{"id":75029,"date":"2013-06-07T09:21:48","date_gmt":"2013-06-07T09:21:48","guid":{"rendered":"https:\/\/new.dedefensa.org\/index.php\/2013\/06\/07\/big-brother-est-enormous-et-encore-plus-bete-que-ca\/"},"modified":"2013-06-07T09:21:48","modified_gmt":"2013-06-07T09:21:48","slug":"big-brother-est-enormous-et-encore-plus-bete-que-ca","status":"publish","type":"post","link":"https:\/\/new.dedefensa.org\/index.php\/2013\/06\/07\/big-brother-est-enormous-et-encore-plus-bete-que-ca\/","title":{"rendered":"<em>Big Brother<\/em> est <em>enormous<\/em>, et encore plus b\u00eate que \u00e7a&#8230;"},"content":{"rendered":"<p><h3 class=\"titrebloc\"><em>Big Brother<\/em> est <em>enormous<\/em>, et encore plus b\u00eate que \u00e7a&#8230; <\/h3>\n<\/p>\n<p><p>\tLa surprise est certainement consid\u00e9rable dans les milieux tr\u00e8s, tr\u00e8s bien inform\u00e9s. La NSA, l&rsquo;agence nationale de s\u00e9curit\u00e9 des USA (\u00e9coutes \u00e9lectroniques, t\u00e9l\u00e9phoniques, etc., en tous genres et au meilleur prix), a un acc\u00e8s direct dans toutes les bases de donn\u00e9es des grands op\u00e9rateurs d&rsquo;internet (Google, Facebook, Apple, etc.). Elle espionne et lit dans l&rsquo;internet comme si la chose lui appartenait. Il s&rsquo;agit de PRISM, nom du programme en cours sans doute depuis depuis 2006-2007. C&rsquo;est le <em>Guardian<\/em> qui en a fait la r\u00e9v\u00e9lation principale, avec un suivi du Washington <em>Post<\/em>. Le site <em>WSWS.org<\/em> nous instruit minutieusement, comme \u00e0 son  habitude, des circonstances de l&rsquo;affaire, vues de l&rsquo;ext\u00e9rieur, ce <a href=\"http:\/\/www.wsws.org\/en\/articles\/2013\/06\/07\/phon-j07.html\" class=\"gen\">7 juin 2013<\/a>.<\/p>\n<\/p>\n<p><p>\t\u00ab<em>The Obama administration is engaged in a secret and illegal dragnet to accumulate detailed phone records of tens and perhaps hundreds of millions of US residents in a program organized by the National Security Agency (NSA).<\/em><\/p>\n<\/p>\n<p><p>\t\u00bb<em>On Wednesday, the British Guardian newspaper published a secret court order, issued by the Foreign Intelligence Surveillance Court, instructing a branch of the telecommunications giant Verizon to turn over, on an ongoing and daily basis, all metadata relating to the calls of all of its customers. Verizon has some 121 million customers, and the branch specifically targetedVerizon Business Serviceshas 10 million lines. The metadata of phone calls includes the phone numbers of the caller and the recipient, location data (such as the nearest cell phone tower or GPS data), and the time and duration of the call. This information would allow the government to construct a detailed picture of the social, professional and political connections and gain insight into the daily activities of everyone whose phone number was covered by the order.<\/em><\/p>\n<\/p>\n<p><p>\t\u00bb<em>The order published by the Guardian applies for three months, from its date of issue in April of this year through July 19. According to the Washington Post, An expert in this aspect of the law said Wednesday night that the order appears to be a routine renewal of a similar order first issued by the same court in 2006. In defending the spying program, Democratic Senator Dianne Feinstein, the chairman of the Senate Intelligence Committee, made a similar statement, saying that the order is as far as I know&#8230; the exact three-month renewal of what has been the case for the past seven years.<\/em><\/p>\n<\/p>\n<p><p>\t\u00bb<em>The official rationalapparently developed in secret legal memoranda prepared by the Obama administrationis that the program is authorized under the business records section of the Patriot Act. That act, signed into law less than a month after the 9\/11 attacks, gives the government, with a rubber stamp from secret courts operating within the framework of the Foreign Intelligence Security Act (FISA), the power to require companies, libraries and other entities to turn over any tangible things (including books, records, papers, documents and other items) required for an investigation to protect against international terrorism.<\/em>\u00bb<\/p>\n<\/p>\n<p><p>\tLe <em>Guardian<\/em> d\u00e9taille donc, dans divers articles, diff\u00e9rents aspects de sa trouvaille consid\u00e9rable. Nous avons droit \u00e0 un dossier sur la redoutable NSA, le monstre impliqu\u00e9, qui collecte des millions de messages chaque jour, espionne des dizaines de millions de personnes, ou peut-\u00eatre des centaines de millions qui sait, etc., etc. (Voir le <em>Guardian<\/em> du <a href=\"http:\/\/www.guardian.co.uk\/world\/2013\/jun\/06\/national-security-agency-surveillance\" class=\"gen\">6 juin 2013<\/a>  : \u00ab<em>The very existence of National Security Agency (NSA) was not revealed for more than two decades after its establishment in 1952, and even now its structure and activities remain largely unknown. Hence its wry nickname: No Such Agency.<\/em>\u00bb) Il y a aussi une appr\u00e9ciation des diverses manifestations de col\u00e8re en apprenant ce dont tout le monde devait ou devrait tout de m\u00eame se douter, et une appr\u00e9ciation de la vertueuse d\u00e9fense du programme PRISM par l&rsquo;administration Obama sortant \u00e9videmment son arsenal \u00e9mouvant de la lutte contre la Terreur du terrorisme qui nous terrorise (ce <a href=\"http:\/\/www.guardian.co.uk\/world\/2013\/jun\/06\/obama-administration-nsa-verizon-records\" class=\"gen\">7 juin 2013<\/a>). Enfin, on en vient \u00e0 un des textes principaux, un long article que le journal britannique consacre aux documents qu&rsquo;il a obtenus, assaisonn\u00e9s de graphiques, de sch\u00e9mas, etc., puisqu&rsquo;il s&rsquo;agit d&rsquo;une production interne type-<em>PowerPoint<\/em> pour l&rsquo;\u00e9dification des agents impliqu\u00e9s ou int\u00e9ress\u00e9s, et o\u00f9 il y a notamment de nombreux d\u00e9tails sur l&rsquo;implication des g\u00e9ants d&rsquo;internet dans le programme PRISM&#8230; (Le <a href=\"ttp:\/\/www.guardian.co.uk\/world\/2013\/jun\/06\/us-tech-giants-nsa-data\" class=\"gen\">6 juin 2013<\/a>.)<\/p>\n<\/p>\n<p><p>\t\u00ab<em>The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian. The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.<\/em><\/p>\n<\/p>\n<p><p>\t\u00bb<em>The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation  classified as top secret with no distribution to foreign allies  which was apparently used to train intelligence operatives on the capabilities of the program. The document claims collection directly from the servers of major US service providers. Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.<\/em><\/p>\n<\/p>\n<p><p>\t\u00bb<em>In a statement, Google said: Google cares deeply about the security of our users&rsquo; data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government &lsquo;back door&rsquo; into our systems, but Google does not have a back door for the government to access private user data. Several senior tech executives insisted that they had no knowledge of PRISM or of any similar scheme. They said they would never have been involved in such a program. If they are doing this, they are doing it without our knowledge, one said. An Apple spokesman said it had never heard of PRISM.<\/em><\/p>\n<\/p>\n<p><p>\t\u00bb<em>The NSA access was enabled by changes to US surveillance law introduced under President Bush and renewed under Obama in December 2012. The program facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US. It also opens the possibility of communications made entirely within the US being collected without warrants.<\/em><\/p>\n<\/p>\n<p><p>\t\u00bb<em>Disclosure of the PRISM program follows a leak to the Guardian on Wednesday of a top-secret court order compelling telecoms provider Verizon to turn over the telephone records of millions of US customers. The participation of the internet companies in PRISM will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata.<\/em>\u00bb<\/p>\n<\/p>\n<p><p>\tIl y a, on s&rsquo;en doute, une foultitude d&rsquo;autres d\u00e9tails. La r\u00e9v\u00e9lation \u00e9tant \u00e0 mesure du gigantisme des programmes de la NSA, et de la NSA elle-m\u00eame, nous nagerons dans un oc\u00e9an de documents et de r\u00e9v\u00e9lations. Au reste, la grande \u00e9motion suscit\u00e9e par cette affaire nous para\u00eet, c&rsquo;est selon, surprenante, suspecte, convenue, na\u00efve, et de toutes les fa\u00e7ons extr\u00eamement r\u00e9v\u00e9latrice. Il est \u00e9vident que la NSA devait espionner internet, les fournisseurs d&rsquo;internet, comme elle espionne le reste depuis sa cr\u00e9ation en 1947 et \u00e0 mesure grandissante de ses moyens techniques et technologiques, comme elle l&rsquo;a fait et le fait avec le programme <em>Echelon<\/em>, avec l&rsquo;aide d&rsquo;acolytes divers de l&rsquo;anglosph\u00e8re (UK, Australie, Canada, Nouvelle-Z\u00e9lande), et ainsi de suite. Ce qui est int\u00e9ressant pour la chronique et la statistique, si l&rsquo;on veut, c&rsquo;est l&rsquo;implication des grandes soci\u00e9t\u00e9s d&rsquo;internet, l&rsquo;\u00e9normit\u00e9 des masses consid\u00e9r\u00e9es (la population espionn\u00e9e, les millions et milliards de messages, de donn\u00e9es, d&rsquo;informations, etc.) ; mais rien de surprenant, si l&rsquo;on admet l&rsquo;implication du <em>corporate power<\/em> dans l&rsquo;alimentation du Syst\u00e8me et le gigantisme sans frein, suscit\u00e9 par une parano\u00efa structurelle, des syst\u00e8mes du technologisme et de la communication&#8230; Cela bien admis, et sans la moindre surprise, nous nous risquerons \u00e0 quelques remarques.<\/p>\n<\/p>\n<p><p>\t Lorsque le porte-parole de la Maison-Blanche du vertueux Obama d\u00e9clare assez vaguement et sans trop se mouiller, \u00ab<em>&#8230;that laws governing such orders are something that have been in place for a number of years now<\/em>\u00bb, il dit une \u00e9vidence qu&rsquo;il pourrait m\u00eame \u00e9largir \u00e0 des d\u00e9cennies en laissant tomber le d\u00e9tail peu important des lois. La NSA et le reste du complexe militaro-industriel, et le reste du Syst\u00e8me, fonctionnent de la m\u00eame fa\u00e7on depuis des d\u00e9cennies, et l&rsquo;\u00e9lan de 9\/11 n&rsquo;a fait qu&rsquo;\u00e9largir d\u00e9mesur\u00e9ment et monstrueusement, et peut-\u00eatre <strong>fatalement<\/strong>, sous le couvert de lois-bidon dont personne ne se pr\u00e9occupe vraiment, une dynamique d\u00e9j\u00e0 existante. Il est \u00e9vident que personne ne peut arr\u00eater cela, et que personne ce contr\u00f4le plus cela. Il est \u00e9vident qu&rsquo;avec la NSA, nous nous trouvons devant une description graphique, technologique et statistique de l&#8217;emprise totale du Syst\u00e8me sur ses propres activit\u00e9s, et par cons\u00e9quent sur tout ce qu&rsquo;il contr\u00f4le, qui repr\u00e9sente si l&rsquo;on veut l&rsquo;univers officiel de notre civilisation,  du bloc BAO \u00e0 la globalisation. Le Syst\u00e8me est <em>in charge<\/em>, il commande, il d\u00e9cide, il conduit, il agit,  et, bien entendu, il se trompe. Confirmation, rien de plus&#8230;<\/p>\n<\/p>\n<p><p>\t Confirmation certes, mais l&rsquo;avantage \u00e9tant qu&rsquo;avec de telles r\u00e9v\u00e9lations et de tels d\u00e9tails, avec un tel tintamarre, les ligues de vertu que sont notamment les grands organes de la presse-Syst\u00e8me, qui sont les cr\u00e9ations du Syst\u00e8me \u00e9galement dans leurs fonctions pr\u00e9sentes, doivent, par obligation statutaire, s&rsquo;\u00e9gosiller, se scandaliser, d\u00e9noncer ces diverses forfaitures. Il y a des valeurs \u00e0 d\u00e9fendre, et l&rsquo;on doit r\u00e9pondre \u00e0 l&rsquo;obligation d&rsquo;accusation des ex\u00e9cutants de ces diverses f\u00e9lonie-Syst\u00e8me. Cela met un peu d&rsquo;animation, renforce le malaise g\u00e9n\u00e9ral, augmente la paralysie des dynamiques politiques au pouvoir, etc. Ce n&rsquo;est pas plus mal, et c&rsquo;est m\u00eame beaucoup mieux pour nourrir les entraves \u00e0 la coh\u00e9sion de l&rsquo;ensemble.<\/p>\n<\/p>\n<p><p>\t Mais la remarque principale que nous ferons concerne notre intense stup\u00e9faction toujours renouvel\u00e9e devant la consid\u00e9rable stupidit\u00e9 du Syst\u00e8me (plus majuscul\u00e9 que jamais, pour l&rsquo;occasion). Voil\u00e0 que nous apprenons, sans la moindre surprise bien entendu mais tout de m\u00eame avec des Himalaya de d\u00e9tails qui font prendre conscience du volume d&rsquo;activit\u00e9, que tout, absolument tout est espionn\u00e9, compil\u00e9, format\u00e9, document\u00e9, etc. Alors, on peut mieux contempler le r\u00e9sultat de cette base de donn\u00e9es universelle et globalis\u00e9e qui devrait \u00eatre \u00e9galement une base de contr\u00f4le absolu, une base de ma\u00eetrise compl\u00e8te, des \u00e9v\u00e9nements, des organisations, des <em>sapiens<\/em> divers, surtout les dissidents et les marginaux, mais les autres aussi car tout le monde est un dissident qui s&rsquo;ignore, et enfin de la marche du monde en g\u00e9n\u00e9ral. Le r\u00e9sultat est, en effet, une totale inversion, mais vertueuse pour notre point de vue&#8230; On pourrait \u00e9tablir une sorte d&rsquo;indice d&rsquo;inefficacit\u00e9 et de stupidit\u00e9, avec la corr\u00e9lation existante entre le d\u00e9marrage du programme PRISM (en 2006, semble-t-i), et l&rsquo;acc\u00e9l\u00e9ration d\u00e9cisive des catastrophes, du d\u00e9sordre, de la perte de contr\u00f4le (effective en 2008). Ils contr\u00f4lent tout, ma\u00eetrisent tout, d\u00e9cryptent tout, mais ils ne voient rien venir, ne comprennent rien, n&rsquo;entendent rien, absolument rien,  ni l&rsquo;effondrement de Wall Street, ni le printemps arabe, ni la non-chute d&rsquo;Assad, ni la s\u00e9questration qui emprisonne le Pentagone, ni les \u00e9v\u00e9nements de Turquie, ni, ni, ni&#8230;<\/p>\n<\/p>\n<p><p>\t Rarement, selon nous, aura \u00e9t\u00e9 montr\u00e9, de fa\u00e7on \u00e0 la fois \u00e9l\u00e9gante et g\u00e9n\u00e9reuse, le rapport intime, quasiment comme entre deux jumeaux o\u00f9 l&rsquo;un se substitue \u00e0 l&rsquo;autre sans que nul ne s&rsquo;aper\u00e7oive de rien&#8230; Disons, d&rsquo;une fa\u00e7on symbolique bien plus qu&rsquo;avec une exactitude statistique qui n&rsquo;est pas notre tasse de th\u00e9, voici donc le rapport intime, quasiment incestueux, quasiment du m\u00eame \u00eatre entre lui-m\u00eame et son double, entre la dynamique de surpuissance du Syst\u00e8me (disons, le programme PRISM depuis 2006) et la dynamique d&rsquo;autodestruction du Syst\u00e8me (disons l&rsquo;acc\u00e9l\u00e9ration des catastrophes depuis 2008).<\/p>\n<\/p>\n<p><\/p>\n<p><p>\tMis en ligne le 7 juin 2013 \u00e0  09H22<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Big Brother est enormous, et encore plus b\u00eate que \u00e7a&#8230; La surprise est certainement consid\u00e9rable dans les milieux tr\u00e8s, tr\u00e8s bien inform\u00e9s. La NSA, l&rsquo;agence nationale de s\u00e9curit\u00e9 des USA (\u00e9coutes \u00e9lectroniques, t\u00e9l\u00e9phoniques, etc., en tous genres et au meilleur prix), a un acc\u00e8s direct dans toutes les bases de donn\u00e9es des grands op\u00e9rateurs d&rsquo;internet&hellip;&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[8604,4270,5518,2631,12214,12213,10437,10091,3659,60,3890,3871,12212,6568,11131,1267],"class_list":["post-75029","post","type-post","status-publish","format-standard","hentry","category-bloc-notes","tag-agency","tag-autodestruction","tag-base","tag-de","tag-donnees","tag-ecoute","tag-espionnage","tag-google","tag-guardian","tag-internet","tag-national","tag-nsa","tag-prism","tag-security","tag-surpuissance","tag-terrorisme"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/posts\/75029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/comments?post=75029"}],"version-history":[{"count":0,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/posts\/75029\/revisions"}],"wp:attachment":[{"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/media?parent=75029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/categories?post=75029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/tags?post=75029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}