Sofrecom : l’entreprise française qui modernise la surveillance des syriens C’est en grandes pompes que Sofrecom fêtait son contrat avec Syrian Telecom en décembre 2009. Christine Lagarde, alors ministre, a même fait le déplacement. Côté syrien, le premier ministre Mr Abdallah Dardari, participait lui aussi à la cérémonie de signature du contrat. S’il n’est pas en soi surprenant de voir une entreprise française spécialiste des communications assister un opérateur étranger, on s’étonnera tout de même de voir nos entreprises viser des marchés très émergents… niveaux droits de l’homme. Les champs d’activités de la Sofrecom peuvent laisser suggérer qu’elle est intervenue sur le « management » du réseau de la STE. Source Wikipedia Les pages business du site de la Sofrecom nous renseignent largement sur les derniers marchés de cette filiale du groupe France Telecom, et les destinations font rêver : le Congo, le Vietnam, la Thaïlande, la Syrie, l’Éthiopie, la Mauritanie, la Côte d’Ivoire, le Tchad, la Libye de Kadhafi, le Maroc, ou la Tunisie de Ben Ali.
To Nobody's Surprise, Australian “Terrorism” Law May Be Used for Copyright Enforcement As we foreshadowed, a new law requiring mandatory data retention by ISPs was introduced into the Australian federal parliament last week. In the few days since then, there have been claims and counter-claims about whether data obtained under the new law would be limited to use in fighting major crimes (such as terrorism, as the government originally claimed), or if it could be used to target citizens who download and share files online. The current party line, from flip-flopping Attorney-General George Brandis (whom some may remember from this train-wreck interview in which he attempted to define “metadata”) is that the new laws “can't be and they won't be” used to prosecute file sharers, because copyright infringement is only a civil offense. Except, of course, when it isn't. The only solution is the obvious one—not to require the collection and retention of the data in the first place.
Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices Our lives are on our laptops – family photos, medical documents, banking information, details about what websites we visit, and so much more. Thanks to protections enshrined in the U.S. Constitution, the government generally can’t snoop through your laptop for no reason. But those privacy protections don’t safeguard travelers at the U.S. border, where the U.S. government can take an electronic device, search through all the files, and keep it for a while for further scrutiny – without any suspicion of wrongdoing whatsoever. Why might people want to protect their data at the border? Business travelers, lawyers, doctors, or other professionals may have confidential or privileged information on their laptops that they don’t want others to see or that they are obligated by law or contract to protect. People may have sensitive personal information on their devices such as medical records, financial documents, and years of correspondence with family, friends and business associates. Backups
Top Level Telecommunications Vos SMS furtifs Les services de sécurité envoient des milliers de SMS furtifs pour localiser des personnes et réactiver leur téléphone à distance. Une technologie jusque-là méconnue, et pas vraiment encadrée par le droit. L'affaire fait grand bruit chez les experts allemands, avec lesquels nous nous sommes entretenus. En France, plusieurs acteurs nous ont concédé, du bout des lèvres, que ce procédé était également utilisé. C’est une question au gouvernement qui nous a mis la puce à l’oreille. En juin 2011, Colette Giudicelli, sénatrice des Alpes Maritimes, écrit à Claude Guéant, ministre de l’intérieur : Plusieurs services de police judiciaire et de renseignement étrangers utilisent des SMS furtifs pour localiser des suspects ou des personnes disparues : cette méthode consiste à envoyer vers le téléphone portable de ce suspect un SMS qui passe inaperçu et renvoie un signal à l’émetteur du message. Sept mois plus tard, toujours pas de réponse du gouvernement. Souriez, vous êtes pistés Réactiver à distance
Australia’s metadata grab will create modern-day Stasi files Until the fall of the Berlin wall in 1989, the East German state security service – the Stasi – conducted surveillance and kept files on a third of the country’s population. One of those people was activist and dissident Ulrike Poppe, whose communications and activities were spied on by Stasi operatives constantly for 15 years. Much of the data that is contained in Poppe’s Stasi files, compiled during the Cold War, would today be considered “telecommunications metadata”. From locations, movements and meetings to relationships, affiliations and associates. Phone calls made and letters sent, as well as newspapers read and movies watched. During the Stasi’s reign, this type of intelligence was the product of covert bugs and undercover spies, a hugely intensive task that kept theirs 91,000 staff busy. Just like the spying perpetrated by the Stasi, metadata retention is a form of surveillance that is unacceptable in a democratic country.
When the Government Comes Knocking, Who Has Your Back? For Immediate Release: Thursday, May 31, 2012 San Francisco - When you use the Internet, you entrust your thoughts, experiences, locations, and more to companies like Google, Twitter, and Facebook. But what happens when the government asks these companies to hand over your private information? Will the company stand with you? Today, the Electronic Frontier Foundation (EFF) releases its second annual "When the Government Comes Knocking, Who Has Your Back?" report – this time as a white paper and chart tracking some of the Internet's biggest service providers on their public commitments to their users' privacy and security. Increasingly, federal law enforcement agents are demanding that Internet companies provide their users' data as part of government investigations – sometimes fairly, sometimes unfairly. EFF first published its chart last year to recognize exemplary practices by some companies. For the full report "When the Government Comes Knocking, Who Has Your Back?" Contacts:
Global LI Industry Forum Rendez-moi mes données ! Principales tendances motrices La crise de la relation de confiance entre individus et organisations et l’inquiétude montante en matière de données personnelles. L’évolution des attentes des consommateurs et des citoyens vers une plus grande maîtrise de leur vie. La prise de conscience de la valeur partagée des données : "open data", "big data"… Signes avant-coureurs Le mouvement Quantified Self : "Connais-toi toi-même par les chiffres." Augmenter le pouvoir d’achat des consommateurs en convaincant les entreprises de partager avec leurs clients toutes les informations personnelles dont elles disposent sur eux : tel est l’objectif du programme MiData que lance le gouvernement de David Cameron en 2011. Pourtant, les premiers résultats n’ont rien de spectaculaire. Les entreprises, ainsi que certaines administrations, apprennent à vivre en partageant leurs données avec leurs clients et usagers. Parallèlement, des effets pervers se dessinent. Qui est concerné ? Raisons de douter
Warning: Enrolling in Obamacare allows government to link your IP address with your name, social security number, bank accounts and web surfing habits - NaturalNews.com (NaturalNews) We have already established that Healthcare.gov is not a functioning database application that allows people to shop for competing health plans. It is actually a government-run Trojan Horse that suckers people into creating accounts where they hand over: • Name and address• Email address and password• Social security number• Private bank account details• Employer details and other information During the enrollment process, your computer also hands over your IP address which is then tied to your social security number. This IP address is then handed over to the NSA thanks to its new mega-black-hole data center in Utah, where your IP is cross-referenced with all website visits, including: • "Anti-government" websites• Porn sites• Gambling sites• File sharing sites• "Terrorism" support sites• Encryption service sites like Hushmail• Chat rooms, message boards and more Ponder the implications of this for a moment... As far as I'm concerned, the IRS can fine me all they want.
Google Glass: óculos inteligentes que podem fazer chamadas, enviar mensagens e acessar a internet RIO - Um dos projetos do laboratório Google X começou a tomar corpo nesta quarta-feira, quando a gigante de internet mostrou um vídeo e algumas fotos do Google Glass, os óculos que permitem que o usuário tenha acesso a informações em tempo real utilizando o recurso de realidade aumentada. Nas imagens do protótipo divulgadas no YouTube, o novo dispositivo projeta no campo de visão do usuário informações como temperatura, hora e mapas e também faz ligações telefônicas, check-in e envia mensagens de texto. Segundo post no Google+, uma equipe do Google X já começou a trabalhar na tecnologia que sustenta o conceito do Project Glass. "Nós acreditamos que a tecnologia deve trabalhar para você - estar lá quando você precisar dela e sair do seu caminho quando você não a quiser mais", disse a companhia em post na sua rede social. Do lado direito do acessório, um pequeno aparelho capta e registra imagens além de projetar conteúdo no campo de visão do usuário.
Cryptome