références pour la partie intro
1
références pour la partie 00
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
références pour la partie 01
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
références pour la partie 02
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
références pour la partie 03
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
intro
- 1 : https://www.franceculture.fr/emissions/la-vie-numerique/banlieue-deep-web-et-dark-net-meme-combat [direct][arc]
00
- 1 : http://www.snopes.com/quotes/internet.asp [direct][arc]
- 2 : Françoise Levie, L’homme qui voulait classer le monde . Paul Otlet et le Mundaneum, Les Impressions nouvelles, 2006.
- 3 : http://archive.org/stream/OtletTraitDocumentationUgent#page/n555/mode/1up [direct]
- 4 : https://interstices.info/jcms/c_16645/louis-pouzin-la-tete-dans-les-reseaux [direct][arc]
- 5 : Slava Gerovitch, From Newspeak to Cyberspeak: A History of Soviet Cybernetics, MIT Press,2002.
- 6 : https://twitter.com/jjarmoc/status/789637654711267328 [direct][arc]
- 7 : http://dylan.tweney.com/2001/09/26/internet-emerges-as-the-most-reliable-way-to-communicate/ [direct][arc]
- 8 : http://www.businessinsider.fr/internet-est-reellement-controle-par-14-personnes-qui-detiennent-7-cles-secretes/ [direct][arc]
- 9 : http://motherboard.vice.com/fr/read/le-controle-dinternet-est-entre-les-mains-de-14-personnes [direct][arc]
- 10 : http://www.icann.org/tr/french.html [direct][arc]
- 11 : http://www.businessinsider.fr/internet-est-reellement-controle-par-14-personnes-qui-detiennent-7-cles-secretes/ [direct][arc]
- 12 : https://www.ietf.org/ [direct][arc]
- 13 : https://www.afnic.fr/fr/l-afnic-en-bref/actualites/actualites-generales/7444/show/securiser-les-communications-sur-internet-de-bout-en-bout-avec-le-protocole-dane.html [direct][arc]
- 14 : http://www.bortzmeyer.org/les-quatorze-qui-controlent-tout.html [direct][arc]
- 15 : http://www.slate.fr/story/122943/video-internet-cia-jeu-video-controler-esprits [direct][arc]
01
- 1 : https://nvd.nist.gov/visualizations/cwe-over-time [direct][arc] (nb:arc: https://web.archive.org/web/20161208020632/https://nvd.nist.gov/visualizations/cwe-over-time [direct] )
- 2 : https://fr.wikipedia.org/wiki/Attaque_de_l%27homme_du_milieu [direct]
- 3 : https://blog.qualys.com/ssllabs/2013/10/31/apple-enabled-beast-mitigations-in-os-x-109-mavericks [direct][arc]
- 4 : https://blog.qualys.com/ssllabs/2013/09/10/is-beast-still-a-threat [direct][arc] ; https://threatpost.com/apple-turns-on-safari-beast-attack-nitigation-by-default-in-os-x-navericks/102804/ [direct][arc]
- 5 : http://www.codenomicon.com/news/pressrelease/2014/04/09/codenomicon_advising_internet_community_on_serious_internet_vulnerability_dubbed_heartbleed.html [direct][arc]
- 6 : http://heartbleed.com/ [direct][arc]
- 7 : https://krebsonsecurity.com/2013/08/firefox-zero-day-used-in-child-porn-hunt/ [direct][arc]
- 8 : https://www.exploit-db.com/ [direct][arc]
- 9 : https://www.nextinpact.com/news/101344-mysql-chercheur-devoile-deux-failles-0day-critiques.htm [direct][arc]
- 10 : http://www.zdnet.fr/actualites/et-si-l-iot-etait-une-mine-pour-la-securite-informatique-39840136.htm [direct][arc] ; http://www.zdnet.fr/actualites/shodan-un-moteur-de-recherche-reve-pour-cybercriminels-et-les-responsables-iot-39842658.htm [direct][arc]
- 11 : http://www.zerodayinitiative.com/about/ [direct][arc]
- 12 : http://www.nytimes.com/2013/07/14/world/europe/nations-buying-as-hackers-sell-computer-flaws.html [direct][arc]
- 13 : https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/ [direct][arc]
- 14 : https://arstechnica.co.uk/security/2015/07/how-a-russian-hacker-made-45000-selling-a-zero-day-flash-exploit-to-hacking-team/ [direct][arc]
- 15 : https://www.zerodium.com/ios9.html [direct][arc]
- 16 : http://www.zdnet.fr/actualites/la-nsa-achete-des-vulnerabilites-y-compris-en-france-legalement-39794121.htm [direct][arc] ; Vupen a fini par fermer ses bureaux en France. Pour se faire une idée des prix, en2012, une 0day se vendait entre 5 000 et 250 000 dollars.
- 17 : Pour une description détaillée, même si elle commence à dater un peu, voir Ablon L., LibickiM. C., & Golay A. A., Markets for Cybercrime Tools and Stolen Data: Hackers’Bazaar, RandCorporation, 2014. http://www.rand.org/pubs/research_reports/RR610.html [direct][arc]
- 18 : https://www.youtube.com/watch?v=b1iyQFcBCsI [direct]
- 19 : http://www.zdnet.fr/actualites/comment-corriger-la-derniere-faille-0-day-de-linux-et-android-39831500.htm [direct][arc]
- 20 : http://www.vox.com/2016/8/24/12615258/nsa-security-breach-hoard [direct][arc]
- 21 : https://www.wired.com/2016/08/shadow-brokers-mess-happens-nsa-hoards-zero-days/ [direct][arc]
- 22 : https://techcrunch.com/2017/01/31/googles-bug-bounty-2016/ [direct][arc]
- 23 : Bellovin S. M., Blaze M., Clark S., & Landau S. Lawful hacking: Using existing vulnerabilitiesfor wiretapping on the Internet, Nw. J. Tech. & Intell. Prop., 12, i, 2014.
- 24 : https://www.nextinpact.com/news/101945-au-journal-officiel-fichier-biometrique-60-millions-gens-honnetes.htm [direct][arc]
- 25 : http://blog.erratasec.com/2015/05/this-is-how-we-get-ants.html [direct][arc]
- 26 : http://www.liberation.fr/futurs/2017/02/21/le-megafichier-etendu-au-pas-de-charge_1549968 [direct][arc]
- 27 : https://medium.com/@espringe/amazon-s-customer-service-backdoor-be375b3428c4#.jvpbvwsj9 [direct][arc]
- 28 : http://money.cnn.com/2016/04/22/technology/facebook-twitter-phishing-scams/ [direct][arc]
- 29 : Voir ces exemples : https://heimdalsecurity.com/blog/wp-content/uploads/Phishing-example-Amazon-Prime-22-12-2015.png [direct][arc] (Amazon Premier) ; le Trésor public françaishttps://www.francebleu.fr/infos/economie-social/le-tresor-public-met-en-garde-contre-des-faux-mails-de-remboursements-d-impots-1452595387 [direct][arc] ; http://www.rtl.fr/culture/futur/une-nouvelle-arnaque-au-phishing-sur-gmail-comment-s-en-proteger-7786848043 [direct][arc] (Gmail) ;http://www.rtl.fr/actu/conso/faux-mails-de-l-assurance-maladie-comment-se-proteger-du-phishing-7773820806 [direct][arc] (Assurance maladie en France) ; https://particulier.edf.fr/fr/accueil/aide-et-contact/aide/arnaque-et-phishing.html [direct][arc] (EDF); etc.
- 30 : http://www.zonebourse.com/VINCI-4725/actualite/Vinci-Un-canular-a-18-en-7-minutes-23443531/ [direct][arc]
- 31 : https://twitter.com/FranckMorelZB/status/801099935080910848 [direct][arc]
- 32 : http://www.liberation.fr/futurs/2011/03/07/le-ministere-de-l-economie-et-des-finances-victime-d-une-attaque-informatique_719808 [direct][arc]
- 33 : https://www.ssi.gouv.fr/particulier/principales-menaces/espionnage/attaque-par-hameconnage-cible-spearfishing/ [direct][arc]
- 34 : https://www.bleepingcomputer.com/news/security/jigsaw-ransomware-decrypted-will-delete-your-files-until-you-pay-the-ransom/ [direct][arc]
- 35 : https://krebsonsecurity.com/2012/08/inside-a-reveton-ransomware-operation/ [direct][arc]
- 36 : https://bits.blogs.nytimes.com/2014/08/22/android-phones-hit-by-ransomware/ [direct][arc]
- 37 : https://www.bleepingcomputer.com/news/security/new-scheme-spread-popcorn-time-ransomware-get-chance-of-free-decryption-key/ [direct][arc]
- 38 : https://www.bleepingcomputer.com/news/security/koolova-ransomware-decrypts-for-free-if-you-read-two-articles-about-ransomware/ [direct][arc]
- 39 : https://blog.barkly.com/phishing-statistics-2016 [direct][arc]
- 40 : http://phishme.com/phishing-ransomware-threats-soared-q1-2016/ [direct][arc]
- 41 : http://arstechnica.com/security/2016/02/locky-crypto-ransomware-rides-in-on-malicious-word-document-macro/ [direct][arc]
- 42 : http://arstechnica.com/security/2016/03/big-name-sites-hit-by-rash-of-malicious-ads-spreading-crypto-ransomware/ [direct][arc]
- 43 : http://www.lemonde.fr/les-decodeurs/article/2016/12/30/espionnage-pendant-la-presidentielle-ce-que-les-etats-unis-reprochent-a-moscou_5055689_4355770.html [direct][arc] ;http://www.lepoint.fr/monde/la-russie-a-t-elle-vraiment-hacke-l-election-americaine-30-12-2016-2093683_24.php [direct][arc]
- 44 : http://www.chicagotribune.com/news/local/politics/ct-illinois-republican-party-email-hack-met-1212-20161211-story.html [direct][arc]
- 45 : Voir par exemple cette actu http://www.nytimes.com/2016/12/29/world/europe/how-russia-recruited-elite-hackers-for-its-cyberwar.html [direct][arc]
- 46 : https://threatconnect.com/blog/state-board-election-rabbit-hole/ [direct][arc]
- 47 : https://chronopay.com/blog/2016/09/15/chronopay-pomogaet-king-servers-com/ [direct][arc]
- 48 : http://www.reuters.com/article/us-usa-cyber-democrats-reconstruct-idUSKCN10E09H [direct][arc]
- 49 : https://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign [direct][arc]
- 50 : https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/ [direct][arc]
- 51 : http://www.threatgeek.com/2016/06/dnc_update.html [direct][arc]
- 52 : https://wikileaks.org/podesta-emails/emailid/34899 [direct][arc]
- 53 : https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf [direct][arc]
- 54 : https://www.slideshare.net/MaliciaRogue/contes-legendesru-net16mars2015 [direct][arc]
- 55 : http://www.politico.com/agenda/story/2016/10/the-growing-threat-of-cyber-mercenaries-000221 [direct][arc]
- 56 : https://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity [direct][arc]
- 57 : https://www.dhs.gov/news/2016/10/07/joint-statement-department-homeland-security-and-office-director-national [direct][arc]
- 58 : https://www.wordfence.com/blog/2016/12/russia-malware-ip-hack/ [direct][arc]
- 59 : https://www.us-cert.gov/sites/default/files/publications/JAR-16-20296A.csv [direct][arc]
- 60 : http://www.robertmlee.org/critiques-of-the-dhsfbis-grizzly-steppe-report/ [direct][arc]
- 61 : https://www.us-cert.gov/sites/default/files/publications/AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdf [direct][arc]
- 62 : http://de.reuters.com/article/deutschland-russland-cyberangriff-idDEKCN0Y41D2 [direct][arc]
- 63 : https://twitter.com/RidT/status/751325844002529280 [direct][arc]
- 64 : https://www.us-cert.gov/sites/default/files/publications/AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdf [direct][arc]
- 65 : https://www.senat.fr/compte-rendu-commissions/20170130/etr.htm [direct][arc] ; Social Media and FakeNews in the 2016 Election http://web.stanford.edu/~gentzkow/research/fakenews.pdf [direct][arc]
- 66 : https://medium.com/@maliciarogue/la-bulle-algorithmique-cache-la-for%C3%AAtdes-int%C3%A9r%C3%AAts-financiers-c5626cffa66#.p8o3xp96p [direct][arc] ; https://reflets.info/comment-la-cybersecurite-pourrait-sinviter-a-la-presidentielle-de-2017/ [direct][arc]
- 67 : https://www.nytimes.com/2016/11/25/us/politics/hacking-russia-election-fears-barack-obama-donald-trump.html?_r=0 [direct][arc]
- 68 : https://www.schneier.com/crypto-gram/archives/2000/0515.html#1 [direct][arc]
- 69 : http://googlepublicpolicy.blogspot.co.uk/2012/07/breaking-borders-for-free-expression.html [direct][arc]
- 70 : http://www.slate.com/blogs/future_tense/2012/07/25/finspy_trojan_from_gamma_group_may_have_been_used_against_bahraini_activists_says_report_.html [direct][arc]
- 71 : https://citizenlab.org/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed/ [direct][arc]
- 72 : http://www.slate.com/blogs/future_tense/2012/08/20/moroccan_website_mamfakinch_targeted_by_government_grade_spyware_from_hacking_team_.html [direct][arc]
- 73 : https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/ [direct][arc]
- 74 : https://privacyinternational.atavist.com/theireyesonme [direct][arc]
- 75 : http://reseau.echelon.free.fr/reseau.echelon/satellites.htm [direct][arc]
- 76 : http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1 [direct][arc]
- 77 : http://www.lemonde.fr/technologies/article/2013/08/23/les-cables-sous-marins-cle-de-voute-de-la-cybersurveillance_3465101_651865.html [direct][arc]
- 78 : https://www.justice.gov/archive/ll/highlights.htm [direct][arc]
- 79 : https://www.wired.com/2010/08/nsl-gag-order-lifted/ [direct][arc]
- 80 : http://www.washingtontimes.com/news/2004/may/28/20040528-122605-9267r/?page=all [direct][arc]
- 81 : https://www.technologyreview.com/s/405707/the-total-information-awareness-project-lives-on/ [direct][arc]
- 82 : http://www.nytimes.com/2005/12/16/politics/bush-lets-us-spy-on-callers-without-courts.html [direct][arc]
- 83 : http://www.nysd.uscourts.gov/rulings/04CV2614_Opinion_092904.pdf [direct][arc]
- 84 : http://www.aclu.org/safefree/nationalsecurityletters/31580prs20070906.html [direct][arc]
- 85 : https://web.archive.org/web/20071106074840/http://www.aclu.org/safefree/nationalsecurityletters/31580prs20070906.html [direct]
- 86 : https://www.techdirt.com/articles/20150427/11042430811/nsas-stellar-wind-program-was-almost-completely-useless-hidden-fisa-court-nsa-fbi.shtml [direct][arc]
- 87 : http://www.democrats.com/bush-impeachment-poll-2 [direct][arc]
- 88 : http://www.pbs.org/wgbh/frontline/film/united-states-of-secrets/transcript/ [direct][arc]
- 89 : https://en.wikipedia.org/wiki/United_States_Foreign_Intelligence_Surveillance_Court#Criticism [direct]
- 90 : Les révélations de The Intercept https://theintercept.com/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/ [direct][arc] ; résumé en françaishttp://www.france24.com/fr/20140520-nsa-bahamas-portable-ecoute-enregistrement-shebab-terrorisme-paradis-fiscal-espionnage-snowden [direct][arc]
- 91 : http://www.afr.com/p/technology/interview_transcript_former_head_51yP0Cu1AQGUCs7WAC9ZVN [direct][arc]
- 92 : http://www.nytimes.com/2014/09/17/opinion/israels-nsa-scandal.html?_r=1 [direct][arc]
- 93 : http://www.nytimes.com/2014/09/13/world/middleeast/elite-israeli-officers-decry-treatment-of-palestinians.html?_r=0 [direct][arc]
- 94 : http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html [direct][arc]
- 95 : https://mic.com/articles/50459/8-whistleblowers-charged-with-violating-the-espionage-act-under-obama#.9rAHcsE6b [direct][arc]
- 96 : http://www.politifact.com/punditfact/statements/2014/jan/10/jake-tapper/cnns-tapper-obama-has-used-espionage-act-more-all-/ [direct][arc]
- 97 : http://www.defenseone.com/business/2013/07/obama-whistleblower-witchhunt-wont-work-DOD/67598/ [direct][arc]
- 98 : http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security [direct][arc] voir en français: http://www.lemonde.fr/technologies/article/2013/09/05/cybersurveillance-la-nsa-a-contourne-les-garde-fous-qui-protegent-les-donnees_3472159_651865.html [direct][arc]
- 99 : https://citizenlab.org/2013/07/planet-blue-coat-redux/ [direct][arc]
- 100 : https://www.netsweeper.com/products/content-filtering/ [direct][arc]
- 101 : https://www.forbes.com/sites/thomasbrewster/2016/10/25/procera-francisco-partners-turkey-surveillance-erdogan/#2e15d1443457 [direct][arc]
- 102 : https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/ [direct][arc]
- 103 : https://theintercept.com/2015/07/01/nsas-google-worlds-private-communications/ [direct][arc]
- 104 : http://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx [direct][arc]
- 105 : https://www.tbb.org.tr/en/banks-and-banking-sector-information/statistical-reports/20 [direct][arc]
- 106 : https://www.forbes.com/sites/thomasbrewster/2016/05/31/ability-unlimited-spy-system-ulin-ss7/#3c13a96063fa [direct][arc] ; https://www.forbes.com/sites/thomasbrewster/2016/02/11/nypd-stingrays-all-over-new-york/#13e981d82d84 [direct][arc]
- 107 : http://www.interceptors.com/ability-script.pdf [direct][arc] (nb:arc: https://web.archive.org/web/20161229112553/http://www.interceptors.com/ability-script.pdf [direct] )
- 108 : http://www.wassenaar.org/ [direct][arc]
- 109 : http://www.international.gc.ca/controls-controles/report-rapports/2015.aspx?lang=eng [direct][arc]
- 110 : http://www.sviluppoeconomico.gov.it/index.php/it/component/content/article?id=2022475 [direct][arc]
- 111 : http://www.timesofisrael.com/israeli-government-okayed-sale-of-spyware-that-exploits-iphones/ [direct][arc]
- 112 : https://blog.imirhil.fr/2017/02/21/logiciel-libre-gouvernance-ethique.html [direct][arc]
- 113 : http://www3.epa.gov/otaq/cert/documents/vw-nov-caa-09-18-15.pdf [direct][arc]
- 114 : http://www.bloomberg.com/news/articles/2015-09-19/vw-clean-diesel-scheme-exposed-as-u-s-weighs-criminal-charges [direct][arc]
- 115 : http://www.volkswagenag.com/content/vwcorp/info_center/en/news/2015/09/Ad_hoc_US.html [direct][arc]
- 116 : http://www3.epa.gov/otaq/standards/light-duty/tier2stds.htm [direct][arc]
- 117 : http://www.dieselforum.org/about-clean-diesel/what-is-clean-diesel [direct][arc]
- 118 : http://www.theicct.org/sites/default/files/publications/ICCT_PEMS-study_diesel-cars_20141013.pdf [direct][arc]
- 119 : http://www.nytimes.com/2015/09/21/business/international/volkswagen-chief-apologizes-for-breach-of-trust-after-recall.html [direct][arc]
- 120 : https://www.wired.com/2015/09/epa-opposes-rules-couldve-exposed-vws-cheating/ [direct][arc]
- 121 : http://www.lemagit.fr/tribune/Laffaire-Volkswagen-Un-plaidoyer-pour-le-logiciel-libre [direct][arc] ;http://www.toolinux.com/L-affaire-Volkswagen [direct][arc]
- 122 : https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ [direct][arc]
- 123 : https://www.wired.com/2015/08/researchers-hacked-model-s-teslas-already/ [direct][arc]
- 124 : http://www.pcworld.com/article/3012220/security/internet-connected-hello-barbie-doll-can-be-hacked.html [direct][arc]
- 125 : http://fusion.net/story/192189/internet-connected-baby-monitors-trivial-to-hack/ [direct][arc]
- 126 : http://www.theregister.co.uk/2015/08/24/smart_fridge_security_fubar/ [direct][arc]
- 127 : https://www.wired.com/2015/07/hackers-can-disable-sniper-rifleor-change-target/ [direct][arc]
- 128 : https://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/#57668e47e426 [direct][arc]
- 129 : http://www.theregister.co.uk/2016/10/25/medsec_vs_st_jude_indy_pentester_report_lands/ [direct][arc]
- 130 : http://www.vocativ.com/358530/smart-dildo-company-sued-for-tracking-users-habits/ [direct][arc]
- 131 : http://observatoire-du-vote.eu/?page_id=38 [direct][arc]
- 132 : http://oumph.free.fr/textes/vote_electronique_issy.html [direct][arc]
- 133 : http://cdst.revues.org/326 [direct][arc]
- 134 : https://www.vice.com/fr/article/ce-hackeur-canadien-divulgue-les-infos-personnelles-des-racistes-d-internet [direct][arc]
- 135 : http://rue89.nouvelobs.com/2014/08/14/vengeance-dun-pseudo-hacker-contre-rue89-vire-tragique-254205 [direct][arc]
- 136 : http://www.leparisien.fr/yvelines-78/mantes-la-ville-une-elue-d-opposition-victime-d-un-swatting-12-03-2015-4597789.php [direct][arc]
- 137 : http://www.europalestine.com/spip.php?article10749 [direct][arc] ; http://www.ujfp.org/spip.php?article3966 [direct][arc]
- 138 : https://www.nextinpact.com/news/98208-les-sanctions-contre-revenge-porn-portees-a-deux-ans-prison-et-60-000-euros-d-amende.htm [direct][arc]
- 139 : http://europe.newsweek.com/revenge-porn-italy-tiziana-cantone-nightclub-rapevideo-499292?rm=eu [direct][arc]
02
- 1 : https://fr.wikipedia.org/wiki/Leet_speak [direct]
- 2 : https://encyclopediadramatica.se/Main_Page [direct][arc] (nb:arc: https://web.archive.org/web/20170420082533/https://encyclopediadramatica.rs/Main_Page [direct] )
- 3 : https://events.ccc.de [direct][arc]
- 4 : http://www.bbc.com/news/technology-10554538 [direct][arc]
- 5 : https://fr.wikipedia.org/wiki/Steven_Levy [direct]
- 6 : http://blog.historyofphonephreaking.org/ [direct][arc]
- 7 : http://www.2600.com/ [direct][arc]
- 8 : https://fr.wikipedia.org/wiki/Hackers [direct]
- 9 : http://www.cs.indiana.edu/docproject/bdgtti/bdgtti_toc.html#SEC57 [direct][arc]
- 10 : http://www.cs.indiana.edu/docproject/bdgtti/bdgtti_8.html [direct][arc]
- 11 : https://w2.eff.org/Net_culture/Net_info/EFF_Net_Guide/EEGTTI_HTML/eeg_91.html [direct][arc] (nb:arc: https://web.archive.org/web/20170301004653/https://w2.eff.org/Net_culture/Net_info/EFF_Net_Guide/EEGTTI_HTML/eeg_91.html [direct] )
- 12 : news:alt.fan.warlord
- 13 : Voir par exemple page 391 de The Johns Hopkins Guide to Digital Media ouhttps://en.wikipedia.org/wiki/Netochka_Nezvanova_(author) [direct] .
- 14 : http://www.weirdcrap.com/recreational/bricefq1.htm [direct][arc]
- 15 : http://www.catb.org/jargon/html/B/B1FF.html [direct][arc]
- 16 : http://www.wired.com/1994/OS/alt.tes/class [direct][arc]
- 17 : https://www.youtube.com/watch?v=RFjU8bZR19A [direct]
- 18 : https://www.youtube.com/watch?v=DNO6G4ApJQY [direct]
- 19 : http://www.rsr.ch/#/la-1ere/programmes/on-en-parle/3058588-le-troll-la-bete-noire-du-net.html [direct][arc]
- 20 : http://www.ibls.com/internet_law_news_portal_view.aspx?s=latestnews&id=1972 [direct][arc]
- 21 : http://blog.wired.com/27bstroke6/2008/01/anonymous-attac.html [direct][arc]
- 22 : https://upload.wikimedia.org/wikipedia/commons/7/73/Message_to_Scientology.ogv [direct][arc]
- 23 : http://www.motherjones.com/mojo/2008/09/sarah-palins-secret-emails [direct][arc]
- 24 : http://sunshinereview.org/index.php/Alaska_Public_Records_Act [direct][arc] (nb:arc: https://web.archive.org/web/20131213013911/http://ballotpedia.org:80/Alaska_Public_Records_Act [direct] )
- 25 : http://machinist.salon.com/blog/2008/09/15/palin_emails/ [direct][arc] (nb:arc: https://web.archive.org/web/20121013131937/http://www.salon.com/2008/09/15/palin_emails/ [direct] )
- 26 : http://arstechnica.com/tech-policy/2008/09/palins-e-mail-habits-come-under-fire/ [direct][arc]
- 27 : http://www.motherjones.com/politics/2011/06/sarah-palin-email-saga [direct][arc]
- 28 : https://www.wired.com/2008/09/palin-e-mail-ha/ [direct][arc]
- 29 : http://gawker.com/5051193/sarah-palins-personal-emails [direct][arc]
- 30 : https://wikileaks.org/wiki/VP_contender_Sarah_Palin_hacked [direct][arc]
- 31 : http://www.slate.com/articles/technology/technology/2008/09/hacking_sarah_palin.html [direct][arc]
- 32 : http://www.memphisflyer.com/JacksonBaker/archives/2013/07/25/david-kernell-is-out-from-under [direct][arc]
- 33 : http://thephoenix.com/Boston/News/70055-Photos-Guy-Fawkes-Day/ [direct][arc]
- 34 : http://blogs.mediapart.fr/edition/club-acte-2/article/110211/les-sociabilites-neuves-des-communautes-dinformation [direct][arc]
- 35 : http://knowyourmeme.com/memes/it-s-over-9000 [direct][arc]
- 36 : http://blogs.suntimes.com/oprah/2008/09/oprah_winfrey_goes_after_inter.html [direct][arc] (nb:arc https://web.archive.org/web/20150920164618/http://blogs.suntimes.com/oprah/2008/09/oprah_winfrey_goes_after_inter.html [direct] )
- 37 : http://ireport.cnn.com/docs/DOC-93559 [direct][arc] ;https://www.reddit.com/r/funny/comments/72g7t/oprah_gets_trolled_by_anonymous_oprah_vs_over/ [direct][arc]
- 38 : http://www.liberation.fr/ecrans/2010/09/20/pedobear-la-chasse-a-l-ours-est-ouverte_954765 [direct][arc]
- 39 : http://knowyourmeme.com/memes/events/over-9000-penises [direct][arc]
- 40 : http://www.liberation.fr/ecrans/2009/07/22/la-pedophilie-sur-internet-encore-instrumentalisee_958768?page=article [direct][arc]
- 41 : http://www.guardian.co.uk/media/2012/jun/12/how-to-deal-with-trolls [direct][arc]
- 42 : http://archive.wikiwix.com/cache/?url=http://news.ninemsn.com.au/technology/827036/internet-underground-takes-on-iran [direct][arc]
- 43 : http://www.abc.net.au/news/stories/2009/09/10/2681642.htm [direct][arc]
- 44 : http://news.bbc.co.uk/2/hi/uk_news/8061979.stm [direct][arc]
- 45 : http://legifrance.gouv.fr/affichTexte.do;?cidTexte=JORFTEXT000021573619&dateTexte=vig [direct][arc]
- 46 : http://www.liberation.fr/france-archive/2009/04/10/le-ps-ruse-et-coince-hadopi-a-l-assemblee_559240 [direct][arc]
- 47 : https://yro.slashdot.org/story/04/07/27/129219/patriot-act-used-to-enforce-copyright-law [direct][arc] ;https://www.techdirt.com/articles/20100129/0630057974.shtml [direct][arc]
- 48 : http://www.indiantelevision.com/aac/y2k10/aac589.php [direct][arc]
- 49 : https://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/ [direct][arc]
- 50 : http://www.theregister.co.uk/2010/09/20/4chan_ddos_mpaa_riaa/ [direct][arc]
- 51 : https://torrentfreak.com/images/mpaaddos.jpg [direct][arc]
- 52 : http://torrentfreak.com/4chan-to-ddos-riaa-next-is-this-the-protest-of-the-future-100919/ [direct][arc]
- 53 : http://www.pandasecurity.com/mediacenter/news/4chan-users-organize-ddos-against-mpaa/ [direct][arc]
- 54 : http://techcrunch.com/2010/09/19/riaa-attack/ [direct][arc]
- 55 : https://torrentfreak.com/4chan-to-ddos-riaa-next-is-this-the-protest-of-the-future-100919/ [direct][arc]
- 56 : http://www.slyck.com/story2040_Your_Quick_Reference_Guide_to_Current_US_BitTorrent_Lawsuits [direct][arc]
- 57 : http://www.theregister.co.uk/2009/05/12/davenport_lyons_acs_law/ [direct][arc]
- 58 : https://web.archive.org/web/20110721060833/http://www.t3.com/news/law-firm-hands-out-thousands-of-fines-to-suspected-digital-pirates?=42559 [direct]
- 59 : http://news.bbc.co.uk/1/hi/technology/8481790.stm [direct][arc]
- 60 : https://web.archive.org/web/20091216055249/http://beingthreatened.yolasite.com:80/press-index.php [direct]
- 61 : http://www.lawgazette.co.uk/opinion/letters/which-hunt [direct][arc] (nb:arc: https://web.archive.org/web/20160310011935/http://www.lawgazette.co.uk/54926.article [direct] )
- 62 : http://www.bbc.co.uk/news/technology-12275913 [direct][arc]
- 63 : http://torrentfreak.com/wrongfully-accused-of-file-sharing-file-for-harassment-100831/ [direct][arc]
- 64 : https://web.archive.org/web/20160129200458/http://www.parliament.the-stationery-office.co.uk/pa/ld200910/ldhansrd/text/100126-0003.htm [direct]
- 65 : http://www.theregister.co.uk/2010/09/22/acs_4chan/ [direct][arc]
- 66 : http://arstechnica.com/tech-policy/news/2010/09/amounts-to-blackmail-inside-a-p2p-settlement-letter-factory.ars [direct][arc]
- 67 : http://www.wired.co.uk/news/archive/2010-09/27/leaked-emails-fuel-anti-piracy-scandal [direct][arc] (nb:arc: https://web.archive.org/web/20160201012130/http://www.wired.co.uk/news/archive/2010-09/27/leaked-emails-fuel-anti-piracy-scandal [direct] )
- 68 : http://www.guardian.co.uk/technology/blog/2010/oct/01/acslaw-filesharing-accused [direct][arc]
- 69 : http://www.which.co.uk/news/2009/07/more-innocent-consumers-accused-of-filesharing--179504 [direct][arc]
- 70 : http://www.bbc.co.uk/newsbeat/article/11430299/my-details-appeared-on-porn-list [direct][arc]
- 71 : https://torrentfreak.com/acslaw-gay-porn-letters-target-pensioners-married-men-100925/ [direct][arc]
- 72 : http://www.theregister.co.uk/2008/04/08/church_of_scientology_contacts_wikileaks/ [direct][arc]
- 73 : https://www.wikileaks.org/wiki/Sarah_Palin_Yahoo_account_2008 [direct][arc]
- 74 : http://www.imdb.com/title/tt1799148/ [direct][arc]
- 75 : http://www.wired.com/threatlevel/2010/06/leak/ [direct][arc]
- 76 : https://web.archive.org/web/20100722020415/http://www.aolnews.com/nation/article/wikileaks-snitch-hacker-adrian-lamo-faces-wrath-of-his-peers/19562042 [direct]
- 77 : http://213.251.145.96/cablegate.html [direct][arc] (nb:arc:maybe: https://web.archive.org/web/20150315004721/http://wikileaks.ch/cablegate.html [direct] )
- 78 : https://en.wikipedia.org/wiki/Reactions_to_the_United_States_diplomatic_cables_leak [direct]
- 79 : http://www.bbc.co.uk/news/technology-11935539 [direct][arc]
- 80 : http://www.nytimes.com/2010/12/06/world/europe/06wiki.html?_r=1&partner=rss&emc=rss [direct][arc]
- 81 : http://www.theatlantic.com/technology/archive/2010/12/wikileaks-exposes-internets-dissent-tax-not-nerd-supremacy/68397/ [direct][arc]
- 82 : https://fr.wikipedia.org/wiki/R%C3%A9volution_am%C3%A9ricaine [direct]
- 83 : Commander X. Behind The Mask: An Inside Look At Anonymous. lulu.com (ISBN 9781365301513)
- 84 : http://www.washingtonpost.com/wp-dyn/content/article/2011/01/25/AR2011012502918.html [direct][arc]
- 85 : http://www.cbc.ca/news/canada/story/2012/03/15/f-online-protest.html [direct][arc] (nb:arc: https://web.archive.org/web/20160123041451/http://www.cbc.ca/news/canada/from-anonymous-to-shuttered-websites-the-evolution-of-online-protest-1.1134948 [direct] )
- 86 : http://switch.sjsu.edu/web/v4n2/stefan/ [direct][arc] (nb:arc: https://web.archive.org/web/20170526032033/switch.sjsu.edu/web/v4n2/stefan [direct] )
- 87 : http://english.aljazeera.net/indepth/features/2011/01/20111614145839362.html [direct][arc]
- 88 : https://userscripts.org/scripts/show/94122 [direct][arc] (nb:arc: https://web.archive.org/web/20140201123740/https://userscripts.org/scripts/show/94122) [direct]
- 89 : http://cryptoanarchy.org/wiki/Telecomix [direct][arc] (nb:arc: https://web.archive.org/web/20120724161944/https://cryptoanarchy.org/w/index.php?title=Telecomix& [direct] )
- 90 : https://www.youtube.com/watch?v=bilJ7lZtutQ [direct]
- 91 : http://www.theatlantic.com/international/archive/2011/01/egyptian-activists-action-plan-translated/70388/ [direct][arc]
- 92 : http://www.aljazeera.com/news/middleeast/2011/05/201151917634659824.html [direct][arc]
- 93 : http://arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars [direct][arc]
- 94 : http://english.aljazeera.net/indepth/opinion/2011/03/20113981026464808.html [direct][arc]
- 95 : https://www.nextinpact.com/archive/63924-sony-pictures-lulzsec-piratage-mots-depasse-vol-donnees.htm [direct][arc]
- 96 : http://www.tnr.com/blog/the-study/89997/hacking-fun-more-profit [direct][arc]
- 97 : http://arstechnica.com/tech-policy/news/2011/06/lulzsec-heres-why-we-hack-you-bitches.ars [direct][arc]
- 98 : http://www.independent.co.uk/news/world/americas/who-are-the-group-behind-this-weeks-cia-hack-2298430.html [direct][arc] ; http://www.pcmag.com/article2/0,2817,2387219,00.asp [direct][arc]
- 99 : http://www.wired.com/threatlevel/2011/05/lulzsec/ [direct][arc]
- 100 : http://www.guardian.co.uk/technology/blog/2011/jun/24/lulzsec-site-down-hacker-jester [direct][arc] ;http://www.computerandvideogames.com/308986/lulzsec-hacked-by-anti-hacking-group/ [direct][arc]
- 101 : http://www.thesmokinggun.com/documents/internet/hackers-who-tried-sink-lulz-boat-071289 [direct][arc] ;http://sanfrancisco.ibtimes.com/articles/169577/20110625/lulzsec-sails-into-sunset-as-teamp0ison-terrorizes-internet-antisec-anti-security-anonymous-hacker.htm [direct][arc] (nb:arc: https://web.archive.org/web/20120428074543/http://www.ibtimes.com/articles/169577/20110625/lulzsec-sails-into-sunset-as-teamp0ison-terrorizes-internet-antisec-anti-security-anonymous-hacker.htm [direct] );http://www.guardian.co.uk/technology/2011/jun/24/lulzsec-irc-leak-the-full-record [direct][arc]
- 102 : http://www.nytimes.com/2010/12/04/world/europe/04domain.html [direct][arc]
- 103 : http://risky.biz/forum/why-we-secretly-love-lulzsec [direct][arc] (nb:arc: https://web.archive.org/web/20151001234144/http://risky.biz/forum/why-we-secretly-love-lulzsec [direct] )
- 104 : http://www.passwordrandom.com/most-popular-passwords [direct][arc]
- 105 : http://owni.fr/2011/06/08/sur-les-traces-de-lulz-security-les-hackers-invisibles/ [direct][arc]
- 106 : http://uk.ibtimes.com/articles/167639/20110622/lulzsec-lulz-security-anonymous-operation-anti-security-anti-sec-hacked-cleary-ryan-arrest-attack.htm [direct][arc] (nb:arc: https://web.archive.org/web/20131111195507/http://www.ibtimes.co.uk/articles/167639/20110622/lulzsec-lulz-security-anonymous-operation-anti-security-anti-sec-hacked-cleary-ryan-arrest-attack.htm [direct] )
- 107 : http://www.bbc.co.uk/news/technology-13912836 [direct][arc]
- 108 : Inutile de faire un catalogue à la Prévert des attaques perpétrées dans le cadre de l’opérationAntiSec : https://en.wikipedia.org/wiki/Operation_AntiSec [direct]
- 109 : https://twitter.com/atopiary/status/94225773896015872 [direct][arc]
- 110 : http://www.nytimes.com/2014/04/24/world/fbi-informant-is-tied-to-cyberattacks-abroad.html [direct][arc]
- 111 : https://fr.wikipedia.org/wiki/Quatri%C3%A8me_pouvoir [direct]
- 112 : https://www.theguardian.com/world/blog/2010/dec/03/julian-assange-wikileaks [direct][arc]
- 113 : https://www.theguardian.com/news/datablog/2010/nov/29/wikileaks-cables-data#data [direct][arc]
- 114 : http://owni.fr/2011/12/01/spy-files-interceptions-ecoutes-wikilleaks-qosmos-amesys-libye-syrie/ [direct][arc]
- 115 : http://cryptome.org/0002/ja-conspiracies.pdf [direct][arc]
- 116 : http://www.hyperorg.com/blogger/2010/12/05/truth-is-not-enough/ [direct][arc]
- 117 : https://zunguzungu.wordpress.com/2010/11/29/julian-assange-and-the-computer-conspiracy-%E2%80%9Cto-destroy-this-invisible-government%E2%80%9D/ [direct][arc] pour une analyse très complète.
- 118 : http://gawker.com/5773533/julian-assange-my-enemies-are-all-jews-and-sissies [direct][arc]
- 119 : http://www.slate.com/blogs/the_slatest/2016/07/25/what_wikileaks_might_have_meant_by_that_anti_semitic_tweet.html [direct][arc]
- 120 : https://www.rt.com/tags/the-julian-assange-show/ [direct][arc]
- 121 : https://twitter.com/wikileaks/status/756206619860561920 [direct][arc]
- 122 : http://rue89.nouvelobs.com/2016/07/22/wikileaks-menace-creer-twitter-apres-quun-troll-a-ete-banni-264749 [direct][arc]
- 123 : http://www.newyorker.com/magazine/2010/06/07/no-secrets [direct][arc]
- 124 : https://voicerepublic.com/talks/reports-from-the-front [direct][arc] L’intervention en question, par JacobAppelbaum, est à partir de 73 min 30 sec.
- 125 : http://www.telerama.fr/monde/alan-rusbridger-du-guardian-wikileaks-a-instaure-un-nouveau-type-de-rapports-entre-journalisme-et-technologie,65785.php [direct][arc]
- 126 : http://owni.fr/2011/08/23/les-confusions-dun-dissident-de-wikileaks/ [direct][arc]
- 127 : http://www.telerama.fr/medias/le-cinquieme-pouvoir-le-film-sur-wikileaks-est-il-conforme-a-la-realite-des-faits,105860.php [direct][arc]
- 128 : http://www.telerama.fr/medias/wikileaks-regle-ses-comptes-dans-un-documentaire,103930.php [direct][arc]
- 129 : Voir pour davantage de détails et des entretiens, l’e-book d’Olivier Tesquet publié en 2011 surl’histoire de WikiLeaks http://shop.owni.fr/fr/41-la-veritable-histoire-de-wikileaks.html [direct][arc] (nb:arc: https://web.archive.org/web/20120107135939/http://shop.owni.fr/fr/41-la-veritable-histoire-de-wikileaks.html [direct] )
- 130 : https://twitter.com/YourAnonNews/status/256194158971215872 [direct][arc]
- 131 : http://pastebin.com/Juxb5M26 [direct][arc]
- 132 : https://twitter.com/wikileaks/status/758781081072046080?ref_src=twsrc%5Etfw] [direct][arc]
- 133 : https://twitter.com/cyberrights/status/758390450009104385 [direct][arc]
- 134 : https://wikileaks.org/akp-emails/ [direct][arc]
- 135 : http://www.reuters.com/article/us-turkey-security-wikileaks-idUSKCN1000H1 [direct][arc] ; http://www.numerama.com/politique/183868-la-turquie-bloque-wikileaks-pour-tenter-de-limiter-les-revelations.html [direct][arc]
- 136 : https://twitter.com/wikileaks/status/755657280406822912 [direct][arc]
- 137 : https://twitter.com/dasecho/status/755758522416128000 [direct][arc]
- 138 : https://twitter.com/ragipsoylu/status/755513149663707137 [direct][arc]
- 139 : https://twitter.com/ragipsoylu/status/755511448407801856 [direct][arc]
- 140 : https://wikileaks.org/akp-emails/?q=&mfrom=akparti.org.tr&mto=&title=¬itle=&date_from=&date_to=&nofrom=¬o=&count=50&sort=0#searchresult [direct][arc]
- 141 : https://wikileaks.org/akp-emails/emailid/31401 [direct][arc]
- 142 : https://medium.com/@crymora/when-leaking-turns-into-dumping-61efcd20c96a#.ehbczztez [direct][arc]
- 143 : https://glomardisclosure.com/2016/07/26/the-who-and-how-of-the-akp-hack-dump-and-wikileaks-release [direct][arc]
- 144 : http://www.huffingtonpost.com/zeynep-tufekci/wikileaks-erdogan-emails_b_11158792.html [direct][arc]
- 145 : https://twitter.com/zeynep/status/757712462925926401 [direct][arc]
- 146 : https://twitter.com/zeynep/status/757754939640799234 [direct][arc]
- 147 : https://twitter.com/zeynep/status/757750555015979008 [direct][arc]
- 148 : https://twitter.com/misterlast/status/757754961191137280 [direct][arc]
- 149 : https://bontchev.nlcv.bas.bg/index.html [direct][arc]
- 150 : https://github.com/bontchev/wlscrape/blob/master/malware.md [direct][arc]
- 151 : https://wikileaks.org/podesta-emails/ [direct][arc]
- 152 : http://www.politifact.com/global-news/statements/2016/oct/16/mike-pence/did-qatar-promise-clinton-foundation-1-million-fiv/ [direct][arc]
- 153 : http://www.nytimes.com/2016/07/27/us/politics/assange-timed-wikileaks-release-of-democratic-emails-to-harm-hillary-clinton.html?smid=tw-nytimes&smtyp=cur&_r=0 [direct][arc]
- 154 : http://www.lemonde.fr/pixels/article/2016/07/25/le-parti-democrate-voit-la-main-de-la-russie-derriere-la-publication-d-e-mails-par-wikileaks_4974501_4408996.html [direct][arc]
- 155 : http://rue89.nouvelobs.com/2016/10/31/maintenant-e-mails-clinton-entre-photos-bites-265545 [direct][arc]
- 156 : https://twitter.com/RogerJStoneJr/status/782443074874138624 [direct][arc]
- 157 : http://www.telegraph.co.uk/news/uknews/law-and-order/11039528/Jui-lien-Assange-suffering-heart-condition-after-two-year-embassy-confinement-it-is-claimed.html [direct][arc] ;http://www.ibtimes.co.uk/medical-woes-julian-assange-exhaustion-pain-likely-deteriorating-mental-state-1581689 [direct][arc]
- 158 : http://www.nbcnews.com/politics/2016-election/wikileaks-fuels-conspiracy-theories-about-dnc-staffer-s-death-n627401 [direct][arc]
- 159 : https://www.bloomberg.com/news/articles/2016-10-11/how-julian-assange-turned-wikileaks-into-trump-s-best-friend [direct][arc]
- 160 : http://tempsreel.nouvelobs.com/rue89/rue89-politique/20161004.RUE3976/pour-ses-10-ans-wikileaks-fait-une-conference-et-zero-revelation.html [direct][arc]
- 161 : https://twitter.com/KFILE/status/775110996071424001?ref_src=twsrc%5Etfw] [direct][arc]
- 162 : http://www.bloomberg.com/politics/articles/2016-10-08/clinton-refuses-to-disavow-hacked-excerpts-from-paid-speeches [direct][arc] ; https://www.washingtonpost.com/news/post-politics/wp/2016/10/11/clinton-campaign-chairman-says-fbi-probing-criminal-hack-of-his-email/?postshare=3211476278016159%20&tid=ss_mail [direct][arc]
- 163 : https://fr.scribd.com/document/28385794/Us-Intel-Wikileaks [direct][arc]
- 164 : http://www.salon.com/2010/12/15/manning_3/ [direct][arc]
- 165 : http://www.nytimes.com/2010/10/24/world/24assange.html?pagewanted=all [direct][arc]
- 166 : http://www.washingtonpost.com/wp-dyn/content/article/2010/11/30/AR2010113001095.html [direct][arc]
- 167 : http://www.huffingtonpost.com/2010/12/07/fox-news-bob-beckel-calls_n_793467.html [direct][arc]
- 168 : http://www.guardian.co.uk/media/2010/dec/17/julian-assange-sweden [direct][arc]
- 169 : http://www.bbc.co.uk/news/world-us-canada-11856122 [direct][arc]
- 170 : http://media.washingtonpost.com/wp-srv/politics/documents/Dept_of_State_Assange_letter.pdf [direct][arc]
- 171 : https://www.bloomberg.com/news/articles/2016-10-11/how-julian-assange-turned-wikileaks-into-trump-s-best-friend [direct][arc]
- 172 : http://pastebin.com/Juxb5M26 [direct][arc]
- 173 : http://www.nytimes.com/2016/08/08/opinion/can-we-trust-julian-assange-and-wikileaks.html [direct][arc]
03
- 1 : http://lci.tf1.fr/france/societe/bernard-debre-lr-en-guerre-contre-la-vente-de-drogues-sur-internet-8755720.html [direct][arc] (nb:arc: https://web.archive.org/web/20160704001047/http://lci.tf1.fr/france/societe/bernard-debre-lr-comment-j-ai-achete-de-la-drogue-sur-internet-8755720.html [direct] )
- 2 : https://web.archive.org/web/20150325025545/http://darknet.se/about-darknet/ [direct]
- 3 : http://www.cs.virginia.edu/~cs757/slidespdf/757-09-overlay.pdf [direct][arc]
- 4 : https://freenetproject.org/ [direct][arc]
- 5 : http://msl1.mit.edu/ESD10/docs/darknet5.pdf [direct][arc] (nb:arc: https://web.archive.org/web/20170108170247/http://msl1.mit.edu/ESD10/docs/darknet5.pdf) [direct]
- 6 : https://fr.wikipedia.org/wiki/Gestion_des_droits_num%C3%A9riques [direct]
- 7 : Darknet: Hollywood’s War Against the Digital Generation (JD Lasica, 2005) en parle en destermes plus accessibles. Voir http://www.m21editions.com/fr/darknet.shtml [direct][arc]
- 8 : https://www.torproject.org/ [direct][arc]
- 9 : https://www.torproject.org/docs/faq#HideExits [direct][arc]
- 10 : Roger Dingledine, Nick Mathewson, Paul Syverson. Tor: The Second-Generation OnionRouter. http://www.onion-router.net/Publications/tor-design.pdf [direct][arc]
- 11 : http://www.themonthly.com.au/issue/2011/march/1324265093/robert-manne/cypherpunk-revolutionary [direct][arc]
- 12 : https://fr.wikipedia.org/wiki/Advanced_Encryption_Standard [direct]
- 13 : Chaum, D. L. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms.Communications of the ACM. 24 (2): 84–90. doi:10.1145/358549.358563.
- 14 : Chaum, David (1983). Blind signatures for untraceable payments. Advances in CryptologyProceedings of Crypto. 82 (3): 199–203. doi:10.1007/978-1-4757-0602-4_18.
- 15 : https://fr.wikipedia.org/wiki/Crypto_Wars#.C3.88re_de_l.27ordinateur_personnel [direct]
- 16 : Zimmermann, Philip (1995). “PGP Source Code and Internals”. MIT Press. ISBN 0-26224039-4.
- 17 : https://www.theguardian.com/uk-news/2015/jan/12/david-cameron-pledges-anti-terror-law-internet-paris-attacks-nick-clegg [direct][arc]
- 18 : http://www.nytimes.com/2015/11/17/us/after-paris-attacks-cia-director-rekindles-debate-over-surveillance.html?ref=world&_r=0 [direct][arc]
- 19 : https://nonblocking.info/liberte-egalite-tcpip/ [direct][arc]
- 20 : https://www.legifrance.gouv.fr/affichCodeArticle.do?idArticle=LEGIARTI000032655328&cidTexte=LEGITEXT000006071154 [direct][arc]
- 21 : https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000029754374&categorieLien=id [direct][arc]
- 22 : https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000032627231&categorieLien=id [direct][arc]
- 23 : http://www.activism.net/cypherpunk/manifesto.html [direct][arc] , Eric Hughes, 1993.
- 24 : McCullagh, Declan (2001-04-09). Cypherpunk’s Free Speech Defense. Wired.
- 25 : http://www.forbes.com/forbes/1999/1101/6411390a.html [direct][arc]
- 26 : https://www.bloomberg.com/news/articles/2015-09-17/bitcoin-is-officially-a-commodity-according-to-u-s-regulator [direct][arc]
- 27 : http://blogs.wsj.com/digits/2015/10/22/eu-rules-bitcoin-is-a-currency-not-a-commodity-virtually/ [direct][arc]
- 28 : https://www.cryptocoincharts.info/coins/info [direct][arc]
- 29 : https://theinternetofmoney.org [direct][arc]
- 30 : http://www.forbes.com/sites/laurashin/2016/07/14/this-man-traveled-around-the-world-for-18-months-spending-only-bitcoin/#10a2b9c6261e [direct][arc]
- 31 : https://www.saveonsend.com/blog/western-union-money-transfer/ [direct][arc]
- 32 : https://www.saveonsend.com/blog/bitcoin-money-transfer/ [direct][arc]
- 33 : https://web.archive.org/web/20131210164404/http://www.nytimes.com/2013/11/27/opinion/much-ado-about-bitcoin.html?_r=0 [direct]
- 34 : http://www.papergeek.fr/dark-web-et-deep-web-quelles-differences-et-comment-y-acceder-2963 [direct][arc]
- 35 : https://www.youtube.com/watch?v=r0l2FPRoGp8 [direct]
- 36 : http://Citazine.fr/article/jour-j-ai-plonge-dans-deep-web [direct][arc]
- 37 : https://i.imgur.com/vvXru.png [direct][arc]
- 38 : http://junkee.com/the-best-unsolved-mysteries-on-the-internet/35874/3 [direct][arc]
- 39 : https://www.youtube.com/watch?v=KztcytZSB-Q [direct]
- 40 : http://searchformarianasweb.tumblr.com/ [direct][arc]
- 41 : http://www.papergeek.fr/dark-web-et-deep-web-quelles-differences-et-comment-y-acceder-2963 [direct][arc]
- 42 : https://torflow.uncharted.software/#?ML=18.017578125,42.94033923363181,3 [direct][arc]
- 43 : https://metrics.torproject.org/hidserv-rend-relayed-cells.html [direct][arc]
- 44 : https://research.torproject.org/techreports/extrapolating-hidserv-stats-2015-01-31.pdf [direct][arc]
- 45 : https://terbiumlabs.com/darkwebstudy.html [direct][arc]
- 46 : http://www.tandfonline.com/doi/abs/10.1080/00396338.2016.1142085 [direct][arc]
- 47 : http://thebotnet.com/guides-and-tutorials/49828-how-to-access-the-hidden-wiki/ [direct][arc] ;http://wordswithmeaning.org/special-you-know-nothing-of-the-internet-exploring-the-deep-web-confessions-from-an-investigator/ [direct][arc]
- 48 : https://www.reddit.com/r/deepweb/comments/3iayfx/are_red_rooms_real/ [direct][arc]
- 49 : https://www.youtube.com/watch?v=aDvRZw9EMWo [direct] ; un YouTubeur nommé CreepyPasta enest également très friand.
- 50 : https://www.reddit.com/r/deepweb/comments/3irkmp/isis_redroom_megathread/ [direct][arc]
- 51 : https://www.reddit.com/r/deepweb/comments/3ittf5/was_isis_redroom_a_honeypot/ [direct][arc]
- 52 : https://www.reddit.com/r/deepweb/comments/3j0cz5/psa_do_not_go_to_that_new_isis_redroom_site_the/ [direct][arc]
- 53 : https://www.torproject.org/docs/faq#WhySlow [direct][arc]
- 54 : Une discussion intéressante et sensée dans cette vidéo : https://youtu.be/K47o2EgUIJU [direct][arc]
- 55 : http://www.abc.net.au/7.30/content/2015/s4300786.htm [direct][arc]
- 56 : http://www.theage.com.au/victoria/melbourne-hurtcore-paedophile-master-matthew-graham-pleads-guilty-20150908-gjht6d.html [direct][arc]
- 57 : http://www.theage.com.au/victoria/how-matthew-david-grahams-hurtcore-paedophile-habit-began-on-the-dark-web-20150908-gjhz43.html [direct][arc] ; https://www.deepdotweb.com/2016/03/23/child-porn-website-admin-matthew-david-graham-jailed-15-years/ [direct][arc]
- 58 : http://www.theage.com.au/victoria/australias-throwaway-children-20150903-gje3fq.html [direct][arc]
- 59 : http://www.9news.com.au/national/2015/03/16/02/19/tracking-the-australian-man-allegedly-responsible-for-horrific-child-sexual-abuse [direct][arc]
- 60 : http://www.snopes.com/horrors/madmen/snuff.asp [direct][arc]
- 61 : http://www.aljazeera.com/indepth/features/2016/10/dark-trade-rape-videos-sale-india-161023124250022.html [direct][arc]
- 62 : https://www.deepdotweb.com/2014/04/02/poll-should-we-publish-an-interview-with-a-pedo-site-owner/ [direct][arc]
- 63 : https://www.deepdotweb.com/clarification-cancelled-interview/ [direct][arc]
- 64 : http://www.bbc.com/news/technology-27885502 [direct][arc]
- 65 : http://www.dailydot.com/crime/iowa-woman-craigslist-killer-father-schmidt/ [direct][arc]
- 66 : http://www.cbsnews.com/news/facebook-murder-for-hire-plot-pa-teen-corey-adams-admits-he-used-site-to-go-after-rape-accuser/ [direct][arc]
- 67 : http://abcnews.go.com/US/ohio-facebook-murder-fur-hire-plot/story?id=15765843 [direct][arc]
- 68 : http://www.dailydot.com/crime/deep-web-murder-assassination-contract-killer/ [direct][arc]
- 69 : https://en.wikipedia.org/wiki/Assassination_market [direct]
- 70 : http://www.forbes.com/sites/andygreenberg/2013/11/18/meet-the-assassination-market-creator-whos-crowdfunding-murder-with-bitcoins/ [direct][arc]
- 71 : Pour le trafic d’êtres humains, voir par exemple ce billet de Deku-Shrubhttp://pirate.london/2015/11/human-hunting-on-the-internet-also-not-a-real-thing/ [direct][arc]
- 72 : https://en.wikipedia.org/wiki/Albanian_mafia#Besa [direct]
- 73 : http://www.hire-a-hitman.com/hire-a-hitman/ [direct][arc]
- 74 : https://allthingsvice.com/2016/05/18/ugly-kids-are-cheaper-the-besa-files/ [direct][arc]
- 75 : Si vous vous y intéressez, mais ne savez pas trop qui raconte des choses sensées, une personne-ressource précieuse est Deku-shrub https://www.reddit.com/user/Deku-shrub [direct][arc]
- 76 : https://www.reddit.com/r/deepweb/comments/4d70hh/how_to_improve_rdeepweb/ [direct][arc]
- 77 : https://np.reddit.com/r/legaladvice/comments/5lpdd8/scammed_out_of_firearm_purchase/ [direct][arc]
- 78 : http://motherboard.vice.com/blog/darknet-touring-the-hidden-internets-illegal-markets [direct][arc] (nb:arc: https://web.archive.org/web/20160305020828/http://motherboard.vice.com/blog/darknet-touring-the-hidden-internets-illegal-markets [direct] )
- 79 : http://motherboard.vice.com/read/the-fbis-deep-web-raid-seized-a-bunch-of-fake-sites [direct][arc]
- 80 : http://www.afp.gov.au/media-centre/news/afp/2015/may/four-australians-charged-in-international-illegal-firearm-sting [direct][arc] (nb:arc: https://web.archive.org/web/20150923132329/http://www.afp.gov.au/media-centre/news/afp/2015/may/four-australians-charged-in-international-illegal-firearm-sting [direct] )
- 81 : https://www.deepdotweb.com/2015/07/07/agora-market-to-stop-listing-lethal-weapons/ [direct][arc]
- 82 : http://www.focus.de/kultur/kino_tv/tv-kolumne-beckmann-beckmann-will-kalaschnikow-im-darknet-kaufen-doch-das-experiment-geht-schief_id_5542330.html [direct][arc]
- 83 : https://www.deepdotweb.com/2016/05/20/german-tv-show-gets-scammed-trying-buy-ak47-darknet/ [direct][arc]
- 84 : https://www.deepdotweb.com/marketplace-directory/listing/therealdeal-market [direct][arc] ;https://www.reddit.com/user/TheRealDealMarket [direct][arc]
- 85 : https://www.reddit.com/r/BlackBank/comments/359oym/blackbank_service_under_ddos/ [direct][arc]
- 86 : http://www.deepdotweb.com/2015/05/31/meet-the-market-admin-who-was-responsible-for-the-ddos-attacks/ [direct][arc]
- 87 : http://www.deepdotweb.com/wp-content/uploads/2015/05/exit2.png [direct][arc]
- 88 : https://www.fbi.gov/news/stories/2015/july/cyber-criminal-forum-taken-down/cyber-criminal-forum-taken-down [direct][arc] ; voir aussi https://www.malwaretech.com/2015/07/darkode-returns-following-internationa.html [direct][arc]
- 89 : https://darkode.cc// [direct][arc]
- 90 : Une histoire détaillée https://www.deepdotweb.com/2015/07/20/darkode-extended-background-story/ [direct][arc]
- 91 : B. Dupont, A.-M. Côté, C. Savine et D. Décary-Hétu (2016), “The ecology of trust amonghackers”, Global Crime, DOI: 10.1080/17440572.2016.1157480
- 92 : https://twitter.com/Xylit0l [direct][arc]
- 93 : https://krebsonsecurity.com/2015/06/opms-database-for-sale-nope-it-came-from-another-us-gov/ [direct][arc]
- 94 : http://money.cnn.com/2015/05/22/technology/adult-friendfinder-hacked/ [direct][arc] ; déclaration du sitecompromis : http://ffn.com/security-updates/ [direct][arc] (nb:arc: https://web.archive.org/web/20150523221431/http://ffn.com/security-updates/ [direct] )
- 95 : https://teksecurityblog.com/hacked-how-safe-is-your-data-on-adult-social-sites/ [direct][arc]
- 96 : https://www.cnet.com/news/facebook-chief-security-officer-alex-stamos-web-summit-lisbon-hackers/ [direct][arc]
- 97 : https://nakedsecurity.sophos.com/2016/11/11/facebook-is-buying-up-stolen-passwords-on-the-black-market/ [direct][arc]
- 98 : http://www.informationsecuritybuzz.com/expert-comments/facebook-buying-back-stolen-passwords-dark-web/ [direct][arc]
- 99 : http://www.csoonline.com/article/3142404/security/security-experts-divided-on-ethics-of-facebooks-password-purchases.html [direct][arc]
- 100 : http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-the-french-underground.pdf [direct][arc]
- 101 : http://www.darkcomet-rat.com/ [direct][arc]
- 102 : http://www.ibtimes.co.uk/bitcoin-tumbler-business-covering-tracks-world-cryptocurrency-laundering-1487480 [direct][arc]
- 103 : https://www.ctc.usma.edu/posts/financing-terror-bit-by-bit [direct][arc]
- 104 : https://www.baselgovernance.org/news/global-conference-countering-money-laundering-and-digital-currencies [direct][arc]
- 105 : http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-the-french-underground.pdf [direct][arc]
- 106 : https://darknetmarkets.co/french-deep-web-market/ [direct][arc]
- 107 : https://www.deepdotweb.com/marketplace-directory/listing/french-dark-net/ [direct][arc]
- 108 : http://blog.trendmicro.com/trendlabs-security-intelligence/the-french-dark-net-is-looking-for-grammar-police/ [direct][arc]
- 109 : http://www.vocativ.com/393689/war-on-drugs-human-rights-violation/ [direct][arc]
- 110 : http://www.shroomery.org/forums/showflat.php/Number/13860995 [direct][arc]
- 111 : https://www.youtube.com/user/ohyeaross [direct]
- 112 : http://austincut.com/2012/01/silk-road-a-vicious-blow-to-the-war-on-drugs/ [direct][arc]
- 113 : http://stackoverflow.com/questions/15445285/how-can-i-connect-to-a-tor-hidden-service-using-curl-in-php [direct][arc]
- 114 : https://www.cs.columbia.edu/~smb/UlbrichtCriminalComplaint.pdf [direct][arc] (nb:arc: https://web.archive.org/web/20160617012119/https://www.cs.columbia.edu/~smb/UlbrichtCriminalComplaint.pdf [direct] )
- 115 : http://arstechnica.com/tech-policy/2013/10/feds-silkroad-boss-paid-80000-for-snitchs-murder-and-torture/ [direct][arc]
- 116 : Les échanges ayant mené à cette prétendue commande d’assassinat :http://arstechnica.com/tech-policy/2015/02/the-hitman-scam-dread-pirate-roberts-bizarre-murder-for-hire-attempts/ [direct][arc]
- 117 : https://www.theguardian.com/technology/2013/nov/21/silk-road-founder-held-without-bail [direct][arc]
- 118 : http://www.dailydot.com/crime/silk-road-murder-charges-ross-ulbricht/ [direct][arc]
- 119 : https://www.wired.com/2016/10/judges-question-ulbrichts-life-sentence-silk-road-appeal/ [direct][arc]
- 120 : https://www.deepdotweb.com/2017/01/08/ross-ulbricht-legal-defense-fund-hacked/ [direct][arc]
- 121 : http://arstechnica.com/tech-policy/2016/02/prosecutors-say-corrupt-silk-road-agent-has-co-conspirators-at-large/ [direct][arc] ; http://arstechnica.com/tech-policy/2016/08/stealing-bitcoins-with-badges-how-silk-roads-dirty-cops-got-caught/ [direct][arc]
- 122 : http://arstechnica.com/tech-policy/2016/09/exclusive-our-thai-prison-interview-with-an-alleged-top-advisor-to-silk-road/ [direct][arc]
- 123 : http://www.thecrimson.com/article/2013/12/16/unconfirmed-reports-explosives-four-buildings/ [direct][arc]
- 124 : http://www.thecrimson.com/article/2013/12/17/student-charged-bomb-threat/ [direct][arc]
- 125 : http://cbsboston.files.wordpress.com/2013/12/kimeldoharvard.pdf [direct][arc]
- 126 : https://research.torproject.org/techreports/tbb-forensic-analysis-2013-06-28.pdf [direct][arc]
- 127 : https://motherboard.vice.com/read/this-researcher-is-hunting-down-ip-addresses-of-dark-web-sites [direct][arc]
- 128 : https://motherboard.vice.com/read/some-dark-web-markets-have-better-user-security-than-gmail-instagram [direct][arc]
- 129 : https://mascherari.press/onionscan-report-this-one-weird-trick-can-reveal-information-from-25-of-the-dark-web-2/ [direct][arc]
- 130 : http://www.wired.co.uk/article/anonymous-targets-paedophiles [direct][arc]
- 131 : https://www.deepdotweb.com/2017/02/09/anonymous-hacks-freedom-hosting-ii-bringing-almost-20-active-darknet-sites/ [direct][arc]
- 132 : https://www.wired.com/2014/01/tormail/ [direct][arc]
- 133 : http://www.forbes.com/sites/runasandvik/2014/01/31/the-email-service-the-dark-web-is-actually-using/#402044448410 [direct][arc]
- 134 : http://motherboard.vice.com/read/the-dark-webs-biggest-market-is-going-to-stop-selling-guns [direct][arc]
- 135 : http://motherboard.vice.com/read/tip-if-youre-selling-guns-on-the-dark-web-dont-get-your-prints-on-them [direct][arc]
- 136 : http://arstechnica.com/business/2013/11/just-a-month-after-shutdown-silk-road-2-0-emerges/ [direct][arc]
- 137 : http://arstechnica.com/tech-policy/2014/11/silk-road-2-0-infiltrated-from-the-start-sold-8m-per-month-in-drugs/ [direct][arc]
- 138 : https://motherboard.vice.com/read/carnegie-mellon-university-attacked-tor-was-subpoenaed-by-feds [direct][arc] Ces données ont permis d’inculper un Écossaishttp://www.edinburghnews.scotsman.com/news/crime/fbi-helps-catch-edinburgh-man-selling-drugs-on-dark-web-1-4139454 [direct][arc]
- 139 : https://motherboard.vice.com/read/how-the-fbi-identified-suspects-behind-the-dark-webs-largest-child-porn-site-playpen [direct][arc]
- 140 : http://www.wired.com/2009/04/fbi-spyware-pro/ [direct][arc]
- 141 : http://www.reuters.com/article/us-usa-crime-childporn-idUSKCN0PI2CH20150708 [direct][arc]
- 142 : http://www.nytimes.com/roomfordebate/2016/01/27/the-ethics-of-a-child-pornography-sting [direct][arc]
- 143 : https://www.eff.org/deeplinks/2016/06/federal-court-fourth-amendment-does-not-protect-your-home-computer [direct][arc]
- 144 : http://www.nytimes.com/2015/12/27/business/dealbook/the-unsung-tax-agent-who-put-a-face-on-the-silk-road.html [direct][arc]
- 145 : https://motherboard.vice.com/read/the-google-search-that-took-down-ross-ulbricht [direct][arc]
- 146 : http://antilop.cc/sr/#jones [direct][arc]
- 147 : https://motherboard.vice.com/read/fbi-says-suspected-silk-road-architect-variety-jones-has-been-arrested [direct][arc]