Education & Numérique
50.6K views | +1 today
Follow
Education, outils numériques, TICE, littéracies numériques. Digital Literacies.
Curated by Terheck
Your new post is loading...
Your new post is loading...

Click a Tag = Custom Magazine

Current selected tag: 'NSA'. Clear
Scooped by Terheck
Scoop.it!

House approves controversial cybersecurity bill - CNET

House approves controversial cybersecurity bill - CNET | Education & Numérique | Scoop.it

"The House of Representatives passed bipartisan legislation on Wednesday designed to help companies and the federal government better defend against the growing threat of cyberattacks, despite opposition from privacy advocates.

Passed by a 307-116 vote, the controversial Protecting Cyber Networks Act encourages US companies to share information about security breaches with the federal government by providing them with expanded legal liability protections. Prompted in part by a recent uptick in high-profile data breaches, the legislation would allow companies to share information through a "cyber portal" administered by the Department of Homeland Security..."

No comment yet.
Scooped by Terheck
Scoop.it!

Snowden's Motivation: What the Internet Was Like Before It Was Being Watched, and How We Can Get There Again

Snowden's Motivation: What the Internet Was Like Before It Was Being Watched, and How We Can Get There Again | Education & Numérique | Scoop.it
Laura Poitras’ riveting new documentary about mass surveillance gives an intimate look into the motivations that guided Edward Snowden, who sacrificed his career and risked his freedom to expose mass surveillance by the NSA. CITIZENFOUR, which debuts on Friday, has many scenes that explore the depths of government surveillance gone awry and the high-tension unfolding of Snowden’s rendezvous with journalists in Hong Kong.
No comment yet.
Rescooped by Terheck from D&IM (Document & Information Manager) - CDO (Chief Digital Officer) - Gouvernance numérique
Scoop.it!

Interception des communications électroniques : quelles sont les pratiques des grands Etats ?

Interception des communications électroniques : quelles sont les pratiques des grands Etats ? | Education & Numérique | Scoop.it
A la suite des révélations portant sur divers programmes de surveillance étatique tels que PRISM1, TEMPORA2, XKeyscore3, ou sur l’existence d’accords entre États permettant de contourner les lois encadrant les interceptions des communications (cf. accord entre le Canada et les Etats-Unis).

Via Jean-Pierre Blanger
No comment yet.
Scooped by Terheck
Scoop.it!

Communiquer sur internet sans être surveillé par la NSA

Communiquer sur internet sans être surveillé par la NSA | Education & Numérique | Scoop.it
Communiquer sur internet sans être surveillé par la NSA. Le scandale lié aux activités de surveillance des Webmails et des réseaux sociaux par la NSA (National Security Agency) conduit au développement de solutions cryptées alternatives à Gmail, Hotmail et...
No comment yet.
Scooped by Terheck
Scoop.it!

Revelations of N.S.A. Spying Cost U.S. Tech Companies

Revelations of N.S.A. Spying Cost U.S. Tech Companies | Education & Numérique | Scoop.it
America’s cloud computing industry could lose billions of dollars in business because of the government’s surveillance program.
No comment yet.
Scooped by Terheck
Scoop.it!

Edward Snowden : neuf mois de révélations

Edward Snowden : neuf mois de révélations | Education & Numérique | Scoop.it
Depuis le 6 juin 2013 et les premières révélations sur les pratiques d'espionnage de la NSA, pas une semaine sans de nouvelles révélations d'Edward Snowden. La rédaction de Tom's Guide a décidé de faire un premier bilan, après neuf mois.
No comment yet.
Scooped by Terheck
Scoop.it!

Des applications de smartphones « mises sur écoute » par la NSA

Des applications de smartphones « mises sur écoute » par la NSA | Education & Numérique | Scoop.it
De nouveaux documents montrent que les agences de surveillance américaine et britannique compilaient des informations personnelles sur les utilisateurs.
No comment yet.
Rescooped by Terheck from ICT Security-Sécurité PC et Internet
Scoop.it!

How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks

How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks | Education & Numérique | Scoop.it
It's not as bad as you thought - it's much worse

Via Gust MEES
Rescooped by Terheck from A New Society, a new education!
Scoop.it!

La NSA aurait implanté 50 000 malwares dans le monde

La NSA aurait implanté 50 000 malwares dans le monde | Education & Numérique | Scoop.it

Un nouveau document rendu public par Edward Snowden, à travers un média hollandais, montre que la NSA aurait implanté 50 000 malwares à travers des réseaux du monde entier, pour intercepter des données ou se donner la possibilité d'attaquer.


Via dm, juandoming
No comment yet.
Rescooped by Terheck from e-Xploration
Scoop.it!

La NSA a "continuellement" enfreint la loi pour collecter des données I #privacy #NSA #DataAwareness

La NSA a "continuellement" enfreint la loi pour collecter des données I #privacy #NSA #DataAwareness | Education & Numérique | Scoop.it
D'anciens juges de la cour censée surveiller l'agence de renseignement américaine ont dénoncé à plusieurs reprises des collectes illégales de données.

Via luiy
luiy's curator insight, November 20, 2013 4:39 AM

DONNÉES COLLECTÉES ILLÉGALEMENT, EXPLOITÉES LÉGALEMENT


Dans son ordonnance, Colleen Kollar-Kotelly s'interroge notamment sur deux techniques, qui permettent d'enregistrer les informations entrantes et sortantes des communications téléphoniques (et potentiellement internet) : le "pen register"et les "trap & trace devices". Des méthodes de collecte jamais clairement définies par la loi, qui englobent selon elle "un spectre exceptionnellement large de collecte" de données.


Le juge John Bates, qui lui a succédé en 2006, abonde dans son sens : "La NSA a continuellement outrepassé les limites de l'acquisition légale" d'informations."Presque chaque" enregistrement réalisé par le programme "comprenait des données dont la collecte n'était pas autorisée", écrit-il. Or, le quotidien britannique rapportait en août qu'un vide juridique permettait à l'agence américaine d'exploiterdes informations collectées illégalement (en dehors de tout mandat), mais "par inadvertance". Quelques jours plus tard, l'actuel président de la FISC, Reggie B. Walton, reconnaissait dans le Washington Post manquer de moyens pour menersa mission de surveillance de la NSA.

Scooped by Terheck
Scoop.it!

Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333

Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333 | Education & Numérique | Scoop.it
A Washington Post article reveals that the National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points around the...
Terheck's insight:

Another article about NSA spying on the Guardian:

"NSA FILE: DECODED. What the revelation mean for you" : http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1

No comment yet.
Scooped by Terheck
Scoop.it!

Huge Online Protest Against NSA Planned For 4th Of July

Huge Online Protest Against NSA Planned For 4th Of July | Education & Numérique | Scoop.it
Reddit, Mozilla, Wordpress, 4chan and other websites are planning a Fourth of July protest against the National Security Agency over its widespread surveillance of telephone records and Internet traffic through secret programs that came to light...
No comment yet.
Scooped by Terheck
Scoop.it!

“Dans sa démarche, PRISM se rapproche des lois existantes”

"L'affaire PRISM n'en finit plus de faire du bruit. Les firmes nient en bloc, l'Administration Obama tente de calmer le jeu et les institutions européennes s'emparent de la question. Le décryptage d'Olivia Luzi, avocat associé au sein du cabinet Féral-Schuhl / Sainte-Marie."

No comment yet.
Scooped by Terheck
Scoop.it!

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle | Education & Numérique | Scoop.it

"AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.

The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data.

The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards.  (...)"

No comment yet.
Scooped by Terheck
Scoop.it!

Edward Snowden interviewed by Lawrence Lessig

Edward Snowden interviewed by Lawrence Lessig | Education & Numérique | Scoop.it
It's a fascinating, hour-long session in which Snowden articulates the case for blowing the whistle, the structural problems that created mass surveillance, and why it's not sufficient to stop the state from using our data -- we should also limit their ability to collect it. The Slashdot post by The Real Hocus Locus provides good timecode-based links into different parts of the talk.
No comment yet.
Scooped by Terheck
Scoop.it!

ÉTATS-UNIS • Les géants technologiques se rebellent contre les autorités judiciaires

ÉTATS-UNIS • Les géants technologiques se rebellent contre les autorités judiciaires | Education & Numérique | Scoop.it
Ebranlées par le scandale de la NSA, Google, Facebook et les autres sont en train de revoir leur politique en matière de protection des données. Lorsque les enquêteurs judiciaires demandent des informations, les utilisateurs sont dorénavant prévenus à l'avance.
No comment yet.
Scooped by Terheck
Scoop.it!

The ACLU launch the NSA Documents Database

The ACLU launch the NSA Documents Database | Education & Numérique | Scoop.it

The ACLU hopes to facilitate the debate by making these documents more easily accessible and understandable.

This tool will be an up-to-date, complete collection of previously secret NSA documents made public since last June. The database is designed to be easily searchable – by title, category, or content – so that the public, researchers, and journalists can readily home in on the information they are looking for.

No comment yet.
Scooped by Terheck
Scoop.it!

3 Security Tips For Every User From NSA Whistleblower Edward Snowden

3 Security Tips For Every User From NSA Whistleblower Edward Snowden | Education & Numérique | Scoop.it
Here's what Snowden shared at SXSW about protecting your information from surveillance.

 

- Full disk encryption

- Network encryption

- Tor

No comment yet.
Scooped by Terheck
Scoop.it!

Les géants du Net publient le nombre de requêtes secrètes de la NSA

Les géants du Net publient le nombre de requêtes secrètes de la NSA | Education & Numérique | Scoop.it
Le gouvernement américain avait annoncé qu'il permettait désormais aux grands groupes de rendre publiques les informations concernant leurs clients surveillés par la NSA.
No comment yet.
Scooped by Terheck
Scoop.it!

Edward Snowden accuse la NSA d'espionnage industriel

Edward Snowden accuse la NSA d'espionnage industriel | Education & Numérique | Scoop.it
Dans un entretien télévisé à une chaîne allemande, il affirme que l'agence américaine utilise parfois des informations « qui n'ont rien à voir avec la sécurité nationale » à des fins économiques.
No comment yet.
Scooped by Terheck
Scoop.it!

NSA : un juge américain estime la collecte de données contraire à la Constitution

NSA : un juge américain estime la collecte de données contraire à la Constitution | Education & Numérique | Scoop.it
Cette collecte ne serait pas conforme au 4e amendement. C'est la première décision de justice depuis la révélation de la collecte massive de données par l'agence.
No comment yet.
Scooped by Terheck
Scoop.it!

U.S. Government Has Weaponized the Internet. Here's How They Did It.

U.S. Government Has Weaponized the Internet. Here's How They Did It. | Education & Numérique | Scoop.it
The internet backbone -- the infrastructure of networks upon which internet traffic travels -- went from being a passive infrastructure for communication to an active weapon for attacks.
No comment yet.
Rescooped by Terheck from CLEMI - Veille sur l'Education aux médias et à l'information
Scoop.it!

Lutte d'influence au sommet de la gouvernance du Net | Les Echos

Lutte d'influence au sommet de la gouvernance du Net | Les Echos | Education & Numérique | Scoop.it

"Les affaires d'espionnage généralisé autour de la NSA fragilisent la position américaine. L'Icann tente d'en profiter pour prendre son autonomie..."


Via CLEMI - Centre de Liaison de l'Enseignement et des Médias d'Information
No comment yet.
Scooped by Terheck
Scoop.it!

Bitmessage: Choice Of A Rightly Paranoid Generation

Bitmessage: Choice Of A Rightly Paranoid Generation | Education & Numérique | Scoop.it
Bitmessage is not without its flaws, but it offers hope to those who want to keep their private communications private.

 

"In the wake of news that the NSA may be spying on citizen communications, many are asking how to secure email and other messaging protocols to keep prying eyes away. While some have traditionally turned to Pretty Good Privacy (PGP) encryption or other encryption programs to secure their communications, none of these keep the NSA or others from keeping tabs on essential metadata like the identity of your email recipients. Bitmessage, a peer-to-peer communications protocol, may offer a better way..."

No comment yet.
Scooped by Terheck
Scoop.it!

New Slides Show PRISM Reach Directly Inside Internet Companies

New Slides Show PRISM Reach Directly Inside Internet Companies | Education & Numérique | Scoop.it
On-premise assets contradict denials from Google, Microsoft and other named PRISM participants.

 

"The Washington Post has published four additional slides from the NSA PowerPoint demonstration leaked by IT contractor Edward Snowden, which outline more information about the PRISM program. The slides, which are annotated by the Post, seem to directly contradict claims from a number of Internet tech companies that they did not have government hardware installed on-premises and used to gather data on suspects."

No comment yet.