We are destroying our counter-intelligence capabilities

Justification of espionage States have to ensure the continuity of their own existence, or in other words to ensure their sovereignty. For this, they must ensure their resources and fight threats. Their resources come from the taxation of the activity taking place on their territories. The threats come from players capable of changing the balance Read more about We are destroying our counter-intelligence capabilities[…]

Cloud computing: Only companies offering services based on cloud computing are making money

Key points of the analysis: – Applications and Internet services have become necessary to the communication and the management of ongoing business activity. The news regularly show how difficult it is for managers and top executives to measure the risks on cloud computing offers for their company. – A cloud contract is no longer about Read more about Cloud computing: Only companies offering services based on cloud computing are making money[…]

The internet of things is really the internet of connected services

From a continuously connected use of Internet Connection / disconnection In the early 2000s, citizen-users used to connect and disconnect from the internet. The main true personal data they provided was their credit card number. It is still true for some US citizens: they don’t have affordable quality high speed internet service. A continuous self-representation Read more about The internet of things is really the internet of connected services[…]

Clicking and accepting applications: a long-term contract

A long-term contract There is a difference between a software wholly distributed to its users and a software which client only is distributed to its users. When a user clicks and accepts the terms of use of Google, Twitter, Facebook or Whatsapp, he is agreeing to use a software which client only is distributed to Read more about Clicking and accepting applications: a long-term contract[…]

Personal data market: legal and black

I used until now the “social media industry” expression to refer to business models based on the exploitation of citizen’s personal data. As for the oil industry where oil is the raw material, citizen’s personal data are the raw material of the social media industry. From now on, I will use the expression “citizen’s personal Read more about Personal data market: legal and black[…]

NSA activities: hidden breaches on our data security are harmful to citizens, industries, fundamental rights, the security of the Nation

We may define a “legal breach” on data security as the one enforced by the Law. Citizens are aware of it and may modify it through the legislative process. Similarly, we may define a “hidden breach” on data security as the one which is not enforced by the Law. For example, lowering the quality of Read more about NSA activities: hidden breaches on our data security are harmful to citizens, industries, fundamental rights, the security of the Nation[…]

Ignoring data security is taking part in an organized system of looting and plundering of data

Before Prism, a safe ignorance No scandals Before Prism, representatives of legal entities could legitimately use Microsoft, Yahoo, Google, Facebook, Paltalk, YouTube, AOL, Skype and Apple services without knowing that these companies were delivering information, some of it about confidential business, about their entities to third parties, including competitors indirectly. Indeed, through the Prism program, Read more about Ignoring data security is taking part in an organized system of looting and plundering of data[…]