Hadopi 3 pourrait avoir la peau du streaming et du direct download
Hadopi livre son rapport sur la lutte contre le streaming et le « direct download » avec plus d’un an de retard. Le document a de quoi angoisser les irréductibles « pirates » : il dessine ce que pourrait être la prochaine législation contre le téléchargement illégal. En attendant les conclusions de la mission Lescure en avril. Avec ce rapport, la Hadopi signe l’aveu d’un échec : responsabiliser directement les internautes français par la prévention et la punition n’a pas suffi à faire disparaître le piratage. Mais le flic du Net dévoile sa nouvelle arme inspirée du procès du site Allostreaming, qui a dû fermer l’année dernière : s’en prendre directement aux hébergeurs de contenus et sites référençant des liens vers des contenus illégaux (Streamiz par exemple). Etendre l’amendement Vivendi-Universal Première proposition formulée par Mireille Imbert Quaretta, présidente de la Commission des droits : étendre l’amendement Vivendi-Universal aux sites de streaming et de direct download.
Jusqu'où ira la vidéosurveillance ?, Analyses
Why the collision of big data and privacy will require a new realpolitik
When it comes to protecting privacy in the digital age, anonymization is a terrifically important concept. In the context of the location data collected by so many mobile apps these days, it generally refers to the decoupling of the location data from identifiers such as the user’s name or phone number. Used in this way, anonymization is supposed to allow the collection of huge amounts of information for business purposes while minimizing the risks if, for example, someone were to hack the developer’s database. Except, according to research published in Scientific Reports on Monday, people’s day-to-day movement is usually so predictable that even anonymized location data can be linked to individuals with relative ease if correlated with a piece of outside information. Why? Because our movement patterns give us away. From the paper: Just because you’re paranoid… For those already worrying about the privacy-busting implications of mobile device use, this should come as no surprise.
Pattern Of Life
Previously we used Recorded Future’s temporal analytics to examine the short term evolution of information on a newly revealed security threat in our series on Faisal Shahzad, also know as the Times Square Bomber (or would-be bomber). In this post we’ll show how we were able to utilize Recorded Future’s data extraction and visualizations for open source intelligence to quickly develop a pattern of life analysis for an American-born terrorist. Recorded Future paints a broad landscape spanning nearly 40 years depicting the transformation of Omar Hammami from an Alabama-born honor student to an Islamic Extremist indicted on terrorism charges. Searching the full time range of Recorded Future’s index for the entity Omar Hammami, we find recognizable expressions of time back to Hammami’s parents first moving to Mobile, Alabama from Syria in 1972. This initial, extended timeline allows us to see upon cursory glance the dramatic increase in relevant data as we move toward the current date.
Pattern of Life and Temporal Signals of Hacker Organizations
Observing an organization or person by their activities using web intelligence can provide interesting clues about who and where they actually are. These clues can include targets, methods, tools, language, etc. This is true in both the physical and cyber world. In this post we’ll look at the temporal signature of activities by hacker groups and use those to discern their pattern of life – basically their work week – for matching with national work weeks/schedules. Top level conclusion? Different groups have different temporal signatures that could potentially be used to differentiate between those on very regular schedules – i.e. working a desk job (nation state?) Temporal analysis has long played a part in cyber defense. This was just one of many other factors that pointed to Russian involvement, but it helped orient analysts. “Hacker teams regularly began work, for the most part, at 8 a.m. KPMG calls out in their Cyber threat intelligence and the lessons from law enforcement report:
Théorie du drone : de la fabrique des automates politiques
Le livre de Grégoire Chamayou, Théorie du drone, est passionnant. Bien sûr, il est passionnant pour son implacable analyse du drone armé et de la façon dont cet « instrument d’homicide mécanisé » transforme la conduite de la guerre. Mais pour ma part, je n’ai pas lu ce livre comme un ouvrage sur les questions éthiques, psychologiques, sociales, juridiques et politiques que posent cette nouvelle arme de guerre, mais bien comme un livre sur les nouvelles technologies et ce qu’elles transforment. La police des schémas : l’activité, alternative à l’identité Grégoire Chamayou ouvre son livre par des extraits d’échanges entre pilotes de drones, comme l’a raconté l’ancien pilote Brandon Bryant. L’essentiel des frappes ne visent pas des personnalités nommément identifiées, mais avant tout des « signatures », c’est-à-dire des individus dont l’identité demeure inconnue, mais dont le comportement laisse supposer, signale ou signe une appartenance à une organisation terroriste ou le port d’armes.
Out of Sight, Out of Mind: A visualization of drone strikes in Pakistan since 2004