Um Big Brother Global? Os Programas De Vigilância Da Nsa À Luz Da Securitização Dos Espaços Sociotecnológicos

Total Page:16

File Type:pdf, Size:1020Kb

Um Big Brother Global? Os Programas De Vigilância Da Nsa À Luz Da Securitização Dos Espaços Sociotecnológicos UNIVERSIDADE ESTADUAL DA PARAÍBA CAMPUS V - MINISTRO ALCIDES CARNEIRO CENTRO DE CIÊNCIAS BIOLÓGICAS E SOCIAIS APLICADAS PROGRAMA DE PÓS-GRADUAÇÃO EM RELAÇÕES INTERNACIONAIS PEDRO HENRIQUE OLIVEIRA FRAZÃO UM BIG BROTHER GLOBAL? OS PROGRAMAS DE VIGILÂNCIA DA NSA À LUZ DA SECURITIZAÇÃO DOS ESPAÇOS SOCIOTECNOLÓGICOS JOÃO PESSOA - PB 2016 PEDRO HENRIQUE OLIVEIRA FRAZÃO UM BIG BROTHER GLOBAL? OS PROGRAMAS DE VIGILÂNCIA DA NSA À LUZ DA SECURITIZAÇÃO DOS ESPAÇOS SOCIOTECNOLÓGICOS Dissertação apresentada ao Programa de Pós- Graduação em Relações Internacionais da Universidade Estadual da Paraíba (PPGRI- UEPB) como requisito para a obtenção do título de Mestre em Relações Internacionais. Orientadora: Prof.ª Dr.ª Silvia Garcia Nogueira JOÃO PESSOA – PB 2016 PEDRO HENRIQUE OLIVEIRA FRAZÃO UM BIG BROTHER GLOBAL? OS PROGRAMAS DE VIGILÂNCIA DA NSA À LUZ DA SECURITIZAÇÃO DOS ESPAÇOS SOCIOTECNOLÓGICOS Dissertação apresentada ao Programa de Pós- Graduação em Relações Internacionais da Universidade Estadual da Paraíba (PPGRI- UEPB) como requisito para a obtenção do título de Mestre em Relações Internacionais. Aprovada em: 19/05/2016 ________________________________________ Prof.ª Dr.ª Silvia Garcia Nogueira Orientadora (UEPB) ________________________________________ Prof. Dr. Paulo Roberto Loyolla Kuhlmann Examinador interno (UEPB) ________________________________________ Prof.ª Dr.ª Ana Paula Maielo Silva Examinadora externa (UEPB) DEDICATÓRIA Dedico este trabalho aos meus pais, Edna e José, pelo amor incondicional e pelo apoio sem o qual nada disso seria possível. AGRADECIMENTOS À Universidade Estadual da Paraíba, pela estrutura de ensino que propiciou minha formação. À professora Silvia Nogueira, pela confiança, pelos ensinamentos e pela orientação que possibilitaram a conclusão deste trabalho. À banca examinadora, composta pelos professores Ana Paula Maielo e Paulo Kuhlmann, e à banca de qualificação, formada pelos professores Augusto Teixeira e Paulo Kuhlmann, pelas observações, sugestões e críticas. Aos professores da graduação e da pós-graduação em Relações Internacionais da UEPB, pelo aprendizado, dedicação e paciência, em especial a Alexandre Leite, Anahi de Castro, Augusto Teixeira, Cristina Pacheco, Elias David, Eliete Gurjão, Gabriela Gonçalves, Henrique Altemani, Paulo Kuhlmann e Silvia Nogueira. Aos funcionários da UEPB pelo trabalho exemplar e pelo carinho com que nos tratam. À Coordenação de Aperfeiçoamento Pessoal de Nível Superior (CAPES) pelo auxílio financeiro à pesquisa. Aos meus pais, Edna Oliveira Frazão e José Ailton Frazão, pelo carinho, dedicação e compreensão em todas as horas. Ao meu irmão, George Oliveira Frazão, pela amizade fraterna. Aos meus avós maternos, Jandira Melo de Oliveira e Francisco Chagas de Oliveira (in memoriam), e paternos, Neuza Fernandes Frazão (in memoriam) e Rosil Moraes Frazão (in memoriam), pelos ensinamentos advindos da experiência. Aos meus familiares, em especial aos tios Edson Melo e Ingrid Saltão pelo incentivo e por cederem diversas vezes um espaço tranquilo para escrever este trabalho. À família que a vida me proporcionou, meus amigos queridos Andrei de Ferrer, Anna Beatriz, Arthur Murta, Carina Rodrigues, Caroline Cevada, Daniel Colom, Elze Rodrigues, Inara Rosas, Luína Marinho, Luísa Nevett, Manoela Lemos, Marcela Dimenstein, Maria Olívia, Natália Nunes e Vitório Pimentel. Em especial, agradeço a Alan Manga por todo o companheirismo, força e ajuda diários. Aos companheiros de biblioteca, Anna Beatriz e Diego Aranha. Essa trilha teria sido bem mais difícil sem vocês! Aos meus colegas de sala. Conseguimos!! A Edward Snowden, pela coragem que proporcionou ao mundo um grito de liberdade. “Quanto mais a sociedade se distancia da verdade, mais ela odeia aqueles que a revelam” (George Orwell) RESUMO O crescente uso do ciberespaço nas Relações Internacionais vem propiciando um novo cenário para a política mundial. A evolução dos meios digitais proporcionou um fluxo de dados nunca antes visto na história da humanidade, o que acabou ampliando o papel da informação enquanto moeda de troca nas relações de poder do cenário internacional atual. Uma das transformações observadas a partir deste processo foi o fortalecimento da vigilância – que ganha novas ferramentas no ambiente cibernético – enquanto mecanismo de monitoramento, manutenção da ordem, controle e aquisição de informações que tornem os atores internacionais relevantes nas novas relações de poder cibernéticas. Sendo assim, a presente dissertação analisa este fenômeno a partir de duas linhas principais que se complementam: a evolução da vigilância enquanto dimensão-chave da (ciber)segurança, através de uma abordagem panóptica e pós- panóptica e como estas perspectivas influenciam nos fenômenos atuais de vigilância cibernética. Para tanto, apresentam-se os estudos de Foucault acerca da sociedade disciplinar e os seus desdobramentos que deram lugar a uma sociedade de controle informacional, e as análises de Bauman sobre a modernidade líquida e como tais características podem influenciar a vigilância contemporânea. A segunda linha de análise, elaborada a partir dos dados levantados até então, aborda uma visão da vigilância cibernética enquanto ferramenta do processo de securitização do ciberespaço. Seguindo esta lógica, os estudos da Escola de Copenhague, baseados na teoria construtivista das Relações Internacionais, apontam um caminho propício para a compreensão do papel da vigilância cibernética dentro das questões de cibersegurança. Como exemplo de caso, examina-se como esse processo se deu dentro dos programas de vigilância global da NSA, revelados em meados de 2013 por Edward Snowden. A fim de alcançar tais objetivos, serão revisados autores clássicos dos estudos de vigilância e segurança, bem como novas abordagens; para a apresentação e análise do caso proposto, serão utilizados análises documentais, reportagens e discursos referentes às respostas internacionais em face das revelações dos programas da NSA. PALAVRAS-CHAVE: Cibersegurança; Securitização; Vigilância cibernética; Panóptico; NSA ABSTRACT The increasing use of cyberspace in International Relations is providing a new scenario for world politics. The evolution of digital media has provided a data flow never before seen in human history, which eventually expanded the role of information as a bargaining chip in the power relations of the current international scenario. One of the changes observed from this process was the strengthening of surveillance – which gains new tools in the cyber environment – as a mechanism of monitoring, law enforcement, control and acquisition of information that makes international actors relevant in the new cyberpower relations. Thus, this dissertation analyzes this phenomenon from two main lines that complement each other: the evolution of surveillance as a key dimension of (cyber)security through a panoptic and post-panoptic approach and how these perspectives influence the current cyber surveillance phenomena. To do so, we present Foucault's studies of disciplinary society and its developments that have given rise to an information society of control, and Bauman’s analysis on liquid modernity and how its characteristics can influence contemporary surveillance. The second line of analysis, drawn from the data collected so far, deals with a vision of cyber surveillance as a tool of cyberspace securitization process. Following this logic, studies of the Copenhagen School, based on the constructivist theory of International Relations, point out a favorable path to understanding the role of cyber surveillance within the cybersecurity issues. As an example case, we examine how this process took place within NSA programs of global surveillance revealed in mid-2013 by Edward Snowden. In order to achieve these objectives, classical authors of surveillance and security studies will be reviewed, as well as new approaches; for the presentation and analysis of the proposed case, documentary analysis, reports and speeches relating to international responses in the face of revelations of the NSA programs will be used. KEYWORDS: Cybersecurity; Securitization; Cyber surveillance; Panopticon; NSA LISTA DE ILUSTRAÇÕES Quadro 1 - Ranking global das 5 primeiras posições de países comprometidos com a segurança cibernética 28 Quadro 2 - Tipologia de conflitos cibernéticos 39 Imagem 1 - Fluxo de dados em Mbps no ano de 2005 82 Anexo A - Rotas dos cabos de fibra óptica 118 Anexo B - Parceiros da NSA nos programas de Vigilância 119 Anexo C - Documentos do PRISM 120 Anexo D - Documentos do Boundless Informant 122 Anexo E - Documentos do X-Keyscore 123 Anexo F - Documentos do Tempora 127 Anexo G - Documentos do Muscular 128 Anexo H - Documentos do Stateroom 129 Anexo I - Documentos de espionagem: Brasil e México 130 LISTA DE SIGLAS AOL America OnLine ASD Australia Signals Directorate AT&T American Telephone and Telegraph BND Bundesnachrichtendienst (Alemanha) CIA Central Intelligence Agency (EUA) CSEC Communications Security Establishment (Canadá) CSS Central Security Service (EUA) DDoS Distributed Denial-of-Service DGSE Direction Générale de la Sécurité Extérieure (França) DNI Digital Network Intelligence DNS Domain Name System EUA Estados Unidos da América GCHQ Government Communications Headquarters (Reino Unido) GCSB Government Communications Security Bureau (Nova Zelândia) GTE Global Telecoms Exploitation GVT Global Village Telecom IBM International Business Machines ICANN Internet Corporation for Assigned Names and Numbers IGF Internet Governance Forum ISP Internet
Recommended publications
  • “State of Civil Society Report: 2015
    the year in review State of Civil Society report 2015: THE YEAR IN REVIEW ...these stories tell us that only civil introduction society, in its broadest sense, is taking a It has been another year of hard work and high achievement for civil society. The story of the year since the stance against the 2014 State of Civil Society Report was published has partly been one of a continuing series of attacks on civil concentration of society in the many countries where, when civil society asks difficult questions about power, the powerful seek to silence it. But is has also been a story of impressive and sustained civil society response, in a world that has power in the hands of become more turbulent and contested. a tiny, global, super- rich elite, and against As we show below, civil society faces challenges - of lack of space, under-resourcing and limited access to the attempts of many decision-makers. Civil society also needs continually to prove its connection with and relevance to citizens, political leaders and and it needs to demonstrate its ability to stay ahead of trends and innovate. When civil society groups do not corporate interests do these, they fail. But so often, we see civil society leading the response to crisis, taking on difficult issues, contributing to change, and winning arguments for social justice. to undermine human rights and This year in review section of the 2015 CIVICUS State of Civil Society Report is complemented by our report’s the value of people’s special thematic section on the resourcing for civil society, and the 27 guest contributions, from civil society participation.
    [Show full text]
  • Covert Action: a Useful Tool for United States Foreign Policy?
    Covert Action: A Useful Tool for United States Foreign Policy? Derek Andrew Uram M.Ed., University of Toronto, 2002 B.Ed.,University of Toronto, 2000 B.U.R.Pl., Ryerson Polytechnical Institute, 1989 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of MASTER OF PUBLIC ADMINISTRATION in the School of Public Administration 0 Derek Andrew Uram, 2005 University of Victoria All rights reserved. This thesis may not be reproduced in whole or in part, by photocopy or by other means, without the permission of the author. Supervisor: Dr. Emmanuel Brunet-Jailly ABSTRACT Covert action is a policy tool used by the United States government. It is secretive and highly controversial in that it attempts to actively change the course of events in other nations. Much covert action undertaken by the US government has taken place within the developing world - governments have been overthrown, elections influenced, media distorted, and the lives of millions of individuals affected by covert activities secretly organized and executed by US officials in Washington, DC and Langley, Virginia - headquarters of the Central Intelligence Agency. The question must be asked: Is covert action a useful tool for US foreign policy? Evidence from two important case studies - Iran and Chile - reveals that covert action has very limited genuine value as a policy tool. It does not always produce desired results. Even "successful" covert undertakings can create additional problems, the type of which may not appear until many years after the fact. Supervisor: Dr. E. Brunet-Jailly (School of Public Administration) Table of Contents Title Page .
    [Show full text]
  • Syria: Syrian Telecommunications Establishment, Syrian Computer Society
    2 ENEMIES OF THE INTERNET / 12 MARCH 2014 //////////////////////////////////////////////////////////////////////////////////////// INTRODUCTION ........................................................................................................... 4 EUROPE AND CENTRAL ASIA .................................................................................. 8 Belarus: Operations and Analysis Centre ....................................................... 8 Russia: Federal Security Service ............................................................................ 10 Turkmenistan: TurkmenTelecom ............................................................................. 12 United Kingdom: Government Communications Headquarters ....................... 13 Uzbekistan: Expert Commission on Information and Mass Communication ................................................................................. 16 AMERICAS .................................................................................................................... 18 Cuba: Ministry of Informatics and Communications ............................................ 18 USA: National Security Agency ............................................................................... 20 MIDDLE EAST AND NORTH AFRICA ............................................................................... 23 Bahrain: Ministry of Interior, National Security Apparatus ............................................................................ 23 Iran: Supreme Council for Cyberspace, Working Group
    [Show full text]
  • (LISA '08) Reports
    LISA ’08: 22nd Large Installation System Administration Conference San Diego, CA November 9–14, 2008 Summarized by Rik Farrow Mario Obejas led off with thanks to the program com- mittee members and USENIX staff for putting together another successful LISA. Then the SAGE award was given conference reports to the SAMBA group for its work on interoperability. SAMBA Team member (and USENIX Board Member) Jerry Carter accepted the award. The Chuck Yerkes award was given to Dustin Puryear for his helpful posts thaNks tO Our summarIzers to sage-members. The Best Student Paper award went to Xiaoning Ding LISA ’08: 22nd Large Installation System of Ohio State University, Hai Huang, Yaoping Ruan, Administration Conference . 59. and Anees Shaikh of IBM T.J. Watson Research Center, Ben Allen and Xiaodong Zhang of The Ohio State University for Kyrre Begnum “Automatic Software Fault Diagnosis by Exploiting Ap- Alex Boster plication Signatures.” The Best Paper award went to Qi Leah Cardaci Liao, Andrew Blaich, Aaron Striegel, and Douglas Thain Marc Chiarini of the University of Notre Dame for “ENAVis: Enterprise Andrew Hoblitzell Network Activities Visualization.” Qi Liao Rowan Littell keynote address Will Nowak Patrick Ntawuyamara n Implementing Intellipedia Within a “Need to Know” David Plonka C u l t u r e Matthew Sacks Sean Dennehy, Chief of Intellipedia Development, Directorate Andrew Seely of Intelligence, U.S. Central Intelligence Agency Josh Simon Summarized by Andrew Hoblitzell ([email protected]) Sean Dennehy discussed technical and cultural chal- CHIMIT ’08: Symposium on Computer lenges being introduced by the introduction of Web Human Interaction for the Management of 2.0 tools in the United States intelligence community.
    [Show full text]
  • 05Bb-Final.Pdf
    About the National Science and Technology Council The National Science and Technology Council (NSTC) was established by Executive Order on November 23, 1993. This Cabinet-level council is the principal means by which the President coordinates science, space, and technology policies across the Federal government. NSTC coordinates the diverse parts of the Federal research and development enterprise. An important objective of the NSTC is the establishment of clear national goals for Federal science and technology investments in areas ranging from information technologies and health research to improving transportation systems and strengthening fundamental research. The Council prepares research and development strategies that are coordinated across Federal agencies to form a comprehensive investment package that is aimed at accomplishing multiple national goals. The NSTC Web site is: www.nstc.gov. To obtain additional information regarding the NSTC, please contact the NSTC Executive Secretariat at (202) 456-6100. About the Office of Science and Technology Policy The Office of Science and Technology Policy (OSTP) was established by the National Science and Technology Policy, Organization, and Priorities Act of 1976. OSTP’s responsibilities include advising the President in policy formulation and budget development on all questions in which science and technology are important elements; articulating the President's science and technology policies and programs; and fostering strong partnerships among Federal, state, and local governments, and the scientific communities in industry and academe. The Assistant to the President for Science and Technology serves as the Director of the OSTP and directs the NSTC on behalf of the President. The OSTP Web site is: www.ostp.gov.
    [Show full text]
  • Caught Between Theory, Practice and Peer Review Mihir Bellare UCSD
    Caught Between Theory, Practice and Peer Review Mihir Bellare UCSD Mihir Bellare, IACR Distinguished August 18, 2014 1 Lecture, Crypto 2014 values, tastes, judgments, … Disciplinary culture Papers Mihir Bellare, IACR Distinguished August 18, 2014 2 Lecture, Crypto 2014 Theory versus Affect our change practice success on job market, promotions, motivations, choice of problems, expository style, self- Peer image, opinions of others, review community impact, … understanding Kahneman & Tversky Sociology, psychology Biases and their role in decision making and guesswork Kuhn The nature of normal science Mihir Bellare, IACR Distinguished August 18, 2014 3 Lecture, Crypto 2014 Today Theory versus practice Anecdote, discussion, cultural phenomena, possible explanations Peer review Mihir Bellare, IACR Distinguished August 18, 2014 4 Lecture, Crypto 2014 Part I: Theory vs. Practice A Tale of Two Cultures Mihir Bellare, IACR Distinguished August 18, 2014 5 Lecture, Crypto 2014 MIT, 1987 Mihir Bellare, IACR Distinguished August 18, 2014 6 Lecture, Crypto 2014 6.875 Cryptography and Cryptanalysis Pseudorandom bit generators [BM,Y] Pseudorandom functions [GGM] Probabilistic encryption, semantic security [GM] Digital signatures unforgeable under adaptive chosen-message attack [GMRi] Zero-knowledge interactive proofs [GMRa] Foundations that are important to good practice Mihir Bellare, IACR Distinguished August 18, 2014 7 Lecture, Crypto 2014 What attracted me: Cryptography = Philosophy made precise Humanist perspective Security in an imaginative context
    [Show full text]
  • 2013 Mass Surveillance Disclosures - Wikipedia, the Fr
    2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan... 2013 mass surveillance disclosures From Wikipedia, the free encyclopedia Further information: Edward Snowden The 2013 mass surveillance disclosures refer to numerous media reports beginning in June 2013 which revealed operational details of the US National Security Agency (NSA) and its international partners' mass surveillance of foreign nationals as well as US citizens. The series of reports emanated from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden. On 6 June 2013, the first set of documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. [1] The practice of mass surveillance in the United States took off during the 1940s and was greatly expanded in the 1970s. It soon grew into a global surveillance program code-named "ECHELON",[2] but did not attract much public attention until other global surveillance programs such as PRISM, XKeyscore, and Tempora were exposed in the 2013 release of thousands of documents.[3] Many countries around the world, including Western Allies and member states of NATO, have been targeted by the "Five Eyes" strategic alliance of Australia, Canada, New Zealand, the UK and the USA—five English-speaking Western democracies aiming to achieve Total Information Awareness by mastering the Internet with analytical tools such as the Boundless Informant.[4] As confirmed by the NSA's director Keith B. Alexander on 26 September 2013, the NSA collects and stores all phone records of all American citizens.[5] Much of the data is kept in large storage facilities such as the Utah Data Center, a US$1.5 billion megaproject referred to by The Wall Street Journal as a "symbol of the spy agency's surveillance prowess."[6] As a result of the disclosures, social movements such as Restore the Fourth have sprung up to protest against mass surveillance.
    [Show full text]
  • Globalization and International Organized Crime
    THE DARK SIDE OF LIFE: GLOBALIZATION AND INTERNATIONAL ORGANIZED CRIME R EG W HITAKER conomic globalization is a more complex concept than terms such as ‘transna- Etional corporations’ and ‘international finance’ would immediately suggest. There is a licit global economy, but there is also an illicit global economy. The first is capitalist, the second is criminal. Moral critiques of capitalism aside, it is impor- tant to distinguish between the lawful and the unlawful, the licit and the illicit, because these differences have enormous consequences in the real world of wealth and power, especially for the emerging governance of the global economy. THE BRIGHT SIDE AND THE DARK SIDE Economic globalization has a public face, reflected in investment flows and currency exchanges, followed and publicized daily in the media, celebrated loudly by its impresarios and apologists, criticized by its detractors in public demonstra- tions. This is the open face, or what I will call the ‘Bright Side’ of globalization. I choose the word ‘bright’ both in a literal sense, reflecting the relative glare of publicity, and in the ironic sense that Monty Python closed The Life of Brian with the crucified singing a cheery chorus of ‘Always look on the bright side of life’. The brightness apparently lies in the lack of obvious alternatives. There is also a ‘Dark Side’, and here I am not referring to what globalization’s critics point to as the underside of the promise, the exploitation and immisera- tion caused by rampant global capitalism. Rather I am referring to capitalism’s dark doppelgänger, the criminal or illicit economy, which has always shadowed capitalism throughout its history, mimicking its methods, actively seeking the opportunities of markets not served by its legal counterparts, sometimes working in tacit alliance but more often in competition with its counterparts, sometimes passing in one or two generations from outlaws to in-laws of the legitimate order.
    [Show full text]
  • Global Surveillance Disclosures (2013–Present) - Wikipedia, the
    Global surveillance disclosures (2013–present) - Wikipedia, the ... http://en.wikipedia.org/wiki/Global_surveillance_disclosures_(... Global surveillance disclosures (2013–present) From Wikipedia, the free encyclopedia Ongoing news reports in the international media have revealed operational details about the U.S. National Security Agency (NSA) and its international partners' global surveillance[1] of foreign nationals and U.S. citizens. The reports emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention.[2] The disclosure continued throughout the entire year of 2013, and a significant portion of the full cache of the estimated 1.7 million documents[3] was later obtained and published by many other media outlets worldwide, most notably The New York Times (USA), Der Spiegel (Germany), Australian Broadcasting Corporation (Australia), O Globo (Brazil), the Canadian Broadcasting Corporation (Canada), Le Monde (France), L'espresso (Italy), NRC Handelsblad (the Netherlands), Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).[4] In summary, these media reports have shed light on the implications of several secret treaties signed by members of the UKUSA Agreement in their efforts to implement global surveillance. For example, Der Spiegel revealed how the German Bundesnachrichtendienst (BND) transfers "massive amounts of intercepted data
    [Show full text]
  • Rapport Final
    « Composantes politico-militaire, économique et sociétale d’une cyberstratégie française : agir dans la dimension sémantique du cyberespace » RAPPORT FINAL Composantes politico-militaire, économique et sociétale d’une cyberstratégie française : agir dans la dimension sémantique du cyberespace FRANCOIS-BERNARD HUYGHE, Directeur de recherche OLIVIER KEMPF, Chercheur associé NICOLAS MAZZUCCHI, Chercheur associé Juin 2014 1 | P a g e Introduction Rares sont ceux qui doutent de la nécessité d’une cyberdéfense nationale. On peut discuter de son organisation, de l’ampleur des efforts entrepris, de son financement ou de son développement mais, au final que notre pays doive assurer son indépendance contre des dangers venus du cyberespace, voilà qui ne fait guère débat. Aussi, cette étude ne porte-t-elle pas essentiellement sur les infrastructures numériques, la protection, la résilience et la cybersécurité en général, mais sur des enjeux stratégiques. Partant de l’analyse de cas pratiques de cyberagressions, elle se propose de discerner les logiques (technique, stratégique, parfois idéologique) qui se profilent derrière les attaques. En cyberstratégie, l’incertitude ne naît pas seulement de la difficulté d’attribuer l’attaque, mais aussi des aléas qu’implique l’emploi d’armes nouvelles et souvent pas ou peu testées, notamment parce qu’elles sont souvent à emploi unique. L’incertitude est également liée à l’interprétation des faits et des intentions : avons-nous bien compris le « message » ? l’enchaînement des réactions est-il bien celui qui était espéré ? L’incertitude est aussi à la mesure des possibilités stratégiques qu’ouvre le cyberespace. Ce dernier est hétérogène. D’ailleurs la majorité des chercheurs le décrit comme divisé en « couches ».
    [Show full text]
  • Exposed: Desire and Disobedience in the Digital
    Free ebooks ==> www.Ebook777.com www.Ebook777.com Free ebooks ==> www.Ebook777.com EXPOSED www.Ebook777.com EXPOSED desire and disobedience in the digital age Bernard E. Harcourt harvard university press cambridge, massachusetts london, en gland 2015 Free ebooks ==> www.Ebook777.com Copyright © 2015 by the President and Fellows of Harvard College All rights reserved Printed in the United States of America First printing Library of Congress Cataloging- in- Publication Data Harcourt, Bernard E., 1963– Exposed : desire and disobedience in the digital age / Bernard E. Harcourt. pages cm ISBN 978-0-674-50457-8 (cloth) 1. Information technology? Social aspects. 2. Privacy, right of. I. Title. HM851.H3664 2015 303.48'33? d c 23 2015012788 www.Ebook777.com To Isadora To Léonard To Mia contents T e Expository Society 1 part one Clearing the Ground 29 1. George Orwell’s Big Brother 31 2. T e Surveillance State 54 3. Jeremy Bentham’s Panopticon 80 part two T e Birth of the Expository Society 105 4. Our Mirrored Glass Pavilion 107 5. A Genealogy of the New Doppelgänger Logic 141 6. T e Eclipse of Humanism 166 part three T e Perils of Digital Exposure 185 7. T e Collapse of State, Economy, and Society 187 8. T e Mortif cation of the Self 217 9. T e Steel Mesh 234 viii Contents part four Digital Disobedience 251 10. Virtual Democracy 253 11. Digital Re sis tance 262 12. Po liti cal Disobedience 280 notes 285 acknow ledg ments 347 index 349 Free ebooks ==> www.Ebook777.com EXPOSED www.Ebook777.com the expository society Every keystroke, each mouse click, every touch of the screen, card swipe, Google search, Amazon purchase, Instagram, “like,” tweet, scan?in short, everything we do in our new digital age can be recorded, stored, and monitored.
    [Show full text]
  • Intra-Allies Intelligence Operations in International Relations
    S2161419 “Doubles Jeux” Intra-Allies Intelligence Operations in International Relations By Gauthier le Roux de Bretagne S2161419 [email protected] Master Thesis Leiden University Humanities Faculty Supervisor: Dr. Lukas Milevski Second reader: Dr. Gjovalin Macaj Word count: 14944 Friday, July 5th 2019 1 S2161419 Acknowledgements First, I would like to thank my supervisor Lukas Milevski for his help and guidance throughout my work. Second, I would like to express my deepest thanks to Eleonora di Pangrazio, Erik Lavalade, Giorgio Alesiani and Jonathan Lench for their invaluable advice and thorough proofreading. I am thankful to Livvy Bourge, Sophie van de Meulengraaf and Lorcan Ryan for their precious company during every lunch and break, which made days spent in the library a pleasure. I would also like to thank my Owl group for their constant support including on Sundays. Finally, I would like to thank the basement community for their warmest welcome every morning, giving me the motivation and inspiration necessary to finish this thesis. 2 S2161419 Table of Contents List of Abbreviations ...................................................................................................................................... 4 Introduction ................................................................................................................................................... 5 Thesis Framework .........................................................................................................................................
    [Show full text]