AGIR






OUTILS LIBRES

browsers
Firefox
messengers
Jappix - Thunderbird
search
Duckduckgo - Quaero - Scroogle
servers
all2all - domaine public - Telekommunisten
networks
Appleseed - Crabgrass - Diaspora - elgg - OneSocialWeb - pip.io
microblog
identi.ca

RELATED SITES

Ada Lovelace Institute - AI Now - Algorithm Watch - Algorithmic Justice League - AlgoTransparency - Atlas of Surveillance - Big Brother Watch - Citizen Lab - Conspiracy Watch - Constantvzw - controle-tes-donnees.net - Data Detox Kit - Digital Freedom Fund - Domaine Public - Do Not Track Electronic Frontier Foundation - europe-v-facebook - Fight for the Future - Forbidden Stories - Gender Shades - Google Spleen - greatfire.org - Guard//Int - hiljade.kamera.rs - Homo Digitalis - Human Rights Watch - Inside Google - Inside Airbnb - Liberties - LobbyPlag - Make Amazon Pay - Manifest-No - Ministry of Privacy - More Perfect Union - myshadow.org - Naked Citizens - Ni pigeons, ni espions - No-CCTV - Non à l’Etat fouineur - Nothing to Hide - noyb - NURPA - Online Nudity Survey - Open Rights Group - Ordinateurs de Vote - Pixel de tracking - Police spies out of lives - Prism Break - Privacy.net - Privacy International - Privacy Project - La Quadrature du Net - Radical AI Project - Reset the Net - Save the Internet - Souriez vous êtes filmés - Sous surveillance - Spyfiles - StateWatch - Stop Amazon - Stop Data Retention - Stop Killer Robots - Stop Spying - Stop The Cyborgs - Stop the Internet Blacklist ! - Stop the Spies - Stop Watching Us - Sur-ecoute.org - Technopolice - Tech Transparency Project - Transparency Toolkit - URME Surveillance - Watching Alibaba - Where are the Eyes ? - Who Targets Me ? - Wikifémia - Wikileaks

washingtonpost.com


analyse
By cracking cellphone code, NSA has capacity for decoding private conversations - 14 décembre 2013
The cellphone encryption technology used most widely across the world can be easily defeated by the National Security Agency, an internal document shows, giving the agency the means to decode most of the billions of calls and texts that travel over public airwaves every day. While the military and law enforcement (...)

analyse
NSA uses Google cookies to pinpoint targets for hacking - 11 décembre 2013
The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using "cookies" and location data to pinpoint targets for government hacking and to bolster surveillance. The agency’s internal presentation slides, provided by former NSA contractor Edward (...)

analyse
FBI’s search for "˜Mo,’ suspect in bomb threats, highlights use of malware for surveillance - 7 décembre 2013
The man who called himself "Mo" had dark hair, a foreign accent and "” if the pictures he e-mailed to federal investigators could be believed "” an Iranian military uniform. When he made a series of threats to detonate bombs at universities and airports across a wide swath of the United States last year, police had (...)

information
Microsoft to encrypt data in its services in bid to prevent snooping - 6 décembre 2013
Microsoft plans to encrypt data flowing through all of its communication, productivity and other services as it seeks to reassure users in the United States and beyond that it will guard their personal information from snooping governments, the company announced Wednesday night. The encryption initiative, (...)

analyse
NSA tracking cellphone locations worldwide, Snowden documents show - 5 décembre 2013
The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals "” and map their relationships "” in ways that would (...)

analyse
Microsoft, suspecting NSA spying, to ramp up efforts to encrypt its Internet traffic - 27 novembre 2013
A 2009 e-mail from a senior manager of the NSA’s MUSCULAR project specifies that a targeting tool called "MONKEY PUZZLE" is capable of searching only across certain listed "realms," including Google, Yahoo and Microsoft’s Passport service. It is not clear what service a fourth listed realm, "emailAddr," refers (...)

analyse
Facebook makes changes to its data use policies - 18 novembre 2013
Facebook moved ahead Friday with changes to its privacy policies that make it clear that the company can include users’ profile pictures, location and other personal information in advertisements. But the social networking company deleted a controversial line, proposed in August, stating that it assumes that teens (...)

analyse
NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say - 30 octobre 2013
The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials. By tapping those links, the agency has positioned (...)

plainte
Judge allows lawsuit against Google’s Gmail scans to move forward - 27 septembre 2013
A federal judge ruled Thursday that Google may be violating wiretap law when it scans the e-mails of non-Gmail users, allowing a lawsuit against the company to move forward. In her ruling, Judge Lucy Koh of the Northern District Court of California, questioned the clarity of Google’s privacy policy in explaining (...)

analyse
Former NSA and CIA director says terrorists love using Gmail - 15 septembre 2013
Former NSA and CIA director Michael Hayden stood on the pulpit of a church across from the White House on Sunday and declared Gmail the preferred online service of terrorists. As part of an adult education forum at St. John’s Episcopal Church, Hayden gave a wide ranging speech on "the tension between security and (...)

analyse
The NSA hacks other countries by buying millions of dollars’ worth of computer vulnerabilities - 1er septembre 2013
Like any government agency, the NSA hires outside companies to help it do the work it’s supposed to do. But an analysis of the intelligence community’s black budget reveals that unlike most of its peers, the agency’s top hackers are also funneling money to firms of dubious origin in exchange for computer malware (...)

analyse
U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show - 1er septembre 2013
U.S. intelligence services carried out 231 offensive cyber-operations in 2011, the leading edge of a clandestine campaign that embraces the Internet as a theater of spying, sabotage and war, according to top-secret documents obtained by The Washington Post. That disclosure, in a classified intelligence budget (...)

analyse
U.S. spy network’s successes, failures and objectives detailed in "˜black budget’ summary - 30 août 2013
U.S. spy agencies have built an intelligence-gathering colossus since the attacks of Sept. 11, 2001, but remain unable to provide critical information to the president on a range of national security threats, according to the government’s top-secret budget. The $52.6 billion "black budget" for fiscal 2013, (...)

analyse
The NSA paid Silicon Valley millions to spy on taxpayers - 26 août 2013
The National Security Agency reimbursed some of the nation’s top tech companies for participating in its PRISM surveillance program, according to new leaked government documents obtained by The Guardian. The revelation puts a financial spin on what until now has mostly been a question of civil liberties. Previous (...)

analyse
NSA broke privacy rules thousands of times per year, audit finds - 16 août 2013
The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents. Most of the infractions involve unauthorized surveillance of Americans or (...)

analyse
Sen. Obama warned about Patriot Act abuses. President Obama proved him right. - 2 août 2013
In recent months, Barack Obama has forcefully defended the use of the Patriot Act to gather the phone records of every American. But before he was elected president, he had a very different perspective on the issue. In December 2005, Congress was debating the first re-authorization of the Patriot Act, a (...)

information
Consumers, not tech firms,should control data, documentary filmmaker says - 28 juillet 2013
Filmmaker Cullen Hoback was about a year into working on a film on how technology is changing society when he realized that his footage was actually leading him in a different direction "” the erosion of online privacy. "I started out by asking the question of how technology is changing us," Hoback told The (...)

analyse
Upstream program - 13 juillet 2013
This slide shows PRISM as only one part of the NSA’s system for electronic eavesdropping. The "Upstream" program collects from the fiber-optic cable networks that carry much of the world’s Internet and phone data. The underlying map depicts the undersea cables that connect North America to the rest of the (...)

analyse
After PRISM reports, Swiss data bank sees boost - 10 juillet 2013
You’ve probably heard of the unique benefits of Swiss banks. But what about Swiss data banks ? As details about the National Security Agency’s secret surveillance programs are still unfolding, some businesses are taking steps to take their company data to places where they think it will be safe from prying eyes. (...)

analyse
New documents reveal parameters of NSA’s secret surveillance programs - 24 juin 2013
The National Security Agency may keep the e-mails and telephone calls of citizens and legal residents if the communications contain "significant foreign intelligence" or evidence of a crime, according to classified documents that lay out procedures for targeting foreigners and for guarding Americans’ privacy. (...)