CIA
analyse
Miscue Calls Attention to Amazon’s Dominance in Cloud Computing - 12 mars 2017
SEATTLE — There have been many opportunities to consider how crucial Amazon has become to the smooth operation of the internet over the past few years.
The most recent involved a case of fat fingers.
That event occurred late last month when an Amazon employee entered an incorrect set of commands on a computer, (...)
analyse
Comprendre l’espionnage informatique : Vault 7, PRISM, que risque-t-on en tant que citoyen ? - 9 mars 2017
À la lecture des documents techniques, il est difficile d’avoir des idées définitives sur Vault 7. On lit ici et là que nous pourrions tous être la cible de la CIA : or, c’est sensiblement plus compliqué que cela. WikiLeaks n’a pour le moment pas révélé de documents mettant en lumière un espionnage de masse. Sommes-nous pour (...)
analyse
WikiLeaks contre la CIA : la fuite en avant - 9 mars 2017
Chacun son tour. Trois ans et demi après la NSA, mise à nu par Edward Snowden, c’est au tour de la CIA de voir ses petits secrets étalés en place publique. Ce mardi, WikiLeaks a commencé à publier ce qui s’annonce comme la plus grosse fuite de documents de l’histoire de l’agence. Nom de code, cryptique et rosselinien : (...)
analyse
Vault 7 : toutes les questions pour comprendre les documents dévoilés par Wikileaks - 7 mars 2017
La machine Wikileaks est rodée, mais lorsqu’elle se met en branle pour sortir pas moins de 8 000 documents des dossiers de la CIA, il faut toujours revenir aux fondamentaux pour bien appréhender et comprendre, au fond, ce qu’est un leak. Nous avons compilé les questions qui nous paraissent essentielles pour éviter les (...)
analyse
ACLU Wants 23 Secret Surveillance Laws Made Public - 21 octobre 2016
The ACLU has identified 23 legal opinions that contain new or significant interpretations of surveillance law "” affecting the government’s use of malware, its attempts to compel technology companies to circumvent encryption, and the CIA’s bulk collection of financial records under the Patriot Act "” all of which (...)
information
CIA claims it can predict some social unrest up to 5 days ahead - 7 octobre 2016
Thanks to the power of algorithms, machine learning, and open source data sets.
Back in March 2015, the CIA chief began setting up a new office, the Directorate of Digital Innovation, to integrate the latest tech into the agency’s data-gathering workflow along with boosting the country’s cyber defense. According to (...)
analyse
Pokémon Go et la CIA, histoire d’une paranoïa - 2 août 2016
Pokémon Go, le jeu mobile en réalité augmentée qui a séduit des millions de joueurs, serait « lié à la CIA ». C’est ce qu’essaie de démontrer le site de propagande russe sputniknews.com. Ce dernier affirme, après avoir parcouru les conditions d’utilisation de l’application, que cette dernière fournirait massivement aux services (...)
analyse
Comment Pokémon Go est-il lié à la CIA ? - 29 juillet 2016
Alors que Pokémon Go donne le tournis à la planète entière, les joueurs ont-ils jamais à quoi aussi pourrait servir ce jeu à priori innocent ? Sputnik a fait une petite recherche sur l’affaire.
Voici quelques faits curieux sur le jeu Pokémon Go "” et ce ne sont pas des ruses afin d’augmenter son niveau de jeu mais des (...)
analyse
The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos - 10 mai 2016
SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an "insider threat," and artificial intelligence that will sift through large data sets "” these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to (...)
analyse
Stingrays - A Secret Catalogue of Government Gear for Spying on Your Cellphone - 21 décembre 2015
THE INTERCEPT HAS OBTAINED a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies. The document, thick with previously undisclosed information, also offers rare insight into the spying capabilities of federal law enforcement and (...)
analyse
CIA Email Hackers Return With Major Law Enforcement Breach - 10 novembre 2015
Hackers who broke into the personal email account of CIA Director John Brennan have struck again.
This time the group, which goes by the name Crackas With Attitude, says it gained access to an even more important target"”a portal for law enforcement that grants access to arrest records and other sensitive data, (...)
analyse
Hack du FBI : 3 000 coordonnées de policiers et militaires US dans la nature - 10 novembre 2015
Deux semaines après avoir hacké le compte de messagerie personnel de John Brennan, directeur de la CIA, le groupe de hackers Crackas With Attitude a pris pour cible le compte mail AOL du patron du FBI, Mark Giuliano. Plus de 3 000 noms, mails et numéros de téléphone appartenant au personnel d’agences gouvernementales (...)
analyse
Drones, IBM, and the Big Data of Death - 23 octobre 2015
LAST WEEK The Intercept published a package of stories on the U.S. drone program, drawing on a cache of secret government documents leaked by an intelligence community whistleblower. The available evidence suggests that one of the documents, a study titled "ISR Support to Small Footprint CT Operations "” (...)
analyse
Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware - 7 juillet 2015
The FBI, Drug Enforcement Administration and U.S. Army have all bought controversial software that allows users to take remote control of suspects’ computers, recording their calls, emails, keystrokes and even activating their cameras, according to internal documents hacked from the software’s Italian manufacturer. (...)
analyse
Apple and Google Just Attended a Confidential Spy Summit in a Remote English Mansion - 23 mai 2015
At an 18th-century mansion in England’s countryside last week, current and former spy chiefs from seven countries faced off with representatives from tech giants Apple and Google to discuss government surveillance in the aftermath of Edward Snowden’s leaks.
The three-day conference, which took place behind closed (...)
analyse
U.S. Government Designated Prominent Al Jazeera Journalist as "Member of Al Qaeda" - 10 mai 2015
The U.S. government labeled a prominent journalist as a member of Al Qaeda and placed him on a watch list of suspected terrorists, according to a top-secret document that details U.S. intelligence efforts to track Al Qaeda couriers by analyzing metadata.
The briefing singles out Ahmad Muaffaq Zaidan, Al Jazeera’s (...)
analyse
Loi sur le renseignement : pourriez-vous être espionné ? - 12 avril 2015
Le projet de loi renseignement, débattu à l’Assemblée nationale à partir du 13 avril, donne plus de moyens aux services français.
Faites le test pour savoir si vous pourriez être leur cible.
par Pierre Alonso, Alexandre Léchenet et Gurvan Kristanadjaja
analyse
DEA Global Surveillance Dragnet Exposed ; Access to Data Likely Continues - 12 avril 2015
Secret mass surveillance conducted by the Drug Enforcement Administration is falling under renewed scrutiny after fresh revelations about the broad scope of the agency’s electronic spying.
On Tuesday, USA Today reported that for more than two decades, dating back to 1992, the DEA and the Justice Department (...)
analyse
Lobbyists for Spies Appointed To Oversee Spying - 9 avril 2015
Who’s keeping watch of the National Security Agency ? In Congress, the answer in more and more cases is that the job is going to former lobbyists for NSA contractors and other intelligence community insiders.
A wave of recent appointments has placed intelligence industry insiders into key Congressional roles (...)
analyse
The CIA Campaign to Steal Apple’s Secrets - 11 mars 2015
RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept.
The security researchers presented their latest tactics and achievements at a secret annual (...)