias-liberte-…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Ven 29 Sep - 15:36 (2017)    Sujet du message: LE PAPE FRANCOIS S'ATTAQUE AUX "FAKE NEWS" Répondre en citant

LE PAPE FRANCOIS S'ATTAQUE AUX "FAKE NEWS"

29/09/2017 à 14h35 
[*] Newsletter
BFMTV Midi

 

Le pape François le 8 septembre 2017. - Alberto PIZZOLI / AFP

Le pape François a annoncé ce vendredi sur Twitter que le thème de la prochaine journée mondiale de la communication tournerait autour de la lutte contre les "fake news" (fausses nouvelles).
[*]
[*]Thème pour la Journée de la Communication 2018 : « La vérité vous rendra libres » (Jn 8, 32). Fausses nouvelles et journalisme de paix.
[*]
twitter-tweet a écrit:
— Pape François (@Pontifex_fr) 29 septembre 2017
[*]
twitter-tweet a écrit:



Cette journée, instituée après le concile Vatican II, est célébrée chaque année au printemps et son thème est en général communiqué le 24 janvier, pour la Saint François de Sales, le patron des journalistes.
[*]
Mais cette année le pape a pris de l'avance en annonçant sur son compte Twitter que le thème serait tiré d'un verset de l'Evangile affirmant: "La vérité vous rendra libres".
[*]

Ce thème "fait référence aux "fake news", ces informations infondées qui contribuent à générer et à alimenter une forte polarisation des opinions", a ensuite expliqué le Vatican dans un communiqué.
[*]
"Promouvoir un journalisme professionnel, qui cherche toujours la vérité" Rolling Eyes
[*]
[*]
Alors que les géants des réseaux sociaux, les institutions et les politique "ont commencé à affronter ce phénomène, l'Eglise aussi veut offrir une contribution en proposant une réflexion sur les causes, sur les logiques et sur les conséquences de la désinformation dans les médias", a-t-il ajouté.
[*]
La démarche vise également à "promouvoir un journalisme professionnel, qui cherche toujours la vérité, et donc un journalisme de paix qui favorise la compréhension entre les personnes", a insisté le Saint-Siège. Rolling Eyes

Le pontife argentin insiste régulièrement sur la responsabilité des médias dans un monde sur-informé. "La bonne information peut abattre les murs de la peur et de l'indifférence", disait-il en avril.

http://www.bfmtv.com/international/le-pape-francois-s-attaque-aux-fake-news…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Sam 30 Sep - 14:43 (2017)    Sujet du message: ETATS-UNIS : LE GOUVERNEMENT RECLAME A FACEBOOK DES DONNEES D'OPPOSANTS Répondre en citant

ETATS-UNIS : LE GOUVERNEMENT RECLAME A FACEBOOK DES DONNEES D'OPPOSANTS

Washington - L'association américaine de défense des libertés ACLU a présenté jeudi un recours pour empêcher la Maison-Blanche d'obtenir des données privées concernant potentiellement des milliers d'utilisateurs de Facebook hostiles au président américain Donald Trump.

En février, après l'investiture de M. Trump le 20 janvier, le gouvernement américain avait réclamé à Facebook des données concernant trois utilisateurs considérés, selon lui, comme des activistes opposés au nouveau président.

La page de l'un de ces utilisateurs, intitulée "DisruptJ20", abritant des discussions sur des manifestations contre l'investiture, a été visitée par des milliers d'utilisateurs du réseau social dont les identités seraient fournies au gouvernement si Facebook se pliait aux demandes.

L'American Civil Liberties Union a déposé devant un tribunal de Washington une requête visant à annuler ces demandes ou les restreindre, arguant de leur caractère "excessif" et assurant qu'elles violaient le quatrième amendement de la Constitution interdisant les perquisitions abusives.

Selon cette requête, l'étendue de ces demandes permettrait au gouvernement d'accéder non seulement aux données liées aux trois utilisateurs, mais également à celles de parties tierces, y compris des messages privés ou des opinions exprimées sur toutes sortes de questions politiques et sociales.

Les trois utilisateurs concernés n'ont pas été mis au courant de ces demandes au départ car elles étaient accompagnées d'une consigne de silence, contestée par Facebook et que le gouvernement a fini par accepter de lever mi-septembre en appel.

Les données réclamées remonteraient au 1er novembre 2016, soit une semaine avant l'élection présidentielle, et s'étaleraient jusqu'au 9 février 2017, selon la requête.

Les avocats de la Maison-Blanche ont également présenté une demande similaire à l'hébergeur DreamHost, également bloquée en justice actuellement.

mdo/mtp/lch/roc/LyS

Facebook

(©AFP / 30 septembre 2017 10h12)

https://www.romandie.com/news/Etats-Unis-le-gouvernement-reclame-a-Facebook…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Jeu 5 Oct - 01:53 (2017)    Sujet du message: SENATE PANEL PASSES FITARA EXTENSION IN BLOCK OF IT BILLS Répondre en citant

SENATE PANEL PASSES FITARA EXTENSION IN BLOCK OF IT BILLS
 


Orhan Cam/Shutterstock.com

By Jack Corrigan 12:09 PM ET
NEXTGOV

The Senate Homeland Security and Government Affairs Committee approved legislation on Wednesday that would extend the Federal Data Center Consolidation Initiative and eliminate the sunset periods for a handful of key consolidation requirements.

The committee forwarded the FITARA Enhancement Act to the Senate along with a handful of other bills relating to federal technology, including the Connected Government Act, SECRET Act and Hack the DHS Act.

With the Government Accountability Office calling out many agencies for dragging their feet on optimizing data centers, the FITARA Enhancement Act would help ensure the government’s consolidation goals are met.

The legislation would extend the consolidation initiative—originally set to expire in 2018—to 2020, and other transparency and review requirements that would have been phased out.

Sens. Steve Daines, R-Mont., Jerry Moran, R-Kansas, Tom Udall, D-N.M., and Mark Warner, D-Va., sponsored the bill, which mirrors legislation passed by the House Oversight Committee in July.

“This is an important step forward in making the FITARA Enhancement Act reality and in our efforts to realize the full potential of FITARA,” said Rep. Gerry Connolly, D-Va., the sponsor of the bill’s House counterpart. “The bipartisan, bicameral support to extend the DCOI provisions for another two years sends a clear message to agencies that they cannot run out the clock on taking the necessary steps to consolidate and optimize their data centers.”

The Connected Government Act, which also passed the committee on Wednesday, would mandate that all federal websites become mobile-friendly. One think-tank found that only 36 percent of government websites passed a loading speed test for mobile devices, and about 90 percent failed some standard of mobile friendliness, ease of use, loading time or security. If passed, the legislation would require full compliance within 18 months.

Additionally, lawmakers approved the SECRET Act, which would require the Office of Personnel Management’s National Background Investigations Bureau to report their backlog of security clearance investigations as well as the process for investigating and judging clearances within the White House.

The committee also forwarded along legislation that would permit the Homeland Security Department to run bug bounty programs to shore up their websites from potential cyberattacks. Similar programs run by the Pentagon and Air Force have shown success, finding hundreds of bugs that hackers could have potentially exploited.

http://www.nextgov.com/cio-briefing/2017/10/senate-panel-passes-fitara-exte…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Lun 9 Oct - 02:04 (2017)    Sujet du message: TRUMP URGES SENATE TO PROBE 'FAKE NEWS NETWORKS' / PROOF OF A BOUGHT AND PAID FOR REPTILIAN MAINSTREAM MEDIA Répondre en citant

TRUMP URGES SENATE TO PROBE 'FAKE NEWS NETWORKS'



VIDEO : https://www.youtube.com/watch?v=e7bCdXuwG_U&t=47s

 
PROOF OF A BOUGHT AND PAID FOR REPTILIAN MAINSTREAM MEDIA



VIDEO : https://www.youtube.com/watch?v=lpS444jd8VI


HOW THE NDAA ALLOWS US GOV TO USE PROPAGANDA AGAINST AMERICANS

 


22 Jul, 2013 by Susanne Posel 
 
The US government has unbound the legal regulations against using propaganda against foreign audiences and American citizens. The intention is to sway public opinion by using television, radio, newspapers, and social media targeting the American and foreign people in controlled psy-ops.

The newest version of the National Defense Authorization Act (NDAA) has an amendment added that negates the Smith-Mundt Act of 1948 (SMA) and the Foreign Relations Authorization Act of 1987.

These laws made propaganda used to influence foreigners and US citizens illegal. Without these laws, disinformation could run rampant throughout our information junkets.
This amendment added to the NDAA has passed into implementation as of this month.

SMA defines the prohibition of domestic access to influence information through a variety of means, from broadcast to publishing of books, media, and online sources by restricting the State Department.

The Broadcasting Board of Governors was created from SMA. This agency claims to “inform, engage, and connect people around the world in support of freedom and democracy”. They omit that their specialty is making sure propaganda is added to the informational flow we all depend on.

The amendment sanctions the US government, without restriction, the use of any mode of message to control how we perceive our world.

As of now, the level of propaganda in the mainstream media (MSM) is quite high, with all of our television, printed media and internet sites associated with MSM owned by only 5 corporations.

Without these laws, the lies purveyed as truth to foreigners would find their way to our doorsteps as a purposeful operation enacted by our government. And in the name of national security, the US government could, and probably would, disseminate misinformation to gain public support for otherwise decidedly deplorable actions.
Amendment 114 of the NDAA was approved by the House in May of 2012.

The Smith-Mundt Modernization Act (2012) reads:
Sec. 501. (a) The Secretary and the Broadcasting Board of Governors are authorized to use funds appropriated or otherwise made available for public diplomacy information programs to provide for the preparation, dissemination, and use of information intended for foreign audiences abroad about the United States, its people, and its policies, through press, publications, radio, motion pictures, the Internet, and other information media, including social media, and through information centers, instructors, and other direct or indirect means of communication.

(b)(1) Except as provided in paragraph (2), the Secretary and the Broadcasting Board of Governors may, upon request and reimbursement of the reasonable costs incurred in fulfilling such a request, make available, in the United States, motion pictures, films, video, audio, and other materials prepared for dissemination abroad or disseminated abroad.

According to Michael Hastings : “The new law would give sweeping powers to the State Department and Pentagon to push television, radio, newspaper, and social media onto the U.S. public. “It removes the protection for Americans,” says a Pentagon official who is concerned about the law. “It removes oversight from the people who want to put out this information. There are no checks and balances. No one knows if the information is accurate, partially accurate, or entirely false.”

Representatives Mac Thornberry (R-TX) and Adam Smith (D-WA) in the Smith-Mundt Modernization Act (2012) (H.R. 5736), advocate that it is time to liberate the authority of the US government to broadcast American produced foreign propaganda in the U.S.

The amendment, which was hidden within the NDAA, has remained relatively unnoticed. However, it empowers the State Department and Pentagon to utilize all forms of media against the American public for the sake of coercing US citizens to believe whatever version of the truth the US government wants them to believe.

All oversight is removed with Amendment 114 . Regardless of whether the information disseminated is truthful, partially truthful or completely false bears no weight.

Thornberry believes that with the use of the internet by terrorist groups like al-Qaeda, the federal government needs to have the freedom to circulate their own propaganda to combat terrorism effectively.

“I just don’t want to see something this significant – whatever the pros and cons – go through without anyone noticing,” says one source on the Hill, who is disturbed by the law. According to this source, the law would allow “U.S. propaganda intended to influence foreign audiences to be used on the domestic population.”

Four billion dollars per year is spent by the Pentagon on propaganda aimed at the American public; as well as $202 million spent by the Department of Defense on misinformation operations in Iraq and Afghanistan in 2011.

Currently, the Pentagon is using “ sock puppet ” (fake handles) on social media sites to purvey false information, harass users and enact psy-ops to influence Americans.

A California corporation is working with the US Central Command (CENTCOM) in spreading propaganda overseas. They provide “online persona management service” that allows active duty military to set up an estimated 10 different false identities that are used worldwide.

Each fake persona comes complete with a background history and safeties to prevent “sophisticated adversaries” from discovering the lie.

CENTCOM spokesman Commander Bill Speaks said: “The technology supports classified blogging activities on foreign-language websites to enable CENTCOM to counter violent extremist and enemy propaganda outside the US.”

Sophisticated software allows military to engage in online conversations with coordinated answers, blog comments and instant messaging remarks that are solely meant to spread pro-American propaganda.

US Army whistleblower, Lieutenant Col. Daniel Davis believes there is a definitive aspiration within the US government “to enable Public Affairs officers to influence American public opinion when they deem it necessary to “protect a key friendly center of gravity, to wit US national will.”

Edward Bernays would be proud.

 https://www.occupycorporatism.com/how...

 

The NDAA Legalizes The Use Of Propaganda On The US Public
Article from businessinsider.com: http://www.businessinsider.com/ndaa-l...


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Lun 9 Oct - 14:32 (2017)    Sujet du message: NOE 3 Répondre en citant



Origine

NOÉ 3.0 est né d’un premier projet informel organisé à l’occasion du déplacement du Cardinal Barbarin, archevêque de Lyon, en Irak, pour la fête de l’Immaculée Conception le 8 décembre 2014.

Cette opération appelée #Erbilight ayant généré un buzz mondial, nous avons décidé de pérenniser un ensemble de process uniques en leur genre. D’autres opérations comme #ChristianBells, #Careme ou #OPLourdes nous ont permis depuis d’affûter et de tester des pratiques de plus en plus innovantes.

« Je vous demande d'être révolutionnaires, je vous demande d'aller à contre-courant, d'aller vers les périphéries existentielles du monde moderne pour annoncer, sans peur, l'amour du Christ. »

– Pape Francois, 1er aout 2013 –

Process

Une cellule fixe de 10 à 60 personnes et une cellule mobile chargée de prendre du son, de l’image, de la vidéo et du texte.

Envoi du data par la cellule mobile à la cellule fixe (via clés 4 G) pour diffusion en temps réel sur site internet / comptes twitter / pages Facebook afin de faire le buzz le plus large possible.

Mise en interaction des comptes Twitter et Facebook existants afin de démultiplier l’onde de diffusion.

Motivation

Evangéliser via les moyens de communication les plus modernes. Former les chrétiens aux supports numériques et papier.




 


La suite : https://noe3-0.fr/#contact


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Mar 10 Oct - 04:01 (2017)    Sujet du message: AI, OTHER HIGH-TECH MAY SIGNAL DEATH OFR JOURNALISM SHAKEN BY FAKE NEWS Répondre en citant

AI, OTHER HIGH-TECH MAY SIGNAL DEATH OFR JOURNALISM SHAKEN BY FAKE NEWS



VIDEO : https://www.youtube.com/watch?v=8gpHICxLC3M


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Mer 18 Oct - 19:31 (2017)    Sujet du message: MICROSOFT CLOUD CAN NOW HOST CLASSIFIED PENTAGON DATA Répondre en citant

MICROSOFT CLOUD CAN NOW HOST CLASSIFIED PENTAGON DATA
 

Frontpage/Shutterstock.com

By Frank Konkel October 17, 2017
NEXTGOV

Microsoft announced on Tuesday that the Defense Department can host secret classified data in its cloud.

The announcement means the Defense Department, the military services, intelligence agencies and their industry partners working within secret enclaves can host classified data in Microsoft’s Azure Government Secret cloud, where they’ll have access to new technologies like machine learning.

“This is a hyper-scale cloud with the same innovations and security you would expect, with innovation in areas like artificial intelligence, data, machine learning and of course, security,” said Tom Keane, Microsoft Azure’s head of Global Infrastructure.

“This environment will allow some of the most secure and important data the U.S. government holds to be realizing some of the power we are making available with Azure Government,” Keane added.

The U.S. government designates secret classified information as data that would cause “serious damage” to national security if it were publicly available and requires a secret-level security clearance to view.

Secret data is traditionally distributed through a system of computer networks managed by the Defense and State departments called the Secret Internet Protocol Router Network, or SIPRNet. Microsoft’s Azure Government Secret cloud can now host SIPRNet data, Keane said.

“SIPR is the platform with which the U.S. and coalition partners go to war,” Keane told Nextgov.

“What SIPR is an example of is a secret enclave. It’s just a very, very large one. If you think about the FBI, the Department of Justice and Department of Homeland Security, all of these organizations have secret-level networks,” Keane said. “So what we’re announcing with Azure Secret is the ability for all those secret networks to be connecting in.”

Keane described Microsoft’s Secret cloud as a physically isolated infrastructure located in a secure facility operating under cleared personnel.

Microsoft is one of several companies, including IBM and Amazon Web Services, that have been beefing up the security of their cloud platforms in an effort to snag business within the Defense Department, which spends nearly $50 billion on information technology each year.

Last year, Microsoft became the first cloud provider to host the military’s most sensitive unclassified data. Cloud is even gaining traction in the intelligence community. The National Security Agency runs its own private cloud and the CIA operates an Amazon-hosted cloud.

http://www.nextgov.com/cloud-computing/2017/10/microsoft-cloud-can-now-host…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Ven 20 Oct - 01:57 (2017)    Sujet du message: POUR WASHINGTON, UN CONTRÔLE STRICT D'INTERNET EST NECESSAIRE POUR EVITER UN NOUVEAU 11 SEPTEMBRE Répondre en citant

POUR WASHINGTON, UN CONTRÔLE STRICT D'INTERNET EST NECESSAIRE POUR EVITER UN NOUVEAU 11 SEPTEMBRE

19 oct. 2017, 15:36


© Kevin Lamarque Source: Reuters
la secrétaire américaine à la Sécurité intérieure, Elaine Duke.

Brandissant la menace d'un nouveau 11 septembre, la secrétaire américaine à la Sécurité intérieure a fait un plaidoyer en faveur d'un accès illimité des autorités aux contenus diffusés sur les réseaux sociaux.

«Les organisations terroristes, que ce soit Daesh, al-Qaïda ou d'autres, cherchent à provoquer la "grosse explosion", comme ils l'ont fait le 11 septembre [2001]. Ils veulent abattre des avions, les renseignements sont catégoriques là-dessus», a assuré la secrétaire américaine à la Sécurité intérieure, Elaine Duke, à l'occasion d'une visite au Royaume-Uni, dans des propos rapportés par le Telegraph le 19 octobre.

«La menace est toujours importante», a-t-elle certifié, à la sortie d'une réunion avec la ministre britannique de l'Intérieur, Amber Rudd, lors de laquelle les deux responsables ont discuté des contenus à caractère terroriste en ligne.

Pour empêcher la diffusion de la propagande terroriste – et donc la probabilité de voir une nouvelle attaque de grande ampleur survenir –, Elaine Duke a expliqué qu'il était nécessaire pour les autorités d'avoir un accès illimité aux contenus mis en ligne sur les réseaux sociaux.

Elle s'est montrée satisfaite que les géants du secteur coopèrent déjà avec les autorités sur ces questions, mais a affirmé que beaucoup restait à faire. «Nous continuerons d'aller aussi loin que nous pouvons», a-t-elle prévenu, notant cependant comme «un signe positif» que ces entreprises [Facebook, Google, Twitter et Microsoft] aient accepté de se joindre à la réunion du G7 qui se tient les 19 et 20 octobre pour discuter de la lutte contre le terrorisme sur internet.

La secrétaire à la Sécurité intérieure a en outre remarqué que ces entreprises faisaient face à une «pression sociale» intense. «[Ces entreprises] veulent faire des affaires, elles doivent donc trouver un équilibre entre conserver les accords qui les lient aux utilisateurs et donner aux forces de l'ordre ce dont elles ont besoin», a-t-elle noté.

Les géants du secteur assurent pour leur part vouloir aider le gouvernement à retirer les contenus extrémistes, mais ils restent soucieux de pouvoir trouver un juste milieu entre les exigences des Etats et le respect des libertés civiles. «Nous aimerions pouvoir obtenir les données cryptées par un processus légal», a conclu Elaine Duke.
Lire aussi : Vladimir Poutine souhaiterait minimiser l'influence de l'Etat dans le filtrage de contenu sur le net

https://francais.rt.com/international/44747-controle-severe-dinternet-est-necessaire-eviter-nouveau-11-septembre-responsable-us


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Ven 20 Oct - 15:35 (2017)    Sujet du message: LE G7 ET LES GEANTS DE L'INTERNET S'ACCORDENT POUR BLOQUER LA PROPAGANDE "TERRORISTE" Répondre en citant

LE G7 ET LES GEANTS DE L'INTERNET S'ACCORDENT POUR BLOQUER LA PROPAGANDE "TERRORISTE"



VIDEO : https://www.youtube.com/watch?v=4cSwMY07TWs


 
Réunion du G7 et des représentants des géants de l'Internet sur l'île d'Ischia en Italie, le 20 octobre 2017 / © AFP / ANDREAS SOLARO

Les pays du G7 et les géants de l'internet se sont mis d'accord sur un plan visant à bloquer les contenus en ligne à caractère "terroriste", a indiqué vendredi un ministre italien, dont le pays préside actuellement le G7.

Des représentants de Google, Facebook ou Twitter et les ministres de l'Intérieur des pays du G7 se sont retrouvés jeudi et vendredi à Ischia (sud), où la décision a été prise "de mettre en oeuvre ensemble" un plan d'action visant à bloquer "des contenus à caractère terroriste", a déclaré devant la presse Marco Minniti, ministre italien de l'Intérieur.

"C'est la première fois" que les pays du G7 et les représentants des principaux opérateurs internet et réseaux sociaux se retrouvent ensemble autour de la même table, s'est félicité M. Minniti, rappelant qu'internet "a été un moyen de recrutement, entraînement et radicalisation important des combattants étrangers".

"La rencontre avec les opérateurs d'internet a été plus que satisfaisante", a poursuivi M. Minniti, déplorant le fait que l’organisation de l'Etat islamique (EI) circule sur internet "comme un poisson dans l'eau.

"C'est à la charge des auteurs de contenus, des gouvernements et aussi de la société civile de faire en sorte qu’internet soit à nouveau un vecteur de paix", a déclaré de son côté son homologue français, Gérard Collomb.

"Nous devons en faire davantage", a souligné pour sa part Elaine Duke, secrétaire américain à la Sécurité par intérim, remerciant les grands réseaux sociaux pour leur collaboration.

La chute de Raqa, fief du groupe Etat islamique (EI) en Syrie, "est une défaite militaire très dure mais cela ne signifie pas que ce groupe n'existe plus", a averti M. Minniti.

Cette réunion du G7 a débuté vendredi matin par un premier échange de vues consacré à la menace représentée par les combattants étrangers en fuite après la chute de plusieurs bastions jihadistes en Irak et en Syrie.

"Nous avons affronté dans le détail les activités de prévention et nous avons en premier discuté sur comment lutter contre le retour des combattants étrangers" dans leur pays d'origine, a expliqué le ministre italien.

"Nous avons décidé de recueillir ensemble les informations et de les partager", a-t-il précisé.

Après la libération de Raqa, le monde s'inquiète du sort des 25.000 à 30.000 combattants étrangers, dont 5.000 venus d'Europe, qui forment un contingent entraîné susceptible d'essaimer à travers la planète.

(©AFP / 20 octobre 2017 14h55)

https://www.romandie.com/news/ZOOM-Le-G7-et-les-geants-de-l-internet-s-acco…


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Sam 21 Oct - 14:39 (2017)    Sujet du message: YOU COULD BE SUED FOR SHARING FAKE NEWS! Répondre en citant

YOU COULD BE SUED FOR SHARING FAKE NEWS!



VIDEO : https://www.youtube.com/watch?v=cT7Bcn_KI4Y&t=42s

That's right! Ann Ravel, the ex-head of the FEC is warning people that they could be sued for libel, just for sharing what she calls "Fake News".

http://www.washingtonexaminer.com/dru...


Revenir en haut
maria
Administrateur

En ligne

Inscrit le: 18 Juin 2011
Messages: 28 787
Féminin

MessagePosté le: Mer 25 Oct - 02:26 (2017)    Sujet du message: TWITTER PROMET PLUS DE TRANSPARENCE SUR LES PUBLICITES POLITIQUES Répondre en citant

TWITTER PROMET PLUS DE TRANSPARENCE SUR LES PUBLICITES POLITIQUES

San Francisco - Twitter a annoncé mardi des mesures pour être plus transparent sur les publicités politiques apparaissant sur le réseau social, leurs annonceurs et les utilisateurs ciblés.

L'entreprise entend mettre en place une politique plus stricte concernant les contenus publicitaires, améliorer les contrôles déjà existants, et lancer un centre qui recensera des informations sur les annonceurs et le message de ces contenus sponsorisés ("ads"), selon Bruce Falck, un des responsables de Twitter.

"Pour que cela soit clair quand vous voyez un contenu qui fait de la publicité électorale, nous allons demander aux annonceurs d'identifier clairement leurs publicités en tant quel tel", a-t-il écrit sur un blog.

"Nous allons également changer l'apparence de ces publicités pour faire apparaitre visuellement qu'il s'agit de publicités politiques".

L'entreprise travaillera entre autres avec ses concurrents, les législateurs et les annonceurs pour identifier clairement ces contenus.

Les géants de la tech tentent de réagir après des ingérences attribuées à la Russie lors de la campagne présidentielle américaine de 2016. Rolling Eyes

Facebook, Twitter et Google ont ainsi trouvé sur leur site respectif des contenus financés par des intérêts russes pendant la campagne. Rolling Eyes

Moyennant finance, certains contenus sur les réseaux sociaux ou les moteurs de recherche peuvent être ciblés vers certains utilisateurs, selon leur profil, leur lieu géographique ou leurs historiques de recherche par exemple. Il peut s'agir de publicités classiques mais aussi de publications ou de pages sponsorisées.

470 comptes ont ainsi dépensé près de 100.000 dollars entre juin 2015 et mai 2017 pour publier des annonces mettant en avant de fausses informations sur Facebook.

Des sénateurs américains ont proposé la semaine dernière de soumettre les réseaux sociaux aux mêmes règles de transparence pour la publicité politique que les chaînes de télévision.

(©AFP / 25 octobre 2017 01h23)

https://www.romandie.com/news/Twitter-promet-plus-de-transparence-sur-les-p…


Revenir en haut
Contenu Sponsorisé






MessagePosté le: Aujourd’hui à 07:10 (2017)    Sujet du message: RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM & HUMAN CONTROL (PARTIE 2)

Revenir en haut
Montrer les messages depuis:   
Poster un nouveau sujet   Répondre au sujet    LE VOÎLE DÉCHIRÉ (1) Index du Forum -> NOUVELLES LOIS ANTITERRORISTES/NEW ANTITERRORIST LAWS -> RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM (PARTIE 2) Toutes les heures sont au format GMT + 2 Heures
Aller à la page: <  1, 2, 316, 17, 18
Page 18 sur 18

 
Sauter vers:  

Index | Creer un forum | Forum gratuit d’entraide | Annuaire des forums gratuits | Signaler une violation | Conditions générales d'utilisation
Powered by phpBB © 2001, 2005 phpBB Group
Traduction par : phpBB-fr.com