LE VOÎLE DÉCHIRÉ (1) Index du Forum

LE VOÎLE DÉCHIRÉ (1)
...

 FAQFAQ   RechercherRechercher   MembresMembres   GroupesGroupes   S’enregistrerS’enregistrer 
 ProfilProfil   Se connecter pour vérifier ses messages privésSe connecter pour vérifier ses messages privés   ConnexionConnexion 

RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM & HUMAN CONTROL (PARTIE 2)
Aller à la page: <  1, 2, 316, 17, 18
 
Poster un nouveau sujet   Répondre au sujet    LE VOÎLE DÉCHIRÉ (1) Index du Forum -> NOUVELLES LOIS ANTITERRORISTES/NEW ANTITERRORIST LAWS -> RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM (PARTIE 2)
Sujet précédent :: Sujet suivant  
Auteur Message
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 28 054
Féminin

MessagePosté le: Sam 12 Aoû - 03:39 (2017)    Sujet du message: ARTIFICIAL INTELLIGENCE HAS THE POWER TO DESTROY OR SAVE DEMOCRACY Répondre en citant



from Net Politics and Digital and Cyberspace Policy Program
 
ARTIFICIAL INTELLIGENCE HAS THE POWER TO DESTROY OR SAVE DEMOCRACY


Artificial intelligence has helped politicians get elected, but what effect is it having on democracy?

Blog Post by Guest Blogger for Adam Segal
August 07, 2017


The Twitter logo in front of 0s and 1s. Dado Ruvic/Reuters

Vyacheslav Polonski is a PhD student at the Oxford Internet Institute and the co-founder of Avantgarde Analytics. You can follow him @avantanalytics.

It’s a great time to be a politician and an even better one for engineers that specialize in machine learning that work for them.

Throughout history, candidates for office have always had limited tools to hone their message and secure votes (aside from outright bribing). Anecdotal evidence is not representative and surveys are imperfect. More often than not, politicians relied more on instinct rather than insight when campaigning.

Today, campaigns have the ability to comb large swaths of data to micro-target specific categories of voters, and develop messaging that will resonate most with them. These efforts began in earnest with the 2008 U.S. presidential election and were honed in 2012 and 2016.

What is good for a politician and their engineers, however, is not necessarily good for a democracy. There is evidence to suggest that artificial intelligence-powered technologies have been systematically misused to manipulate citizens in recent elections.

One example of such manipulation is the use of political bots to spread right-wing propaganda and fake news on social media. Bots are autonomous accounts that are programmed to aggressively spread one-sided political messages to manufacture the illusion of public support. This is an increasingly wide-spread tactic that attempts to shape public discourse and distort political sentiment.

Typically disguised as ordinary human accounts, bots have been responsible for spreading misinformation and contributing to an acrimonious political climate on sites like Twitter, Facebook, and Reddit. They are very effective at attacking voters from the opposing camp and even discouraging them from going to the voting booth.
For example, Pro-Trump bots regularly infiltrated the online spaces used by pro-Clinton campaigners to spread highly automated content, generating one quarter of Twitter traffic about the 2016 election.

Bots were also largely responsible for popularizing #MacronLeaks on social media just days before the French presidential election. They swarmed Facebook and Twitter with leaked information that was mixed with falsified reports, to build a narrative that Emmanuel Macron was a fraud and hypocrite—a common tactic used by bots to push trending topics and dominate social feeds while giving the impression that the messages promoted are from genuine people.

In addition to shaping online debate, AI can also be used to target and manipulate individual voters: during the U.S. presidential election, the data science firm Cambridge Analytica rolled out an extensive advertising campaign that targeted persuadable voters based on their individual psychology. This highly sophisticated micro-targeting operation relied on big data and machine learning to influence people’s emotions.

The problem with using AI in political campaigns is not the technology itself, but rather the covert nature of its use and the targeted messages that preyed on individuals’ psychological vulnerabilities. Different voters received different messages based on predictions about their susceptibility to different arguments. The paranoid received ads with messages that were mostly fear-based. People with a conservative pre-disposition received ads with arguments based on tradition and community.

The micro-targeting was possible thanks to voter data available from social media and data miners, which can often include lifestyle attributes, consumption patterns and social relationships. Every click online generates signals that could be readily accessed and analyzed to build unique behavioral and psychographic profiles.

A presidential candidate with flexible campaign promises like Donald Trump was, of course, particularly well-suited for this tactic. Every voter could receive a tailored message that emphasised a different side of the argument. There was a different Trump for every voter—the Trump campaign just needed to find the right emotional triggers for each person to drive them to action.

This is a disquieting trend. A representative democracy depends on free and fair elections in which citizens can vote their conscience, free of manipulation. Yet AI and related technologies threaten to undermine fair elections if it continues to be methodically used to manipulate voters and promote extreme narratives.

All is not lost. AI itself is not harmful. The same algorithmic tools used to mislead, misinform and confuse can be re-purposed to support democracy and increase civic engagement. An ethical approach to AI can work to inform and serve an electorate. New AI startups like Factmata and Avantgarde Analytics are already providing these technological solutions. For example, political bots can be programmed to spread information debunking known falsehoods, like the infamous WTOE 5 News article that falsely claimed the pope had endorsed Donald Trump. Similarly, micro-targeting campaigns can educate voters on a variety of political issues to help them make up their own mind. And most importantly, AI can be used to listen to an electorate to ensure their elected representatives can hear them.

The use of AI techniques in politics is not going away anytime soon—it is simply too valuable to politicians and their campaigns. However, they should commit to use AI as ethically and judiciously as possible to ensure that their attempts to sway voters do not undermine democracy as a whole.

https://www.cfr.org/blog/artificial-intelligence-has-power-destroy-or-save-…


Revenir en haut
Publicité






MessagePosté le: Sam 12 Aoû - 03:39 (2017)    Sujet du message: Publicité

PublicitéSupprimer les publicités ?
Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 28 054
Féminin

MessagePosté le: Dim 13 Aoû - 03:11 (2017)    Sujet du message: GOOGLE’S NEW POLICIES ARE STRAIGHT OUT OF ORWELL’S 1984 / THE YouTube PURGE AGAINST INDEPENDENT NEWS IS HERE Répondre en citant



GOOGLE’S NEW POLICIES ARE STRAIGHT OUT OF ORWELL’S 1984


Aug 9, 2017
Melissa Dykes




Aug 9, 2017
Melissa Dykes

Remember 1984? In Orwell’s dystopic vision of the future, there was a huge difference between “truth” — what actually is — and “facts” — what a consensus has been led to believe.

Now the search engine giant Google will be delisting and censoring content that doesn’t follow “well-established” scientific, medical, or historical “facts”. Check out the company’s newly updated quality raters guidelines.

While you may think of all the links returned to you in a Google search as “information choices,” Google’s Eric Schmidt (annual Bilderberg attendee) thinks of them as “bugs” that need to be eradicated from their system, and that users should be given one “right” answer. In that case, these new guidelines are the extermination squad.

On one page, it refers to “Expertise, Authoritativeness, and Trustworthiness (EAT)” regarding on what constitutes “expertise” on a topic in the eyes of Google, then proceeds to link to the BBC and USA Today as “high quality news sources”.

It also notes, High quality information pages on scientific topics should represent well-established scientific consensus on issues where such consensus exists.” Medical information will be ranked and listed the same way. Take a guess what the prescribed “consensus” is there…

The guide also specifically mentions giving the lowest rankings to what they deem “conspiracy theories”.

VIDEO : http://truthstreammedia.com/2017/08/09/googles-new-policies-straight-orwell…

Welcome to 1984. Is anyone going to say anything?

And if they do, will anyone hear us?

(Some in the comments have suggested DuckDuckGo which claims not to track and Startpage. At least there are alternatives out there, but more people need to start using them en masse to really effect change.)

http://truthstreammedia.com/2017/08/09/googles-new-policies-straight-orwell…


THE YouTube PURGE AGAINST INDEPENDENT NEWS IS HERE





VIDEO : https://www.youtube.com/watch?v=GOkeJo2Tye8


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 28 054
Féminin

MessagePosté le: Ven 18 Aoû - 05:59 (2017)    Sujet du message: ‘EVERY COUNTRY SHOULD HAVE A CYBER WAR’: WHAT ESTONIA LEARNED FROM RUSSIAN HACKING Répondre en citant

‘EVERY COUNTRY SHOULD HAVE A CYBER WAR’: WHAT ESTONIA LEARNED FROM RUSSIAN HACKING


August 14, 2017
Markus Schreiber/AP

Estonia’s steps have certainly been radical, and other countries can learn lessons from them about how to defend themselves.

In 1991, Estonia was part of the dying communist empire. Its economy was run by central planners in Moscow, less than half of all households had a phone line, and goods were so scarce that people had to line up for food.

Skip ahead 26 years, and Estonians don’t even have to queue to vote. They do that online.

In just over two decades, Estonia has become one of the world’s most digitally innovative and efficient countries. In fact, Estonians conduct all their civic responsibilities online.

Offices and paper forms have become obsolete as state-issued digital identities allow all citizens to carry out any financial or government transaction from their laptops or cellphones. And that gives them an edge when it comes to cybersecurity.

Estonia’s journey down the digital road has been astonishingly fast. When it gained independence from the Soviet Union in 1991, it had almost no money and few natural resources. But it did have one advantage: It was the designated center for software and computer production for the USSR. After achieving independence, the country had a pool of tech expertise for them to build on.

During these early years of independence, Estonia needed to create the means for a new economy. And it wasn’t going to be easy. The country’s tiny population of just 1.3 million is spread over a relatively vast countryside. Outside the capital Tallinn, there’s an average of just four people per square kilometer. The new government didn’t have the resources to extend government offices or banking facilities to small towns and villages, so it decided to encourage self-service, and spread internet access across the country in order to do so. :roll:

To achieve this, the government set up an investment group to build computer networking and infrastructure. By 1997, almost every school was connected to the internet, and by 2004, 300 wifi access points had been established, bringing the internet even to small villages—and mostly for free.

But this was just laying the groundwork. Estonia’s biggest turning point was 10 years ago, when the country came under sustained cyberattack.

In 2007, Estonia was in the middle of a political fight with Moscow over plans to remove a Soviet war memorial from a park in Tallinn. Suddenly, it was hit with three weeks of D-DoS (designated denial of service) attacks. When this happens, multiple sources send multiple online requests, flooding a service or system and making it unable to function. It’s the digital equivalent of crowding an entrance to a building so that no one can come in or out.

Read more Which Cyberattacks Should the United States Deter, and How?

See also US Cyber Diplomacy Has Bigger Problems Than the Closure of its Coordination Office

And Counties Are on the Front Lines of Cyber War

As a result, the internet shut down as websites were bombarded with traffic. Russia denied any involvement, but Estonia didn’t believe it.

“War is the continuation of policy by other means,” Estonian president Kersti Kaljulaid told a NATO cyber-conference in Tallinn in June 2017. “Ten years on, it is clear that the decision made by Estonia not to withdraw but stay and fight for the security of our cyberspace was indeed the right one.”

The attacks made Estonia more determined than ever to develop its digital economy and make it safe from future attacks. “I think every country should have a cyber war,” says Taavi Kotka, the government’s former chief information officer. “Citizens get knowledge about what an attack means, about how phishing works, how D-DoS works, and they start to understand and live with that. People aren’t afraid if they know they can survive something. It’s the same thing as electricity going off: Okay, it’s an inconvenience, but you know how to deal with it.”

In Estonia, people are not afraid of cyber warfare, nor are they afraid of sharing personal data across public and private institutions. Go to a hospital, and the nurse or doctor can call up your entire health records from any doctor you ever visited without the need to call their offices and asking them to send files.

Full marks for convenience, simplicity, and efficiency. But what about the dangers of nameless bureaucrats accessing your personal data? Isn’t there a risk of future governments abusing the system and using your intimate details against you? Isn’t this inviting an Orwellian nightmare?

Estonia says no. Unlike an authoritarian state like the old Soviet Union, government transparency is built into the system. While all your private data is online, only you can give permission for any data to be accessed. And you can check who has accessed what. If a doctor you don’t know has viewed your records, it will be traceable, and you can have them sacked. As one software developer Quartz spoke to said, “You become your own Big Brother.” = Lies. We don't have any control about our data and we can't see it and they don't ask to us permission who should be access to our data.

Data is protected through a framework known as X-road, which helps exchange decentralized data between big government databases. X-road has built-in security measures that encrypt traffic and time-stamps so that the data cannot be manipulated. = Lie, they can change and manipulate anything they want in our data and be use against us if we don't submit to their agenda.

Taimar Peterkop, from Estonia’s Information System Authority, says that the security measures built into E-identity databases are all but impenetrable by outsiders. “Estonia takes data integrity very seriously because our society is so digitized,” he says. “If someone manipulates citizens’ data, that’s a challenge for us. We use blockchain-based technology to ensure the data is as it should be.”

When it comes to security, Peterkop says humans are usually the weak link. “Cybersecurity starts with us. If you have weak cyber hygiene, that’s a problem. We need to raise awareness and educate people about using strong authentication methods,” he says. For example, Estonia has public-education campaigns about how to use your smart devices wisely.

It seems like glaringly obvious advice, but a look at the recent US election shows that basic cyber hygiene has been an after-thought, even for the powerful. When Democratic nominee Hilary Clinton’s campaign chief John Podesta’s Gmail account was hacked, Wikileaks founder Julian Assange claimed Podesta’s password was simply the word “password.” The campaign denied this claim and said they fell victim to a phishing scam. Whatever the case, it was an avoidable security breach that should never have occurred.

Peterkop also says that consumers need to ask more questions about the Internet of Things, especially when it comes to everyday household products and devices. “There is so much pressure to come up with new products in a hurry, so security measures are an after-thought,” he says. “As consumers, it’s essential that we start paying attention to it. We don’t do enough risk mitigation. Basically every TV is a computer now.” These issues are present already: recent document dump from Wikileaks points to hacking tools that directly relate to Samsung televisions.

Estonians don’t see cybersecurity as a phenomenon, and they know that good cyber hygiene isn’t just about strong passwords: It’s about being empowered by technology, not controlled by it.

Estonia’s steps have certainly been radical, and other countries can learn lessons from them about how to defend themselves. As well as creating a paperless public service,

Estonia is now backing up government data on secure servers offsite in Luxembourg. It has also prioritized tougher international action for cyber-crime and encouraged private companies to review security measures and have stronger agreements with server providers.

The shock of a cyberwar united the community to take action. The challenge for other countries is to take action without one.


http://www.defenseone.com/technology/2017/08/every-country-should-have-cybe…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 28 054
Féminin

MessagePosté le: Sam 19 Aoû - 23:34 (2017)    Sujet du message: FOCUSED ON SECURITY, TRUMP ELEVATES CYBERCOM Répondre en citant

FOCUSED ON SECURITY, TRUMP ELEVATES CYBERCOM



VIDEO : https://www.youtube.com/watch?v=FU4aKdbvkoA


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 28 054
Féminin

MessagePosté le: Dim 20 Aoû - 01:50 (2017)    Sujet du message: WEEKEND READ : IT TOOK CHARLOTTESVILLE FOR SILICON VALLEY TO STAND UP TO HATE Répondre en citant



WEEKEND READ : IT TOOK CHARLOTTESVILLE FOR SILICON VALLEY TO STAND UP TO HATE 

August 19, 2017

Silicon Valley has a reputation as a liberal place, but it was a critical partner in the deadly “Unite the Right” rally that cost a counter-protestor her life.

Hate groups of all stripes used their websites to advertise their participation in the rally. They turned to social media to urge their followers to join them. And they used services like PayPal and Patreon to fund their invasion of Charlottesville, Virginia.

Such partnerships may soon be a thing of the past. By Monday morning, service providers had begun to pull the plug on hate groups and individual extremists alike.

“I woke up this morning in a bad mood and decided to kick them off the internet,” Cloudflare Chief Executive Matthew Prince wrote in an email to employees announcing his suspension of the neo-Nazi website The Daily Stormer.

The Daily Stormer became the top hate site in America last year, but it struggled to stay online this week after its long-time host, GoDaddy, delisted its domain on Monday.

Over the course of the week, The Daily Stormer transferred its registration to Google and even to the Russian Network Information Center, only to be kicked off each provider.

“Charlottesville has definitely lit a fire under some people,” SPLC Intelligence Project Director Heidi Beirich told USA Today. “I wonder if the violence marks a sea change.”

Beirich is right that tech companies have been stubbornly hands-off in the past. Despite policies that are ostensibly “anti-hate,” they have rarely taken action to remove hateful content or users from their platforms.

But as the nation grapples with the violent coordination of hate groups across the far-right spectrum in Charlottesville, Facebook has shut down at least nine pages connected to the rally; Twitter, YouTube, and LinkedIn have suspended several extremist accounts; Reddit has eliminated one discussion community that supported “Unite the Right,” and even OKCupid has kicked white nationalist Christopher Cantwell off the dating site.

By far, the biggest sweep came from PayPal, which agreed to block at least 34 organizations from using its services after an SPLC report highlighted how extremists used the platform to fund the rally in Charlottesville.

“For the longest time, PayPal has essentially been the banking system for white nationalism,” the SPLC’s Keegan Hankes told The Washington Post. “It’s a shame it took Charlottesville for them to take it seriously.”

It is good news that PayPal, Pateron, and other tech companies are finally taking steps to curb the hate on their platforms. But to truly make a dent in the hate and bigotry online, tech companies must be more cognizant of the role their services play in spreading hate.

“If you’re not outraged, you’re not paying attention,” Heather Heyer, 32, posted on Facebook before she was killed by an alleged Nazi sympathizer in Charlottesville.
It's wise advice for tech firms in Silicon Valley and beyond.

The Editors.

PS Here are some other pieces we think are worthwhile:
SPLC’s Weekend Readings are a weekly summary of the most important news reporting and commentary from around the country on civil rights, economic and racial inequality, and hate and extremism. Sign up to receive Weekend Readings every Saturday morning.

https://www.splcenter.org/news/2017/08/19/weekend-read-it-took-charlottesvi…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 28 054
Féminin

MessagePosté le: Dim 20 Aoû - 01:56 (2017)    Sujet du message: GOOGLE CENSURE-T-IL LES SITES SOCIALISTES ET ANTI-MILITARISTES? Répondre en citant

GOOGLE CENSURE-T-IL LES SITES SOCIALISTES ET ANTI-MILITARISTES?

il y a 15 heures
19 août 2017



19/08/2017 – 08h00 San Francisco (Breizh-info.com) – Un certain nombre de sites ont confirmé que leur fréquentation en provenance de Google a chuté très fortement ces derniers mois. Leur point commun ? Etre de gauche et anti-militaristes. Ils accusent Google de mettre en place, sous couvert de lutter contre les fake news, une censure politique qui a pour effet de les effacer des premiers résultats de recherche.

 « Quelque chose s’est passé avec Google à tous les niveaux qui affecte grandement les médias de gauche », a déclaré Scott LaMorte, le développeur de sites web pour Truthout et The Real News. Il constate une « baisse inédite » de l’audience des deux sites, depuis mai 2017, ce qui n’a jamais été le cas auparavant.

Robert Epstein, expert de Google et ancien rédacteur en chef de Psychology Today, relaie ces accusations en déclarant : « C’est le pire des cas de la censure politique ; c’est juste une excuse pour supprimer des points de vue politiques ».

Justement, le 25 avril dernier, Ben Gomes, vice-président de l’ingénierie de Google, a déclaré que la mise à jour du moteur de recherche Google bloquerait l’accès à des sites «offensants» tout en s’efforçant de faire ressortir le «contenu faisant autorité».

En l’occurrence, il y a plus d’une douzaine de sites impactés depuis cette date. Au premier plan, le Word socialist web site (WSWS), qui a vu sa fréquentation depuis Google chuter de 67% en provenance des recherches Google. Ce site dresse la liste des autres victimes : alternet.org (-63%), globalresearch.ca (-62%), consortiumnews.com et socialistworker.org (-47%), mediamattters.org (-42%), commondreams.org (-37%), internationalviewpoint.org et democracynow.org (-36%), wikileaks.org (-30%), truth-out.org (-25%), counterpunch.org (-21%), theintercept.com (-19%).

Ce sont bien les recherches Google qui sont en cause. Alors que le trafic n’a cessé d’augmenter depuis douze mois avant le printemps 2017, avec un point d’orgue en avril 2017, «fin mai, les modifications apportées à l’algorithme de Google ont eu une incidence négative sur le volume de trafic vers le site web Common Dreams provenant de recherches Google organiques», a déclaré Aaron Kaufman, directeur du développement au site d’actualités progressiste Common Dreams. «Depuis mai, le trafic de Google Search en pourcentage du trafic total vers le site Common Dreams a diminué de près de 50% ».

Le WSWS affirme de son côté que la stratégie de Google consiste à bloquer dans ses recherches le renvoi vers les articles du site pour les 45 premiers mots de recherche vers celui-ci. L’effet serait radical : « plus de 90 % des utilisateurs du moteur de recherche de Google ne cliquent pas sur les résultats après la première page, et plus de 99 % ne cliquent pas sur les liens après la 10ᵉ page. Cela signifie que si un résultat est refoulé au-delà des 100 premiers résultats, il est effectivement inaccessible », explique le WSWS.
Ainsi, le site a constaté que « les utilisateurs de Google pourront trouver le WSWS s’ils incluent spécifiquement le « World Socialist Web Site » dans leur demande. Mais si leur requête comprend simplement des termes tels que « Trotsky », « Trotskysme », « Marxisme », « socialisme » ou « inégalité », ils ne trouveront pas le site ». De même, les « termes « socialisme contre capitalisme », « soins de santé socialistes », « lutte des classes sociales » et « manifeste du parti socialiste », qui ont tous renvoyé vers des articles WSWS dès la première page dans le passé, ne renvoient maintenant pas vers le WSWS dans les 100 premiers résultats. Les termes « socialisme », « socialiste », « mouvement socialiste » et « conflit de classe », pour lesquels le WSWS apparaissait auparavant dans les quatre premières pages, ne renvoient plus vers des articles du WSWS ».

D’autres termes ont été mis sur liste noire, notamment « UAW » [United auto workers, syndicat de l’automobile], « Révolution russe », « Révolution d’octobre », « inégalités sociales dans le monde », etc. alors qu’ils pointaient auparavant vers le WSWS dans les 100 premiers résultats. Difficile de croire au hasard : « Le terme « Flint Michigan », qui avait amené la deuxième fréquentation la plus élevée au WSWS parmi tous les mots-clés a de même connu la suppression des articles du WSWS de ses 100 premières entrées ».

Le fonds de la culture stratégique, fondsk.ru (Russie) cite les recherches faites par Andre Damon et Niles Miemuth qui tendent à démontrer que l’effondrement des visites des sites socialistes et alter-mondialistes depuis Google présente un caractère organisé. Pour David North, président du conseil de rédaction international du WSWS « il n’y a pas d’explication innocente pour la chute extraordinairement forte du lectorat, pratiquement du jour au lendemain, en provenance des recherches Google. L’affirmation de Google selon laquelle il protège ses lecteurs contre les « fausses nouvelles » est un mensonge politique.

Google, un monopole massif, avec les liens les plus étroits avec les agences de l’état et du renseignement, bloque l’accès au WSWS et à d’autres sites Web progressistes et de gauche grâce à un système de recherches biaisé 
».

Entre censure d’État, grands monopoles et contrôle de l’information, l’utopie d’un web neutre et mondialisé continue de s’éloigner.

Louis-Benoît Greffe
Crédit photo : DR

[cc] Breizh-info.com, 2017, dépêches libres de copie et de diffusion sous réserve de mention et de lien vers la source d’origine

http://www.breizh-info.com/2017/08/19/75870/google-censure-t-sites-socialistes-anti-militaristes


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 28 054
Féminin

MessagePosté le: Mar 22 Aoû - 22:41 (2017)    Sujet du message: LA REGULATION DU TRAVAIL JOURNALISTIQUE DANS DIX PAYS, DONT LE CANADA / (PRESS SELF-REGULATION IN 10 COUNTRIES INCLUDING CANADA) Répondre en citant

LA REGULATION DU TRAVAIL JOURNALISTIQUE DANS DIX PAYS, DONT LE CANADA (PRESS SELF-REGULATION IN 10 COUNTRIES INCLUDING CANADA)

French and english

The Council for mass media 


Pdf document : http://www.cem.ulaval.ca/pdf/Regulation journalisme.pdf




https://www.google.fr/search?q=the council for mass media council pontifica…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 28 054
Féminin

MessagePosté le: Sam 26 Aoû - 00:09 (2017)    Sujet du message: SOUTHCOM COMMANDER HIGHLIGHTS SECURITY COOPERATION WITH REGIONAL PARTNERS Répondre en citant

SOUTHCOM COMMANDER HIGHLIGHTS SECURITY COOPERATION WITH REGIONAL PARTNERS

By Lisa Ferdinando DoD News, Defense Media Activity
 
WASHINGTON, Aug. 24, 2017 — The United States and its South American partners are committed to working together in addressing the security challenges impacting Latin America and beyond, the U.S. Southern Command commander said in Lima, Peru, yesterday.



Navy Adm. Kurt Tidd, commander of U.S. Southern Command, meets with Adm. José Paredes, chief of the Peruvian Armed Forces Joint Staff, during the South American Defense Conference in Lima, Peru, Aug. 23, 2017. The conference, cohosted by Tidd and Paredes, brought together military leaders from nine other countries for discussions on defeating illicit networks and responding to cyberattacks and humanitarian crises. Photo courtesy of the Peruvian Armed Forces Joint Staff

Navy Adm. Kurt W. Tidd joined South American security leaders for discussions on defense support to humanitarian and disaster relief efforts and cooperation to detect, disrupt and dismantle threat networks in the Western Hemisphere

"This conference is symbolic of our hemisphere's tradition of collaboration," Tidd said in opening remarks at the South American Defense Conference. He is cohosting the Aug. 22-24 event with Peru's Adm. José Paredes, chief of the Peruvian Armed Forces Joint Staff.

The conference, which includes military leaders from nine other nations, also symbolizes the shared understanding of the "challenges of the modern security environment and our willingness to face them together," Tidd said.

Regional, Global Cooperation

Discussions are focusing on truly global issues, including defeating illicit networks and responding to cyberattacks and humanitarian crises, he said. "This means there's not a single country or military out there able to solve them by acting alone," he added. "We all have to work together, sharing information freely and trusting one another implicitly."

He underscored the importance of the partner countries examining how they can hone or focus security cooperation efforts to help mitigate or possibly avert regional crises and large-scale emergencies.

Tidd advocated for going beyond bilateral partnerships, and working as "one network, united in purpose and unified in action" to defeat illicit networks, strengthen defenses against cyberattacks, and build regional resilience against crises.

"This conference represents the potential of a hemisphere that pools its resources and collaborates freely to face new and old challenges alike," he said.

Tidd pointed out many South American nations have been affected by natural disasters in recent years and tested by "increasingly sophisticated illicit actors who do not respect our national boundaries, laws or sovereignty."

The United States and its regional partners remain united in facing challenges in South America, he said. The conference, he added, is an important forum to discuss key cooperation to deal with threats in the region.

"We have a priceless opportunity during this conference not only to build upon past successes, but also to enrich our dialogue with these recent experiences," he said.

(Follow Lisa Ferdinando on Twitter: @FerdinandoDoD)

https://www.defense.gov/News/Article/Article/1287945/southcom-commander-hig…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 28 054
Féminin

MessagePosté le: Sam 26 Aoû - 12:22 (2017)    Sujet du message: CHINE : LES INTERNAUTES SOMMES DE S'IDENTIFIER POUR POSTER DES COMMENTAIRES EN LIGNE Répondre en citant

CHINE : LES INTERNAUTES SOMMES DE S'IDENTIFIER POUR POSTER DES COMMENTAIRES EN LIGNE

Pékin - Les plateformes internet chinoises devront impérativement vérifier l'identité de leurs usagers avant de les laisser poster des commentaires en ligne, a indiqué Pékin, confirmant le tour de vis de la censure imposée par le régime communiste.

A partir du 1er octobre, tous les opérateurs de réseaux sociaux ou forums de discussion devront "s'assurer de la véritable identité" de leurs utilisateurs avant de leur permettre de poster des contenus et commentaires en ligne, selon un règlement publié vendredi par l'Administration chinoise de l'internet, un organisme gouvernemental.

De même, les plateformes du web se voient sommées de "renforcer la supervision des informations diffusées" ; si elles découvrent des contenus "interdits par la loi", elles devront ainsi "immédiatement agir pour les supprimer" tout en "avertissant les autorités".

L'internet local est déjà encadré de façon drastique par un système ("la Grande muraille électronique") qui bloque les réseaux sociaux Facebook et Twitter, YouTube, Google, ainsi que de nombreux médias occidentaux.

Les plateformes chinoises comme le site de microblogs Weibo ou la populaire messagerie WeChat font par ailleurs l'objet d'une censure étroite, les contenus jugés "sensibles" étant promptement supprimés et certaines recherches bloquées.

Mais l'enregistrement obligatoire des internautes --avec probable envoi d'un scan d'une pièce d'identité pour s'authentifier-- marque un nouveau durcissement en facilitant les poursuites judiciaires. Depuis 2013, des peines de prison sont prévues pour les messages jugés "diffamatoires".

Ce nouveau règlement s'inscrit dans le cadre d'une grande loi sur la "cybersécurité" entrée en vigueur en juin. Celle-ci interdit notamment la publication de contenus portant atteinte à "l'honneur national", "troublant l'ordre social" ou destinés à "renverser le système socialiste".

En juillet, Pékin a ordonné aux grands groupes technologiques de fermer les sites publiant des informations politiquement sensibles, des "mauvaises interprétations" des directives du pouvoir et autres "déformations" de l'histoire du Parti.

Le régime a également intensifié sa campagne contre les VPN, ces logiciels permettant de contourner la "muraille informatique", puis a lancé début août des enquêtes contre trois grandes plateformes internet pour "propagation de contenus violents et obscènes".

(©AFP / 26 août 2017 11h23)

https://www.romandie.com/news/Chine-les-internautes-sommes-de-s-identifier-…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 28 054
Féminin

MessagePosté le: Mar 29 Aoû - 17:11 (2017)    Sujet du message: CYBERSECURITY IS 2017’S VERSION OF THE WHITE WALKERS—AND YOU DON'T WANT TO BE A NON-BELIEVER Répondre en citant

CYBERSECURITY IS 2017’S VERSION OF THE WHITE WALKERS—AND YOU DON'T WANT TO BE A NON-BELIEVER


Fan Christopher Lomas, dressed as the Night King, asks a question at the "Game of Thrones" panel on day two of Comic-Con International on Friday, July 21, 2017. // Al Powers/Invision/AP

By Jamie Butler Quartz August 28, 2017
NEXTGOV

The trials and tribulations of Jon, Daenerys, and co. against the impending undead army of White Walkers share a lot of similarities with the evolution of cyberthreats over the last several years.

In Westeros, amidst the constant warring between the Lannisters, Starks, and Targaryens, a few small groups have seen the real threat facing the entire human race, the White Walkers. Despite Jon Snow’s borderline-obsessive urgings and warnings, many dismiss the White Walkers as stuff of fairytales or distant history. Among those who do recognize the threat, no one has a clear strategy to stop the enemy. Even with the new plans to harvest dragonglass (which appear to have been more-or-less abandoned) and unite the feuding houses, the Night King’s army is growing larger and looming closer every day.

A similar set of circumstances are ensnaring our digital security. Despite existing for many years, cyberattacks have only recently begun to gain the notoriety they deserve due to the kinetic consequences they pose. However, like the small contingent of Jon Snow’s followers (the Night’s Watch, the armies of the North, Samwell Tarly, etc.), many organizations fail to understand that attacks are now customized to penetrate their specific defenses—to breach fire-Walls—and hackers now have access to tools that were previously only available to national governments—like fire-breathing dragons.

Neither the White Walkers nor digital weapons started as destructive. The White Walkers used to be humanoids whom the Children of the Forest created with magic to protect themselves from the First Men; they were defense weapons created with good intentions that eventually became so powerful that they threatened all of humanity. Similarly, cyberweapons like StuxNet were most likely originally developed as tools of defense to limit Iran’s nuclear proliferation abilities, but have since become tools of third-party criminal groups who’ve accessed the techniques that made Stuxnet possible. From Russia to North Korea, China to profit-driven criminal organizations, many groups are now all capable of developing digital weapons that could take down a power grid or control a nuclear facility.

This has lead to organizations increasing their cybersecurity defenses through investments and research. In 2015 alone, more than $75 billion was spent on enterprise security products and services, and that number is expected to top $100 billion by 2020—that’s an Iron Bank-level of cash. But a stronger defense isn’t always enough when the attackers are also highly motivated and well-funded.

While swooping in with her dragons to rescue the "A-Team"-like search party in the penultimate episode for Season 7, Daenerys clearly thought she had the upper hand. But when the Night King threw his ice spear at one of her dragons, everything changed. Not only had Daenerys lost one of her most powerful (and beloved) assets, but the Night King was then able to reanimate Viserion as a Wight dragon, turning the tables entirely. Even when you think you have the upper hand, things can quickly change.

Similarly, despite all the spending and assurances of increased security, last year there was a record 1,093 breaches of U.S. companies and government agencies, up 40% from 2015. And even though many security experts recognize the threat of advanced adversaries, security programs must still be properly designed to account for the adversary’s strategy, techniques and technology, and organizations need the right technology and team to respond to these threats in real time. Though many realize this, unfortunately the vast majority of security funding still goes to the perimeter to fight the same basic adversaries of yesteryear, not the advanced adversaries—in other words, leaders focus on taking the half-abandoned Casterly Rock, not the White Walkers of the digital domain.

As we saw at Hardhome and elsewhere, the Night King’s army is seemingly endless and can be reanimated at the flick of a wrist. Where one wight goes down, many more are ready to take its place and cause great harm in the process. As malware is spread around the internet, cyberattacks have only become more prevalent, and it’s become easier to inflict major damage. It’s a (Jon) snowball effect.

In just the past few months, the WannaCry and NotPetya ransomware strains turned the world on its head, and a massive hack of HBO has led to "Game of Thrones" episodes being leaked and the theft of a whole bunch of IP. Before that, the Shadow Brokers released a trove of powerful “zero day” attacks allegedly stolen from the NSA, each of which can be very dangerous.

In "Game of Thrones," the leaders of Westros are finally realizing that the White Walkers are real and the threats they pose are existentially dangerous. But unless they work together and realize that their petty politics are a distraction from the real threat at hand, the realm will cease to exist. In the digital domain, advanced adversaries present a similar existential threat to businesses and organizations that don’t re-evaluate investment for modern era of targeted attacks.

Unless we recognize who and what the real threats are, and establish strong security systems that face the threats head-on, cutting them off before they have a chance to overtake our systems, the digital domain is in as much trouble as the realm of men.

http://www.nextgov.com/cybersecurity/2017/08/cybersecurity-2017s-version-wh…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 28 054
Féminin

MessagePosté le: Dim 17 Sep - 01:51 (2017)    Sujet du message: FALSE FLAG THIS JUST HAPPENED IN LONDON AND YOU'LL PROBABLY PAY FOR IT...(SEPTEMBER 2017) [flash width=425 height=350 loop=true flashvars=]http://www.youtube.com/v/meGGZvpTyLE[/flash] VIDEO : https://www.youtube.com/watch?v=meGGZvpTyLE Répondre en citant

FALSE FLAG

 THIS JUST HAPPENED IN LONDON AND YOU'LL PROBABLY PAY FOR IT...(SEPTEMBER 2017)



VIDEO : https://www.youtube.com/watch?v=meGGZvpTyLE


  


Revenir en haut
Contenu Sponsorisé






MessagePosté le: Aujourd’hui à 20:47 (2017)    Sujet du message: RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM & HUMAN CONTROL (PARTIE 2)

Revenir en haut
Montrer les messages depuis:   
Poster un nouveau sujet   Répondre au sujet    LE VOÎLE DÉCHIRÉ (1) Index du Forum -> NOUVELLES LOIS ANTITERRORISTES/NEW ANTITERRORIST LAWS -> RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM (PARTIE 2) Toutes les heures sont au format GMT + 2 Heures
Aller à la page: <  1, 2, 316, 17, 18
Page 18 sur 18

 
Sauter vers:  

Index | Creer un forum | Forum gratuit d’entraide | Annuaire des forums gratuits | Signaler une violation | Conditions générales d'utilisation
Powered by phpBB © 2001, 2005 phpBB Group
Traduction par : phpBB-fr.com