LE VOÎLE DÉCHIRÉ (1) Index du Forum

LE VOÎLE DÉCHIRÉ (1)
...

 FAQFAQ   RechercherRechercher   MembresMembres   GroupesGroupes   S’enregistrerS’enregistrer 
 ProfilProfil   Se connecter pour vérifier ses messages privésSe connecter pour vérifier ses messages privés   ConnexionConnexion 

RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM & HUMAN CONTROL (PARTIE 2)
Aller à la page: <  1, 2, 3, 4, 512, 13, 14  >
 
Poster un nouveau sujet   Répondre au sujet    LE VOÎLE DÉCHIRÉ (1) Index du Forum -> NOUVELLES LOIS ANTITERRORISTES/NEW ANTITERRORIST LAWS -> RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM (PARTIE 2)
Sujet précédent :: Sujet suivant  
Auteur Message
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Ven 22 Fév - 20:59 (2013)    Sujet du message: CYBERDÉFENSEUR: UN PROFIL DISCRET ET RECHERCHÉ Répondre en citant

CYBERDÉFENSEUR: UN PROFIL DISCRET ET RECHERCHÉ

On sait très bien ce qui se cache derrière ce beau discours pour nous endormir.

Patrick Rahir, Agence France-Presse (Paris)
21 février 2013 | 23 h 04



Après Facebook, Twitter ou le New York Times, Apple a annoncé cette semaine avoir été victime d'une attaque informatique. - Photo Regis Duvignau, Reuters.

Les cyberattaques sont de plus en plus spectaculaires, les défenseurs eux restent très discrets: ils n'ont pas un profil du «hacker» génial popularisé par Hollywood, mais de jeune ingénieur posé. Et ils sont très recherchés.

Après Facebook, Twitter ou le New York Times, Apple a annoncé cette semaine avoir été victime d'une attaque informatique.


Le président Barack Obama a fait de la menace cybernétique un des thèmes de son discours sur l'état de l'Union au début du mois et des consultants américains ont montré du doigt l'armée chinoise, qui a démenti.

«Nous savons que des pays et des entreprises étrangères volent les informations confidentielles de nos sociétés, a lancé M. Obama. À présent nos ennemis cherchent aussi à saboter notre réseau énergétique, nos institutions financières, nos systèmes de contrôle du trafic aérien».
 
Du coup, la demande en spécialistes explose. Aux États-Unis, on parle d'un candidat pour dix postes à pourvoir. En France aussi, les entreprises rivalisent avec le ministère de la Défense pour recruter ses spécialistes de haut niveau.
«On n'est plus dans une activité de geeks. Le métier s'est professionnalisé», explique Sébastien Héon, directeur des affaires politiques chez Cassidian Cybersecurity, une filiale d'EADS.

«C'est un peu la différence entre James Bond et les vrais espions», s'amuse Christophe Ternat, 34 ans, directeur des missions chez Thales Communications and Security. Les spécialistes de la cybersécurité sont «des gens un peu ordinaires, entre 25 et 35 ans, avec un contrat de travail, mais avant tout des passionnés», dit-il.

David Bizeul, 35 ans, père de deux enfants, est un passionné. Sorti d'une école d'ingénieur à 23 ans, il débute dans une société de services informatiques. Le 11 septembre 2001, il assiste à la télévision aux attaques suicide contre le Word Trade Center.
«Le marché de la sécurité va exploser», prédit-il. Et dès 2001, des budgets sont dégagés pour renforcer la sécurité, y compris informatique, des entreprises.

Tout en travaillant pour de grands clients, «je commence à travailler sur le côté en peu sombre d'internet et à décortiquer les réseaux de cybercriminalité», raconte David Bizeul.

«Challenges» parmi lycéens et étudiants


«C'est passionnant de retrouver les adresses IP (internet protocol) et les noms de domaines pour retracer l'historique d'une attaque et remonter parfois jusqu'à l'identité de la personne à l'origine de la chaîne».

En 2006, il est embauché par la Société Générale où il développe le premier Computer emergency response team (CERT) d'entreprise en France. Un CERT est une structure dédiée pour gérer les incidents de sécurité et de cybercriminalité.

Il est passé en 2012 chez Cassidian Security, qui embauche pour se développer sur un marché dont la croissance annuelle est estimée à 10%.

Une de ses spécialités est l'intervention d'urgence chez un client. L'équipe doit isoler la machine compromise, extraire le logiciel malveillant et le disséquer, pour le comparer avec une base de données des menaces.

David contribue aussi au recrutement en organisant des «challenges» parmi lycéens et étudiants, pour identifier les jeunes talents et susciter des vocations.

«Nous avons des difficultés à recruter ces experts, encore trop rares alors que nous faisons face à des sollicitations de plus en plus nombreuses et pressantes de nos clients», dit Jean-Michel Orozco, président de Cassidian CyberSecurity.

Thales, numéro un de la cybersécurité en France, favorise le recrutement par cooptation, les employés étant encouragés à présenter des candidats qu'ils connaissent personnellement.

La nouvelle Agence nationale de la sécurité des systèmes d'information, née en 2009, recrute aussi à tour de bras. Certains des 100 postes à pourvoir sont affichés sur son site internet depuis novembre...

http://techno.lapresse.ca/nouvelles/internet/201302/21/01-4624234-cyberdefenseur-un-profil-discret-et-recherche.php


Revenir en haut
Publicité






MessagePosté le: Ven 22 Fév - 20:59 (2013)    Sujet du message: Publicité

PublicitéSupprimer les publicités ?
Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Lun 25 Fév - 15:53 (2013)    Sujet du message: SEE SOMETHING, SAY SOMETHING’- LIKE SYSTEM TO POWER SHARING OF CYBER TIPS Répondre en citant

SEE SOMETHING, SAY SOMETHING’- LIKE SYSTEM TO POWER SHARING OF CYBER TIPS


Thinkstock

By Aliya Sternstein February 22, 2013

The White House will refurbish existing technology for sharing reports of suspected terrorist activity to carry out a new executive order encouraging the disclosure of cyber threats, U.S. intelligence officials told Nextgov.

Since 2004, an agency within the Office of the Director of National Intelligence has put forth technical standards and policies to protect the quality and confidentiality of tips exchanged concerning national security threats. One of the key counterterrorism efforts supported by the DNI Information Sharing Environment office is the “Nationwide Suspicious Activity Reporting” system that securely routes incoming messages from the “See Something, Say Something” public awareness campaign.

Now, to hasten cybersecurity-related communications, the intelligence community, along with the Defense, Commerce, Homeland Security and Justice departments, are "leveraging the appropriate best practices, frameworks, and assets from the Information Sharing Environment," said Kshemendra Paul, program manager for the intelligence office, known as ISE.

The speed and security of ISE’s counterterrorism messaging techniques prompted the Obama administration to broaden their use, according to intelligence officials.

"The White House recognizes cyber information sharing as a priority,” and, in line with its policies on data protection, “has asked [ISE] to join the interagency team as part of a broader push to accelerate responsible sharing of cybersecurity information,” Paul said.

The cybersecurity executive order, released last week, includes rules for the government and voluntary initiatives for vital U.S. sectors, such as the energy and health care industries, aimed at protecting private networks.

One provision calls on the DNI and other agencies to establish a mechanism similar to the suspicious activity reporting system for sharing computer infection alerts. The order requires a process that "rapidly disseminates" to affected companies reports about "cyber threats to the U.S. homeland that identify a specific targeted entity." The procedures, however, must not allow the intelligence to be leaked or blow the cover off sources, the provision states.

The cyber tip hotline will not exactly mirror the counterterrorism phone tree. Rather, the new information-sharing arrangement will reuse applicable features as a foundation, a DNI official said.

Today, to communicate potential terrorist threats, local police forward messages to analysts at DHS-funded state fusion centers, who decide whether the reported abnormal activity merits circulation. Writeups worthy of national distribution are stripped of any sensitive personal or investigative information to protect local citizens. Each file is then catalogued inside a state-owned server that outside authorities access remotely through the cloud. This way, each jurisdiction maintains control over its data and does not have to buy a whole new computing system.

The usefulness of this information-sharing approach is still up for debate. Critics of the suspicious activity reporting system, including the American Civil Liberties Union, say it overshoots and captures innocent behavior, like tourists snapping photos of bridges. At the other extreme, the DNI reported in 2012 that almost half of federal agencies were not entering documented incidents into the network.

The tools and techniques for conveying threats are still evolving, intelligence officials say. And even ACLU members have commended ISE for refining the reporting standards to, among other things, force police to establish a connection to terrorism before publishing Americans' personal information.

http://www.nextgov.com/cybersecurity/2013/02/see-something-say-something-system-power-sharing-cyber-tips/61465/?oref=nextgov_today_nl


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Mar 26 Fév - 04:18 (2013)    Sujet du message: SIX STRIKES OFFICIALLY BEGINS ON MONDAY - COPYRIGHT ALERT SYSTEM Répondre en citant



SIX STRIKES OFFICIALLY BEGINS ON MONDAY - COPYRIGHT ALERT SYSTEM



VIDEO : http://www.youtube.com/watch?v=Cg9qSoDiXcM


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Mar 26 Fév - 05:30 (2013)    Sujet du message: SB 1614 INTERNET POSTING REMOVAL ACT Répondre en citant

SB 1614 INTERNET POSTING REMOVAL ACT



VIDEO : http://www.youtube.com/watch?v=-mMdILmxfmQ


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Jeu 28 Fév - 04:03 (2013)    Sujet du message: DEMOCRACY IN THE DIGITAL AGE: ROBIN SONTHEIMER AT TEDxDelft Répondre en citant

DEMOCRACY IN THE DIGITAL AGE: ROBIN SONTHEIMER AT TEDxDelft



VIDEO : http://www.youtube.com/watch?v=UZZ-M_sis6Y


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Mer 13 Mar - 16:30 (2013)    Sujet du message: LA CYBERGUERRE ENTRE DANS L'ÈRE INDUSTRIELLE Répondre en citant

 

LA CYBERGUERRE ENTRE DANS L'ÈRE INDUSTRIELLE

Pour mener ses opérations informatiques offensives, le Pentagone ne veut plus être dépendant de petites unités de hackers-soldats, et commence à développer un outil capable de mener des frappes d'envergure pratiquement sans interaction humaine, comme le font les systèmes de défense anti-missiles.(...)
 
http://www.intelligenceonline.fr/renseignement-d-etat/2012/09/06/la-cybergu…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Mer 13 Mar - 16:45 (2013)    Sujet du message: BARACK OBAMA SIGNED AN CYBERSECURITY EXECUTIVE ORDER LAST MONTH // Carolyn Kaster/AP Répondre en citant

BARACK OBAMA SIGNED AN CYBERSECURITY EXECUTIVE ORDER LAST MONTH // Carolyn Kaster/AP




By Aliya Sternstein March 11, 2013
   
The National Institute of Standards and Technology has started visiting businesses to rally support for a nationwide cybersecurity program called for by a February executive order.

The Feb. 12 mandate directed NIST, a Commerce Department agency, to develop standard guidelines for protecting computer operations in key sectors. On Monday, at an industry briefing organized by law firm Venable LLP, government officials stressed the guidelines will not be performance standards. The protections, however, would become mandatory for certain companies under a White House legislative proposal, so the order has raised questions among lobbying groups.

A draft “cybersecurity framework” – the official term for the voluntary regulations -- is expected to be released by November, said Ari Schwartz, a Commerce senior policy adviser. NIST has published a formal notice requesting input from businesses and scheduled a brainstorming workshop for April 3 in Gaithersburg, Md. Future meetings to solicit feedback will not all be held in the suburbs, Adam Sedgewick, NIST senior information technology policy advisor, assured the audience, which was watching remotely via Webcast and at Venable's Washington office.

About 300 individuals had registered for the April session as of Monday, a NIST spokeswoman said after the Venable briefing.
The agency is making the rounds at a time when most businesses outside Washington likely do not even know there will be a nationwide cybersecurity program. About 82 percent of U.S. executives are not familiar with President Obama’s order, according to a March 4 survey of nearly 2,000 chief technology and chief financial officers, along with other top officials, conducted by consulting firm Deloitte. Close to 79 percent polled said they were not very confident in their organization’s ability to protect information systems and data from intrusions.

Schwartz said the recommended practices largely will be aimed at firms managing “critical infrastructure” vital to daily living, such as banks, gas pipelines and water treatment facilities. The framework is not intended to provide “one-size-fits-all technical solutions,” he said.

At the April workshop, officials want to learn how organizations currently are managing risks and the types of industry cyber guidelines that already exist. In the future, “we certainly see ourselves traveling and going out and speaking” at meetings of the Critical Infrastructure Partnership Advisory Council, a public-private effort, and other events, Sedgewick said.

http://www.nextgov.com/cybersecurity/2013/03/nist-hits-party-circuit-drum-cyber-standards-support/61802/?oref=nextgov_cybersecurity


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Mer 13 Mar - 16:51 (2013)    Sujet du message: EXECUTIVE ORDER -- IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY Répondre en citant

For Immediate Release

February 12, 2013

EXECUTIVE ORDER

EXECUTIVE ORDER -- IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY

- - - - - - -

IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY

By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:

Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront. The national and economic security of the United States depends on the reliable functioning of the Nation's critical infrastructure in the face of such threats. It is the policy of the United States to enhance the security and resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties. We can achieve these goals through a partnership with the owners and operators of critical infrastructure to improve cybersecurity information sharing and collaboratively develop and implement risk-based standards.

Sec. 2. Critical Infrastructure. As used in this order, the term critical infrastructure means systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.

Sec. 3. Policy Coordination. Policy coordination, guidance, dispute resolution, and periodic in-progress reviews for the functions and programs described and assigned herein shall be provided through the interagency process established in Presidential Policy Directive-1 of February 13, 2009 (Organization of the National Security Council System), or any successor.

Sec. 4. Cybersecurity Information Sharing. (a) It is the policy of the United States Government to increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities so that these entities may better protect and defend themselves against cyber threats. Within 120 days of the date of this order, the Attorney General, the Secretary of Homeland Security (the "Secretary"), and the Director of National Intelligence shall each issue instructions consistent with their authorities and with the requirements of section 12(c) of this order to ensure the timely production of unclassified reports of cyber threats to the U.S. homeland that identify a specific targeted entity. The instructions shall address the need to protect intelligence and law enforcement sources, methods, operations, and investigations.

(b) The Secretary and the Attorney General, in coordination with the Director of National Intelligence, shall establish a process that rapidly disseminates the reports produced pursuant to section 4(a) of this order to the targeted entity. Such process shall also, consistent with the need to protect national security information, include the dissemination of classified reports to critical infrastructure entities authorized to receive them. The Secretary and the Attorney General, in coordination with the Director of National Intelligence, shall establish a system for tracking the production, dissemination, and disposition of these reports.

(c) To assist the owners and operators of critical infrastructure in protecting their systems from unauthorized access, exploitation, or harm, the Secretary, consistent with 6 U.S.C. 143 and in collaboration with the Secretary of Defense, shall, within 120 days of the date of this order, establish procedures to expand the Enhanced Cybersecurity Services program to all critical infrastructure sectors. This voluntary information sharing program will provide classified cyber threat and technical information from the Government to eligible critical infrastructure companies or commercial service providers that offer security services to critical infrastructure.

(d) The Secretary, as the Executive Agent for the Classified National Security Information Program created under Executive Order 13549 of August 18, 2010 (Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities), shall expedite the processing of security clearances to appropriate personnel employed by critical infrastructure owners and operators, prioritizing the critical infrastructure identified in section 9 of this order.

(e) In order to maximize the utility of cyber threat information sharing with the private sector, the Secretary shall expand the use of programs that bring private sector subject-matter experts into Federal service on a temporary basis. These subject matter experts should provide advice regarding the content, structure, and types of information most useful to critical infrastructure owners and operators in reducing and mitigating cyber risks.

Sec. 5. Privacy and Civil Liberties Protections. (a) Agencies shall coordinate their activities under this order with their senior agency officials for privacy and civil liberties and ensure that privacy and civil liberties protections are incorporated into such activities. Such protections shall be based upon the Fair Information Practice Principles and other privacy and civil liberties policies, principles, and frameworks as they apply to each agency's activities.

(b) The Chief Privacy Officer and the Officer for Civil Rights and Civil Liberties of the Department of Homeland Security (DHS) shall assess the privacy and civil liberties risks of the functions and programs undertaken by DHS as called for in this order and shall recommend to the Secretary ways to minimize or mitigate such risks, in a publicly available report, to be released within 1 year of the date of this order. Senior agency privacy and civil liberties officials for other agencies engaged in activities under this order shall conduct assessments of their agency activities and provide those assessments to DHS for consideration and inclusion in the report. The report shall be reviewed on an annual basis and revised as necessary. The report may contain a classified annex if necessary. Assessments shall include evaluation of activities against the Fair Information Practice Principles and other applicable privacy and civil liberties policies, principles, and frameworks. Agencies shall consider the assessments and recommendations of the report in implementing privacy and civil liberties protections for agency activities.

(c) In producing the report required under subsection (b) of this section, the Chief Privacy Officer and the Officer for Civil Rights and Civil Liberties of DHS shall consult with the Privacy and Civil Liberties Oversight Board and coordinate with the Office of Management and Budget (OMB).

(d) Information submitted voluntarily in accordance with 6 U.S.C. 133 by private entities under this order shall be protected from disclosure to the fullest extent permitted by law.

Sec. 6. Consultative Process. The Secretary shall establish a consultative process to coordinate improvements to the cybersecurity of critical infrastructure. As part of the consultative process, the Secretary shall engage and consider the advice, on matters set forth in this order, of the Critical Infrastructure Partnership Advisory Council; Sector Coordinating Councils; critical infrastructure owners and operators; Sector-Specific Agencies; other relevant agencies; independent regulatory agencies; State, local, territorial, and tribal governments; universities; and outside experts.

Sec. 7. Baseline Framework to Reduce Cyber Risk to Critical Infrastructure. (a) The Secretary of Commerce shall direct the Director of the National Institute of Standards and Technology (the "Director") to lead the development of a framework to reduce cyber risks to critical infrastructure (the "Cybersecurity Framework"). The Cybersecurity Framework shall include a set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks. The Cybersecurity Framework shall incorporate voluntary consensus standards and industry best practices to the fullest extent possible. The Cybersecurity Framework shall be consistent with voluntary international standards when such international standards will advance the objectives of this order, and shall meet the requirements of the National Institute of Standards and Technology Act, as amended (15 U.S.C. 271 et seq.), the National Technology Transfer and Advancement Act of 1995 (Public Law 104-113), and OMB Circular A-119, as revised.

(b) The Cybersecurity Framework shall provide a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, to help owners and operators of critical infrastructure identify, assess, and manage cyber risk. The Cybersecurity Framework shall focus on identifying cross-sector security standards and guidelines applicable to critical infrastructure. The Cybersecurity Framework will also identify areas for improvement that should be addressed through future collaboration with particular sectors and standards-developing organizations. To enable technical innovation and account for organizational differences, the Cybersecurity Framework will provide guidance that is technology neutral and that enables critical infrastructure sectors to benefit from a competitive market for products and services that meet the standards, methodologies, procedures, and processes developed to address cyber risks. The Cybersecurity Framework shall include guidance for measuring the performance of an entity in implementing the Cybersecurity Framework.

(c) The Cybersecurity Framework shall include methodologies to identify and mitigate impacts of the Cybersecurity Framework and associated information security measures or controls on business confidentiality, and to protect individual privacy and civil liberties.

(d) In developing the Cybersecurity Framework, the Director shall engage in an open public review and comment process. The Director shall also consult with the Secretary, the National Security Agency, Sector-Specific Agencies and other interested agencies including OMB, owners and operators of critical infrastructure, and other stakeholders through the consultative process established in section 6 of this order. The Secretary, the Director of National Intelligence, and the heads of other relevant agencies shall provide threat and vulnerability information and technical expertise to inform the development of the Cybersecurity Framework. The Secretary shall provide performance goals for the Cybersecurity Framework informed by work under section 9 of this order.

(e) Within 240 days of the date of this order, the Director shall publish a preliminary version of the Cybersecurity Framework (the "preliminary Framework"). Within 1 year of the date of this order, and after coordination with the Secretary to ensure suitability under section 8 of this order, the Director shall publish a final version of the Cybersecurity Framework (the "final Framework").

(f) Consistent with statutory responsibilities, the Director will ensure the Cybersecurity Framework and related guidance is reviewed and updated as necessary, taking into consideration technological changes, changes in cyber risks, operational feedback from owners and operators of critical infrastructure, experience from the implementation of section 8 of this order, and any other relevant factors.

Sec. 8. Voluntary Critical Infrastructure Cybersecurity Program. (a) The Secretary, in coordination with Sector-Specific Agencies, shall establish a voluntary program to support the adoption of the Cybersecurity Framework by owners and operators of critical infrastructure and any other interested entities (the "Program").

(b) Sector-Specific Agencies, in consultation with the Secretary and other interested agencies, shall coordinate with the Sector Coordinating Councils to review the Cybersecurity Framework and, if necessary, develop implementation guidance or supplemental materials to address sector-specific risks and operating environments.

(c) Sector-Specific Agencies shall report annually to the President, through the Secretary, on the extent to which owners and operators notified under section 9 of this order are participating in the Program.

(d) The Secretary shall coordinate establishment of a set of incentives designed to promote participation in the Program. Within 120 days of the date of this order, the Secretary and the Secretaries of the Treasury and Commerce each shall make recommendations separately to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs, that shall include analysis of the benefits and relative effectiveness of such incentives, and whether the incentives would require legislation or can be provided under existing law and authorities to participants in the Program.

(e) Within 120 days of the date of this order, the Secretary of Defense and the Administrator of General Services, in consultation with the Secretary and the Federal Acquisition Regulatory Council, shall make recommendations to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs, on the feasibility, security benefits, and relative merits of incorporating security standards into acquisition planning and contract administration. The report shall address what steps can be taken to harmonize and make consistent existing procurement requirements related to cybersecurity.

Sec. 9. Identification of Critical Infrastructure at Greatest Risk. (a) Within 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security. In identifying critical infrastructure for this purpose, the Secretary shall use the consultative process established in section 6 of this order and draw upon the expertise of Sector-Specific Agencies. The Secretary shall apply consistent, objective criteria in identifying such critical infrastructure. The Secretary shall not identify any commercial information technology products or consumer information technology services under this section. The Secretary shall review and update the list of identified critical infrastructure under this section on an annual basis, and provide such list to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs.

(b) Heads of Sector-Specific Agencies and other relevant agencies shall provide the Secretary with information necessary to carry out the responsibilities under this section. The Secretary shall develop a process for other relevant stakeholders to submit information to assist in making the identifications required in subsection (a) of this section.

(c) The Secretary, in coordination with Sector-Specific Agencies, shall confidentially notify owners and operators of critical infrastructure identified under subsection (a) of this section that they have been so identified, and ensure identified owners and operators are provided the basis for the determination. The Secretary shall establish a process through which owners and operators of critical infrastructure may submit relevant information and request reconsideration of identifications under subsection (a) of this section.

Sec. 10. Adoption of Framework. (a) Agencies with responsibility for regulating the security of critical infrastructure shall engage in a consultative process with DHS, OMB, and the National Security Staff to review the preliminary Cybersecurity Framework and determine if current cybersecurity regulatory requirements are sufficient given current and projected risks. In making such determination, these agencies shall consider the identification of critical infrastructure required under section 9 of this order. Within 90 days of the publication of the preliminary Framework, these agencies shall submit a report to the President, through the Assistant to the President for Homeland Security and Counterterrorism, the Director of OMB, and the Assistant to the President for Economic Affairs, that states whether or not the agency has clear authority to establish requirements based upon the Cybersecurity Framework to sufficiently address current and projected cyber risks to critical infrastructure, the existing authorities identified, and any additional authority required.

(b) If current regulatory requirements are deemed to be insufficient, within 90 days of publication of the final Framework, agencies identified in subsection (a) of this section shall propose prioritized, risk-based, efficient, and coordinated actions, consistent with Executive Order 12866 of September 30, 1993 (Regulatory Planning and Review), Executive Order 13563 of January 18, 2011 (Improving Regulation and Regulatory Review), and Executive Order 13609 of May 1, 2012 (Promoting International Regulatory Cooperation), to mitigate cyber risk.

(c) Within 2 years after publication of the final Framework, consistent with Executive Order 13563 and Executive Order 13610 of May 10, 2012 (Identifying and Reducing Regulatory Burdens), agencies identified in subsection (a) of this section shall, in consultation with owners and operators of critical infrastructure, report to OMB on any critical infrastructure subject to ineffective, conflicting, or excessively burdensome cybersecurity requirements. This report shall describe efforts made by agencies, and make recommendations for further actions, to minimize or eliminate such requirements.

(d) The Secretary shall coordinate the provision of technical assistance to agencies identified in subsection (a) of this section on the development of their cybersecurity workforce and programs.

(e) Independent regulatory agencies with responsibility for regulating the security of critical infrastructure are encouraged to engage in a consultative process with the Secretary, relevant Sector-Specific Agencies, and other affected parties to consider prioritized actions to mitigate cyber risks for critical infrastructure consistent with their authorities.

Sec. 11. Definitions. (a) "Agency" means any authority of the United States that is an "agency" under 44 U.S.C. 3502(1), other than those considered to be independent regulatory agencies, as defined in 44 U.S.C. 3502(5).

(b) "Critical Infrastructure Partnership Advisory Council" means the council established by DHS under 6 U.S.C. 451 to facilitate effective interaction and coordination of critical infrastructure protection activities among the Federal Government; the private sector; and State, local, territorial, and tribal governments.

(c) "Fair Information Practice Principles" means the eight principles set forth in Appendix A of the National Strategy for Trusted Identities in Cyberspace.

(d) "Independent regulatory agency" has the meaning given the term in 44 U.S.C. 3502(5).

(e) "Sector Coordinating Council" means a private sector coordinating council composed of representatives of owners and operators within a particular sector of critical infrastructure established by the National Infrastructure Protection Plan or any successor.

(f) "Sector-Specific Agency" has the meaning given the term in Presidential Policy Directive-21 of February 12, 2013 (Critical Infrastructure Security and Resilience), or any successor.

Sec. 12. General Provisions. (a) This order shall be implemented consistent with applicable law and subject to the availability of appropriations. Nothing in this order shall be construed to provide an agency with authority for regulating the security of critical infrastructure in addition to or to a greater extent than the authority the agency has under existing law. Nothing in this order shall be construed to alter or limit any authority or responsibility of an agency under existing law.

(b) Nothing in this order shall be construed to impair or otherwise affect the functions of the Director of OMB relating to budgetary, administrative, or legislative proposals.

(c) All actions taken pursuant to this order shall be consistent with requirements and authorities to protect intelligence and law enforcement sources and methods. Nothing in this order shall be interpreted to supersede measures established under authority of law to protect the security and integrity of specific activities and associations that are in direct support of intelligence and law enforcement operations.

(d) This order shall be implemented consistent with U.S. international obligations.

(e) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

BARACK OBAMA

http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-impro…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Jeu 14 Mar - 19:53 (2013)    Sujet du message: PENTAGON CREATES 13 OFFENSIVE CYBER TEAMS FOR WORLDWIDE ATTACKS Répondre en citant

PENTAGON CREATES 13 OFFENSIVE CYBER TEAMS FOR WORLDWIDE ATTACKS



VIDEO : http://www.youtube.com/watch?v=0Prbu3Dsgzk


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Lun 18 Mar - 16:22 (2013)    Sujet du message: BIPARTISAN BILL AIMS TO BEEF UP FOIA COMPLIANCE Répondre en citant

BIPARTISAN BILL AIMS TO BEEF UP FOIA COMPLIANCE


The Republican and Democrat sitting atop Congress’ top watchdog panel unveiled joint proposed legislation Tuesday that would mandate a single online portal for all Freedom of Information Act requests across government.

The 2013 FOIA Oversight and Implementation Act would direct officials to look closely at FOIA Online, a 5-month old joint FOIA Portal for the Commerce Department, the Environmental Protection Agency and a handful of other agencies. It would leave the door open for the governmentwide FOIA system to be built elsewhere, though, according to a press release from sponsors Rep. Darrell Issa, R-Calif., and Rep. Elijah Cummings, D-Md.

There have been rumors that the Justice Department opposed FOIA Online being adopted more widely, a charge Justice has denied.

Issa and Cummings are the chairman and ranking member of the House Oversight and Government Reform Committee. Their proposed legislation would also grant the Office of Government Information Services, which was established as a sort of FOIA ombudsman in 2007, to report directly to Congress rather than passing its reports and recommendations through the White House’s Office of Management and Budget first.

OMB delayed OGIS’ first report for several months until it was finally released following pressure from senators.

Issa’s and Cummings’ proposed legislation would also Beef up FOIA oversight, establish a council of agency chief FOIA officers and put the power of legislation behind a 2009 memorandum from Attorney General Eric Holder that required agencies to review FOIA requests with a “presumption of openness.”

The legislation would require agencies to post online any document that is requested more than three times through FOIA.

“Requests through the Freedom of Information Act remain the principal vehicle through which the American people can access information generated by their government,” Issa said in a statement. “The draft bill is designed to strengthen transparency by ensuring that legislative and executive action to improve FOIA over the past two decades is fully implemented by federal agencies.”

Cummings added: “This bill strengthens FOIA, our most important open government law, and makes clear that the government should operate with a presumption of openness and not one of secrecy.”

http://www.nextgov.com/emerging-tech/2013/03/bipartisan-legislation-aims-beef-foia-compliance/61821/


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Lun 18 Mar - 16:27 (2013)    Sujet du message: MAKE WAY FOR THE LONE CYBER RANGER AND ONLINE VIGILANTISM Répondre en citant

MAKE WAY FOR THE LONE CYBER RANGER AND ONLINE VIGILANTISM

As cybersecurity continues to heat up on the Hill and within the Administration, more policymakers are asking about whether the United States should be conducting cyber offensive activities to address the increasing international threat to cybersecurity. When it was revealed earlier this month that Chinese computers are conducting sweeping attacks on not only our government systems but on our commercial systems as well, and that large amounts of intellectual property and proprietary information potentially has been stolen, many asked: Why shouldn’t we hack back?

Some policymakers have urged taking a cautious approach to cyber offense activities, including House Intelligence Committee Chairman Mike Rogers, R-Mich., who recently said, “If you’re going to punch your neighbor in the nose, best to hit the weight room for a couple of months.” Chairman Roger’s observation is astute. We have to be very careful when we move forward on the cyber offense side because we know that those we attack, especially nation-states, can potentially strike-back and deliver their own blows.

What worries me, however, more than potential government cyber offense activities, is the possibility that private sector entities or individuals may engage in offensive cyber operations. Currently, much, if not all, of what we would envision as cyber offense behavior may be illegal under the Computer Fraud and Abuse Act. Attacks against computers in other nations potentially could violate those nation’s cybercrime laws and put those conducting the activities at risk for prosecution in foreign nations, as unenforceable as a prosecution or judgment might be.

Some have argued that we should allow cyber offense and that laws should be adjusted to assure that companies and individuals are allowed to use all available tools and resources to protect their systems. How that would work, however, is unclear. Would we allow anyone who has had their systems compromised or attacked to strike back? Would only certain activities be acceptable?

The potential for cyber vigilantism could be tremendous with limitations and safeguards in place. The old analogy of the Internet to the Wild West and being the Electronic Frontier could ring true with vigilante justice and a blurring of good-bad actors. The potential for the wrong computers to be counter-attacked could also be significant if there were no rules about who could act. Just imagine, if any individual with more than basic computer knowledge decided to track down someone targeting his system and try to take them down, the possibility is high that an innocent bystander, who’s computer may have been used as a pass-through device, would be harmed. Think of the diplomatic nightmare if that computer was in another country or, even worse, an unfriendly country. I also could see a modern-day version of the movie War Games play out depending on the entities involved. Maybe this example is a bit extreme, but it makes the point – we have to be careful about who and what we allow on the cyber offense side.

What if we created a licensing/certification process for cyber offense? Imagine the equivalent of a cyber bounty hunter or repo man. Keeping with the Wild West analogy, it would be the silver star given to the brave hero by besieged towns in countless Western films. It is an interesting concept. Determining the licensing would be tricky. Giving every state or local jurisdiction authority to issue licenses would not work – the Internet doesn’t stop at the town, county, or state line. It could be a federal process, using the government’s authority to act in interstate commerce. It would be an interesting concept – having the Department of Justice or the Department of Homeland Security oversee a cyber offense licensing program for the private sector. But the Internet does not stop at the U.S. borders either. Maybe we need an international organization (Interpol?) to authorize a certain number of companies to conduct cyber offense. Of course that would be beyond any structures we have seen in the past.

It is a challenging issue but one that will inevitably have to be addressed, especially as more critical data goes online and attacks continue to grow. We’re not likely to see the hero ride off into the sunset on a reliable horse anytime soon.

http://www.nextgov.com/cybersecurity/cybersecurity-report/2013/03/make-way-lone-cyber-ranger-and-online-vigilantism/61910/?oref=nextgov_today_nl


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Mar 26 Mar - 15:43 (2013)    Sujet du message: VA AWARDS OMNIBUS IT CONTRACTS VALUED AT $5.3 BILLION Répondre en citant

VA AWARDS OMNIBUS IT CONTRACTS VALUED AT $5.3 BILLION

Pressmaster/Shutterstock.com

By Bob Brewin March 25, 2013



This story has been updated.

The Veterans Affair Department awarded contracts for desktops, laptops, servers, switches, routers, storage services and tablet computers valued at $5.3 billion to three companies that will compete for orders through the indefinite quantity, indefinite delivery contract for five years.

VA selected Hanover, Md.-based Alliance Technology Group LLC; Claremont, N.H.-based Red River Computer Co. Inc.; and Valador, Inc., of Herndon, Va., for its Commodities Enterprise Contract out of a field of more than 50 bidders, according to an announcement posted on Federal Business Opportunities website last Thursday.

The Commodities Enterprise Contract provides VA with a second vehicle to purchase desktop personal computers and monitors. In May 2011, the department tapped Dell Inc. to provide up to 600,000 PCs in a deal that runs through April 2015.

Rom Mascetti, VA deputy assistant secretary for information technology resource management, told Nextgov in April 2011 that the department would use the commodity contract as a follow-on to the Dell contract when it expires.

VA kicked off the Commodities Enterprise Contract in December 2011, and in August 2011 added Apple, Google Android and Windows tablet PCs to its shopping list to keep pace with changes in technology.

Former VA Chief Information Officer Roger Baker backed widespread use of tablets and smartphones in the department and last June predicted that within five or six years VA would no longer furnish employees with computers. Instead, they will use the devices they own to connect to department networks.

(Image via Pressmaster/Shutterstock.com)

http://www.nextgov.com/defense/2013/03/va-awards-omnibus-it-contacts-valued-53-billion/62057/?oref=nextgov_today_nl


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Ven 12 Avr - 19:31 (2013)    Sujet du message: CALLING ALL HACKERS Répondre en citant

CALLING ALL HACKERS

By Brittany Ballenstedt April 8, 2013

The White House is inviting tech experts, developers and entrepreneurs to come together for some civic hacking on June 1.


The second White House hackathon will bring together these tech experts to help produce full, production-ready apps and visualization tools that will be featured on the White House’s petition website We the People and made available under an open source license.

The first hackathon in February included 21 participants who built apps and visualizations based on the new application programming interface, or API, for the We the People website. The White House development team used feedback from the hackathon to improve the API and is adding code from the hackathon projects to a software development kit, said Peter Welsh, deputy director of online platform for the Office of Digital Strategy, in a blog post on WhiteHouse.gov.

“The most creative ideas, and the best solutions, often emerge when a diverse group comes together and each person contributes from their own unique perspective,” Welsh said. “We hope that hackers from all backgrounds, men and women, young and old, will apply.”

The June 1 hackathon coincides with the “National Day of Civic Hacking,” an event that will take place June 1-2 in cities across the nation. The effort will bring together citizens, software developers and entrepreneurs to create, build and invent new tools using publicly-released data, code and technology to help solve societal challenges.

The application deadline for the hackathon is 5:00 p.m. on April 19. Those selected to participate will be notified by email and invited to the White House on June 1. Those unable to attend in person will be invited to a public repo on GitHub where they can collaborate with other participants and the White House development team, Welsh said.

To apply for the National Day of Civic Hacking, click here.

http://www.nextgov.com/cio-briefing/wired-workplace/2013/04/calling-all-hac…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Lun 15 Avr - 20:09 (2013)    Sujet du message: BIG DATA CAN HELP KEEP THE PEACE Répondre en citant

BIG DATA CAN HELP KEEP THE PEACE



Amgun/Shutterstock.com
By Joseph Marks April 12, 2013

Some of the same social media analyses that have helped Google and the Centers for Disease Control and Prevention spot warning signs of a flu outbreak could be used to detect the rumblings of violent conflict before it begins, scholars said in a paper released this week.

Kenyan officials used essentially this system to track hate speech on Facebook, blogs and Twitter in advance of that nation’s 2013 presidential election, which brought Uhuru Kenyatta to power.

Similar efforts to track Syrian social media have been able to identify ceasefire violations within 15 minutes of when they occur, according to the paper on New Technology and the Prevention of Violence and Conflict prepared by the United States Agency for International Development, the United Nations Development Programme and the International Peace Institute and presented at the United States Institute of Peace Friday.

These predictions can be improved by adding other data from satellites, surveillance cameras and other sensors, the authors of the big data section of the paper said.

The authors were careful to note, however, that data analysis isn’t a one-size-fits-all solution for conflict and researchers should always take the specific nature of a conflict into consideration.

Crowdsourcing initiatives to encourage citizens to report violent behavior by Latin American drug gangs, for instance, may rely heavily on anonymity to keep the reporters safe from retribution, said author Emmanuel Letouze, a Ph.D Candidate at the University of California-Berkeley. A separate crowdsourcing system seeking evidence of electoral violence in Kenya, on the other hand, may be damaged by anonymity, he said, because it would encourage false reports from both candidates’ camps.

(Image via Amgun/Shutterstock.com)

http://www.nextgov.com/big-data/2013/04/big-data-can-help-prevent-conflicts…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Jeu 18 Avr - 15:05 (2013)    Sujet du message: H.R.624 - CYBER INTELLIGENCE SHARING AND PROTECTION ACT Répondre en citant

H.R.624 - CYBER INTELLIGENCE SHARING AND PROTECTION ACT

To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes.

http://www.opencongress.org/bill/113-h624/show


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Lun 29 Avr - 17:50 (2013)    Sujet du message: JULIAN ASSANGE S'ATTAQUE À LA CYBERPRISON Répondre en citant

JULIAN ASSANGE S'ATTAQUE À LA CYBERPRISON

La Presse (Montréal)
29 avril 2013 | 08 h 24


Julian Assange -

Chaque attentat terroriste, perpétré ou déjoué, sert de prétexte aux services policiers et de renseignements pour renforcer leur emprise sur l'internet et les banques de données personnelles.

Pour en savoir plus

Chambre des représentants|WikiLeaks|Julian Assange

C'est ce qu'affirme Julian Assange, que La Presse a interviewé par téléphone dans le cadre du lancement de son essai Menace sur nos libertés, en librairie début mai.

Concepteur de WikiLeaks, Julian Assange est réfugié à l'ambassade de l'Équateur à Londres depuis bientôt un an. Il y a demandé et obtenu l'asile politique pour éviter son extradition en Suède, où il fait face à des accusations d'agression sexuelle qu'il dément.

Il craint que la Suède l'extrade à son tour vers les États-Unis, où il pourrait être accusé relativement aux fuites de documents sur les guerres en Afghanistan et en Irak.
 
Q - Les récents actes terroristes ne donnent-ils pas raison aux forces de l'ordre pour renforcer le contrôle de l'internet?
R - «Statistiquement pourtant, le nombre d'attentats terroristes diminue par rapport à il y a quelques années. Chaque attentat, chaque catastrophe sert de prétexte (« cover-up «) pour accroître la surveillance. On en a eu un bon exemple lors de la tempête Irene l'an dernier.»

Q - Les politiciens et les tribunaux ne sont-ils pas là pour s'assurer qu'il n'y ait pas d'abus?

R - «Un attentat, c'est plutôt l'occasion de donner plus de pouvoirs aux services policiers ou de renseignement. La Chambre des représentants aux États-Unis vient d'adopter la loi CISPA (Cyber Intelligence Sharing and Protection Act), qui autorise des perquisitions des bases de données [sans mandat préalable]».

Q - N'y a-t-il pas des lois pour garantir les droits fondamentaux comme la liberté de communiquer, de circuler ou de commercer?

R - «Légiférer n'est pas la solution. Même si les droits existent, comment pouvons-nous nous assurer qu'ils sont respectés? Les services de renseignements travaillent dans l'ombre. Ils augmentent toujours la centralisation de l'information.»

Q - Alors, quelle serait la solution?

R - «Nous sommes à la croisée des chemins. Tout passe par l'éducation. Quand on a compris que les bactéries se propageaient dans les hôpitaux, on a amené les gens à se laver les mains et à porter des gants. Les gens doivent comprendre que l'internet est partout et que l'information qui y circule est transmise aux serveurs centraux localisés aux États-Unis.

«L'éducation politique est déjà avancée en Australie. Un sondage paru hier [la semaine dernière] montre que ma candidature aux élections sénatoriales du 14 septembre reçoit l'appui de 26% de la population.»

http://techno.lapresse.ca/nouvelles/internet/201304/29/01-4645518-julian-as…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Lun 29 Avr - 17:59 (2013)    Sujet du message: COMMENT INTERNET NOUS ESPIONNE: NOTRE CYBERPRISON Répondre en citant

COMMENT INTERNET NOUS ESPIONNE: NOTRE CYBERPRISON

Rudy Le Cours, La Presse (Montréal)
29 avril 2013 | 08 h 14



L'attaque terroriste au marathon de Boston et le complot déjoué pour faire sauter un train au-dessus de la rivière Niagara ont fait ressortir à quel point la surveillance policière dispose désormais de moyens très puissants.

Au point où l'on ne peut s'empêcher de se demander quelles sont les garanties que l'État peut encore offrir à nos libertés de circuler et de commercer.

Menace sur nos libertés: Comment Internet nous espionne, comment résister est un brûlot inquiétant qui va bien au-delà de la théorie du complot. «Il y a aujourd'hui une MILITARISATION DU CYBERESPACE au sens d'une OCCUPATION MILITAIRE, soutient Julian Assange. Quand on communique sur l'internet, quand on communique par un téléphone portable, qui est aujourd'hui raccordé à l'internet, ces communications sont interceptées par des services de renseignements militaires [...]. L'internet, qui était censé constituer un espace civil, est devenu un espace militarisé

Dans cet essai, qui prend la forme d'une conversation animée par le concepteur de WikiLeaks avec trois autres pirates et experts en cryptage, on explique comment fonctionne la lourde quincaillerie du cyberespace.
 
On souligne aussi que les données sont surtout concentrées sur des serveurs situés aux États-Unis et accessibles sur demande aux services de renseignements américains. Quand la Russie a demandé que les transactions commerciales réalisées avec la carte Visa sur son territoire soient traitées chez elle, on lui a dit: non merci. Ça signifie, ironisent les panélistes, que lorsque Vladimir Poutine s'achète une vodka, la CIA est en mesure de savoir où et quand, à la minute près!
Les Apple, Google, Visa, PayPal et autres Facebook de ce monde ont accepté de donner accès à leurs données en échange de l'immunité en cas de crimes où elles auraient servi d'outils. L'exemple des transmissions de communications de BlackBerry à BlackBerry, censées être confidentielles, est aussi cité.

Selon les panélistes, quatre raisons sont toujours évoquées pour justifier le contrôle accru de l'internet par les forces policières ou de renseignements, quatre raisons qu'ils surnomment les «Quatre cavaliers de l'Infocalypse: le blanchiment d'argent, les drogues, le terrorisme et la pornographie infantile».

«Leur spectre sert à dénigrer les technologies de préservation de la confidentialité parce qu'il ne fait aucun doute qu'il faut vaincre ces quatre groupes», soutient Jacob Appelbaum, une personnalité américaine du logiciel libre et un chercheur indépendant en sécurité informatique.

Cet écran de vertu protège aussi le statu quo économique et freine l'innovation. Les géants en place jouissent de la protection de l'État en échange du partage de renseignements.

On devient dès lors très réticent à la venue de nouveaux joueurs, comme en font foi les tentatives de légiférer pour étouffer certaines initiatives au nom de la protection des brevets ou de droits d'auteur qui n'appartiennent plus à leurs créateurs. (Plusieurs exemples sont cités dans les nombreuses notes en fin de chapitre.)

Voilà pourquoi les quatre préconisent le cryptage, une manière efficace de contrer ce qu'ils voient comme de la répression. Survient toutefois une nouvelle difficulté: les ordinateurs sont de plus en plus normalisés et difficiles à modifier. Bref, la vie des pirates est plus compliquée qu'il y a une dizaine d'années.

En fait, plusieurs pirates sont désormais recrutés par l'armée et ils ont pour mission de simuler des attaques sur des sites, alors que d'autres doivent en même temps imaginer des stratégies pour défendre ces mêmes sites.

Les quatre panélistes se définissent d'ailleurs plutôt comme des cypherpunks, c'est-à-dire des militants qui recourent à la cryptographie et à d'autres méthodes du même type comme instrument de changement social et politique. «Une élite rebelle du high-tech», résume Assange.

Cette élite revendique des logiciels libres et gratuits ainsi qu'une quincaillerie libre et ouverte, seules garanties désormais, à leurs yeux, du monde libre qu'avait laissé miroiter l'internet au début de sa démocratisation.

Menace sur nos libertés: Comment Internet nous espionne, comment résister. Julian Assange avec Jacob Appelbaum, Andy Müller-Maguhn et Jérémie Zimmermann. Robert Laffont. 246 pages.

http://techno.lapresse.ca/nouvelles/internet/201304/29/01-4645511-comment-i…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Mer 1 Mai - 14:47 (2013)    Sujet du message: NIST REWORKS CYBER GUIDELINES FOR THE HACKING ERA Répondre en citant

NIST REWORKS CYBER GUIDELINES FOR THE HACKING ERA

 
Maksim Kabakou/Shutterstock.com

By Aliya Sternstein April 30, 2013

The National Institute of Standards and Technology has rewritten federal cybersecurity standards for the first time in nearly a decade to address evolving smartphone vulnerabilities and foreign manipulation of the supply chain, among other new threats.

The 457-page government computer security bible, officially called "SP (Special Publication) 800-53," was last revised in 2005. That was long before the rise of advanced persistent threats -- infiltrations that play off human failings to linger in systems until finding sensitive data.

Agencies are not required to follow all the specifications, but rather choose among the protections that suit their operational environments, such as space in the case of NASA.

Congressional reports indicate that foreign adversaries have attempted to corrupt the supply chain at some point between agency system design and operation to disrupt or spy on the government. To protect critical computer parts, the compendium recommends sometimes withholding the ultimate purpose of a technology from contractors by "using blind or filtered buys."

Agencies also should offer incentives to vendors that provide transparency into their processes and security practices, or vet the processes of subcontractors.

NIST broaches the controversial approach to "restrict purchases from specific suppliers or countries," which U.S. technology firms, even those who have been hacked, say might slow installations.

The new guidelines also cover the challenges of web-based or cloud software, insider threats and privacy controls.

There are considerations specific to employees using personal devices for work, commonly referred to as BYOD, or bring your own device." Recommended restrictions include using cloud techniques to limit processing and storage activities on actual government systems. NIST also advises that agencies consult the Office of the General Counsel regarding legal uncertainties, such as "requirements for conducting forensic analyses during investigations after an incident."

Government experts from the intelligence, defense and national security communities began promulgating this incarnation of NIST standards in 2009.

(Image via Maksim Kabakou/Shutterstock.com)

http://www.nextgov.com/cybersecurity/2013/04/nist-reworks-cyber-guidelines-…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Mer 1 Mai - 15:07 (2013)    Sujet du message: ‘ANY TIME, ANYWHERE’ DATA ACCESS COMING SOON, OFFICIAL SAYS Répondre en citant

‘ANY TIME, ANYWHERE’ DATA ACCESS COMING SOON, OFFICIAL SAYS

By Claudette Roulo
American Forces Press Service


WASHINGTON, April 30, 2013 – In the not-too-distant future, Defense Department personnel will be able to securely access data any time and anywhere, the department’s deputy chief information officer for command, control, communications and computers and information infrastructure said here today.

The current mobility strategy calls for Wi-Fi to be the primary means for DOD personnel to access routine data by 2017, Air Force Maj. Gen. Robert E. Wheeler said at the Mobile Work Exchange Spring 2013 Town Hall Meeting.
The department is conducting more than 70 pilot programs in its effort to make this vision a reality, he said.

One of these programs, the electronic flight bag, paid for itself within about a month of implementation, he said. In the past, airplane pilots had to carry with them numerous paper manuals and maps every time they flew, and each had to be regularly updated. The publications could weigh up to 80 pounds, depending on the aircraft, Wheeler said.

“You carry all that on a tablet, … you think of the fuel savings. You think of the ability to update on a commercial site. … It was a big money savings for us,” he said.

The modernization of Defense Department mobile communications hasn’t been mistake-free, the general acknowledged, citing as an example the secure mobile environment portable electronic device, or SME PED. The devices, intended to enable users to send and receive both classified and unclassified data, cost more than $8,000 per unit and are too slow for today’s data-driven communications, Wheeler said. The mobility strategy calls for the device to be phased out from fiscal year 2015 to fiscal 2017.

The department will continue to look for faster, more secure and cheaper ways to use technology and transmit information, he said, adding that the ultimate goal is to speed up productivity to maintain information dominance.
“Our challenge is to bring it to the warfighter every place they need it -- whether it's in Washington, D.C., to the edge of the battlefield, [or] onto the battlefield,” Wheeler said.

Location isn’t the only challenge, he said. The department divides data into one of three domains, Wheeler said: commercial, unclassified and classified. Classified data requires special consideration, and mobile device access to this domain is being implemented more slowly than it is to the unclassified domain.

The Defense Information Systems Agency is rolling out mobile device access to DOD users in multiple phases, Wheeler said. By fiscal 2014, more than 100,000 mobile devices will be approved for access to unclassified Defense Department networks, he added.

“Right now, our process is 9 to 12 months to approve a phone,” he said. That’s too long if the department wants to keep pace with technology, Wheeler said.

The department is working with the National Institute of Standards and Technology to refine requirements for these devices, he said. DOD’s goal is for new hardware, new applications and new mobile operating systems to be approved or denied for use on defense networks within 30 days of submission, Wheeler said, ensuring that the right devices are in the hands of warfighters as quickly as possible.

In the future, mobile devices could, in some cases, entirely replace desktop computers or desk phones, Wheeler said. But even before that happens, he said, by cutting down on costs and ending the “fragmented methodologies” of the old mobility strategy, the mobility program pays for itself in about 15 months.

That includes all the front-end investment, all the networking and all the mobile device management, Wheeler added.

"So, from a taxpayer perspective, it's a very good approach,” he said, adding that it will also allow the department to increase productivity. “We really don't even know how far we could go yet,” Wheeler said, “and I think that's the exciting part of it.”


Biographies:
Air Force Maj. Gen. Robert E. Wheeler

Related Sites:
DOD CIO Mobility Strategy
Special Report: Science & Technology News



http://www.defense.gov/news/newsarticle.aspx?id=119908


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Mar 28 Mai - 16:14 (2013)    Sujet du message: TARANTO: ‘OBAMA PRESIDENCY HAS GIVEN LIBERAL MEDIA BIAS A NEW AND DANGEROUS FORM’ Répondre en citant

 TARANTO: ‘OBAMA PRESIDENCY HAS GIVEN LIBERAL MEDIA BIAS A NEW AND DANGEROUS FORM’


By Brent Baker | May 25, 2013 | 14:21

 
“Liberal media bias is an old complaint,” the Wall Street Journal’s James Taranto noted in his “Best of the Web Today” column this past Monday on responses to the Obama scandals, before warning: “The Obama presidency has given it a new and dangerous form. Never has the prevailing bias of the media been so closely aligned with the ideological aims and political interests of the party in power.”

He recognized “the American media remain free and independent, or you would not be reading this column,” but zinged, “to a large extent they have functioned for the past few years as if they were under state control.”

 
 


As an example, he cited a Washington Post article, in which reporters Zachary A. Goldfarb and Kimberly Kindy described as a “good-government group” the left-wing Democracy 21 which pressured the IRS to scrutinize Tea Party groups, without any consideration that the Tea Party groups believe they, too, are working for good government.

Taranto: “Tea Party organizations conceive of themselves as good-government groups, just as Democracy 21 does. The Post accepts the latter characterization, but not the former, unquestioningly.”

An excerpt from
Taranto’s May 20 post, “A Crisis of Authority: The deeper meaning of the Obama scandals.”
Citation:
....Liberal media bias is an old complaint, but the Obama presidency has given it a new and dangerous form.

Never has the prevailing bias of the media been so closely aligned with the ideological aims and political interests of the party in power. The American media remain free and independent, or you would not be reading this column. But to a large extent they have functioned for the past few years as if they were under state control.

The problem of media bias runs deep, and it often does not take the form of open partisanship. Here's an example, from a Washington Post story on the IRS scandal:

“Nonprofit groups that do not have to pay taxes are supposed to ensure that political activity is not their primary purpose, so evidence that some of the new organizations seeking tax-exempt status were fronts for campaign organizations drew bipartisan interest. Good-government groups started pressuring the IRS to more closely scrutinize applicants. One such group, Democracy 21, wrote a series of letters to the IRS arguing that many of the groups should not receive favored tax status.

“‘In all of these cases, the groups were claiming (c)(4) status basically for the purpose of hiding their donors,’ said Democracy 21 President Fred Wertheimer.”

There’s a whole world of bias in that phrase “good-government groups.” According to the Inspector General’s report, one of the red flags the IRS used to identify dissident organizations for targeting was “education of the public via advocacy/lobbying to ‘make America a better place to live.’” Tea Party organizations conceive of themselves as good-government groups, just as Democracy 21 does. The Post accepts the latter characterization, but not the former, unquestioningly.

The description of Democracy 21 as a “good-government group” is especially inapt in this particular story. Wertheimer’s organization wrote letters lobbying the IRS to take action against political groups of whose activities it disapproved. The IRS did Wertheimer’s bidding, and in so doing massively abused its power. The IRS, not Wertheimer, is culpable for the abuse of power. But it is preposterous to label Democracy 21 “a good-government group” in the course of telling how its activities encouraged an abuse of governmental power.

“Good-government group” is a misleading designation for another reason. As we noted last week, Democracy 21 is itself a tax-exempt 501(c)(4) corporation. In lobbying the IRS to investigate nonprofits for engaging in political activity, Democracy 21, a nonprofit, was engaging in political activity....




About the Author


Brent Baker is Vice President for Research and Publications at the Media Research Center. Click here to follow Brent Baker on Twitter.
 
http://newsbusters.org/blogs/brent-baker/2013/05/25/taranto-obama-presidenc…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Dim 9 Juin - 01:50 (2013)    Sujet du message: OBAMA NOW READY TO CYBERATTACK OTHER NATIONS; NOBEL PEACE PRIZE PRESIDENT Répondre en citant

 RUMOR OF WAR 

OBAMA NOW READY TO CYBERATTACK OTHER NATIONS; NOBEL PEACE PRIZE PRESIDENT

 


VIDEO : http://www.youtube.com/watch?v=Jiirv0b4EWE 


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Mar 11 Juin - 16:18 (2013)    Sujet du message: MARINES FOCUSED AT TACTICAL EDGE OF CYBER, COMMANDER SAYS Répondre en citant

  MARINES FOCUSED AT TACTICAL EDGE OF CYBER, COMMANDER SAYS
 
Contractors to Handle Marines Corps' Cyber Arsenal http://www.nextgov.com/defense/2013/06/contractors-handle-cyber-arsenal-marines/64607/?oref=nextgov_today_nl 

By Cheryl Pellerin
American Forces Press Service 
 
MARINE CORPS BASE QUANTICO, Va., June 10, 2013 – What differentiates his command from Army, Navy and Air Force cyber operations is a focus on the forward-deployed nature of America’s expeditionary force in readiness, the commander of Marine Corps Forces Cyberspace Command said during a recent interview here.
 



 
Marine Corps Lance Cpl. David Anzualda, a cyber network operator with the 26th Marine Expeditionary Unit command element, peers out the back of an MV-22B Osprey as he crosses decks from the USS Bataan to the USS San Antonio, Dec. 15, 2012. This was part of the 26th MEU's third major training exercise of their pre-deployment training process. The 26th MEU operates continuously around the globe, providing a forward-deployed, sea-based quick-reaction force. The MEU is a Marine air-ground task force capable of conducting amphibious operations, crisis response and limited contingency operations. U.S. Marine Corps photo by Cpl. Kyle N. Runnels  
(Click photo for screen-resolution image);high-resolution image available.

As commander of MARFORCYBER, Lt. Gen. Richard P. Mills heads one of four service components of U.S. Cyber Command. The Marine command stood up in January 2010. 
 
Today, 300 Marines, federal civilians and contractors are performing cyber operations, Mills said. That number, he added, will grow to just under 1,000, at least until fiscal year 2016.
 
Each of the services’ cyber commands protects its own networks, Mills noted.
 
“Where we differ is that we look more at tactical-level cyber operations and how we will be able to provide our forward-deployed ... Marine Air-Ground Task Force commanders with the capability to reach back into the cyber world [at home] to have their deployed units supported,” the general said.
 
The basic structure for deployed Marine units, he said, is an air-ground task force that integrates ground, aviation and logistics combat elements under a common command element.
 
“We’re more focused at the tactical level, the tactical edge of cyber operations, in supporting our forward-deployed commanders, and that’s what we should do,” Mills said.
 
It’s an important capability, the general said, and one that will become more important and effective for deployed commanders in the years ahead.
 
Cyber to me is kind of like artillery or air support,” Mills explained. “The actual weapon systems are well to your rear, back here in the continental United States, and what you need to be able to do is request that support be given to you and have it take effect wherever you’re operating.”
 
The Marine Corps cyber mission is to advise the commander of U.S. Cyber Command, Army Gen. Keith B. Alexander, on the capabilities of the Marines within the cyber world and how to best use those forces in accomplishing the Cybercom mission, Mills said.
 
“That’s our first job,” he added. “Our second job is to be able to conduct cyber operations across all three lines of cyber operations -– defensive and offensive cyber ops –- so we have to man, train and equip Marine forces to accomplish those missions.”
 
In testimony to Congress in March, Alexander described the three Cybercom lines, or missions.
 
-- A Cyber National Mission Force and its teams will help to defend the country against national-level threats;
 
-- A Cyber Combat Mission Force and its teams will be assigned to the operational control of individual combatant commanders to support their objectives; and
 
-- A Cyber Protection Force and its teams will help to operate and defend the Defense Department’s information environment.
 
Of the nearly 1,000 MARFORCYBER forces that will come online between now and fiscal 2016, Mills estimated that a third will be in uniform, a third will be federal civilian employees, and a third will be contractors.
 
MARFORCYBER has Marines in the joint community who work throughout Cybercom at Fort Meade in Maryland. The Marine Corps cyber organization also is developing teams to be tasked by Cybercom to conduct operations across the spectrum of cyber operations.
 
“It’s very similar to what we do today,” Mills said. “The units train and go forward from the United States and work for other commanders well forward, and cyber will be the same way. We’ll ship forces to Cybercom when requested, fully trained, fully manned, fully equipped, ready to operate.”
 
MARFORCYBER is a full-up component command under Cybercom along with the Air Force, Navy and Army, the general said.
 
“All four of the component commanders talk regularly to each other and meet regularly at Cybercom to coordinate our growth, coordinate our requirements, [provide] input to Cybercom and take its guidance and direction, and operate together in big exercises like Cyber Flag,” he said.
 
Cyber Flag is an annual exercise at Nellis Air Force Base, Nev., which Cybercom conducts with U.S. interagency and international partners.
 
For the Marines, the smallest U.S. military service branch, contractors play an important part in cyber, the general said.
 
“One of the challenges of cyber is that it’s such a dynamic environment,” he explained. “You need people who are educated and current in their specialties and who are available to stay on the job for long periods of time, whereas Marines come and go in the normal assignment process.”
 
Contractors have skill sets that aren’t always available in the active-duty Marine Corps, and can fit neatly into short-term projects, he added.
 
“They all operate under the same clearance requirements, the same authorities, the same rules,” the general said. “That’s one of the things that make them so expensive. They come at a cost, but you have to bear it to make sure that your cyber capabilities are current and that you stay on the cutting edge.”
 
In the newest domain of warfare, the battlefield is evolving, Mills said, and Marine commanders have come to understand the impact cyber can have on defensive and offensive operations.
 
“I think cyber commanders now understand when you go forward you have to be able to defend your systems against intrusion by other states, by rogue elements, and even by hobbyists who are just trying to break in and infiltrate your nets,” the general said. “But they’re also beginning to understand the positive effects cyber can have in your operations against potential enemies. … It’s a very valuable tool in that quiver of arrows that a commander takes forward, and they want to understand how it operates.”
 
In the new domain, even a discussion of weapons veers off the traditional path. A cyber weapon, Mills said, “can be something as simple as a desktop computer. It’s also a vulnerability to you, because it’s a way in which the enemy can enter your Web system if you put the wrong hardware on there or open the wrong attachment or email.”
 
Cyber weapons are much more nuanced than big cannons and large bombs and weapons systems.
 
The armories of the cyber world are very sophisticated computers and very sophisticated smart people who sit behind those computers and work those issues for you,” the general said.
 
Mills said he’s an infantry officer by trade, so he tends to view everything he does through a combat-arms prism.
 
“I think the definition of combat arms is expanding a little bit these days,” he said. “I don’t think cyber is any longer a communicator’s environment -- it’s an operator’s environment. So we want that cyber expert to sit in the operations shop right next to the air expert, right next to the artillery expert, because we think that’s where it belongs.”
 
Mills pointed out the contrast between a Marine “kitted out” for battle with a Marine dressed for a cyber operation who may be sitting behind a desk in the United States.
 
“He’s got access to a huge computer system that allows him to operate within that domain,” the general said. “He may go home at night and never have to deploy forward. But he’s providing support to deployed forces, he’s conducting actions against designated targets, he’s doing a lot of things -- but from the foxhole or the fighting hole at his desk, rather than some foxhole or fighting hole forward.” 
 
http://www.defense.gov/news/newsarticle.aspx?id=120246 


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Mar 11 Juin - 23:53 (2013)    Sujet du message: GRECE - LE PRINCIPAL SYNDICAT DES SALARIÉS DE LA TÉLÉVISION PUBLIQUE GRECQUE DÉNONCE UN ACTE ANTI-DÉMOCRATIQUE DU GOUVERNEMENT... Répondre en citant

GRECE - LE PRINCIPAL SYNDICAT DES SALARIÉS DE LA TÉLÉVISION PUBLIQUE GRECQUE DÉNONCE UN ACTE ANTI-DÉMOCRATIQUE DU GOUVERNEMENT...

Les chaînes de la radio-télévision publique ERT ont cessé d'émettre ce mardi peu après 23h (22h heure française) et les écrans sont devenus noirs, l'émetteur principal situé sur une montagne près d'Athènes ayant été neutralisé par la police, selon une source syndicale. 

Au moment de la fermeture des chaînes, des milliers de Grecs étaient réunis devant le siège d'ERT, à Athènes. 

«C'est illégal. Le gouvernement a arrêté l'émetteur principal. Cela ressemble plus à un gouvernement de Ceausescu qu'à une démocratie», a déclaré à l'AFP le président du principal syndicat des salariés de la télévision, Panayotis Kalfayanis.

«La télé publique est au coeur des sociétés démocratiques»

Plus tôt ce mardi, l'Union européenne de radio-télévision (UER) avait demandé à la Grèce d'annuler sa décision de fermer ses chaînes de télévision et de radio publiques ERT. 

Le président de l'UER, Jean-Paul Philippot, et sa directrice générale, Ingrid Deltenre, ont écrit au Premier ministre grec Antonis Samaras pour l'appeler à «user de tous ses pouvoirs pour annuler immédiatement cette décision», indique un communiqué de l'UER. «L'existence de médias de service public et leur indépendance à l'égard du gouvernement sont au coeur des sociétés démocratiques», souligne l'UER. 

Avec AFP  

http://www.20minutes.fr/monde/1171959-20130611-grece-chaines-radio-televisi…


Revenir en haut
vicflame


Hors ligne

Inscrit le: 07 Mai 2012
Messages: 206

MessagePosté le: Jeu 4 Juil - 22:45 (2013)    Sujet du message: LES NOUVEAUX CHIENS DE GARDE ! Répondre en citant




PRESSE PROSTITUEE : UN FILM-DOCUMENTAIRE A VOIR : LES NOUVEAUX CHIENS DE GARDE !





Chers amis,


Le temps est venu pour une petite respiration culturelle…

JE VOUS PROPOSE, EN CE DÉBUT DE VACANCES D’ÉTÉ, DE VOUS PROCURER ET DE REGARDER L’EXCELLENT FILM-DOCUMENTAIRE « LES NOUVEAUX CHIENS DE GARDE ».

CE FILM, QUI SE CONCENTRE SPÉCIFIQUEMENT SUR LA FRANCE (MAIS LA SITUATION EST BIEN SÛR GLOBALEMENT LA MÊME DANS LES AUTRES PAYS), DOCUMENTE LE FAIT QUE LA PRESSE ACTUELLE DES MASS MÉDIAS EST TOTALEMENT VENDUE, CORROMPUE ET GANGRENÉE, ET TIENT AVEC L’ÉLITE AU POUVOIR !

DEPUIS LA COLLUSION DES JOURNALEUX AU SEIN DE SOCIÉTÉS SEMI-SECRÈTES JUSQU’AUX PRÉTENDUS « EXPERTS » (TOUJOURS LES MÊMES) QUI SONT INVITÉS POUR DONNER LEUR AVIS ET ORIENTER TOUJOURS L’OPINION DANS LA MÊME DIRECTION (CELLE DU POUVOIR ET DU MONDIALISME), TOUT EST DISSÉQUÉ ET RAPPORTÉ.


Ce documentaire, qui DÉBOULONNE VÉRITABLEMENT TOUTE LA STRUCTURE MÉDIATIQUE DU POUVOIR,  a bien entendu reçu de piètres évaluations de la part de cette presse qu’il critique, et l’on comprend facilement pourquoi : dans un système de plus en plus corrompu et antidémocrate, les documentaires d’opposition sont vivement combattus.

Il n’empêche que ce film a quand même reçu le prix du public et le prix du jury à Valenciennes, cette année… Un point de rupture supplémentaire entre le public - qui l’a acclamé -,  et la presse pourrie - qui l’a descendu.

JE VOUS EXHORTE À LE VISIONNER, CAR IL EN VAUT LARGEMENT LA PEINE. UNE CHOSE EST CERTAINE : APRÈS AVOIR VU CE DOCUMENTAIRE, VOUS NE REGARDEREZ PLUS JAMAIS LA TÉLÉ, NI N’ÉCOUTEREZ LA RADIO OU LIREZ LA PRESSE, DE LA MÊME MANIÈRE !


BON VISIONNEMENT… ET BONNE RÉVOLUTION, SURTOUT ! Vic.


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Sam 17 Aoû - 08:50 (2013)    Sujet du message: ENDEMOL APPARTIENT A... GOLDMAN SACHS ! (TF1, France Télévisions, M6, Direct 8, W9, NRJ 12) Répondre en citant

Retour sur info mai 2013

ENDEMOL APPARTIENT A... GOLDMAN SACHS ! (TF1, France Télévisions, M6, Direct 8, W9, NRJ 12)
 
  Samedi 17 août 2013

Endemol France est le premier producteur français de programmes pour la télévision et les nouveaux medias (plus de 800 heures de programmes produites chaque année).



 
Nous créons et développons des formats originaux pour tous les diffuseurs, les grandes chaînes hertziennes (TF1, FranceTélévisions, M6), ainsi que les chaînes de la TNT (Direct 8, W9, NRJ 12), du câble et du satellite dans les genres suivants :
  • Télé-réalité (Secret Story, L’Amour est aveugle, La Ferme Célébrités, Star Academy) ;
  • Divertissement (Les Enfants de la Télé, Les 100 plus grands, Les 30 Histoires, Miss France, Wipe Out) ;
  • Jeux (12 Coups de Midi, Attention à la marche, La Roue de la fortune, A Prendre ou à Laisser, Fasila Chanter) ;
  • Emissions pour la TNT (Morandini !, l’Ecole des Stars) ;
  • Docu-réalité (On a échangé nos mamans, Les parents les plus stricts du monde, Maman cherche l’amour) ;
  • Nouveaux médias (Les Dessous de Noëlle, Surfcamp, Jamais sans mon répertoire, Monique’s trip) ;
  • Fiction (Victor Sauvage, Empreintes, Arbre de mai).
Nos programmes phares qui remportent de grands succès d’audience, constituent des marques fortes, socles de la notoriété du groupe.

A côté des programmes de flux et des grands évènements, Endemol France diversifie son activité dans la fiction à travers sa filiale Endemol Fiction, les magazines et les documentaires.

Chaque jour, une équipe d’une dizaine de collaborateurs dédiée à la création et au développement, réfléchit, teste et crée des formats originaux, qui sont la propriété exclusive d’Endemol France.

Les équipes d’Endemol France disposent d’un savoir-faire unique dans la production de tous les formats de programmes, et plus particulièrement dans les grands évènements. En 2007, elles ont été sollicitées par Karoui Karoui pour apporter leur expertise au programme tunisien Star Academy.

Endemol France exploite ses formats sur tous les supports de diffusion et toutes les plateformes de communication accessibles aujourd’hui : le Web, la téléphonie mobile et la télévision.

Le département Nouveaux médias fort d’une dizaine de collaborateurs, experts reconnus dans ce domaine, développe des concepts adaptés aux nouveaux supports de diffusion (Web, mobile) en partenariat avec des marques annonceurs.
 
Endemol France est la filiale française d’Endemol, filiale de Goldman Sachs Capital Partners, Mediaset, Telecinco et Cyrte Investments, leader mondial des programmes de télévision, présent dans 26 pays.
 
Endemol France est membre du Syndicat des Producteurs et Créateurs d’Emissions de Télévision (SPECT) et est représentée par son PDG, Virginie Calmels, en qualité de vice-présidente.

D’un point de vue social, la convention collective qui s’applique au sein du groupe Endemol France est celle de l’audiovisuel à travers l’USPA (Union Syndicale de la Production Audiovisuelle).

Source : Endemol.fr  Via La Jeune Democrate

http://www.wikistrike.com/article-endemol-appartient-a-goldman-sachs-tf1-fr…


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Ven 23 Aoû - 11:49 (2013)    Sujet du message: DEFENSE HIRES CYBER CHIEF FOR INDUSTRY INFORMATION-SHARING PROGRAM Répondre en citant

DEFENSE HIRES CYBER CHIEF FOR INDUSTRY INFORMATION-SHARING PROGRAM 


Daniel Prieto, III, was previously a vice president for IBM's public sector global business services. // Flickr user Center for American Progress Action Fund

By Aliya Sternstein August 21, 2013


The U.S. military has tapped an IBM executive to encourage Pentagon contractors to come clean about network breaches that might compromise government data, Defense Department officials said on Wednesday.

Daniel Prieto III will serve as director of cybersecurity and technology for Defense chief information officer Teri Takai.

Prieto, previously a vice president for IBM's public sector global business services, was recruited to increase participation in an exchange of cyber incident reports among willing defense industrial base firms and the government, Pentagon officials said.

"Prieto will be charged with improving and growing the voluntary information sharing program between the government and the private sector DIB companies, which is designed to improve DIB network defenses and helps DIB companies and the government to reduce damage to critical programs when defense information is compromised," Defense spokesman Lt. Col. Damien Pickart said.

The two-pronged effort involves the dissemination of contractor breach reports -- stripped of identifying information -- among all participants, as well as a component that discloses highly-classified intelligence on malware discovered by the National Security Agency. The idea is that cleared contractors or their cleared Internet providers can feed the threat indicators into anti-virus programs to preempt attacks.

It came to light in fall 2012 that five of the 17 initial contractors who joined the classified intelligence part of the program in 2011 dropped out, reportedly because they felt the cost and labor required outweighed any security benefits. Today, there are 14 companies participating, and all but one are paying their communications providers to install the service, Pickart said.

The number of contractors in the information-sharing part has grown from 34 to more than 90 since May 2012, when the Pentagon expanded the entire initiative from a limited trial to a permanent sectorwide program, he said.

What remains to be seen is how this new role will affect Defensewide information security decisionmaking. The number of cyber chiefs within the Pentagon has increased over the past few years. 

For example, in 2010, Gen. Keith Alexander helped stand up U.S. Cyber Command, where, as head of the service, he now is responsible for planning and conducting cyber operations. In 2011, Eric Rosenbach was appointed deputy assistant secretary of defense for cyber policy, a position that supports Pentagon top brass by formulating and executing strategies for cyberspace operations. Meanwhile, Lt. Gen. Mark Bowman -- who in 2012 became director for Command, Control, Communications and Computers/Cyber, J6 -- develops C4 capabilities and guidance.


http://www.nextgov.com/cybersecurity/2013/08/defense-hires-cyber-chief-indu…



Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Sam 31 Aoû - 18:03 (2013)    Sujet du message: KILL SWITCH? SYRIA'S LARGEST CITY OF ALEPPO LOSES ALL INTERNET COMMUNICATIONS ! Répondre en citant

KILL SWITCH? SYRIA'S LARGEST CITY OF ALEPPO LOSES ALL INTERNET COMMUNICATIONS !  

VIDEO : http://www.youtube.com/watch?feature=player_detailpage&v=arcBQibSXD4&list=UUFjOi1ZpZVErr8EYxg8t1dQ


Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Dim 1 Sep - 10:35 (2013)    Sujet du message: DID DEPARTMENT OF HOMELAND SECURITY (DHS) HEAD JANET NAPOLITANO REALLY RESIGN AFTER CATCHING WIND OF A FUTURE U.S. GOVERNMENT SPONSORED “CYBER EVENT” THAT WOULD CRIPPLE THE POPULACE, CONSTITUTING MARTIAL LAW IN AMERICA ? Répondre en citant

DID DEPARTMENT OF HOMELAND SECURITY (DHS) HEAD JANET NAPOLITANO REALLY RESIGN AFTER CATCHING WIND OF A FUTURE U.S. GOVERNMENT SPONSORED “CYBER EVENT” THAT WOULD CRIPPLE THE POPULACE, CONSTITUTING MARTIAL LAW IN AMERICA ?


 
WASHINGTON, DC – U.S. Homeland Security Secretary Janet Napolitano speaks during the White House daily briefing. (Photo by Alex Wong/Getty Images)

By Shepard Ambellas
Intellihub.com
August 27, 2013


In what can only be described as an ominous statement, DHS head Janet Napolitano, blabbed upon her departure from the organization that a coming “cyber event” would cripple the economy causing turmoil for nearly all Americans.

RawStory.com reported, “In what she described as “a kind of open letter to my successor,” Napolitano warned of terrorist threats, major weather events and the need to reinforce US border security.

“Our country will, for example, at some point, face a major cyber event that will have a serious effect on our lives, our economy, and the everyday functioning of our society,” she said.

The administration has yet to name a successor for Napolitano, who resigned in July and will leave office next month after more than four years as the head of the Department of Homeland Security.

Created after the September 11, 2001, attacks, the department plays a key role, not only in guarding borders and preventing terror attacks, but also in the response to natural disasters.”[1]


Napolitanos comments are rather disturbing considering that FEMA has been requesting large stockpiles of food from preparedness companies throughout the U.S.[2]

http://intellihub.com/2013/08/27/napolitano-warns-coming-cyber-event/



Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Dim 1 Sep - 20:01 (2013)    Sujet du message: LES ÉTATS-UNIS INTERROMPENT LA DIFFUSION DE LA CHAINE RUSSIA TODAY Répondre en citant

LES ÉTATS-UNIS INTERROMPENT LA DIFFUSION DE LA CHAINE RUSSIA TODAY 
 
Vendredi 30 août 2013

La tension entre américains et russes ne cesse de croître. RT a été suspendue ce vendredi aux USA, un signe supplémentaire d'inquiétude...




 
Les États-Unis ont interrompu la diffusion de la chaîne Russia Today, a annoncé le rédacteur en chef de la chaîne Margarita Simonyan.
Citation:

« Je m’y attendais depuis longtemps. Maintenant notre chaîne est bloquée aux États-Unis. Ça y est ! Bravo pour la liberté de l’expression ! »



Il s’agit aux États-Unis de la seconde chaîne d’information étrangère la plus regardée. Elle emploie plusieurs milliers de personnes avec un siège à Moscou et Washington, et des bureaux à Paris, Londres, Los Angeles, Miami, Delhi et Tel Aviv.

Russia Today (ou RT) est une chaîne de télévision d’information continue russe lancée le 10 décembre 2005 par l’agence gouvernementale RIA Novosti qui l’abrite dans ses locaux moscovites. Depuis 2007, la chaîne est entrée dans la bataille de l’information, au même titre que BBC World, CNN, Al Jazeera et France 24.

Russia Today a également été bloquée par Reddit, le site web communautaire qui permet aux utilisateurs de soumettre leurs liens.

La chaîne compte plus d’un millions d’abonnés sur son compte YouTube.

Sources : La Voix de la Russie / Le Journal du Siècle

http://www.wikistrike.com/article-guerre-les-etats-unis-interrompent-la-dif…



Revenir en haut
maria
Administrateur

Hors ligne

Inscrit le: 18 Juin 2011
Messages: 24 739
Féminin

MessagePosté le: Mar 10 Sep - 12:47 (2013)    Sujet du message: WILL THE NEXT MAJOR FALSE FLAG BE A CYBER ATTACK? Répondre en citant

WILL THE NEXT MAJOR FALSE FLAG BE A CYBER ATTACK?



VIDEO : http://www.youtube.com/watch?v=_5C0dOnwhm4


Revenir en haut
Contenu Sponsorisé






MessagePosté le: Aujourd’hui à 14:31 (2016)    Sujet du message: RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM & HUMAN CONTROL (PARTIE 2)

Revenir en haut
Montrer les messages depuis:   
Poster un nouveau sujet   Répondre au sujet    LE VOÎLE DÉCHIRÉ (1) Index du Forum -> NOUVELLES LOIS ANTITERRORISTES/NEW ANTITERRORIST LAWS -> RÉFORME DES MÉDIAS - MEDIA REFORM - CYBERTERRORISM (PARTIE 2) Toutes les heures sont au format GMT + 2 Heures
Aller à la page: <  1, 2, 3, 4, 512, 13, 14  >
Page 4 sur 14

 
Sauter vers:  

Portail | Index | Creer un forum | Forum gratuit d’entraide | Annuaire des forums gratuits | Signaler une violation | Conditions générales d'utilisation
Powered by phpBB © 2001, 2005 phpBB Group
Traduction par : phpBB-fr.com