%3Cp%20align%3D%22justify%22%20class%3D%22DKKeswick%22%3EUne%20fabuleuse%20histoire%2C%20un%20cas%20unique%26nbsp%3B%21%3C%2Fp%3E%0D%0A%0D%0A%3Cp%20align%3D%22justify%22%20class%3D%22DKKeswick%22%3EUn%20petit%20must%20%E0%26nbsp%3Bne%20surtout%20pas%20manquer%26nbsp%3B%21%3C%2Fp%3E
Must
|
• |
Fraude exceptionnelle : "Le hacker devenu millionnaire en truquant la loterie" dans la catégorie "Mafias, Gangs, Corruption, Crimes et Business" |
%3Cp%20align%3D%22justify%22%20class%3D%22DKKeswick%22%3EUne%20exp%E9rience%20claire%2C%26nbsp%3Bnette%2C%20et%20d%E9finitive%2C%20par%20un%20expert%20en%20s%E9curit%E9%20informatique.%3C%2Fp%3E%0D%0A%0D%0A%3Cp%20align%3D%22justify%22%20class%3D%22DKKeswick%22%3EConclusions%26nbsp%3B%3A%3C%2Fp%3E%0D%0A%0D%0A%3Cul%3E%0D%0A%09%3Cli%20align%3D%22justify%22%20class%3D%22DKKeswick%22%3EOn%20se%20cro%EEt%20en%20s%E9curit%E9%20sur%20les%20sites%20s%E9curis%E9s%2C%20mais%20nous%20n%27y%20sommes%20pas%2C%20c%27est%20une%20illusion%20%28%E0%20cause%20des%20failles%20de%20s%E9curit%E9%29.%3C%2Fli%3E%0D%0A%09%3Cli%20align%3D%22justify%22%20class%3D%22DKKeswick%22%3EIl%20est%20pr%E9f%E9rable%20sur%20Internet%20de%20payer%20via%20un%20site%20comme%20PayPal%26nbsp%3B%3A%20jamais%20vous%20n%27avez%20%E0%20rentrer%20vos%20coordonn%E9es%20bancaires%20ou%20votre%20carte%20de%20cr%E9dit%20pour%20payer%20sur%20un%20site%20marchand%20puisque%20le%20paiement%20a%20lieu%20via%20contre%20compte%20PayPal%20%28ou%20autre%20service%20du%20m%EAme%20genre%29.%3C%2Fli%3E%0D%0A%3C%2Ful%3E
|
• |
Sécurité informatique, hacking, et sites web marchands : la preuve définitive que nos informations personnelles ne sont pas en sécurité sur Internet dans la catégorie "Médias, Multimédia, Informatique, et Réseaux" |
%3Cp%20align%3D%22justify%22%20class%3D%22chalk%22%20style%3D%22text-align%3A%20justify%3B%22%3E%3Cspan%20style%3D%22color%3A%23ffff66%3B%22%3ESYNOPSIS%20%3A%3C%2Fspan%3E%3Cbr%3E%0D%0A%3Cbr%3E%0D%0AL%92assistant%20vocal%20d%92un%20smartphone%20peut%20%EAtre%20manipul%E9%20%E0%20l%92aide%20d%92ultrasons%20ind%E9tectables%20%E0%20l%27oreille%20et%20permettre%20%E0%20des%20personnes%20malveillantes%20d%92acc%E9der%20%E0%20l%92appareil%2C%20affirment%20des%20chercheurs.%20Ils%20se%20veulent%20cependant%20rassurants.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0ADes%20chercheurs%20de%20l%92Universit%E9%20de%20Washington%20ont%20%E9tabli%20que%20les%20smartphones%20qui%20disposent%20d%92un%20assistant%20vocal%2C%20comme%20Siri%20ou%20Google%20Home%2C%20peuvent%20%EAtre%20pirat%E9s%20%E0%20distance%20par%20des%20ultrasons.%20Ils%20ont%20pr%E9sent%E9%20le%20r%E9sultat%20de%20leur%20travail%20dans%20un%20rapport%20au%20Network%20and%20Distributed%20System%20Security%20Symposium.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0ASur%20la%20vid%E9o%2C%20les%20chercheurs%20dissimulent%20un%20%E9metteur%20d%92ultrasons%20qui%20ont%20une%20fr%E9quence%20sup%E9rieure%20%E0%20celle%20que%20l%92oreille%20humaine%20peut%20discerner.%20Mais%20les%20micros%20des%20portables%20peuvent%20enregistrer%20ces%20fr%E9quences.%20Lorsqu%92un%20smartphone%20est%20pos%E9%20sur%20une%20table%2C%20il%20devient%20ainsi%20possible%20d%92activer%20diverses%20fonctions%20du%20t%E9l%E9phone.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0A%ABNous%20voulons%20sensibiliser%20%5Bles%20propri%E9taires%20des%20portables%2C%20ndlr%5D%20%E0%20une%20telle%20menace.%20Je%20veux%20que%20tout%20le%20monde%20le%20sache%BB%2C%20d%E9clare%20Ning%20Zhang%2C%20professeur%20d%27informatique%20%E0%20la%20McKelvey%20School%20of%20Engineering.%BB%3Cbr%3E%0D%0A%3Cbr%3E%0D%0ALes%20chercheurs%20ont%20montr%E9%20que%20gr%E2ce%20aux%20ultrasons%2C%20il%20%E9tait%20possible%20d%92entrer%20en%20contact%20avec%20l%92assistant%20vocal%20d%92un%20t%E9l%E9phone%20et%20lui%20faire%20lire%20des%20messages%20%E0%20haute%20voix%20ou%20d%E9clencher%20les%20capteurs%20photo.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0A%ABVous%20pouvez%20manipuler%20%5Bles%20signaux%2C%20ndlr%5D%20de%20telle%20sorte%20que%20lorsque%20le%20t%E9l%E9phone%20interpr%E8te%20les%20ondes%20sonores%20entrantes%2C%20il%20pensera%20que%20vous%20prononcez%20une%20commande%BB%2C%20explique%20Ning%20Zhang.%BB%3Cbr%3E%0D%0A%3Cbr%3E%0D%0AL%92%E9quipe%20de%20recherche%20indique%20que%2015%20des%2017%20t%E9l%E9phones%20test%E9s%20se%20sont%20montr%E9s%20vuln%E9rables%20%E0%20cette%20technique.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0APas%20de%20panique%3Cbr%3E%0D%0ALes%20chercheurs%20a%20baptis%E9%20ce%20processus%20%ABsurfing%20attack%BB.%20Toutefois%2C%20ils%20pr%E9cisent%20qu%92%E0%20l%92heure%20actuelle%2C%20une%20telle%20attaque%20de%20piraterie%20ne%20pourrait%20%EAtre%20lanc%E9e%20que%20dans%20des%20conditions%20sp%E9cifiques%20et%20difficiles%20%E0%20reproduire%20sans%20mat%E9riel%20sp%E9cial.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0AEnfin%2C%20l%92%E9quipe%20cite%20des%20m%E9canismes%20de%20d%E9fense%20pour%20contrer%20une%20telle%20attaque.%20Ainsi%2C%20il%20suffirait%20d%92envelopper%20son%20appareil%20dans%20un%20mouchoir%20ou%20de%20le%20placer%20sur%20une%20nappe.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0ASource%20%3A%20Sputnik.%3C%2Fp%3E%0D%0A%0D%0A%3Cp%20align%3D%22justify%22%20class%3D%22DKKeswick%22%3EIncroyable%20%21%26nbsp%3B%3Cimg%20border%3D%220%22%20src%3D%22IMAGES%2FICONES%2FIcone%2520-%2520Choqu%25E9.gif%22%3E%3C%2Fp%3E
|
• |
Piratage (hacking) et téléphonie mobile : Un smartphone posé sur une table peut être piraté via des ultrasons dans la catégorie "Médias, Multimédia, Informatique, et Réseaux" |
%3Cp%20class%3D%22DKKeswick%22%20style%3D%22text-align%3A%20justify%3B%22%3EVoil%E0%20un%20exemple%20concret%20de%20dysfonctionnement%20majeur%20de%20l%27%C9tat%20fran%E7ais.%20La%20cause%26nbsp%3B%3F%20Nos%20politiciens%20qui%20sont%20des%20tra%EEtres.%20Qui%20a%20invit%E9%20ces%20banques%20%E0%20cette%20commission%26nbsp%3B%3F%3F%20Le%20S%E9nat%20est-il%20le%20lieu%20de%20repr%E9sentation%20des%20int%E9r%EAts%20des%20citoyens%20ou%20d%27int%E9r%EAts%20priv%E9s%20%3F%20C%27est%20ahurissant%20%21%20%3Cspan%20style%3D%22color%3A%23ff0000%3B%22%3EC%27est%20de%20la%20haute%20trahison%3C%2Fspan%3E.%3C%2Fp%3E%0D%0A%0D%0A%3Cp%20class%3D%22DKKeswick%22%20style%3D%22text-align%3A%20justify%3B%22%3EQuand%20%E0%20nos%20tra%EEtres%20de%20m%E9dias%2C%20ils%20sont%20les%20complices%20objectifs%20de%20ces%20malversations%20et%20forfaitures%20majeures%20en%20ne%20les%20d%E9non%E7ant%20pas%2C%20et%20en%20ne%26nbsp%3Bd%E9non%E7ant%20pas%20ceux%20qui%20ont%20proc%E9d%E9%20%E0%20ces%20invitations%20iniques%20radicalement%20incompatibles%20avec%20la%20d%E9mocratie%20et%20l%27int%E9r%EAt%20g%E9n%E9ral.%20Des%20voyous%20qui%20escroquent%20l%27%C9tat%20fran%E7ais%20de%20plusieurs%20milliards%20d%27Euros%20d%27imp%F4ts%20invit%E9s%20au%20S%E9nat%20%3F%26nbsp%3B%3Cimg%20border%3D%220%22%20src%3D%22IMAGES%2FICONES%2Fgrrr3.gif%22%3E%26nbsp%3BParce-qu%27au%20bout%20du%20compte%2C%20c%27est%20nous%20qui%20payons%20par%20des%20imp%F4ts%20et%20des%20taxes%20suppl%E9mentaires%26nbsp%3Bces%20manques%20%E0%20gagner%20gigantesques%20engendr%E9s%20par%20l%27%E9vasion%20fiscale%20organis%E9e.%3C%2Fp%3E%0D%0A%0D%0A%3Cp%20class%3D%22DKKeswick%22%20style%3D%22text-align%3A%20justify%3B%22%3E%3Cspan%20style%3D%22background-color%3A%23ffff00%3B%22%3ED%E9sormais%2C%20tous%20les%20citoyens%20sont%20en%20mesure%20de%20voir%20que%20la%20soi-disant%20d%E9mocratie%20du%20syst%E8me%20de%20gouvernement%20repr%E9sentatif%2C%20non%20repr%E9sentatif%2C%20%3C%2Fspan%3E%3Cspan%20style%3D%22color%3A%23ff0000%3B%22%3E%3Cspan%20style%3D%22background-color%3A%23ffff00%3B%22%3Ea%20%E9chou%E9%20lamentablement%20au%20b%E9n%E9fice%26nbsp%3Bde%20lobbies%20de%20tous%20types%3C%2Fspan%3E%3C%2Fspan%3E%3Cspan%20style%3D%22background-color%3A%23ffff00%3B%22%3E%20%3A%20financiers%2C%20%E9conomiques%2C%20soci%E9taux%2C%20et%20partisans.%3C%2Fspan%3E%3C%2Fp%3E%0D%0A%0D%0A%3Cp%20class%3D%22DKKeswick%22%20style%3D%22text-align%3A%20justify%3B%22%3EIl%20faut%20donc%20en%20finir%20avec%20ce%20syst%E8me%20corrompu%20de%20tra%EEtres%20%E0%20la%20Nation%2C%20et%20la%20premi%E8re%20t%E2che%20de%20chacun%20est%20donc%20de%20%3Cspan%20style%3D%22color%3A%23ff0000%3B%22%3Ediffuser%20ces%20exemples%20pour%20%E9clairer%20la%20conscience%20de%20chaque%20citoyen%3C%2Fspan%3E.%3C%2Fp%3E%0D%0A%0D%0A%3Cp%20class%3D%22DKKeswick%22%20style%3D%22text-align%3A%20justify%3B%22%3ESans%20ce%20travail%20d%27%E9ducation%20populaire%2C%20tout%20changement%20de%20r%E9gime%20est%20vou%E9%20%E0%20l%27%E9chec.%3C%2Fp%3E%0D%0A%0D%0A%3Cp%20class%3D%22DKKeswick%22%20style%3D%22text-align%3A%20justify%3B%22%3EInternet%20constitue%20donc%20un%20outil%20majeur%20et%20d%E9cisif%20que%20chaque%20citoyen%20doit%20empoigner%20avec%20la%20force%20de%20la%20volont%E9%20pour%20informer%20autrui%20%3A%20chacun%26nbsp%3Bdoit%20se%20convertir%20en%20un%20gentil%20virus%2C%20chacun%20doit%20contaminer%20positivement%20les%20autres%20en%20d%E9non%E7ant%26nbsp%3Btoutes%20les%20forfaitures%20commises%20contre%20le%20peuple%2C%26nbsp%3Bpour%20le%20plus%20grand%20bien%26nbsp%3Bcommun%20et%20l%27int%E9r%EAt%20g%E9n%E9ral%20bien%20compris.%3C%2Fp%3E%0D%0A%0D%0A%3Cp%20class%3D%22DKKeswick%22%20style%3D%22text-align%3A%20justify%3B%22%3EEn%20avant%2C%20en%20avant%2C%20en%26nbsp%3Bavant%20%21%3C%2Fp%3E
|
• |
Un exemple typique du hacking de la démocratie par des lobbies : le sénateur Éric Bocquet dénonce la présence, lors d'une commission des finances du Sénat, de représentants de grandes banques privées internationales dont l'UBS qui est coupable de trafic organisé d'évasion fiscale au détriment de l'État français dans la catégorie "Politique, Démocratie, Libertés, et Altermondialisme" |
%3Cp%20align%3D%22center%22%3E%0D%0A%3Cimg%20border%3D%221%22%20src%3D%22IMAGES%2Fhacker-hacking-facon-matrix.jpg%22%20width%3D%22800%22%20height%3D%22533%22%3E%3C%2Fp%3E%0D%0A%3Cp%3E%26nbsp%3B%3C%2Fp%3E%0D%0A%3Cp%3E%3Cu%3E%3Cb%3E%3Cfont%20size%3D%225%22%3ESynopsis%3A%3C%2Ffont%3E%3C%2Fb%3E%3C%2Fu%3E%3C%2Fp%3E%0D%0A%3Cblockquote%3E%0D%0A%09%3Cp%3ELa%20beaut%E9%20des%20hackers%2C%20dit%20l%27experte%20en%20cybers%E9curit%E9%20Keren%20Elazari%2C%20%0D%0A%09c%27est%20qu%27ils%20nous%20forcent%20%E0%20%E9voluer%20et%20%E0%20nous%20am%E9liorer.%3C%2Fp%3E%0D%0A%09%3Cp%3EOui%2C%20certains%20hackers%20sont%20mauvais%2C%20mais%20beaucoup%20travaillent%20pour%20%0D%0A%09combattre%20la%20corruption%20des%20gouvernements%20et%20d%E9fendre%20nos%20droits.%3C%2Fp%3E%0D%0A%09%3Cp%3EEn%20exposant%20les%20vuln%E9rabilit%E9s%2C%20ils%20poussent%20Internet%20%E0%20devenir%20plus%20fort%20%0D%0A%09et%20plus%20sain%2C%20utilisant%20sa%20puissance%20pour%20am%E9liorer%20le%20monde.%3C%2Fp%3E%0D%0A%09%3Cp%3ESource%20%3A%20TED%20Talk.%3C%2Fp%3E%0D%0A%3C%2Fblockquote%3E%0D%0A%3Cp%3EUne%20bonne%20petite%20conf%E9rence%20invitant%20%E0%20la%20r%E9flexion%20sur%20le%20r%F4le%20des%20hackers%2C%20%0D%0Anotamment%20en%20cette%20p%E9riode%20o%F9%20la%20surveillance%20gouvernementale%20se%20g%E9n%E9ralise%20%0D%0Apartout%20dans%20le%20monde.%3C%2Fp%3E%0D%0A%3Cp%3E%C0%20voir%20%21%3C%2Fp%3E
|
• |
Informatique, Internet, liberté d'expression, et lutte contre la dictature : "Les hackers, le système immunitaire d'aujourd'hui" par Keren Elazari - TEDx dans la catégorie "Médias, Multimédia, Informatique, et Réseaux" |
%3Cp%20align%3D%22center%22%3E%0D%0A%3Cimg%20border%3D%220%22%20src%3D%22IMAGES%2Fdelit%2520d_initie_voyance.jpg%22%20width%3D%22567%22%20height%3D%22329%22%3E%3C%2Fp%3E%0D%0A%3Cp%3E%26nbsp%3B%3C%2Fp%3E%0D%0A%3Cp%3ECette%20vid%E9o%20est%20un%20court%20expos%E9%2C%20produit%20par%20l%27excellent%20site%20amateur%0D%0Ad%27informations%20%E9conomiques%20Warrant%0D%0AMarrant.%3C%2Fp%3E%0D%0A%3Cp%3EToujours%20pr%E9sent%E9s%20avec%20un%20peu%20d%27humour%20et%20de%20panache%2C%20les%20clips%20de%20ce%20site%0D%0An%27en%20demeurent%20pas%20moins%20s%E9rieux%2C%20car%20ils%20pr%E9sentent%20des%20informations%0D%0Apertinentes%20et%20v%E9ridiques.%3C%2Fp%3E%0D%0A%3Cp%3EL%27int%E9r%EAt%20majeur%20de%20ces%20vid%E9os%2C%20c%27est%20d%27expliquer%20de%20fa%E7on%20claire%2C%20et%20de%0D%0Ad%E9noncer%2C%20les%20diverses%20m%E9thodes%20et%20man%9Cuvres%20op%E9r%E9es%20par%20les%20traders%2C%20les%0D%0Abanques%2C%20et%20Wall%20Street%20en%20g%E9n%E9ral.%3C%2Fp%3E%0D%0A%3Cp%3E%3Cu%3E%3Cb%3E%3Cfont%20size%3D%225%22%3ESynopsis%20de%20l%27%E9pisode%20%3A%3C%2Ffont%3E%3C%2Fb%3E%3C%2Fu%3E%3C%2Fp%3E%0D%0A%3Cblockquote%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3EDes%20hackers%20pi%E8gent%20des%20as%20de%20la%20finance%20pour%20obtenir%20des%20%0D%0A%09informations%20sensibles%20et%20sp%E9culer%20gr%E2ce%20%E0%20elles.%3C%2Fp%3E%0D%0A%3C%2Fblockquote%3E%0D%0A%3Cp%3EUne%20courte%20vid%E9o%20%E0%20voir%20pour%20prendre%20conscience%20de%20la%20folie%20du%20monde%20%0D%0Afinancier%20o%F9%20n%27existent%20plus%20aucunes%20limites%20ni%20aucune%20%E9thique%20parce-que%20seuls%20%0D%0Acomptent%20les%20profits%20qu%27on%20peut%20y%20faire.%3C%2Fp%3E
|
• |
Spéculation et délits d'initiés : comment des hackers sont parvenus à piéger des as de la finance pour se faire de l'argent sur leur dos dans la catégorie "Argent, Banques, États, et Organisations mondiales" |
%3Cp%20align%3D%22center%22%3E%0D%0A%3Cimg%20border%3D%221%22%20src%3D%22IMAGES%2Fisrael-terre-promise-de-la-cyberguerre.jpg%22%20width%3D%22833%22%20height%3D%22413%22%20vspace%3D%227%22%3E%3Cbr%3E%0D%0A%3Cb%3EIsra%EBl%2C%20terre%20promise%20de%20la%20cyberguerre%2C%20de%20la%20censure%2C%20et%20de%20la%20%0D%0Ad%E9sinformation.%3C%2Fb%3E%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%26nbsp%3B%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%3Cu%3E%3Cb%3E%3Cfont%20size%3D%225%22%3ESynopsis%20%3A%3C%2Ffont%3E%3C%2Fb%3E%3C%2Fu%3E%3C%2Fp%3E%0D%0A%3Cblockquote%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3EAujourd%92hui%2C%20je%20vous%20lance%20un%20appel%20pressant%20%3A%20maintenant%20%0D%0A%09que%20le%20site%20de%20vente%20en%20ligne%20est%20enfin%20r%E9tabli%2C%20venez-y%20pour%20commander%20%0D%0A%09%26quot%3BIsra%EBl%2C%20parlons-en%20%21%26quot%3B.%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3EVous%20enverrez%20%E0%20Isra%EBl%20ce%20message%20%3A%20%26quot%3B%3Ci%3Evotre%20attaque%20se%20%0D%0A%09retournera%20contre%20vous%2C%20les%20gens%20liront%20encore%20plus%20ce%20livre%20qui%20vous%20%0D%0A%09d%E9range%2C%20la%20v%E9rit%E9%20finira%20par%20triompher%3C%2Fi%3E%26quot%3B.%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3ELien%20du%20livre%20Isra%EBl%2C%20parlons-en%20%21%20%3A%0D%0A%09%3Ca%20target%3D%22_blank%22%20href%3D%22http%3A%2F%2Fwww.michelcollon.info%2Fspip.php%3Fpage%3Dproduit%26ref%3Disrael-parlons-en%26id_rubrique_thelia%3D%22%3Ehttp%3A%2F%2Fwww.michelcollon.info%2Fspip.php%3Fpage%3Dproduit%26amp%3Bref%3Disrael-parlons-en%26amp%3Bid_rubrique_thelia%3D%3C%2Fa%3E%20%28%3Cimg%20border%3D%220%22%20src%3D%22IMAGES%2FNouvelle%2520Fenetre%252025x25.jpg%22%20align%3D%22absmiddle%22%20width%3D%2225%22%20height%3D%2225%22%3E%29.%3C%2Fp%3E%0D%0A%3C%2Fblockquote%3E%0D%0A%3Cp%20align%3D%22justify%22%3EUne%20affaire%20de%20plus%20r%E9v%E9lant%20les%20m%E9thodes%20d%E9gueulasses%20des%20%0D%0Asionistes.%20Aucune%20%E9thique.%20Aucune%20morale.%20Tous%20les%20moyens%20sont%20bons%20pour%20faire%20%0D%0Aen%20sorte%20que%20l%27information%20soit%20censur%E9e%20et%20n%27arrive%20pas%20aux%20citoyens.%3C%2Fp%3E
|
• |
Cyberguerre et censure de l'information par Israël et les sionistes : appel de Michel Collon suite au hacking du site Investigu'Action - 22 Septembre 2014 dans la catégorie "Politique, Démocratie, Libertés, et Altermondialisme" |
%3Cp%20align%3D%22center%22%3E%0D%0A%3Cimg%20border%3D%221%22%20src%3D%22IMAGES%2FLes%2520gardiens%2520du%2520nouveau%2520monde.jpg%22%20width%3D%22400%22%20height%3D%22552%22%3E%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%0D%0A%26nbsp%3B%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%0D%0ALes%20Gardiens%20du%20nouveau%20monde%20est%20un%20documentaire%20r%E9alis%E9%20par%20Flo%20Laval%20sur%20les%20%0D%0Ahacktivistes%2C%20ces%20hackers%20qui%20ont%20fait%20le%20choix%20de%20l%27engagement%20politique%20aux%20%0D%0Ac%F4t%E9s%20des%20ONG%20et%20des%20cyberdissidents.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%3Cu%3E%3Cb%3E%3Cfont%20size%3D%225%22%3ESynopsis%20%3A%3C%2Ffont%3E%3C%2Fb%3E%3C%2Fu%3E%3C%2Fp%3E%0D%0A%3Cblockquote%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3EVous%20qui%20surfez%20sur%20le%20web%2C%20vous%20qui%20par%20l%27interm%E9diaire%20%0D%0A%09des%20r%E9seaux%20sociaux%20parlez%20avec%20vos%20proches%20et%20le%20monde%20entier%2C%20r%E9cemment%20%0D%0A%09encore%2C%20vous%20pensiez%20le%20faire%20en%20toute%20libert%E9%85%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3EMais%20des%20mots%20tels%20que%20Wikileaks%2C%20Prism%20ou%20Snowden%20vous%20%0D%0A%09ont%20peut-%EAtre%20mis%20la%20puce%20%E0%20l%27oreille%20%3A%20que%20connaissez-vous%20du%20%0D%0A%09fonctionnement%20d%27Internet%26nbsp%3B%26nbsp%3B%3F%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3E%C0%20l%27instar%20des%20hackers%2C%20il%20s%27agit%2C%20%E0%20notre%20tour%20de%20saisir%20%0D%0A%09les%20enjeux%20politiques%20et%20%E9conomiques%20qui%20se%20cachent%20derri%E8re%20nos%20%E9crans.%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3E%AB%20Les%20gardiens%20du%20nouveau%20monde%20%BB%20nous%20raconte%20%0D%0A%09l%92%E9mergence%20d%92une%20nouvelle%20g%E9n%E9ration%20de%20militants%20hacktivistes%20qu%27il%20%0D%0A%09devient%20chaque%20jour%20plus%20indispensable%20d%27%E9couter.%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3EIl%20sont%20%E0%20la%20crois%E9e%20des%20chemins%20entre%20les%20mouvements%20de%20%0D%0A%09protestation%20et%20de%20r%E9volution%20mondiaux%2C%20et%20les%20communaut%E9s%20de%20hackers%20et%20de%20%0D%0A%09pirates%20informatiques.%20%C0%20cheval%20en%20r%E9el%20et%20virtuel%2C%20une%20grande%20utopie%20semble%20%0D%0A%09rena%EEtre%20%3A%20celle%20d%92une%20cyber%20r%E9volution%20pour%20un%20monde%20plus%20juste.%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3ESource%20%3A%20Atelier%20des%20m%E9dias.%3C%2Fp%3E%0D%0A%3C%2Fblockquote%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%3Cu%3E%3Cb%3E%3Cfont%20size%3D%225%22%3EUne%20interview%20du%20r%E9alisateur%20%3A%3C%2Ffont%3E%3C%2Fb%3E%3C%2Fu%3E%3C%2Fp%3E%0D%0A%3Cblockquote%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3EFlo%20Laval%20est%20photographe%20et%20r%E9alisateur%20documentaire.%20Il%20%0D%0A%09collabore%20avec%20des%20m%E9dias%20comme%20Spray%20Magazine%2C%20Melting%20Pop%2C%20TV5%2C%20Sud%20Ouest%2C%20%0D%0A%09Lib%E9ration%20ou%20encore%20des%20ONG%20tels%20que%20Planet%20Finance.%20A%20partir%20de%20son%20projet%20%0D%0A%09multim%E9dia%20Rencontres%20Africaines%2C%20il%20s%27est%20sp%E9cialis%E9%20dans%20la%20production%20de%20%0D%0A%09reportages%20photo%20et%2F%20ou%20vid%E9o%20web.%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3EC%27est%20donc%20en%20d%E9couvrant%20ce%20dernier%20travail%20que%20je%20suis%20%0D%0A%09tomb%E9e%20sur%20la%20derni%E8re%20r%E9alisation%20de%20l%27auteur.%20Son%20film%20documentaire%2C%20les%20%0D%0A%09gardiens%20du%20nouveau%20monde.%20Je%20l%27ai%20alors%20contact%E9%20et%20j%27ai%20eu%20l%27honneur%20de%20%0D%0A%09regarder%20le%20chef%20d%27oeuvre.%20Florian%20Laval%20m%27a%20alors%20accord%E9%20un%20entretien.%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3ECes%20individus%20%26quot%3Bbraconniers%20de%20l%27usage%26quot%3B%20comme%20l%27aurait%20%0D%0A%09d%E9crit%20Michel%20De%20Certeau.%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3E%3Cb%3ESinatou%20Saka%3A%20Les%20gardiens%20du%20Nouveau%20Monde%20vise-t-il%20%E0%20%0D%0A%09redorer%20l%27image%20des%20hackers%20dans%20la%20soci%E9t%E9%26nbsp%3B%3F%3Cbr%3E%0D%0A%09%3C%2Fb%3EFlo%20Laval%3A%20Les%20hackers%20ont%20souvent%20une%20image%20n%E9gatif.%20Mais%20il%20faut%20savoir%20%0D%0A%09que%20l%27individu%20qui%20fait%20des%20choses%20ill%E9gales%20sur%20internet%20n%27est%20pas%20un%20%0D%0A%09hacker%2C%20c%27est%20un%20bandit.%20Le%20hacker%20c%27est%20une%20personne%20curieuse%2C%20qui%20d%E9tourne%20%0D%0A%09peut-%EAtre%20l%27usage%20des%20objets%20pour%20permettre%20aux%20gens%20de%20comprendre%20le%20monde%20%0D%0A%09dans%20lequel%20ils%20vivent.%20C%27est%20comme%20un%20boulanger%20qui%20commet%20un%20meurtre.%20A%20ce%20%0D%0A%09moment%2C%20il%20n%27est%20plus%20boulanger%20mais%20meurtrier.%20C%27est%20exactement%20comme%20%E7a%20%0D%0A%09pour%20les%20hackers.%20A%20travers%20ce%20documentaire%2C%20je%20voulais%20alors%20red%E9finir%20ce%20%0D%0A%09terme%20et%20essayer%20de%20comprendre%20comment%20les%20univers%20du%20hacking%20se%20sont%20%0D%0A%09d%E9velopp%E9s%2C%20comment%20ils%20interagissent%20avec%20d%27autres%20communaut%E9s.%3Cbr%3E%0D%0A%09%3Cbr%3E%0D%0A%09%3Cb%3EDu%20hacking%20au%20hacktivisme%3Cbr%3E%0D%0A%09S.Saka%3A%20Dans%20votre%20film%20documentaire%2C%20vous%20n%E9gligez%20donc%20totalement%20l%27aspect%20%0D%0A%09autrefois%20peu%20recommandable%20de%20ces%20personnes%20qui%20%E9taient%20accus%E9es%20de%20%0D%0A%09contaminer%20nos%20ordinateurs%20de%20virus.%3Cbr%3E%0D%0A%09%3C%2Fb%3EFlo%20Laval%3A%20La%20communaut%E9%20des%20hackers%20est%20avant%20tout%20humaniste.%20On%20parle%20trop%20%0D%0A%09dans%20les%20m%E9dias%20du%20c%F4t%E9%20anxiog%E8ne%20de%20cette%20communaut%E9.%20Pour%20moi%2C%20c%27%E9tait%20un%20%0D%0A%09peu%20l%27occasion%20de%20r%E9aliser%20un%20contre%20point%20de%20vue.%3Cbr%3E%0D%0A%09%3Cbr%3E%0D%0A%09%3Cb%3EAller%20au%20bout%20de%20l%27histoire%3Cbr%3E%0D%0A%09S.S%3A%20Avec%20les%20nouveaux%20formats%20qu%27offrent%20le%20web%2C%20pourquoi%20avoir%20choisi%20un%20%0D%0A%09film%20documentaire%26nbsp%3B%3F%3Cbr%3E%0D%0A%09%3C%2Fb%3EFlo%20Laval%3A%20Lorsque%20j%27ai%20rencontr%E9%20le%20producteur%2C%20%26quot%3BLe%3Cfont%20color%3D%22%23FF0000%22%20face%3D%22arial%22%20size%3D%225%22%3E%3Cspan%20style%3D%22background-color%3A%20%23FFFFCC%22%3E%3Cb%3E%20%5B...%5D%3C%2Fb%3E%3C%2Fspan%3E%3C%2Ffont%3E
Évaluée
|
• |
"Hackers : Les gardiens du nouveau monde" dans la catégorie "Médias, Multimédia, Informatique, et Réseaux" |
%3Cp%20align%3D%22center%22%3E%0D%0A%3Cimg%20border%3D%221%22%20src%3D%22IMAGES%2Fcybercriminel.jpg%22%20width%3D%22747%22%20height%3D%22498%22%3E%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%26nbsp%3B%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%3Cu%3E%3Cb%3E%3Cfont%20size%3D%225%22%3ESynopsis%20%3A%3C%2Ffont%3E%3C%2Fb%3E%3C%2Fu%3E%3C%2Fp%3E%0D%0A%3Cblockquote%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3EEn%202011%2C%20les%20criminels%20russophones%20ont%20capt%E9%20plus%20d%27un%20%0D%0A%09tiers%20du%20march%E9%20mondial%20de%20la%20cybercriminalit%E9%20selon%20un%20cabinet%20d%27%E9tudes%20%0D%0A%09russe%20sp%E9cialis%E9%20dans%20la%20s%E9curit%E9.%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3ECette%20forte%20augmentation%20de%20la%20fraude%20en%20ligne%2C%20dans%20et%20%0D%0A%09hors%20du%20pays%2C%20fait%20de%20la%20Russie%20une%20superpuissance%20en%20mati%E8re%20de%20criminalit%E9%20%0D%0A%09num%E9rique.%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3ESource%20%3A%20RTS.%3C%2Fp%3E%0D%0A%3C%2Fblockquote%3E%0D%0A%3Cp%20align%3D%22center%22%3E%0D%0A%3Cimg%20border%3D%221%22%20src%3D%22IMAGES%2Fcybercrime-stats-1.jpg%22%20width%3D%22946%22%20height%3D%22634%22%3E%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%3Cu%3E%3Cb%3E%3Cfont%20size%3D%225%22%3EQu%27est-ce%20que%20la%20cybercriminalit%E9%20%3F%3C%2Ffont%3E%3C%2Fb%3E%3C%2Fu%3E%3C%2Fp%3E%0D%0A%3Cblockquote%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3ELa%20cybercriminalit%E9%20est%20une%20notion%20large%20qui%20regroupe%20%AB%20%0D%0A%09toutes%20les%20infractions%20p%E9nales%20susceptibles%20de%20se%20commettre%20sur%20ou%20au%20moyen%20%0D%0A%09d%92un%20syst%E8me%20informatique%20g%E9n%E9ralement%20connect%E9%20%E0%20un%20r%E9seau.%20%BB%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3EIl%20s%92agit%20donc%20d%92une%20nouvelle%20forme%20de%20criminalit%E9%20et%20de%20%0D%0A%09d%E9linquance%20qui%20se%20distingue%20des%20formes%20traditionnelles%20en%20ce%20qu%92elle%20se%20%0D%0A%09situe%20dans%20un%20espace%20virtuel%2C%20le%20%AB%20cyberespace%20%BB.%20Depuis%20quelques%20ann%E9es%20la%20%0D%0A%09d%E9mocratisation%20de%20l%92acc%E8s%20%E0%20l%92informatique%20et%20la%20globalisation%20des%20r%E9seaux%20%0D%0A%09ont%20%E9t%E9%20des%20facteurs%20de%20d%E9veloppement%20du%20cybercrime.%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3EOn%20peut%20alors%20aujourd%92hui%20regrouper%20la%20cybercriminalit%E9%20%0D%0A%09en%20trois%20types%20d%92infractions%20%3A%3C%2Fp%3E%0D%0A%09%3Cul%3E%0D%0A%09%09%3Cli%3E%0D%0A%09%09Les%20infractions%20sp%E9cifiques%20aux%20technologies%20de%20%0D%0A%09%09l%92information%20et%20de%20la%20communication%20%3A%20parmi%20ces%20infractions%2C%20on%20recense%20%0D%0A%09%09les%20atteintes%20aux%20syst%E8mes%20de%20traitement%20automatis%E9%20de%20donn%E9es%2C%20les%20%0D%0A%09%09traitements%20non%20autoris%E9s%20de%20donn%E9es%20personnelles%20%28comme%20la%20cession%20%0D%0A%09%09illicite%20des%20informations%20personnelles%29%2C%20les%20infractions%20aux%20cartes%20%0D%0A%09%09bancaires%2C%20les%20chiffrements%20non%20autoris%E9s%20ou%20non%20d%E9clar%E9s%20ou%20encore%20les%20%0D%0A%09%09interceptions.%3C%2Fli%3E%0D%0A%09%09%3Cli%3E%0D%0A%09%09Les%20infractions%20li%E9es%20aux%20technologies%20de%20l%92information%20et%20de%20la%20%0D%0A%09%09communication%20%3A%20cette%20cat%E9gorie%20regroupe%20la%20p%E9dopornographie%2C%20%0D%0A%09%09l%92incitation%20au%20terrorisme%20et%20%E0%20la%20haine%20raciale%20sur%20internet%2C%20les%20%0D%0A%09%09atteintes%20aux%20personnes%2C%20les%20atteintes%20aux%20biens.%3C%2Fli%3E%0D%0A%09%09%3Cli%3E%0D%0A%09%09Les%20infractions%20facilit%E9es%20par%20les%20technologies%20de%20l%92information%20et%20de%20%0D%0A%09%09la%20communication%2C%20que%20sont%20les%20escroqueries%20en%20ligne%2C%20le%20blanchiment%20%0D%0A%09%09d%27argent%2C%20la%20contrefa%E7on%20ou%20toute%20autre%20violation%20de%20propri%E9t%E9%20%0D%0A%09%09intellectuelle.%3C%2Fli%3E%0D%0A%09%3C%2Ful%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3ESource%20%3A%20Wikip%E9dia.%3C%2Fp%3E%0D%0A%3C%2Fblockquote%3E%0D%0A%3Cp%20align%3D%22center%22%3E%0D%0A%3Cimg%20border%3D%221%22%20src%3D%22IMAGES%2Fcybercrime-stats-2.jpg%22%20width%3D%22964%22%20height%3D%22563%22%3E%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3ECette%20vid%E9o%20n%27a%20pas%20encore%20%E9t%E9%20%E9valu%E9e%20compl%E8tement.%3C%2Fp%3E
Évaluée
|
• |
Mafia : les hackers russes ont fait de leur pays la superpuissance du cybercrime dans la catégorie "Médias, Multimédia, Informatique, et Réseaux" |
%3Cp%20align%3D%22justify%22%3ECette%20vid%E9o%20est%20un%20entretien%20avec%20Ma%EEtre%20Olivier%20Iteanu%2C%20%0D%0Al%27avocat%20de%20Olivier%20Laurelli%2C%20alias%20%26quot%3B%3Ci%3EBluetouff%3C%2Fi%3E%26quot%3B%2C%20sur%20une%20affaire%20%0D%0Asurr%E9aliste%20%3A%20Bluetouff%20a%20%E9t%E9%20condamn%E9%20en%20premi%E8re%20instance%20pour%20avoir%20%0D%0At%E9l%E9charg%E9%20en%202012%20des%20documents%20de%20l%27ANSES%2C%20l%27Agence%20Nationale%20de%20S%E9curit%E9%20Sanitaire%20de%20%0D%0Al%27Alimentation%2C%20qu%27il%20a%20trouv%E9s%20sur%20le%20Net%20gr%E2ce%20%E0%20Google.%20L%27ANSES%20a%20eu%20alors%20%0D%0Al%27audace%20absurde%20de%20porter%20plainte%20contre%20lui.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3EDans%20cette%20affaire%2C%20il%20est%20d%E9finitivement%20aberrant%20qu%27un%20%0D%0Ainternaute%20soit%20poursuivi%20pour%20avoir%20t%E9l%E9charg%E9%20des%20documents%20trouv%E9s%20gr%E2ce%20%E0%20%0D%0AGoogle.%20L%27ANSES%20est%20clairement%20fautive%20%3A%20cette%20agence%20n%27avait%20qu%27%E0%20bien%20faire%20%0D%0Ason%20travail%20en%20prot%E9geant%20ses%20fichiers%2C%20et%20rejette%20sa%20propre%20incomp%E9tence%20sur%20un%20%0D%0Alampiste.%20Si%20les%20responsables%20informatiques%20de%20cette%20agence%20avait%20correctement%20%0D%0Afait%20leur%20travail%2C%20les%20robots%20de%20Google%20n%27aurait%20jamais%20pu%20trouver%20et%20r%E9f%E9rencer%20%0D%0Aces%20fichiers%2C%20et%20l%27affaire%20s%27arr%EAtait%20l%E0.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3EMa%EEtre%20Olivier%20Iteanu%20aborde%20aussi%20les%20th%E8me%20importants%20%0D%0Asuivants%20%3A%3C%2Fp%3E%0D%0A%3Cul%3E%0D%0A%09%3Cli%3E%0D%0A%09La%20loi%20de%20programmation%20militaire%20%28LPM%29%2C%3C%2Fli%3E%0D%0A%09%3Cli%3E%0D%0A%09La%20g%E9olocalisation%2C%20conseils%20et%20pr%E9conisations%3C%2Fli%3E%0D%0A%09%3Cli%3E%0D%0A%09L%27extension%20des%20%E9coutes%20%0D%0A%09administratives%2C%3C%2Fli%3E%0D%0A%09%3Cli%3E%0D%0A%09La%20captation%20de%20donn%E9es%2C%20Mail%2C%20mot%20de%20passe%2C%20et%20leur%20utilisations.%3C%2Fli%3E%0D%0A%3C%2Ful%3E%0D%0A%3Cp%20align%3D%22justify%22%3EUne%20interview%20passionnante%20qui%20montre%2C%20une%20fois%20de%20plus%2C%20la%20%0D%0Ad%E9rive%20de%20notre%20soci%E9t%E9s%20vers%20des%20dictatures%20num%E9riques%20o%F9%20la%20surveillance%20%0D%0Ag%E9n%E9ralis%E9e%20incontr%F4l%E9e%20prend%20le%20pas%20sur%20les%20libert%E9s%20fondamentales%20et%20la%20%0D%0Ad%E9mocratie.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%C0%20voir%20%21%3C%2Fp%3E
|
• |
Hacker vs justice française : la scandaleuse affaire Bluetouff par l'avocat Olivier Iteanu - par Thinkerview - 6 Mars 2014 dans la catégorie "Droit, Justice, Police, et Mauvais traitements" |
Une%20vid%E9o%20montrant%20l%27ampleur%20des%20op%E9rations%20d%27espionnage%20g%E9n%E9ralis%E9%20entreprises%20par%20les%20%C9tats-Unis.%3Cbr%3E%3Cbr%3EConsternant.
|
• |
Le hacker Jacob Appelbaum explique le système de surveillance américain au Parlement européen dans la catégorie "Renseignement, Espionnage, Guerre électronique, et Surveillance" |
%3Cp%20align%3D%22justify%22%3E%3Cu%3E%3Cb%3E%3Cfont%20size%3D%225%22%3ESynopsis%20%3A%3C%2Ffont%3E%3C%2Fb%3E%3C%2Fu%3E%3C%2Fp%3E%0D%0A%3Cblockquote%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3ENous%20avons%20pos%E9%20nos%20questions%20%E0%20Eric%20Filiol%20%28directeur%20de%20%0D%0A%09laboratoire%20de%20virologie%20et%20de%20cryptologie%20informatique%2C%20hacker%20incontest%E9%29%20%0D%0A%09pendant%20le%20%26quot%3BHack%20in%20Paris%26quot%3B%202013.%20Nous%20avons%20abord%E9%20des%20sujets%20tels%20que%20PRISM%20%0D%0A%09%28Snowden%29%2C%20ECHELON%2C%20la%20s%E9curit%E9%20informatique%2C%20la%20vie%20priv%E9e%2C%20la%20d%E9mocratie%2C%20%0D%0A%09la%20formation%20des%20%E9lites%20et%20des%20r%E9percussions%20de%20la%20surveillance%20informatique%20%0D%0A%09%E0%20l%27%E9chelle%20%E9tatique%20dans%20la%20vie%20des%20citoyens%20et%20des%20entreprises.%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3ESource%20%3A%20Thinkerview.%3C%2Fp%3E%0D%0A%3C%2Fblockquote%3E%0D%0A%3Cp%20align%3D%22justify%22%3ECette%20vid%E9o%20n%27a%20pas%20encore%20%E9t%E9%20%E9valu%E9e.%3C%2Fp%3E
Évaluée
|
• |
Interview par Thinkerview d'Éric Filiol, hacker, cryptanalyse, et ancien de la DGSE - Juin 2013 dans la catégorie "Renseignement, Espionnage, Guerre électronique, et Surveillance" |
De%20plus%20en%20plus%20de%20puces%20RFID%20sont%20utilis%E9es%20couramment%20de%20nos%20jours.%20Notamment%20avec%20les%20cartes%20de%20cr%E9dit%2C%20dans%20les%20pi%E8ces%20ou%20documents%20d%27identit%E9%2C%20et%20aussi%20dans%20les%20cartes%20d%27acc%E8s%20ou%20dans%20les%20entreprise.%3Cbr%3E%3Cbr%3ETout%20cela%20pour%20dire%20que%20ce%20syst%E8me%20sans%20fil%20n%27est%20pas%20%E0%20l%27abri%20des%20pirates.%3Cbr%3E%3Cbr%3E%C0%20conna%EEtre.
|
• |
La sécurité des puces RFID est compromise par de plus en plus de hackers s'attaquant à ces systèmes dans la catégorie "Biométrie, Implants, Puces RFID, Transhumanisme, et Cyborgs" |
D%27un%20c%F4t%E9%2C%20il%20y%20a%20les%20%22black%20hats%22%20%28chapeaux%20noirs%29%2C%20les%20d%E9linquants%20virtuels%20mus%20par%20l%27app%E2t%20du%20gain%20%3B%20de%20l%27autre%2C%20les%20%22white%20hats%22%20%28chapeaux%20blancs%29%20ou%20pirates%20bienveillants.%20Les%20hackers%20forment%20une%20vaste%20communaut%E9%20aux%20profils%20diversifi%E9s.%20Capables%20de%20modifier%20la%20une%20d%27un%20journal%20sur%20le%20Net%20ou%20de%20pi%E9ger%20le%20ministre%20de%20l%27Int%E9rieur%2C%20ils%20sont%20aussi%20les%20seuls%20%E0%20savoir%20prot%E9ger%20les%20entreprises%20des%20menaces%20informatiques.%20Inventeurs%20des%20logiciels%20libres%20-%20permettant%20d%27%E9chapper%20%E0%20la%20toute-puissance%20de%20Bill%20Gates%20ou%20de%20Steve%20Jobs%20-%2C%20ils%20sont%20aussi%2C%20gr%E2ce%20%E0%20l%27exploration%20des%20failles%20informatiques%2C%20%E0%20l%27origine%20de%20la%20s%E9curisation%20des%20achats%20en%20ligne.%20Beaucoup%20n%27ont%20qu%27un%20bac%20en%20poche%20mais%20les%20services%20secrets%20et%20les%20responsables%20politiques%20se%20disputent%20leurs%20faveurs...%3Cbr%3E%3Cbr%3E%C0%20contre-courant%20des%20id%E9es%20re%E7ues%2C%20ce%20film%20raconte%20la%20g%E9n%E9ration%20hackers%2C%20entr%E9e%20dans%20l%27ar%E8ne%20politique%20et%20m%E9diatique%20%E0%20l%27occasion%20du%20d%E9bat%20sur%20Hadopi.
Évaluée
|
• |
"Hackers, les nouveaux maîtres du monde" dans la catégorie "Médias, Multimédia, Informatique, et Réseaux" |
%3Cp%20align%3D%22justify%22%3E%3Cu%3E%3Cb%3E%3Cfont%20size%3D%225%22%3ELa%20probl%E9matique%20%3A%3C%2Ffont%3E%3C%2Fb%3E%3C%2Fu%3E%3C%2Fp%3E%0D%0A%3Cblockquote%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3EChaque%20jour%2C%20les%20hackers%20d%E9veloppent%20environ%20260.000%20%0D%0A%09lignes%20de%20codes%20infect%E9s%2C%20on%20en%20comptait%2050.000%20il%20y%20a%20seulement%20trois%20ans.%20%0D%0A%09Un%20des%20grands%20probl%E8mes%2C%20c%27est%20d%27identifier%20la%20localisation%20g%E9ographique%20des%20%0D%0A%09cybercriminels.%20Les%20pirates%20informatiques%20ont%20l%27habitude%20de%20brouiller%20les%20%0D%0A%09pistes%20en%20d%E9tournant%20le%20trafic%20des%20donn%E9es.%20Pour%20cela%2C%20ils%20peuvent%20utiliser%20%0D%0A%09des%20ordinateurs%20qu%27ils%20ont%20infect%E9%20aux%20quatre%20coins%20du%20monde%2C%20en%20passant%20par%20%0D%0A%09des%20serveurs%20informatiques%20tels%20que%20les%20proxy%2C%20ils%20peuvent%20m%EAme%20passer%20par%20%0D%0A%09votre%20ordinateur%20pour%20attaquer%20quelqu%27un%20d%27autre.%20Cela%20fait-il%20de%20vous%20le%20%0D%0A%09criminel%20%3F%20%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3ELe%20Centre%20Europ%E9en%20de%20Lutte%20contre%20la%20cybercriminalit%E9%20%28EC3%29%2C%20install%E9%20%E0%20La%20Haye%20dans%20les%20locaux%20d%27Europol%20a%20ouvert%20ses%20portes%20le%2011%20%0D%0A%09Janvier%202013.%20Objectif%20principal%20%3A%20lutter%20contre%20les%20groupes%20criminels%20organis%E9s%20qui%20font%20d%27%E9normes%20profits%20en%20fraudant%20sur%20le%20net%2C%20vol%20de%20carte%20de%20cr%E9dit%20et%20de%20coordonn%E9es%20bancaires%20en%20t%EAte.%20Comment%20les%20combattre%20%3F%20Existent-ils%20des%20accords%20internationaux%20%3F%20Obtenir%20des%20r%E8gles%20de%20bonne%20gouvernance%20sur%20le%20web%20est-il%20possible%20%3F%3C%2Fp%3E%0D%0A%09%3Cp%20align%3D%22justify%22%3ESource%20%3A%20Euronews.%3C%2Fp%3E%0D%0A%3C%2Fblockquote%3E%0D%0A%3Cp%20align%3D%22justify%22%3ECette%20vid%E9o%20n%27a%20pas%20encore%20%E9t%E9%20%E9valu%E9e.%3C%2Fp%3E
Évaluée
|
• |
Malwares : la lutte européenne contre les hackers et la cybercriminalité va s’intensifier en 2013 dans la catégorie "Médias, Multimédia, Informatique, et Réseaux" |
%3Cp%3ECette%20vid%E9o%20est%20une%20interview%20de%202006%20du%20fameux%20pirate%20britannique%20qui%20a%20%0D%0Ar%E9ussi%20%E0%20p%E9n%E9trer%20dans%20les%20ordinateurs%20du%20Pentagone%2C%20un%20exploit%20que%20les%20%0D%0Aam%E9ricains%20n%27ont%20pas%20du%20tout%20appr%E9ci%E9%20car%20il%20a%20t%E9l%E9charg%E9%20des%20fichiers%20et%20des%20%0D%0Ainformations%20qui%20r%E9v%E8lent%20des%20informations%20tellement%20hors%20normes%2Cque%20l%27homme%20%0D%0Aordinaire%20ne%20peut%20arriver%20%E0%20croire.%20Et%20pourtant...%3C%2Fp%3E%0D%0A%3Cp%3ECette%20vid%E9o%20n%27a%20pas%20encore%20%E9t%E9%20%E9valu%E9e%20compl%E8tement.%3C%2Fp%3E%0D%0A%3Cp%3E%3Cb%3ENota%20Bene%20%3A%20dans%20le%20m%EAme%20genre%2C%20voyez%20%26quot%3B%3Cfont%20color%3D%22%23FF0000%22%3E%3Ci%3EGary%20%0D%0AMcKinnon%20%3A%20le%20hacker%20qui%20voulait%20conna%EEtre%20les%20secrets%20gouvernementaux%20sur%20les%20%0D%0AOVNIS%3C%2Fi%3E%3C%2Ffont%3E%26quot%3B%2C%20une%20vid%E9o%20%E9galement%20visible%20sur%20ce%20site%2C%0D%0A%3Ca%20href%3D%22https%3A%2F%2Fwww.blueman.name%2FDes_Videos_Remarquables.php%3FNumVideo%3D21%22%3E%5Bici%5D%3C%2Fa%3E.%3C%2Fb%3E%3C%2Fp%3E
Évaluée
|
• |
"Pirater le Pentagone, une interview du hacker Gary McKinnon" dans la catégorie "Renseignement, Espionnage, Guerre électronique, et Surveillance" |
Cette%20vid%E9o%20est%20une%20capsule%20de%20l%27%E9mission%20%22%3Ci%3ECulture%20geek%3C%2Fi%3E%22%20de%20la%20cha%EEne%20fran%E7aise%20%22%3Ci%3EBFTMV%3C%2Fi%3E%22%20sur%20ces%20chercheurs-hackers%20qui%20sont%20parvenus%20%E0%20pirater%20le%20syst%E8me%20informatique%20de%20voitures%20par%20la%20prise%20destin%E9e%0D%0Anormalement%20%E0%20l%27%E9tablissement%20num%E9rique%20de%20diagnostics.%20Et%20maintenant%2C%20ils%20arrivent%20m%EAme%20%E0%0D%0Aprendre%20le%20contr%F4le%20de%20certaines%20voitures%20gr%E2ce%20un%20simple%20t%E9l%E9phone%20potable.%0D%0A%3Cp%3ETout%20indique%20que%20dans%20un%20proche%20futur%2C%20tout%20objet%20ayant%20de%20l%27informatique%20embarqu%E9e%20sera%20susceptible%20d%27%EAtre%20hack%E9%2C%20%E0%20fortiori%20parce-que%20nous%20entrons%20dans%20l%27%E8re%20de%20la%20cybertronique%20%3A%20tous%20les%20objets%20seront%20communiquants%2C%20interconnect%E9s%2C%20en%20r%E9seau%2C%20et%20les%20technologies%0D%0A%3Ca%20href%3D%22http%3A%2F%2Ffr.wikipedia.org%2Fwiki%2FBluetooth%22%20target%3D%22_blank%22%3E%20Bluetooth%3C%2Fa%3E%20%0D%0A%28%3Cimg%20border%3D%220%22%20src%3D%22IMAGES%2FNouvelle%2520Fenetre%252025x25.jpg%22%20align%3D%22absmiddle%22%20width%3D%2225%22%20height%3D%2225%22%3E%29%0D%0Aet%0D%0A%3Ca%20href%3D%22http%3A%2F%2Ffr.wikipedia.org%2Fwiki%2FWifi%22%20target%3D%22_blank%22%3EWi-Fi%3C%2Fa%3E%20%28%3Cimg%20border%3D%220%22%20src%3D%22IMAGES%2FNouvelle%2520Fenetre%252025x25.jpg%22%20align%3D%22absmiddle%22%20width%3D%2225%22%20height%3D%2225%22%3E%29%20en%20sont%20les%20pr%E9mices.%20Inqui%E9tant...%3C%2Fp%3E
|
• |
La voiture moderne, future cible des hackers ? dans la catégorie "Médias, Multimédia, Informatique, et Réseaux" |
%3Cp%20align%3D%22center%22%3E%3Cimg%20border%3D%221%22%20src%3D%22IMAGES%2FPiratage.jpg%22%20width%3D%22488%22%20height%3D%22399%22%3E%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3ECette%20vid%E9o%20est%26nbsp%3Bun%20film%20documentaire%20d%27%C9tienne%20Rouillon%0D%0Aqui%20retrace%20l%92histoire%20d%92Internet%20gr%E2ce%20aux%20t%E9moignages%20de%20ceux%20qui%20l%92ont%20construit%2C%20les%0D%0Ahackers.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%3Cb%3E%3Cu%3E%3Cfont%20size%3D%225%22%3ER%E9sum%E9%20%2F%20Critique%20%3A%3C%2Ffont%3E%3C%2Fu%3E%3C%2Fb%3E%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3EDe%20prime%20abord%2C%20on%20aurait%20pu%20penser%20%E0%20un%20reportage%20qui%20resterait%20dans%20les%20clich%E9s%20qu%92on%20nous%20sert%20habituellement%2C%20mais%20le%20r%E9alisateur%20a%20pr%E9f%E9r%E9%20parler%20du%20fond%20ici.%20On%20commence%20donc%20par%20la%20d%E9finition%20du%20mot%0D%0Ahacking%20par%20un%20des%20tout%20premier%20hackeur%20au%20monde%2C%20John%20Drapper%2C%20qui%20inventa%20un%20bo%EEtier%0D%0Acapable%20de%20passer%20des%20appels%20gratuitement%2C%20puis%20Andy%20M%FCller-Maguhn%2C%20porte-parole%20du%20Chaos%20Computer%20Club.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3ECe%20reportage%20nous%20parle%20du%20hacking%20et%20de%20son%20%E9thique%2C%20que%20personnellement%20je%20ne%20connaissais%20pas%20totalement.%20Quasiment%20tous%20les%20th%E8mes%20sont%20abord%E9s%2C%20mais%20il%20y%20a%20eu%20des%20impasses%20%28notamment%20en%20ce%20qui%20concerne%20le%0D%0Alogiciel%20libre%2C%20tr%E8s%20vite%20exp%E9di%E9%29%20car%20il%20faudrait%20plusieurs%20heures%20pour%20vraiment%20tout%20traiter.%20On%20n%92y%20traite%20pas%20des%20black%20hats%20qui%20cassent%20derri%E8re%20eux%2C%20mais%20des%20white%20hats%2C%20et%20ceux%20qui%20font%20progresser%20le%20monde%0D%0Aavec%20des%20noms%20comme%20Zuckerberg%2C%20Assange%2C%20des%20hackers%20de%20g%E9nie%20%28Napster%20a%20aussi%20%E9t%E9%20cit%E9%29.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3ECompar%E9%20%E0%20tout%20ce%20que%20l%92on%20a%20pu%20voir%2Fentendre%20sur%20les%20hackers%2C%20c%92est%20de%20loin%20le%20meilleur%20reportage%20que%20j%92ai%20pu%20voir.%20Je%20vous%20conseille%20vivement%20de%20le%20regarder%2C%20car%20je%20suis%20sur%20qu%92il%20vous%20apprendra%20des%20choses%20%21%26nbsp%3B%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3EEt%2C%20qui%20sait%2C%20peut%20%EAtre%20qu%92il%20pourrait%20faire%20na%EEtre%20en%20vous%20la%20curiosit%E9%20de%20ces%20hackeurs%85%26nbsp%3B%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3ELe%20r%E9alisateur%20se%20place%20au%20c%9Cur%20des%20pr%E9occupations%20de%20cette%20g%E9n%E9ration%20Y%2C%20dont%20il%20analyse%20les%20modes%20de%0D%0Acommunication%20en%20r%E9seau%2C%20de%20consommation%20de%20biens%20culturels%20et%20de%20leur%20partage.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3ESource%20%3A%26nbsp%3B%3Ca%20href%3D%22http%3A%2F%2Fwww.begeek.fr%2Freportage-piratage-par-france-4-33607%23ixzz1SZpMAWGd%22%20target%3D%22_blank%22%3EBeGeek%3C%2Fa%3E%0D%0A%28%3Cimg%20border%3D%220%22%20src%3D%22IMAGES%2FNouvelle%2520Fenetre%252025x25.jpg%22%20align%3D%22absmiddle%22%20width%3D%2225%22%20height%3D%2225%22%3E%29.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3ECette%20vid%E9o%20n%27a%20pas%20encore%20%E9t%E9%20%E9valu%E9e%2C%20mais%20s%27annonce%20d%E9j%E0%20comme%20tr%E8s%20int%E9ressante.%3C%2Fp%3E
Évaluée
|
• |
Ordinateurs, informatique, et hacking : "Piratage" dans la catégorie "Médias, Multimédia, Informatique, et Réseaux" |
%3Cp%20align%3D%22justify%22%3ECette%20vid%E9o%20est%26nbsp%3Bune%20enqu%EAte%20de%20Stanislans%20Kraland%20sur%0D%0Ales%20hackers%2C%20suivie%20d%27un%20d%E9bat.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%3Cb%3E%3Cu%3E%3Cfont%20size%3D%225%22%3ESynopsis%20%3A%3C%2Ffont%3E%3C%2Fu%3E%3C%2Fb%3E%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3EQue%20serait%20Internet%20sans%20eux%20%3F%20Une%20immersion%20instructive%20dans%20la%20vaste%20communaut%E9%20des%0D%0Ahackers.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3ED%27un%20c%F4t%E9%2C%20il%20y%20a%20les%20%22black%20hats%22%20%28chapeaux%20noirs%29%2C%20les%20d%E9linquants%20virtuels%20mus%20par%20l%27app%E2t%20du%20gain%20%3B%20de%20l%27autre%2C%20les%20%22white%20hats%22%20%28chapeaux%20blancs%29%20ou%20pirates%20bienveillants.%0D%0ALes%20hackers%20forment%20une%20vaste%20communaut%E9%20aux%20profils%20diversifi%E9s.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3ECapables%20de%20modifier%20la%20une%20d%27un%20journal%20sur%20le%20Net%20ou%20de%20pi%E9ger%20le%20ministre%20de%20l%27Int%E9rieur%2C%20ils%20sont%20aussi%20les%20seuls%20%E0%20savoir%20prot%E9ger%20les%20entreprises%20des%20menaces%0D%0Ainformatiques.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3EInventeurs%20des%20logiciels%20libres%20-%20permettant%20d%27%E9chapper%20%E0%20la%20toute-puissance%20de%20Bill%20Gates%20ou%20de%20Steve%20Jobs%20-%2C%20ils%20sont%20aussi%2C%20gr%E2ce%20%E0%20l%27exploration%20des%20failles%20informatiques%2C%20%E0%20l%27origine%20de%20la%0D%0As%E9curisation%20des%20achats%20en%20ligne.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3EBeaucoup%20n%27ont%20qu%27un%20bac%20en%20poche%20mais%20les%20services%20secrets%20et%20les%20responsables%20politiques%20se%20disputent%20leurs%20faveurs...%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3E%C0%20contre-courant%20des%20id%E9es%20re%E7ues%2C%20ce%20film%20raconte%20la%0D%0Ag%E9n%E9ration%20hackers%2C%20entr%E9e%20dans%20l%27ar%E8ne%20politique%20et%20m%E9diatique%20%E0%20l%27occasion%20du%20d%E9bat%20sur%20Hadopi.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3ESource%20%3A%20%3Ca%20target%3D%22_blank%22%20href%3D%22http%3A%2F%2Fvideos.arte.tv%2Ffr%2Fvideos%2Fhackers_ni_dieu_ni_maitre-3945076.html%22%3EArte%3C%2Fa%3E%26nbsp%3B%20%28%3Cimg%20border%3D%220%22%20src%3D%22IMAGES%2FNouvelle%2520Fenetre%252025x25.jpg%22%20align%3D%22absmiddle%22%20width%3D%2225%22%20height%3D%2225%22%3E%29.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%3Cb%3E%3Cu%3E%3Cfont%20size%3D%225%22%3ELe%20d%E9bat%20%3A%3C%2Ffont%3E%3C%2Fu%3E%3C%2Fb%3E%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3EDaniel%20Leconte%20et%20ses%20invit%E9s%20reviennent%20sur%20la%20question%20de%20la%20s%E9curit%E9%20informatique%20dans%20le%20cyberespace.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%20style%3D%22margin-left%3A%2020%22%3ELes%20invit%E9s%20%3A%3C%2Fp%3E%0D%0A%3Cul%3E%0D%0A%20%20%3Cli%3E%0D%0A%20%20%20%20%C9ric%20Filiol%2C%20Expert%20en%20s%E9curit%E9%20informatique%2C%3C%2Fli%3E%0D%0A%20%20%3Cli%3E%0D%0A%20%20%20%20Sandro%20Gaycken%2C%20Philosophe%20technique%20et%20chercheur%20de%20s%E9curit%E9%20%E0%20la%20Freie%20Universit%E4t%20Berlin.%3C%2Fli%3E%0D%0A%3C%2Ful%3E%0D%0A%3Cp%20align%3D%22justify%22%3ECette%20vid%E9o%20n%27a%20pas%20encore%20%E9t%E9%20%E9valu%E9e.%3C%2Fp%3E
Évaluée
|
• |
Ordinateurs, informatique, Internet, et sécurité : "Hackers : ni dieu, ni maître" dans la catégorie "Médias, Multimédia, Informatique, et Réseaux" |
%3Cp%20align%3D%22justify%22%3ECette%20vid%E9o%20est%20l%27extrait%20d%27un%20documentaire%20sur%20la%20biom%E9trie%2C%20o%F9%20des%20hakers%20allemands%20d%E9voilent%20comment%20tromper%20avec%20succ%E8s%20les%20scanners%20d%27empreintes%20digitales.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3ER%E9sultat%20%3A%20les%20proc%E9dures%20biom%E9triques%20d%92identification%20par%20lecture%20d%27empreinte%20digitale%20ne%20valent%20pas%20un%20kopeck%20du%20point%20de%20vue%20de%20la%20s%E9curit%E9.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%C0%20voir%20%21%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22justify%22%3E%3Cb%3ENota%20Bene%20%3A%20pour%20un%20meilleur%20confort%20auditif%2C%20j%27ai%20rehauss%E9%20le%20son%20de%20cette%20vid%E9o%20de%207%20dB.%3C%2Fb%3E%3C%2Fp%3E
|
• |
Des hackers allemands sont parvenus à falsifier la procédure biométrique d'identification par empreinte digitale dans la catégorie "Biométrie, Implants, Puces RFID, Transhumanisme, et Cyborgs" |
%3Cp%3ECette%20vid%E9o%20est%20un%20extrait%20d%27un%20documentaire%20fran%E7ais%20o%F9%20un%20hacker%20fait%20la%0D%0Ad%E9monstration%20qu%27%E0%20partir%20du%20moment%20o%F9%20vous%20payez%20en%20ligne%20avec%20votre%20carte%0D%0Abancaire%2C%20t%F4t%20ou%20tard%2C%20votre%20num%E9ro%20de%20carte%2C%20sa%20date%20d%27expiration%2C%20et%20m%EAme%0D%0Aparfois%20son%20code%20de%20s%E9curit%E9%20de%203%20chiffres%2C%20seront%20hack%E9s%20sur%20le%20serveur%20o%F9%0D%0Avous%20avez%20fait%20un%20achat%2C%20pour%20finalement%20%EAtre%20soit%20directement%20utilis%E9s%20pour%0D%0Avous%20soutirer%20de%20l%27argent%20en%20se%20faisant%20passer%20pour%20vous%2C%20ou%20pour%20%EAtre%20revendus%0D%0A%E0%20des%20brigands%20n%27importe%20o%F9%20dans%20le%20monde%20avec%20le%20m%EAme%20dessein.%3C%2Fp%3E%0D%0A%3Cp%3EConclusion%20%3F%3C%2Fp%3E%0D%0A%3Cp%3E%3Cfont%20color%3D%22%23FF0000%22%3E%3Cb%3E%C9vitez%20au%20maximum%20de%20payer%20en%20ligne%20avec%20une%20carte%20bancaire%3C%2Fb%3E%3C%2Ffont%3E%2C%0D%0Aet%20pr%E9f%E9rez%20toujours%20de%20r%E9gler%20vos%20achats%20gr%E2ce%20%E0%20un%20service%20de%20type%20%3Ca%20href%3D%22https%3A%2F%2Fwww.paypal.com%22%20target%3D%22_blank%22%3EPayPal%3C%2Fa%3E%20%28%3Cimg%20border%3D%220%22%20src%3D%22IMAGES%2FNouvelle%2520Fenetre%252025x25.jpg%22%20align%3D%22absmiddle%22%20width%3D%2225%22%20height%3D%2225%22%3E%29%0D%0Aou%20autre.%3C%2Fp%3E
|
• |
Un hacker dévoile pourquoi et comment payer par carte bancaire sur Internet est dangereux dans la catégorie "Médias, Multimédia, Informatique, et Réseaux" |
Le%20commentaire%20de%20cette%20vid%E9o%20sera%20r%E9dig%E9%20prochainement.%0D%0A%3Cp%3E%3Cb%3ENota%20Bene%201%20%3A%20sur%20le%20m%EAme%20sujet%2C%20ne%20manquez%20surtout%20pas%20%3A%3C%2Fb%3E%3C%2Fp%3E%0D%0A%3Cul%3E%0D%0A%09%3Cli%3E%3Cb%3EL%27excellent%20documentaire%20%26quot%3B%3Cfont%20color%3D%22%23FF0000%22%3E%3Ci%3EHacking%20%0D%0A%09Democray%20%28le%20piratage%20de%20la%20d%E9mocratie%29%3C%2Fi%3E%3C%2Ffont%3E%26quot%3B%2C%20une%20vid%E9o%20%E9galement%20visible%20sur%20ce%20site%2C%0D%0A%09%3Ca%20target%3D%22_blank%22%20href%3D%22https%3A%2F%2Fwww.blueman.name%2FDes_Videos_Remarquables.php%3FNumVideo%3D410%22%3E%5Bici%5D%3C%2Fa%3E.%3C%2Fb%3E%3C%2Fli%3E%0D%0A%09%3Cli%3E%3Cb%3E%26quot%3B%3Cfont%20color%3D%22%23FF0000%22%3E%3Ci%3EVote%20%E9lectronique%20-%20la%20preuve%20en%20%0D%0A%09image%20qu%27il%20est%20possible%20de%20trafiquer%20les%20r%E9sultats%20des%20machines%20%E0%20voter%3C%2Fi%3E%3C%2Ffont%3E%26quot%3B%2C%0D%0Aun%20ensemble%20de%20vid%E9os%20%E9galement%20visible%20sur%20ce%20site%2C%20%0D%0A%09%3Ca%20href%3D%22https%3A%2F%2Fwww.blueman.name%2FDes_Videos_Remarquables.php%3FNumVideo%3D3931%22%3E%5Bici%5D%3C%2Fa%3E.%3C%2Fb%3E%3C%2Fli%3E%0D%0A%3Cli%3E%3Cb%3E%26quot%3B%3Cfont%20color%3D%22%23FF0000%22%3E%3Ci%3E%C9tats-Unis%20%3A%20la%20g%E9n%E9ralisation%20du%20vote%20%0D%0A%09%E9lectronique%20%E0%20introduit%20le%20trucage%20des%20%E9lections%20et%20initi%E9%20la%20d%E9liquescence%20%0D%0A%09de%20la%20d%E9mocratie%20au%20profit%20d%27une%20smart%20dictature%3C%2Fi%3E%3C%2Ffont%3E%26quot%3B%2C%20une%20vid%E9o%20%0D%0A%09%E9galement%20visible%20sur%20ce%20site%2C%0D%0A%09%3Ca%20href%3D%22https%3A%2F%2Fwww.blueman.name%2FDes_Videos_Remarquables.php%3FNumVideo%3D4325%22%3E%5Bici%5D%3C%2Fa%3E.%3C%2Fb%3E%3C%2Fli%3E%0D%0A%3C%2Ful%3E%0D%0A%3Cb%3ENota%20Bene%202%20%3A%20si%20vous%20vous%20sentez%20concern%E9%20par%20le%20sujet%2C%20allez%20vite%20signer%20la%20p%E9tition%20en%20ligne%0D%0Acontre%20l%27implantation%20de%20machines%20%E0%20voter%20en%20France%2C%20%3Ca%20class%3D%22thumbnailAlignedPage%22%20href%3D%22https%3A%2F%2Fwww.blueman.name%2FPetitions.php%22%20target%3D%22_blank%22%3E%5Bici%5D%3Cspan%20id%3D%22MACHINES_A_VOTER_PETITIONS%22%3E%3C%2Fspan%3E%3C%2Fa%3E%0D%0A%3Cscript%20language%3D%22javascript%22%3E%0D%0ACreateLinkWithPopUpImage%28%22MACHINES_A_VOTER_PETITIONS%22%2C%20%22https%3A%2F%2Fwww.blueman.name%2FPetitions.php%22%2C%20%22%22%29%3B%20%20%0D%0A%3C%2Fscript%3E%20%28%3Cimg%20border%3D%220%22%20src%3D%22IMAGES%2FNouvelle%2520Fenetre%252034x34.jpg%22%20align%3D%22absmiddle%22%20width%3D%2234%22%20height%3D%2234%22%3E%29.%3C%2Fb%3E
|
• |
Les machines à voter sont sujettes au hacking, à la fraude, et sont un cauchemar pour les séniors dans la catégorie "Politique, Démocratie, Libertés, et Altermondialisme" |
Cette%20vid%E9o%20est%20un%20court%20expos%E9%2C%20produit%20par%20l%27excellent%20site%20amateur%0D%0Ad%27informations%20%E9conomiques%20%3Ca%20href%3D%22http%3A%2F%2Fwarrantmarrant.blog.capital.fr%2F%22%20target%3D%22_blank%22%3EWarrant%0D%0AMarrant%3C%2Fa%3E%20%28%3Cimg%20border%3D%220%22%20src%3D%22IMAGES%2FNouvelle%2520Fenetre%252025x25.jpg%22%20align%3D%22absmiddle%22%20width%3D%2225%22%20height%3D%2225%22%3E%29.%0D%0A%3Cp%3EToujours%20pr%E9sent%E9s%20avec%20un%20peu%20d%27humour%20et%20de%20panache%2C%20les%20clips%20de%20ce%20site%0D%0An%27en%20demeurent%20pas%20moins%20s%E9rieux%2C%20car%20ils%20pr%E9sentent%20des%20informations%0D%0Apertinentes%20et%20v%E9ridiques.%3C%2Fp%3E%0D%0A%3Cp%3EL%27int%E9r%EAt%20majeur%20de%20ces%20vid%E9os%2C%20c%27est%20d%27expliquer%20de%20fa%E7on%20claire%2C%20et%20de%0D%0Ad%E9noncer%2C%20les%20diverses%20m%E9thodes%20et%20man%9Cuvres%20op%E9r%E9es%20par%20les%20traders%2C%20les%0D%0Abanques%2C%20et%20Wall%20Street%20en%20g%E9n%E9ral.%3C%2Fp%3E%0D%0A%3Cp%3ECes%20clips%20vous%20apporteront%20la%20preuve%20d%E9finitive%20que%20%3Cfont%20color%3D%22%23FF0000%22%3E%3Cb%3Ele%0D%0Amonde%20financier%20est%20%3Cu%3E%20%3Cfont%20face%3D%22Arial%22%20size%3D%224%22%20color%3D%22%23FF0000%22%3E%3Cspan%20style%3D%22text-transform%3A%20uppercase%22%3Ehautement%0D%0Anuisible%3C%2Fspan%3E%3C%2Ffont%3E%3C%2Fu%3E%20au%20genre%20humain%2C%20et%20vit%20aux%20crochets%20de%20la%20soci%E9t%E9%0D%0Aen%20la%20vampirisant%3C%2Fb%3E%3C%2Ffont%3E.%3Cbr%3E%0D%0ACes%20gens%20%3Cfont%20color%3D%22%23FF0000%22%3E%3Cb%3E%3Cu%3Ene%20cr%E9ent%20rien%3C%2Fu%3E%3C%2Fb%3E%3C%2Ffont%3E%20%3B%20ils%20ne%0D%0Asont%20l%E0%20que%20pour%20%3Cfont%20color%3D%22%23FF0000%22%3E%3Cb%3Ese%20g%E9n%E9rer%20du%20profit%3C%2Fb%3E%3C%2Ffont%3E%2C%20%3Cb%3Esans%0D%0Aapporter%20%E0%20la%20soci%E9t%E9%20un%20quelconque%20produit%20ou%20service%3C%2Fb%3E.%3Cbr%3E%0D%0ASeule%20la%20plus%20value%20rapide%2C%20et%20sans%20rien%20faire%2C%20les%20int%E9resse%2C%20m%EAme%20si%20pour%0D%0Acela%20des%20nations%20enti%E8res%20et%20des%20%E9tats%20doivent%20vivre%20dans%20la%20mis%E8re%2C%20ou%20se%0D%0Aserrer%20la%20ceinture%20contin%FBment%20de%20g%E9n%E9ration%20en%20g%E9n%E9ration.%3C%2Fp%3E%0D%0A%3Cp%3ELes%20vampires%20de%20Wall%20Street%20disent%20que%20%26quot%3B%3Ci%3El%27%E9conomie%20r%E9elle%20ne%20les%0D%0Aint%E9resse%20pas%3C%2Fi%3E%26quot%3B%20%28c%27est%20une%20citation%20authentique%20d%27un%20banquier%20que%20j%27ai%0D%0Aentendue%20%E0%20la%20radio%29%2C%20mais%20on%20voit%20bien%20ici%20qu%27ils%20sont%20des%20fourbes%20et%20des%0D%0Ahypocrites%20car%2C%20quand%20vient%20le%20moment%20de%20manger%20dans%20un%20grand%20restaurant%2C%20de%20se%0D%0Apayer%20une%20Rolls-Royce%20ou%20une%20Ferrari%2C%20de%20s%27offrir%20une%20luxueuse%20villa%20avec%20jardin%0D%0Aet%20piscine%20sur%20la%20C%F4te%20d%27Azur%2C%20le%20monde%20r%E9el%20tout%20%E0%20coup%20les%20int%E9resse%20alors%0D%0Atr%E8s%20fortement...%3Cbr%3E%0D%0A%3Cbr%3E%0D%0AEt%20ce%20n%27est%20pas%20tout%20%3A%20l%27argent-bulle%20sans%20valeur%2C%20qu%27ils%20cr%E9ent%20sans%20vergogne%2C%0D%0Ane%20prend%20une%20valeur%20dans%20le%20monde%20r%E9el%20qu%27%E0%20cause%20des%20milliards%20de%20personnes%0D%0Aqui%20travaillent%20chaque%20jour%20%E0%20la%20sueur%20de%20leur%20front%2C%20et%20qui%20eux%20inventent%2C%20cr%E9ent%2C%0D%0Aet%20produisent%2C%20des%20objets%20ou%20des%20services%20bien%20%3Cb%3E%3Cu%3Er%E9els%3C%2Fu%3E%3C%2Fb%3E%2C%20%E0%20partir%0D%0Ade%20surcro%EEt%20de%20ressources%20terrestres%20bien%20%3Cb%3E%3Cu%3Er%E9elles%3C%2Fu%3E%3C%2Fb%3E.%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22center%22%3E%3Cfont%20color%3D%22%23FF0000%22%20size%3D%226%22%3E%3Cspan%20style%3D%22background-color%3A%20%23FFFF00%22%3E%3Cb%3E%26nbsp%3BLa%0D%0Asph%E8re%20financi%E8re%20de%20Wall%20Street%20et%20autres%20places%20financi%E8res%2C%26nbsp%3B%3Cbr%3E%0D%0A%26nbsp%3Bdes%20Banques%2C%20des%20soci%E9t%E9s%20de%20bourses%2C%20des%20fonds%20de%20placements%2C%3Cbr%3E%0D%0A%26nbsp%3Bdes%0D%0Atraders%2C%20et%20des%20produits%20d%E9riv%E9s%20de%20toutes%20sortes%2C%20etc.%2C%26nbsp%3B%3Cbr%3E%0D%0A%26nbsp%3Best%20l%27un%20des%20probl%E8mes%20syst%E9miques%20les%20plus%20graves%20de%20nos%0D%0Asoci%E9t%E9s.%26nbsp%3B%3C%2Fb%3E%3C%2Fspan%3E%3C%2Ffont%3E%3C%2Fp%3E%0D%0A%3Cp%20align%3D%22center%22%3E%3Cfont%20color%3D%22%23FF0000%22%20size%3D%226%22%3E%3Cspan%20style%3D%22background-color%3A%20%23FFFF00%22%3E%3Cb%3E%26nbsp%3BSans%0D%0Ala%20disparition%20de%20cette%20sph%E8re%20naus%E9abonde%2C%20hautement%20pr%E9judiciable%2C%20de%0D%0Avampires%20sans%20scrupules%2C%26nbsp%3B%3Cbr%3E%0D%0A%26nbsp%3Bil%20ne%20sera%20%3Cu%3EJAMAIS%3C%2Fu%3E%20possible%20de%20construire%20un%20monde%20libre%2C%0D%0Ad%E9mocratique%20et%20heureux%2C%3Cbr%3E%0D%0A%26nbsp%3Bo%F9%20chacun%20puisse%20vivre%20d%E9cemment.%26nbsp%3B%3C%2Fb%3E%3C%2Fspan%3E%3C%2Ffont%3E%3C%2Fp%3E%0D%0A%3Cp%3EUne%20courte%20vid%E9o%20%E0%20voir%20pour%20prendre%20conscience%20de%20la%20perversit%E9%20et%20de%0D%0Al%27ignominie%20du%20monde%20financier%20inhumain%20parasitaire.%3C%2Fp%3E%0D%0A%3Cp%3E%3Cb%3ENota%20Bene%20%3A%20pour%20afficher%20la%20liste%20de%20toutes%20les%20vid%E9os%20de%20la%20s%E9rie%20%26quot%3B%3Cfont%20color%3D%22%23FF0000%22%3E%3Ci%3EWarrant%20%0D%0AMarrant%3C%2Fi%3E%3C%2Ffont%3E%26quot%3B%20disponibles%20sur%20ce%20site%2C%20cliquez%0D%0A%3Ca%20href%3D%22https%3A%2F%2Fwww.blueman.name%2FDes_Videos_Remarquables.php%3FCom%3DWarrant%26mode%3Dliste%22%3E%5Bici%5D%3C%2Fa%3E.%3C%2Fb%3E%3C%2Fp%3E
|
• |
Les hackers traders dans la catégorie "Argent, Banques, États, et Organisations mondiales" |
Cette%20vid%E9o%20est%20un%20film%20documentaire%20r%E9alis%E9%20par%20le%20%22%3Ci%3ENational%20Geographic%3C%2Fi%3E%22%20sur%20les%20hackers%2C%20ces%20pirates%20de%20l%27informatique%20qui%20peuvent%20p%E9n%E9trer%20dans%20n%27importe%20quel%20syst%E8me.%3Cbr%3E%3Cbr%3ECette%20vid%E9o%20n%27a%20pas%20encore%20%E9t%E9%20%E9valu%E9e.
Évaluée
|
• |
"Les hackers" dans la catégorie "Médias, Multimédia, Informatique, et Réseaux" |
%3Cimg%20border%3D%221%22%20src%3D%22IMAGES%2FHacking-Democracy%2520-%2520400x554.jpg%22%20align%3D%22left%22%20hspace%3D%2220%22%20vspace%3D%225%22%20width%3D%22400%22%20height%3D%22554%22%3ECette%20vid%E9o%20est%20une%20enqu%EAte%20produite%20par%20%26quot%3B%3Ci%3EHBO%3C%2Fi%3E%26quot%3B%2C%0D%0Asur%20le%20syst%E8me%20de%20comptage%20des%20votes%20aux%20%C9tats-Unis%2C%20et%20dont%20le%20titre%20en%0D%0Afran%E7ais%20serait%20%26quot%3B%3Ci%3ELe%20piratage%20de%20la%20D%E9mocratie%3C%2Fi%3E%26quot%3B.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0AUn%20petit%20groupe%20de%20citoyens%20part%20en%20qu%EAte%20d%27une%20r%E9ponse%20claire%20%E0%20une%20simple%0D%0Aquestion%20%3A%20comment%20les%20votes%20sont-ils%20comptabilis%E9s%20%3F%3Cbr%3E%0D%0A%3Cbr%3E%0D%0A%26quot%3B%3Ci%3ECe%20n%27est%20que%20lorsque%20les%20gens%20d%E9couvriront%20ce%20qui%20se%20passe%20vraiment%0D%0Aqu%27il%20deviendra%20impossible%20que%20les%20choses%20continuent%20ainsi%3C%2Fi%3E%26quot%3B%20affirme%0D%0ABev%20Harris%2C%20la%20fondatrice%20de%20l%27organisation%20%26quot%3B%3Ci%3EBlack%20Box%20Voting%3C%2Fi%3E%26quot%3B%2C%20une%20association%0D%0A%E0%20but%20non%20lucratif%20d%E9di%E9e%20%E0%20la%20protection%20des%20%E9lecteurs%20%28%3Ca%20class%3D%22thumbnailAlignedPage%22%20href%3D%22http%3A%2F%2Fwww.blackboxvoting.org%2F%22%20target%3D%22_blank%22%3Ehttp%3A%2F%2Fwww.blackboxvoting.org%2F%3Cspan%20id%3D%22BLACK_BOX_VOTING_ORG%22%3E%3C%2Fspan%3E%3C%2Fa%3E%0D%0A%3Cscript%20language%3D%22javascript%22%3E%0D%0ACreateLinkWithPopUpImage%28%22BLACK_BOX_VOTING_ORG%22%2C%20%22http%3A%2F%2Fwww.blackboxvoting.org%2F%22%2C%20%22%22%29%3B%20%20%0D%0A%3C%2Fscript%3E%20%28%3Cimg%20border%3D%220%22%20src%3D%22IMAGES%2FNouvelle%2520Fenetre%252034x34.jpg%22%20align%3D%22absmiddle%22%20width%3D%2234%22%20height%3D%2234%22%3E%29%29.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0ALe%20point%20de%20d%E9part%20de%20cette%20enqu%EAte%20est%20l%27%E9lection%20pr%E9sidentielle%20de%202000%2C%0D%0Ao%F9%20Georges%20W.%20Bush%20fut%20oppos%E9%20%E0%20Al%20Gore.%20Le%20point%20d%E9cisif%20de%20cette%0D%0A%E9lection%20eu%20lieu%20dans%20l%27%C9tat%20de%20Floride%2C%20o%F9%20une%20bataille%20m%E9morable%20%E9clata%0D%0Aautour%20du%20nombre%20de%20voix%20attribu%E9es%20%E0%20l%27un%20ou%20%E0%20l%27autre%2C%20et%20les%20divers%0D%0Arecomptages%20et%20proc%E9dures%20judiciaires%20ayant%20eu%20lieu%20%E0%20cette%20occasion.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0ALe%20syst%E8me%20des%20machines%20%E0%20voter%20est%20en%20cause%20%3A%20on%20peut%20truquer%20les%20r%E9sultats%2C%0D%0Aet%20certains%20le%20savent...%3Cbr%3E%0D%0A%3Cbr%3E%0D%0AUn%20cas%20typique%20et%20effarant%20est%20celui%20d%27une%20candidate%20qui%20est%20all%E9e%20tester%20des%0D%0Amachines%20%E0%20voter.%20Elle%20appuie%20sur%20la%20zone%20de%20l%27%E9cran%20o%F9%20son%20nom%20figure%2C%20et...%0D%0Al%27afficheur%20lui%20indique%20le%20nom%20de%20son%20adversaire%20%21%20Elle%20essaye%20sur%20une%20vingtaine%0D%0Ad%27autres%20machines%20%3A%20m%EAme%20r%E9sultat.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0AQuand%20on%20sait%20que%20depuis%202002%2C%20il%20est%20interdit%20d%27ouvrir%20une%20machine%20%E0%20voter%20et%0D%0Ad%27inspecter%20son%20logiciel%20de%20comptage%2C%20on%20ne%20peut%20%EAtre%20qu%27inquiet%20pour%20l%27avenir%0D%0Ade%20la%20d%E9mocratie%20aux%20%C9tats-Unis%20qui%2C%20il%20faut%20le%20reconna%EEtre%2C%20sont%20en%20train%20de%0D%0Ad%E9g%E9n%E9rer%20%E0%20toute%20vitesse%20et%20perdre%20toutes%20les%20valeurs%20et%20principes%20essentiels%20qui%0D%0Aont%20permis%20son%20ascension%20et%20son%20accession%20au%20titre%20de%20pays%20le%20plus%20puissant%20du%0D%0Amonde.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0AEt%20vous%20savez%20quoi%20%3F%20Les%20gens%20de%20la%20%26quot%3B%3Ci%3EBlack%20Box%20Voting%3C%2Fi%3E%26quot%3B%20ont%20d%E9couvert%0D%0Ade%20terribles%20secrets%2C%20et%20m%EAme%20des%20bulletins%20de%20votes%20sens%E9s%20%EAtre%20conserv%E9s%0D%0Apendant%2022%20mois%2C%20en%20fouillant%20les%20poubelles%20des%20compagnies%20qui%20fabriquent%20les%0D%0Amachines%20%E0%20voter%2C%20et%20dans%20celles%20des%20villes%20qui%20utilisent%20ces%20machines...%3Cbr%3E%0D%0A%3Cbr%3E%0D%0AOutre%20le%20fait%20que%20le%20march%E9%20de%20ces%20machines%20est%20colossal%20au%20%C9tats-Unis%2C%20et%20que%0D%0A3%20soci%E9t%E9s%20se%20partagent%20le%20march%E9%20%28Diebold%2C%20Sequoia%20et%20ESS%2C%20avec%20les%20deux%0D%0Apremi%E8res%20ayant%2080%25%20des%20parts%20de%20march%E9%29%2C%20il%20est%20clair%20que%20le%20r%E9sultat%20des%0D%0Avotes%20d%E9pend%20de%20soci%E9t%E9s%20priv%E9es%20hautement%20lucratives%2C%20et%20que%20la%20logique%20des%0D%0Ar%E9seaux%20d%27influence%20permet%20%E0%20certains%20de%20passer%20leurs%20ordres%20%E0%20ces%20compagnies%0D%0Av%E9reuses%2C%20en%20%E9change%2C%26nbsp%3B%20bien%20s%FBr%2C%20de%20quelques%20esp%E8ces%20sonnantes%20et%0D%0Atr%E9buchantes...%3Cbr%3E%0D%0A%3Cbr%3E%0D%0AMais%20pire%20%3A%20il%20s%27av%E8re%20que%20m%EAme%20les%20employ%E9s%20du%20service%20des%20%E9lections%20de%0D%0Acertaines%20villes%20trichent%2C%20%E9cartent%20des%20lots%20de%20bulletins%2C%20regroupent%20des%0D%0Acartes%20perfor%E9es%2C%20etc.%2C%20emp%EAchant%20par%20l%E0-m%EAme%20tout%20recomptage%20des%20votes.%20La%0D%0Afraude%20et%20la%20manipulation%20sont%20clairement%20organis%E9s%2C%20et%20ce%20qui%20est%20triste%2C%0D%0Ac%27est%20de%20voir%20ces%20gens%20sans%20aucune%20conscience%2C%20sans%20aucune%20%E9thique%20personnelle%2C%0D%0Aaffirmer%20devant%20les%20cam%E9ras%20que%20%26quot%3B%3Ci%3Etout%20va%20bien%3C%2Fi%3E%26quot%3B%2C%20que%20%26quot%3B%3Ci%3Etout%20se%20d%E9roule%0D%0Anormalement%3C%2Fi%3E%26quot%3B%2C%20que%20%26quot%3B%3Ci%3Etout%20est%20parfait%3C%2Fi%3E%26quot%3B.%20Le%20simple%20citoyen%0D%0Ad%E9g%E9n%E8re%2C%20et%20par%20l%E0%20m%EAme%2C%20l%27humanit%E9%20toute%20enti%E8re%20d%E9g%E9n%E8re.%3Cbr%3E%0D%0A%3Cbr%3E%0D%0A%3Ccenter%3E%3Cb%3E%3Cfont%20color%3D%22%23FF0000%22%20size%3D%226%22%3E%3Cspan%20style%3D%22background-color%3A%20%23FFFF00%22%3E%26nbsp%3BTout%20syst%E8me%2C%0D%0Aqu%27il%20soit%20%E9tatique%2C%20social%2C%20organisationnel%2C%20etc%3Cfont%20color%3D%22%23FF0000%22%20face%3D%22arial%22%20size%3D%225%22%3E%3Cspan%20style%3D%22background-color%3A%20%23FFFFCC%22%3E%3Cb%3E%20%5B...%5D%3C%2Fb%3E%3C%2Fspan%3E%3C%2Ffont%3E
Top
|
• |
Machines à voter et fraudes : "Hacking Democracy (Le piratage de la démocratie)" dans la catégorie "Politique, Démocratie, Libertés, et Altermondialisme" |
Gary%20McKinnon%20%28pseudo%20%3A%20Solo%29%20est%20un%20hacker%20britanique%20accus%E9%20par%20les%20%C9tats-Unis%20d%27avoir%20r%E9alis%E9%20le%20plus%20grand%20piratage%20militaire%20de%20tous%20les%20temps.%3Cbr%3E%3Cbr%3EAdministrateur%20syst%E8me%20de%20m%E9tier%2C%20il%20est%20accus%E9%20d%27avoir%20r%E9ussi%20%E0%20infiltrer%2C%20p%E9n%E9trer%20et%20visiter%20%E0%20de%20nombreuses%20reprises%20%28et%20cela%20durant%20un%20peu%20plus%20de%20deux%20ans%20en%202001%20et%202002%29%2097%20ordinateurs%20appartenant%20%E0%20l%27arm%E9e%20am%E9ricaine.%20Il%20aurait%20%E9galement%20r%E9ussi%20%E0%20p%E9n%E9trer%20de%20nombreux%20r%E9seaux%20tr%E8s%20sensibles%20am%E9ricains%20comme%20celui%20de%20la%20NASA%2C%20de%20l%27arm%E9e%2C%20de%20la%20marine%2C%20du%20minist%E8re%20de%20la%20d%E9fense%20ainsi%20que%20celui%20du%20Pentagone.%3Cbr%3E%3Cbr%3EGary%20McKinnon%20explique%20qu%27il%20cherchait%20simplement%20%E0%20prouver%20l%27existence%20r%E9elle%20des%20ovnis%20et%20affirme%20que%20les%20Am%E9ricains%20ont%20r%E9ussi%20%E0%20se%20procurer%20une%20technologie%20extra-terrestre%20concernant%20l%27antigravit%E9.%3Cbr%3E%3Cbr%3EUn%20t%E9moignage%20direct%20%E9tonnant%20m%EAme%20si%20les%20voix%20pour%20le%20doublage%20en%20francais%20sont%20d%27orgine%20synth%E9tique...%3Cbr%3E%3Cbr%3E%3Cb%3ENota%20Bene%201%20%3A%20une%20deuxi%E8me%20vid%E9o%2C%20contenant%20des%20informations%20compl%E9mentaires%20sur%20cette%20affaire%2C%20%E0%20%E9t%E9%20ajout%E9e%20%E0%20la%20suite.%3C%2Fb%3E%3Cp%3E%3Cb%3ENota%20Bene%202%20%3A%20dans%20le%20m%EAme%20genre%2C%20voyez%20%26quot%3B%3Cfont%20color%3D%22%23FF0000%22%3E%3Ci%3EPirater%20%0D%0Ale%20Pentagone%2C%20un%20interview%20du%20hacker%20Gary%20McKinnon%3C%2Fi%3E%3C%2Ffont%3E%26quot%3B%2C%20une%20vid%E9o%20%E9galement%20visible%20sur%20ce%20site%2C%0D%0A%3Ca%20href%3D%22https%3A%2F%2Fwww.blueman.name%2FDes_Videos_Remarquables.php%3FNumVideo%3D4072%22%3E%5Bici%5D%3C%2Fa%3E.%3C%2Fb%3E%3C%2Fp%3E
|
• |
Gary McKinnon : le hacker qui voulait connaître les secrets gouvernementaux sur les OVNIS dans la catégorie "OVNIS, PAN, et Extraterrestres" |