#huawei

  • Vidéosurveillance et intelligence artificielle : le grand flou de la RATP
    https://www.mediapart.fr/journal/france/280720/videosurveillance-et-intelligence-artificielle-le-grand-flou-de-la-ratp

    Intéressée par la « vidéosurveillance automatisée », la régie publique multiplie les expérimentations avec des partenaires privés. Dernier en date : un laboratoire d’intelligence artificielle à la station Châtelet-Les Halles, sur lequel règne une grande opacité. Faute de réponses de la RATP, Mediapart a décidé de saisir la Cada pour faire respecter le droit de savoir des usagers. Elles ne scruteront plus les passants. Installées début mai à la station de métro et de RER Châtelet-Les Halles, à Paris, dans (...)

    #Axone #Datakalab #RATP #Thalès #algorithme #CCTV #biométrie #facial #reconnaissance #vidéo-surveillance #[fr]Règlement_Général_sur_la_Protection_des_Données_(RGPD)[en]General_Data_Protection_Regulation_(GDPR)[nl]General_Data_Protection_Regulation_(GDPR) #masque #surveillance (...)

    ##[fr]Règlement_Général_sur_la_Protection_des_Données__RGPD_[en]General_Data_Protection_Regulation__GDPR_[nl]General_Data_Protection_Regulation__GDPR_ ##_ ##CNIL ##LaQuadratureduNet ##LDH-France ##Hypervision3D ##SmartCity ##Huawei ##comportement ##Deepomatic

  • A recipe for hypocrisy : democracies export surveillance tech without human rights
    https://aboutintel.eu/surveillance-export-human-rights

    As is, global trade in surveillance technology is a race to the bottom, in which liberal democratic governments continue to criticise the behaviour of others while using it to justify their own. In a twisted consequence of profits over human rights, democracies also continue to be the primary exporters of surveillance capabilities to repressive regimes. Controlling the spread of surveillance technology is a moral, legal, and strategic imperative though, and Europe must do better ; not only (...)

    #Huawei #algorithme #spyware #anti-terrorisme #exportation #FAI #vidéo-surveillance #écoutes #surveillance (...)

    ##PrivacyInternational

  • U.S. and China, Caught in ‘Ideological Spiral,’ Drift Toward Cold War
    https://www.nytimes.com/2020/07/14/world/asia/cold-war-china-us.html?campaign_id=158&emc=edit_ot_20200721&instance_id=204

    Relations are in free fall. Lines are being drawn. As the two superpowers clash over technology, territory and clout, a new geopolitical era is dawning. One by one, the United States has hit at the core tenets of Xi Jinping’s vision for a rising China ready to assume the mantle of superpower. In a matter of weeks, the Trump administration has imposed sanctions over punitive policies in Hong Kong and China’s western region of Xinjiang. It took new measures to suffocate Chinese innovation by (...)

    #Huawei #5G #technologisme #domination #lutte

  • Qui surveille, la CIA ou Huawei ?, par Dan Schiller
    https://www.monde-diplomatique.fr/mav/170/SCHILLER/61707

    Le premier ministre britannique Boris Johnson a décidé mardi d’interdire au géant chinois des télécommunications Huawei l’accès au réseau 5G du Royaume-Uni en raison d’un risque pour la sécurité nationale. « Je suis persuadé qu’ils ont fait ça parce que leurs experts en sécurité sont parvenus aux mêmes conclusions que les nôtres », a réagi le secrétaire d’État américain Mike Pompeo. Mais quelles conclusions, au juste ? Qui surveille, la CIA ou Huawei ? Surpris par l’arrivée sur le marché mondial du spécialiste de (...)

    #Alcatel-Lucent #Alibaba #Alphabet #Apple #Cisco #Crypto #Google #Huawei #Microsoft #Motorola #Nokia_Siemens #Samsung #Sony-Ericsson_ #Tencent #5G #technologisme #domination #bénéfices (...)

    ##lutte

  • Privée de Chine, la Silicon Valley « reporte ses ambitions sur l’Inde »
    https://www.lemonde.fr/economie/article/2020/07/15/privee-de-chine-la-silicon-valley-reporte-ses-ambitions-sur-l-inde_6046243_3

    La décision de Google d’investir 10 milliards de dollars sur les cinq prochaines années dans le sous-continent est un symbole du grand basculement géopolitique du « dragon chinois » vers le « tigre indien », analyse Philippe Escande, éditorialiste économique au « Monde ». Pertes et profits. La géopolitique a toujours fait bon ménage avec la technologie. D’Angela Merkel à Emmanuel Macron, de Xi Jinping à Donald Trump, chacun rêve de maîtriser son destin par la domestication des électrons de l’atome ou des (...)

    #Google #Huawei #Intel #Microsoft #Qualcomm #Reliance #Adobe #IBM #Facebook #bénéfices #GAFAM #lutte (...)

    ##Jio

  • European court decision radically changes rules on how internet users’ data is stored
    https://www.independent.co.uk/life-style/gadgets-and-tech/news/european-court-justice-privacy-shield-us-data-storage-brexit-a9622546

    The move protects the data of EU citizens, but it is unclear how it will affect the UK after Brexit People’s personal Facebook data, and the data kept by thousands of other companies on them, will not be able to be transferred from Europe to America because the US government could snoop on it. The European Court of Justice ruled the “Privacy Shield” – an agreement between the EU and the US which let companies transfer data between the regions – is invalid. The ruling means that Europeans’ (...)

    #Google #TikTok #Huawei #Facebook #données #BigData #PrivacyShield #[fr]Règlement_Général_sur_la_Protection_des_Données_(RGPD)[en]General_Data_Protection_Regulation_(GDPR)[nl]General_Data_Protection_Regulation_(GDPR)

    ##[fr]Règlement_Général_sur_la_Protection_des_Données__RGPD_[en]General_Data_Protection_Regulation__GDPR_[nl]General_Data_Protection_Regulation__GDPR_

  • Chine et États-Unis se livrent une guerre technologique sous-marine
    https://korii.slate.fr/tech/chine-etats-unis-guerre-technologique-sous-marine-cable-internet-liaison

    Une rivalité à 20.000 lieues sous les mers. Le projet date de 2016. « Pacific Light » est le fruit de l’association entre Google et Facebook avec Pacific Light Cable Network, une entreprise du New Jersey, pour dérouler un câble internet entre Los Angeles, Hong Kong, Taïwan et les Philippines. Cette liaison serait la première à relier directement les États-Unis et Hong Kong, ce qui permettrait de transmettre de l’information à 120 terabytes par seconde. Mais pour que ce projet voie le jour, les deux (...)

    #Google #US-Department-of-Justice-DoJ #FCC #Facebook #Huawei #5G #câble

  • IBM (not) ending facial recognition - our quick thoughts
    https://www.privacyinternational.org/news-analysis/3898/ibm-not-ending-facial-recognition-our-quick-thoughts

    On June 9th, in light of the global debate against racial injustices, the company IBM announced they would stop selling facial recognition. Here are 4 quick-fire thoughts we have on this. Key points This latest announcement is a PR stunt to distract from the reality : IBM has been profitting from the sale of technology to the police and it is at the heart of their business model. IBM is also harming the very communities it is pretending to protect by selling states technology aiming at (...)

    #Facewatch #IBM #Huawei #Amazon #algorithme #CCTV #SmartCity #biométrie #police #facial #fraude #reconnaissance #extrême-droite #pauvreté #urbanisme (...)

    ##pauvreté ##PrivacyInternational

  • Riconoscimento facciale, perché Como è tra le prime città a usarlo
    https://www.wired.it/internet/regole/2020/06/09/riconoscimento-facciale-como/?refresh_ce=

    I sistemi di videosorveglianza stanno diventando una realtà sempre più diffusa. Anche in Italia, dove la sperimentazione con il riconoscimento facciale procede. Negli ultimi mesi Como ha spinto molto in questa direzione, diventando una delle realtà urbane più avanzate nel suo utilizzo. In particolare, il modo in cui la città lombarda ha scelto, installato e attivato sistemi di riconoscimento facciale è emblematico per comprendere come la tecnologia stia prendendo piede da diversi punti di vista : (...)

    #surveillance #[fr]Règlement_Général_sur_la_Protection_des_Données_(RGPD)[en]General_Data_Protection_Regulation_(GDPR)[nl]General_Data_Protection_Regulation_(GDPR) #vidéo-surveillance #reconnaissance #facial #technologisme #migration #biométrie #CCTV #algorithme (...)

    ##[fr]Règlement_Général_sur_la_Protection_des_Données__RGPD_[en]General_Data_Protection_Regulation__GDPR_[nl]General_Data_Protection_Regulation__GDPR_ ##Huawei

  • Riconoscimento facciale, perché Como è tra le prime città a usarlo - Wired

    Perché Como è diventata una delle prime città in Italia a usare il riconoscimento facciale
    Il Comune ha già fatto due appalti per dotarsi di sistemi di videosorveglianza con riconoscimento facciale. Ma su che basi? L’inchiesta di Wired con le carte della gara

    https://www.wired.it/internet/regole/2020/06/09/riconoscimento-facciale-como

    #come #como #italie #controlefaciale #migration #gare @cdb_77

  • hiljade.kamera.rs
    https://hiljade.kamera.rs/en-index.html

    THE PROBLEM Face and object recognition technology in public spaces is based on the assumption that we are all potential criminals. We are therefore recorded when moving around and meeting, our actions are analysed, and our behaviour is predicted. The total loss of anonymity represents a certain loss of our freedom – the awareness that we are under constant surveillance drastically changes our decisions. Smart surveillance cameras have been installed in the streets of Belgrade without (...)

    #Huawei #algorithme #CCTV #biométrie #consentement #facial #reconnaissance #vidéo-surveillance #surveillance (...)

    ##hiljade.kamera.rs_

  • hiljade.kamera.rs : community strikes back against mass surveillance
    https://www.sharefoundation.info/en/hiljade-kamera-rs-community-strikes-back

    Serbian citizens have launched the website hiljade.kamera.rs as a response to the deployment of state-of-the-art facial recognition surveillance technology in the streets of Belgrade. Information regarding these new cameras has been shrouded in secrecy, as the public was kept in the dark on all the most important aspects of this state-lead project. War, especially in the past hundred years, has propelled the development of exceptional technology. After the Great War came the radio, decades (...)

    #algorithme #CCTV #biométrie #facial #reconnaissance #vidéo-surveillance #surveillance #journalisme #manipulation #FreedomHouse #RSF #Huawei #immatriculation (...)

    ##lutte

  • Journée internationale de lutte contre la 5G du 6 juin
    http://stop5g.be/fr/lettre/20200604.htm

    Le collectif stop5G.be vous propose deux actions dans le cadre de la 3e journée internationale de mobilisation pour l’arrêt du déploiement de la 5G. 1) Action devant la Bourse de Bruxelles La société industrielle nous entasse. Les discours idolâtres de la technologie irriguent les programmes politiques, laissant les marchands du futur connecté nous voler même le ciel étoilé ! Pourtant, les trajectoires techno-scientifiques qui nous sont imposées apparaissent comme des sources de plus en (...)

    #Alibaba #Huawei #Proximus #SpaceX #Tesla #Virgin #domotique #écologie #technologisme #GAFAM (...)

    ##lutte

  • Boris Johnson forced to reduce Huawei’s role in UK’s 5G networks
    https://www.theguardian.com/technology/2020/may/22/boris-johnson-forced-to-reduce-huaweis-role-in-uks-5g-networks

    Boris Johnson has been forced to cave into to Conservative backbench rebels opposed to the presence of Huawei in 5G networks and has drawn up plans to reduce the Chinese company’s involvement to zero by 2023. The prime minister’s retreat is designed to stave off what could have been an embarrassing defeat when his existing proposal to reduce Huawei to a 35% market share was to be voted on in the Commons. Although Johnson boasts an 80 strong majority, the number of Conservative MPs willing (...)

    #Huawei #technologisme #5G

    https://i.guim.co.uk/img/media/8b13691d62846d597acaa6dd6d6b464006c4ebe7/0_138_5568_3341/master/5568.jpg

  • Chine : l’offensive high-tech
    https://www.franceculture.fr/emissions/grand-reportage/grand-reportage-du-vendredi-14-juin-2019

    La guerre commerciale entre les Etats-Unis et la Chine est devenue une guerre technologique. Pourquoi les nouvelles technologies développées en Chine font elles trembler l’Amérique ? Où en est la Chine dans ses ambitions technologiques ? A deux semaines d’un possible tête-à-tête entre Donald Trump et Xi Jinping, l’espoir d’une désescalade de la guerre commerciale est bien limité. Les sanctions américaines et chinoises sont toujours en vigueur de chaque côté, et le géant chinois des télécommunications (...)

    #technologisme #Tencent #Huawei #VirtualReality #bénéfices #lutte #5G #Alibaba #robotique #algorithme #domination (...)

    ##smartphone

  • Le dinosaure onusien #UIT vient de publier des documents sur « l’Internet du futur » https://www.itu.int/en/ITU-T/studygroups/2017-2020/13/Documents/Internet_2030%20.pdf où ils annoncent un nouvel Internet, et critiquent l’actuel. L’approche proposée (purement « vaporware » à cette étape) est celle de la table rase.

    Un résumé en français https://www.letemps.ch/monde/chine-exacerbe-bataille-controle-dinternet Bien plus médiocre, cet article qui présente la proposition UIT comme achevée alors qu’il ne s’agit que de PowerPoints https://siecledigital.fr/2020/03/31/huawei-et-la-chine-proposent-un-nouveau-protocole-internet

    Commme #Huawei est derrière, il y a eu des réactions parfois assez chauvines, notamment aux États-Unis. Article du Financial Times derrière un paywall : https://www.ft.com/content/ba94c2bc-6e27-11ea-9bca-bf503995cd6f Milton Muller a critiqué ces réactions https://www.internetgovernance.org/2020/03/30/about-that-chinese-reinvention-of-the-internet

    L’#IETF a fait une réponse cinglante et très détaillée à ce projet https://datatracker.ietf.org/liaison/1677

    L’ETSI, traditionnelle émanation des industriels de la téléphonie s’y met aussi, en se prétendant en charge de concevoir le nouvel Internet https://www.etsi.org/newsroom/press-releases/1749-2020-04-etsi-launches-new-group-on-non-ip-networking-addressing-5g-new-se Leur projet ne mentionne pas l’UIT et semble distinct (bien que le discours soit identique).

    Notez que le communiqué de l’ETSI parle d’un groupe de travail NGP qui aurait produit analyse et identification de technologies possibles (aucun lien fourni sur ces analyse et identifictaion) mais quand on regarde la page du groupe NGP à l’ETSI, on a… 404.

    • ce passage de la réponse de l’IETF est hilarant : “We also note
      that any real-time systems requiring sub-millisecond latency inevitably have limited scope because of the constraints of the speed of light.”
      Ils les auraient traités directement d’abrutis ça aurait été pareil !

    • Ci-après la partie que le CI n’a pas traduite (curieusement les derniers paragraphes sont en français)

      The new IP presentation paints a picture of a digital world in 2030 where virtual reality, holographic communication and remote surgery are omnipresent – and for which our current network is unsuitable. The traditional IP protocol is described as “unstable” and “largely insufficient”, with “many security, reliability and configuration issues”.

      The documents suggest that a new network should rather have a “top-down design” and promote data sharing systems between governments “thus serving AI, Big Data and all kinds of other applications”. Many experts fear that under the new IP, Internet service providers, usually state-owned, will control and supervise all devices connected to the network and be able to monitor and control individual access.

      The system is already under construction by engineers from “industry and academia” in “several countries,” Huawei team leader Sheng Jiang told the group in September, although he will not reveal who they were due to commercial sensitivities. Spectators included ITU veterans, including government officials from the United Kingdom, the United States, the Netherlands, Russia, Iran, Saudi Arabia and China.

      For some participants, the very idea is anathema. If the new IP address was legitimized by the ITU, state operators could choose to implement a Western or Chinese Internet, they say. The latter could mean that everyone in these countries would need permission from their internet provider to do anything over the internet – whether it’s downloading an app or accessing a site – and administrators might have the power to deny access on a whim.

      Rather than a unified global network, citizens may be forced to connect to a patchwork of national internet, each with its own rules – a concept known in China as cyber sovereignty.

      In recent periods of civil unrest, Iran and Saudi Arabia have cut internet connectivity for long periods, with the exception of some
      In recent periods of civil strife, Iran and Saudi Arabia have cut internet connectivity for long periods, with the exception of some “essential” services © Alexander Glandien

      Recent events in Iran and Saudi Arabia provide a glimpse of what it would look like. These governments blocked global internet connectivity for long periods during the civil unrest, allowing only limited access to essential services such as banking or healthcare. In Russia, a new Internet sovereign law adopted in November enshrined the government’s right to monitor web traffic closely and showed the country’s ability to separate from the global web – a capacity that Chinese companies, including Huawei, have helped the Russians build.

      Experts now wonder whether China’s vision of Internet governance could shift from a defensive vision, in which the government wanted to be left alone to impose authoritarian Internet controls at home, to a more assertive approach, in which the country openly advocates for others. follow his example.

      The creators of New IP say that parts of the technology will be ready for testing next year. Efforts to convince delegations of its value will culminate in an important ITU conference to be held in India in November. To persuade the ITU to approve it within the year, so that it can be officially “normalized”, representatives must reach an internal consensus, freely based on a majority agreement. If delegates fail to agree, the proposal will be put to a closed-door vote in which only member countries will be able to participate, cutting off the views of industry and civil society.

      The rapid timetable is causing particular concern to Western delegations and requests have been made to slow the process down, according to documents consulted by the FT. A participant in the Dutch delegation wrote in an official response, leaked to the FT by several sources, that the “open and adaptable nature” of the Internet – both its technical structure and its mode of governance – was fundamental to its success and that he was “particularly concerned” that this model departed from this philosophy.

      Another scathing reprimand from a British delegate, also leaked to the FT, said: “It is far from clear that technically sound justifications have been provided for taking such a drastic step. Unless these are to come, the reasonable basis for future work or even ongoing research activities on these topics is, at best, weak or nonexistent. “

      Patrik Fältström, a non-conformist engineer with long hair, known in his native Sweden as one of the fathers of the Internet, is one of the most vocal critics of the new intellectual property. In the early 1980s, Fältström was a math student in Stockholm when he was hired to build and test the infrastructure for a new technology that the US government called the Internet.

      His job was to write a series of protocols that allowed computers to send text to each other. “In Europe, we were maybe 100 people in Sweden, 100 in the United Kingdom, 50 here, 20 there, we all knew each other. We used to joke that if there was a problem, you knew who to call, ”he says.

      Today, Fältström is a digital advisor to the Swedish government and its representative to most major Internet standards organizations, including the ITU. Thirty years after helping to assemble the building blocks of the Internet, it embodies the Western cyber-libertarian ideals that were woven into its foundation.

      “The Internet architecture makes it very, very difficult, almost impossible for anyone providing Internet access to know or regulate the use of Internet access,” he says. “It is a problem for law enforcement and others who would like an ISP to control it, so it is not used for illegal activities such as film pirating or child abuse.

      “But I am ready to accept that there will be criminals who will do bad things and the police will be unable to fight [all of] he. I accept this sacrifice. “

      For Fältström, the beauty of the Internet is its nature “without permission”, as demonstrated by the Arab Spring. “We have to remember,” he says, “it’s a balance between being able to communicate and to control, but people who have a voice are always more important.”

      A stark contrast to this view can be found in a river village called Wuzhen near Shanghai, which is emptied every fall to make room for technical executives, academics and policy makers attending the ambitious world conference of the Internet. The event was created by the China Cyberspace Administration in 2014, a year after President Xi Jinping came to power. A row of world flags greets visitors – a nod to Xi’s vision of creating “a shared future community in cyberspace”.

      Tim Cook, CEO of Apple, at the 2017 World Internet Conference in China. Foreign participation has declined in recent years as the technology war between the United States and China has intensified and leaders feared to be too aligned with Beijing
      Tim Cook, CEO of Apple, at the 2017 World Internet Conference in China. Foreign participation has declined in recent years as the technology war between the United States and China intensified and leaders feared being too aligned with Beijing © Getty

      Tech executives, from Tim Cook of Apple to Steve Mollenkopf of Qualcomm, spoke at the event, crediting Xi’s attempts to bring together the international tech elite. But in recent years, foreign participation has declined American-Chinese Technological War intensifies and leaders fear being too closely aligned with Beijing.

      There is a precedent for such fears. During the first year of the event, the organizers slipped a draft joint declaration under the doors of the guests’ hotels at midnight, setting out Xi’s point of view on each nation’s right to “cyber sovereignty” . Customers were invited to return with any changes before 8 a.m. After the protests, the organizers dropped the case completely. But the fact that management attempted such a move reflected Xi’s digital ambitions.

      In the early 1990s, the Chinese government began to develop what is now known Large firewall, a system of internet controls that prevent citizens from connecting to banned foreign websites – from Google to the New York Times – as well as blocking politically sensitive national content and preventing mass organization online.

      Beijing technical controls are supported by large teams of government censors as well as those hired by private tech companies such as Baidu and Tencent. Although anyone in the world can technically host their own website using just a computer and an Internet connection, in China you need to apply for a license to do so. Telecommunications providers and Internet platforms are also required to assist the police in monitoring “crimes”, which may include actions such as calling Xi “steamed bun” in a private discussion group , an act punishable by two years in prison.

      Chinese President Xi Jinping at the World Internet Conference in 2015, where he told participants that each nation should have independent authority over its own Internet
      Chinese President Xi Jinping at the 2015 World Internet Conference, where he told participants that each nation should have independent authority over its own Internet © Getty

      Despite this, the Chinese Internet is not 100% effective in blocking content deemed sensitive or dangerous by the government. “The leaking global internet remains frustrating for Chinese censors, and they have dealt with it at great cost and effort, but if you could make these problems go away almost completely using a more automated and technical process, maybe like New IP, that would be fantastic for them, “says James Griffiths, author of The Great Firewall of China: How to Create and Control an Alternative Internet Version.

      “Building a new version of the Internet could prevent more people from acquiring politically dangerous knowledge, thereby saving a great deal of effort, money and manpower on the censorship side. They can choose the commands they want, integrate them with technology and deploy them. “

      The establishment of a sophisticated alternative to the Western Internet would also fit in with China’s ambitions to expand its digital footprint on a global scale. “At the very beginning of the Internet, China was a follower and did not recognize, like many other countries, how disruptive the Internet would be,” said Julia Voo, research director for the China Cyber ​​Policy Initiative at the Harvard University in Belfer. Center.

      “As they realized how important it was, [they] channeled more resources into technology development. . . and we can see their influence increased in many standards bodies like the ITU in the past two or three years.

      “But the United States and others have made a strategic mistake by failing to see the value of growing infrastructure in developing markets,” she added. “There is still a lot of infrastructure to provide and over the past 10 years, Chinese companies have been at their disposal, especially in Africa.”

      Beijing has signed memoranda of understanding on building a “digital silk road” – or advanced IT infrastructure system – with 16 countries. Huawei says it has 91 contracts to supply 5G wireless telecommunications equipment worldwide, including 47 in Europe – despite US warnings that Huawei’s involvement amounted to giving Chinese access to national security secrets, an allegation denied by the society.

      “By proving that you can control and monitor your home internet intensely and prevent it from being used as a tool to rally people against the government, combined with the economic success of its businesses, China has made this vision incredibly attractive to regimes – autocratic and others – all over the world, ”says Griffiths.

      ITU was created 155 years ago, making it one of the oldest international organizations in the world, even before the United Nations. It is installed in a group of glazed buildings on Place des Nations in Geneva. On the 10th floor is the airy office of Bilel Jamoussi, the head of ITU study groups, born in Tunisia – the units that develop and ratify technical standards.

      The room is lined with a huge library from which Jamoussi draws a dusty blue book – his doctoral thesis, written 25 years ago, on traffic passing through the Internet. At the time, there was a desire to build a new networking protocol to meet the growing base of Internet users. Ultimately, the engineers opted for a layer on top of the existing TCP / IP infrastructure. Technology, invented in the late 1970s by computer engineers working for the United States Department of Defense, was a means of transmitting messages between computers at the speed of light, using a special addressing system.

      Bilel Jamoussi, Head of ITU study groups, which ratify technical standards.
      Bilel Jamoussi, Head of ITU study groups, which ratify technical standards. “Twenty years ago, it was Europe and North America that dominated the development of products, solutions and standards, we now have an eastward orientation” © YouTube

      “Twenty-five years ago we had this conversation as a community – is it TCP / IP or is it something else – and then a lot of design and development came to a kind of rescue [it]Explains Jamoussi. “We are now, I think, at another turning point, saying, is this enough, or do we need something new?”

      In its early days, the ITU oversaw the first international telegraph networks. Since then, it has grown from 40 countries to 193 and has become de facto the standardization body for telecommunications networks. The standards produced there legitimize new technologies and systems in the eyes of some governments – especially those in developing countries that do not participate in other Internet organizations. In the end, they give a business advantage to the companies that have built the technology on which they are based.

      Over the past 21 years, Jamoussi has witnessed a geopolitical shift. “The pendulum has tilted to the east, and now we see more participation from China, Japan, Korea,” he said. “Twenty years ago, it was Europe and North America that dominated the development of products, solutions and standards, we now have an eastward orientation.”

      On one of the marble walls of the ITU, backlit flags are hung, showing the largest donor countries. The Chinese flag – currently number five – was not there at all a few years ago, said an employee, but it is progressing gradually.

      New intellectual property is the latest grenade launched in the ITU arena, but it is not the first Internet-related standard to be offered as an alternative to the original Western-style system. The governments of Russia, Saudi Arabia, China and Iran have been pushing the idea of ​​alternative networks for years, according to participants who wanted to remain anonymous.

      “In the early 2000s, once you saw widespread use of the Internet, you suddenly had this idea of ​​democratization, which is basically to give people more control and more information. For authoritarian governments, it was something they were not happy with, ”said a member of the British delegation. “And so the work started, around the beginning of the 2000s, especially in China, then a little later in Iran and Russia, on how to create an alternative to the standards and technologies that were still being developed mainly by Americans. “

      But in recent years, Chinese companies have switched to new intellectual property. “There is a new paradigm, it is not voice and text and video and people talking, it is real-time control of something remotely, or telepresence, or holograms”, explains Jamoussi. “These new applications require new solutions. And now it’s more doable, it’s no longer science fiction, it’s almost a reality. “

      Cutting-edge projects for a new IP is Richard Li, chief scientist at Futurewei, Huawei’s R&D division located in California. Li worked with Huawei engineers based in China, as well as state-owned telecommunications companies China Mobile and China Unicom, with the explicit support of the Chinese government, to develop the technology specifications and the proposal for standards.

      Having Huawei at the helm will sound the alarm for many in Europe and the United States, where governments are concerned that Chinese technology is being developed as a vehicle for state espionage. The advent of 5G – a much higher bandwidth network that will serve as the digital backbone for a more automated world – has raised growing concern that products developed by Huawei will be built with “backdoors” for consumers. spies in Beijing.

      Richard Li, chief scientist at Futurewei, Huawei’s R&D division. Li worked with the explicit support of the Chinese government to develop technology that would allow
      Richard Li, chief scientist at Futurewei, Huawei’s R&D division. Li worked with the explicit support of the Chinese government to develop the technology that would allow “cyber sovereignty” © YouTube

      Last year, the United States excluded Huawei from sale in its market, and the British government is involved in a parliamentary battle over the company’s involvement in its basic telecommunications infrastructure.

      The FT contacted Li to discuss the new IP, but Huawei declined the opportunity to explain the idea in more detail. The company said in a statement, “The new IP aims to provide new IP technology solutions that can support. . . future applications such as the Internet of Everything, holographic communications and telemedicine. New IP’s research and innovation is open to scientists and engineers from around the world to participate and contribute. “

      Critics argue that the technical claims made in the New IP documentation are false or unclear and represent a “solution to the search for a problem”. They insist that the current IP system is suitable for use, even in a fast-scanning world. “The way the Internet has grown is through modular and weakly coupled building blocks, it’s the brilliance of it,” says Alissa Cooper, president of the Internet Engineering Task Force (IETF), an organization industry-dominated standardization in the United States. .

      In November, Li introduced himself to a small group at an IETF meeting in Singapore, which Cooper attended. “[The current infrastructure] is in stark contrast to what you see in the new IP proposition, which is this type of top-down monolithic architecture that wants to tightly couple applications to the network. This is exactly what the internet was not designed for, “she said.

      The implications for the average user could be enormous. “You push control into the hands of [telecoms] public operators, “said a member of the British ITU delegation. “Therefore [it means] now you can not only control access to certain types of online content, or track that content online, but you can actually control a device’s access to a network. “

      For internet pioneer Patrik Fältström, the beauty of the Internet is its
      For internet pioneer Patrik Fältström, the beauty of the Internet is its “unlicensed” nature. “We have to remember,” he says, “it’s a balance between being able to communicate and controlling, but people who have a voice are always more important” © Alexander Glandien

      China is already in the process of setting up a credit rating system for its people, based on online and offline behavior and past “crimes”, noted the member of the delegation. “Donc, si le score de crédit social d’une personne est tombé en dessous d’un certain montant parce qu’il publiait trop sur les réseaux sociaux, vous pourriez en fait empêcher ce téléphone de se connecter au réseau.”

      Les opérateurs de télécommunications chinois disposent de nombreuses données sur leurs abonnés. Selon la loi, les clients doivent s’inscrire pour un numéro de téléphone ou une connexion Internet en utilisant leur vrai nom et identification, qui est ensuite accessible par d’autres sociétés telles que les banques. La loi du pays sur la cybersécurité stipule également que tous les «opérateurs de réseaux», y compris les sociétés de télécommunications, doivent tenir des «journaux Internet» – bien que ce que cela implique ne soit pas clair.

      Jamoussi fait valoir que ce n’est pas à l’UIT de juger si les propositions pour une nouvelle architecture Internet sont «descendantes» »ou pourraient être utilisées à mauvais escient par des gouvernements autoritaires. «Bien sûr, tout ce que vous construisez est une épée à double tranchant. Vous pouvez utiliser n’importe quoi pour le bien ou pour le mal, et c’est la décision souveraine de chaque État membre », dit-il. “À l’UIT, nous ne nous engageons pas dans ce mauvais usage potentiel de la technologie, nous nous concentrons uniquement sur” en voici quelques-uns. . . problème de la technologie de la communication, voici une aspiration, en tant que communauté, construisons une solution pour y parvenir. “Mais la façon dont les gens l’utilisent est vraiment à eux.”

      Les ambitions de Pékin de renforcer les contrôles dans l’infrastructure Internet ne sont pas perçues par tout le monde comme un problème – simplement comme le prochain chapitre de son évolution.

      «Internet était censé être une infrastructure neutre, mais il est devenu un bras de contrôle politisé. De plus en plus, l’infrastructure Internet est utilisée à des fins politiques – pour réprimer les gens économiquement et physiquement – nous l’avons vu au Cachemire, au Myanmar et dans les révélations de Snowden », explique Niels ten Oever, ancien délégué néerlandais à l’UIT.

      «Pour moi, la question primordiale est: comment construire un réseau public sur des infrastructures privées? C’est le problème avec lequel nous nous débattons. Quel est le rôle de l’État par rapport au rôle des entreprises? “

      Selon lui, les entreprises conçoivent des technologies principalement dans un but lucratif. «Internet est dominé par les entreprises américaines, toutes les données y circulent. Alors, bien sûr, ils veulent garder ce pouvoir », dit-il. «Nous avons peur de la répression chinoise. Nous faisons des caricatures des Chinois d’une manière impérialiste-raciste limite. Mais la gouvernance d’Internet ne fonctionne pas aujourd’hui. Il y a de la place pour une alternative. “

      Partout où notre avenir numérique se construit actuellement, il semble y avoir un accord mondial pour dire que le moment est venu pour une meilleure version du cyberespace. “Je pense [some] les gens diraient que notre modèle actuel d’Internet est profondément défectueux, sinon cassé. À l’heure actuelle, il n’existe qu’un seul autre modèle vraiment complet et pleinement réalisé, celui de la Chine », écrit Griffiths dans Le grand pare-feu de Chine.

      «Le risque est que si nous ne parvenons pas à trouver un troisième modèle – un qui autonomise les utilisateurs et accroît la démocratie et la transparence en ligne, et réduit les pouvoirs des services de sécurité des grandes technologies et du gouvernement – alors de plus en plus de pays pencheront vers les Chinois modèle, plutôt que de faire face aux retombées de l’échec de la Silicon Valley. “

      Aujourd’hui le “Déclaration d’indépendance du cyberespace»- le principe directeur d’Internet – commence à ressembler de plus en plus à une relique. Le manifeste, écrit en 1996 par John Perry Barlow, co-fondateur de la fondation américaine sans but lucratif Electronic Frontier Foundation et parolier de Grateful Dead, était un appel aux armes.

      «Gouvernements du monde industriel, vous, géants las de chair et d’acier, je viens du cyberespace, la nouvelle maison de l’esprit», commence le document. «Au nom de l’avenir, je vous demande du passé de nous laisser seuls. Vous n’êtes pas les bienvenus parmi nous. Vous n’avez aucune souveraineté là où nous nous réunissons. “

      Cette opinion est maintenant devenue un retour à une époque antérieure à la capitalisation boursière de billions de dollars dans l’industrie de la technologie, disent les critiques. Mais il y a encore de l’espoir – et peut-être une troisième alternative à nos deux internets d’aujourd’hui.

      «Ce qui nous différencie de la Chine maintenant, c’est qu’à l’ouest, le public peut toujours se mobiliser et avoir son mot à dire. Une grande partie de cette responsabilité incombe désormais aux législateurs de protéger la démocratie à l’ère de la surveillance, qu’elle soit dictée par le marché ou autoritaire », a déclaré Zuboff. «Le géant endormi de la démocratie est enfin en train de remuer, les législateurs se réveillent, mais ils ont besoin de sentir le public dans leur dos. Nous avons besoin d’un Web occidental qui offrira le genre de vision d’un avenir numérique compatible avec la démocratie. C’est l’œuvre de la prochaine décennie. “

      Madhumita Murgia est la correspondante technologique européenne du FT. Anna Gross est journaliste aux marchés FT. Reportage supplémentaire par Yuan Yang et Nian Liu

  • Marseille’s fight against AI surveillance - Coda Story
    https://www.codastory.com/authoritarian-tech/ai-surveillance-france-crime

    The southern French city, once synonymous with urban crime, now encapsulates the spread of AI surveillance driven by Chinese companies In 2016, Netflix launched its first European production – a twisty political drama titled “Marseille.” Set in the historic port city, the series starred Gerard Depardieu and was supposed to be France’s answer to the hit U.S. TV show House of Cards. Instead ‘Marseille’ was widely panned for amplifying stereotypes about the city and reheating its former notoriety (...)

    #Engie #Huawei #ZTE #algorithme #backdoor #CCTV #Predpol #SmartCity #biométrie #criminalité #émotions #facial #prédiction #reconnaissance #vidéo-surveillance #BigData #surveillance #discrimination #LaQuadratureduNet (...)

    ##criminalité ##LDH-France

  • Coronavirus : The Low Tech of the High Tech | Somatosphere
    http://somatosphere.net/forumpost/coronavirus-low-tech-high-tech

    At a meeting of the Central Committee in Beijing on 14 February 2020, President Xi Jinping conceded that the COVID-19 epidemic in Hubei had exposed shortcomings in China’s preparedness and early warning systems. “The foundations of emergency management,” he declared, “need to be strengthened.”[1] In particular, he stressed the importance of high-tech tools in the fight against epidemics : The use of digital technologies such as big data, artificial intelligence and cloud computing must be (...)

    #Huawei #Tencent #WeChat #algorithme #CCTV #drone #lunettes #biométrie #facial #reconnaissance #vidéo-surveillance #BigData #CloudComputing #santé (...)

    ##santé ##surveillance

  • CIA funnels cash to In-Q-Tel in bid to defeat Huawei - Washington Times
    https://www.washingtontimes.com/news/2020/mar/8/cia-funnels-cash-q-tel-bid-defeat-huawei

    Venture capital fund taps Parallel Wireless in bid to stop China’s 5G dominance The CIA isn’t waiting while the White House, Congress, the Justice Department and the Pentagon squabble over the best approach to combating Huawei’s domination of the future 5G wireless network. The agency has been funneling taxpayer dollars to venture capitalists investing in a private company set up to compete with and hopefully defeat Huawei. Huawei has gained an advantage in the battle for global control (...)

    #lutte #5G #domination #CIA #Palantir #In-Q-Tel #Huawei

    https://twt-thumbs.washtimes.com/media/image/2020/02/27/Replacing_Huawei_44294.jpg-cc6c0_c0-125-3000-1875_s1200x700.jp

  • China is getting smarter - but at what cost ? - BBC News
    https://www.bbc.com/news/technology-50658538

    Thirty years ago, Shenzhen was a fishing village, surrounded by paddy fields. Then came a plan to build China’s first special economic zone to allow foreign investments, and out of the quiet rural landscape grew private businesses and factories which over time transformed into a city. Now Shenzhen, with a population of 12 million, is just one part of a huge urbanised area running down the Pearl River Delta. China’s smart cities ambitions are among the grandest in the world. But there are (...)

    #Alibaba #Huawei #Tencent #algorithme #SmartCity #CCTV #géolocalisation #automobile #vidéo-surveillance #notation #SocialCreditSystem #surveillance (...)

    ##urbanisme

  • Washington accuse Huawei d’avoir eu accès à des portes dérobées sur les réseaux 4G - ZDNet
    https://www.zdnet.fr/actualites/washington-accuse-huawei-d-avoir-eu-acces-a-des-portes-derobees-sur-les-reseau

    Technologie : Des dirigeants américains accusent Huawei d’avoir eu accès, pendant de nombreuses années, à des portes dérobées sur les réseaux de télécommunication qu’elle a contribué à déployer. Les soupçons américains pesant sur Huawei et la mainmise du constructeur chinois sur les réseaux de télécommunications prennent une nouvelle tournure. Selon le Wall Street Journal, qui se base sur des déclarations de dirigeants américains, la firme de Shenzhen aurait eu accès à des portes dérobées sur les réseaux (...)

    #Huawei #ZTE #5G #écoutes #surveillance #web #backdoor

  • Backdoors « officielles » détournées : de quoi les USA accusent-ils Huawei ? - Cyberguerre
    https://cyberguerre.numerama.com/2913-backdoors-officielles-detournees-de-quoi-les-usa-accusent

    Les États-Unis auraient enfin des preuves concrètes de l’espionnage de Huawei. Ironiquement, le géant chinois utiliserait des portes dérobées... demandées par les gouvernements pour leur propre espionnage. Les États-Unis seraient-ils enfin prêts à apporter des preuves pour soutenir leurs accusations d’espionnage contre Huawei ? Le gouvernement de Donald Trump a exclu le constructeur de réseaux télécoms de son pays depuis presque un an. Et il incite fortement ses alliés occidentaux à faire de même. Les (...)

    #Bouygues #Deutsche_Telekom #Huawei #Nokia_Siemens #Orange #Sony-Ericsson_ #SFR #backdoor #écoutes #lutte (...)

    ##surveillance
    //c1.lestechnophiles.com/cyberguerre.numerama.com/content/uploads/sites/2/2019/01/will-huawei-be-the-next-failure.jpg

  • UK minister met surveillance firm accused of enabling Uighur abuses | World news | The Guardian
    https://www.theguardian.com/world/2020/jan/29/uk-trade-minister-met-with-surveillance-firm-implicated-in-uighur-abuse

    Facial recognition firm SenseTime and government discussed use of AI in universities A government trade minister held a one-on-one meeting with a facial recognition firm accused of enabling the Chinese government’s campaign of persecution against Uighur Muslims, the Guardian and the Bureau of Investigative Journalism have established. Graham Stuart, a minister at the Department for International Trade (DIT), met representatives from SenseTime, a Hong Kong-based surveillance technology firm, (...)

    #Huawei #SenseTime #biométrie #facial #reconnaissance #vidéo-surveillance #enseignement #firme #Islam #surveillance (...)

    ##BigBrotherWatch
    https://i.guim.co.uk/img/media/516317b9989980944d83f72332130420ba27d64c/14_45_5266_3160/master/5266.jpg

  • Une vulnérabilité grossière sur un composant Huawei permet de contrôler des caméras de surveillance - Cyberguerre
    https://cyberguerre.numerama.com/2732-une-vulnerabilite-grossiere-sur-des-composants-huawei-per

    Avec quelques commandes relativement simples, il est possible de prendre à distance le contrôle de puces HiSilicon, qui équipent des milliers d’appareils de surveillance Nouveau problème de sécurité pour Huawei. Cette fois, c’est du côté de HiSilicon, sa filiale de microprocesseurs. Un chercheur en cybersécurité russe, Vladislav Yarmak, a trouvé une porte dérobée dans une couche logicielle basse (le firmware) de ces puces, qui permet d’en prendre le contrôle à distance. Huawei lui-même a développé ce (...)

    #Huawei #CCTV #puce #vidéo-surveillance #hacking #surveillance

    //c0.lestechnophiles.com/cyberguerre.numerama.com/content/uploads/sites/2/2018/12/26394857992_35f97a3f99_k.jpg