{"id":1391,"date":"2012-01-10T14:23:36","date_gmt":"2012-01-10T12:23:36","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=1391"},"modified":"2012-01-10T14:23:36","modified_gmt":"2012-01-10T12:23:36","slug":"systemes-dinformation-les-portes-derobees-au-service-des-etats","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=1391","title":{"rendered":"Syst\u00e8mes d\u2019information : les portes d\u00e9rob\u00e9es au service des Etats"},"content":{"rendered":"<p style=\"text-align: justify;\">La probl\u00e9matique des portes d\u00e9rob\u00e9es n\u2019est pas nouvelle. Ce qui l\u2019est plus, c\u2019est l\u2019apparition de portes d\u00e9rob\u00e9es \u00e0 la demande de Gouvernements&#8230; et leur m\u00e9diatisation. Si l\u2019on peut comprendre que les Etats aient besoin, pour des raisons de s\u00e9curit\u00e9 nationale, de pouvoir acc\u00e9der \u00e0 des communications ou \u00e0 des donn\u00e9es de nature priv\u00e9e, il para\u00eet tout de m\u00eame inqui\u00e9tant que ces possibilit\u00e9s soient offertes sans que l\u2019utilisateur n\u2019en soit a priori inform\u00e9 et\u00a0hors de tout contr\u00f4le ind\u00e9pendant. Au niveau de l\u2019entreprise, la question qui se pose est de savoir si ces portes d\u00e9rob\u00e9es ne sont r\u00e9ellement accessibles qu\u2019\u00e0 des agents habilit\u00e9s par l\u2019Etat\u2026 Les m\u00eames interrogations peuvent d&#8217;ailleurs se poser avec d&#8217;autres composantes du syst\u00e8me d&#8217;information : syst\u00e8me d&#8217;exploitation, plateformes de donn\u00e9es et services h\u00e9berg\u00e9s (Cloud&#8230;). B.R.<\/p>\n<p style=\"text-align: justify;\">Sur ce sujet, l\u2019article suivant apporte un \u00e9clairage int\u00e9ressant :<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.silicon.fr\/rim-nokia-et-apple-auraient-donne-au-gouvernement-indien-la-possibilite-despionner-70515.html\">http:\/\/www.silicon.fr\/rim-nokia-et-apple-auraient-donne-au-gouvernement-indien-la-possibilite-despionner-70515.html<\/a><\/p>\n<p style=\"text-align: justify;\"><em>RIM, Nokia et Apple auraient donn\u00e9 au gouvernement indien la possibilit\u00e9 d\u2019espionner<\/em><\/p>\n<p style=\"text-align: justify;\"><em>En \u00e9change d\u2019une pr\u00e9sence commerciale sur le march\u00e9 indien, RIM, Nokia, Apple et d\u2019autres compagnies auraient int\u00e9gr\u00e9 des portes d\u00e9rob\u00e9es (backdoors) \u00e0 leurs logiciels mobiles, offrant ainsi aux autorit\u00e9s du pays la possibilit\u00e9 d\u2019acc\u00e9der \u00e0 des donn\u00e9es confidentielles [\u2026] et \u00e0 des communications prot\u00e9g\u00e9es par une cl\u00e9 de chiffrement.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>Des services indiens en charge du renseignement auraient ainsi espionn\u00e9 la Commission d\u2019examen de l\u2019\u00e9conomie et de la s\u00e9curit\u00e9 sino-am\u00e9ricaine (USCC \u2013 United States-China Economic and Security Review Commission). [\u2026] (ces agissements) ont \u00e9t\u00e9 d\u00e9couverts par les hackers indiens qui \u00e9taient parvenus \u00e0 pirater des contenus appartenant \u00e0 Symantec, sp\u00e9cialiste des logiciels de s\u00e9curit\u00e9 informatique.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>Cette affaire intervient 18 mois apr\u00e8s que l\u2019Inde a menac\u00e9 Research in Motion (RIM), concepteur canadien du Blackberry, d\u2019interdire ses services sur son march\u00e9. Le gouvernement indien a exig\u00e9 que RIM lui permette d\u2019acc\u00e9der \u00e0 des communications s\u00e9curis\u00e9es, et ce en \u00e9change de la poursuite d\u2019une activit\u00e9 commerciale sur son territoire. D\u2019autres \u00c9tats, tels l\u2019Arabie Saoudite et les \u00c9mirats arabes unis, ont \u00e9galement pratiqu\u00e9 le bras de fer avec RIM pour parvenir \u00e0 leurs fins.<\/em><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Syst%C3%A8mes%20d%E2%80%99information%20%3A%20les%20portes%20d%C3%A9rob%C3%A9es%20au%20service%20des%20Etats\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>La probl\u00e9matique des portes d\u00e9rob\u00e9es n\u2019est pas nouvelle. Ce qui l\u2019est plus, c\u2019est l\u2019apparition de portes d\u00e9rob\u00e9es \u00e0 la demande de Gouvernements&#8230; et leur m\u00e9diatisation. Si l\u2019on peut comprendre que les Etats aient besoin, pour des raisons de s\u00e9curit\u00e9 nationale, de pouvoir acc\u00e9der \u00e0 des communications ou \u00e0 des donn\u00e9es de nature priv\u00e9e, il para\u00eet &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=1391\" class=\"more-link\">Continue reading &lsquo;Syst\u00e8mes d\u2019information : les portes d\u00e9rob\u00e9es au service des Etats&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Syst%C3%A8mes%20d%E2%80%99information%20%3A%20les%20portes%20d%C3%A9rob%C3%A9es%20au%20service%20des%20Etats\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,36,35,30,24],"tags":[654,603,656,94,652,473,648,653,655,649,657,117,99,643,157,477,645,629,647,597,118,95,1629,646,1628,644,651,658,1624,650],"class_list":["post-1391","post","type-post","status-publish","format-standard","hentry","category-breves","category-protection-des-donnees","category-securite-informatique","category-sites-internet","category-systeme-dinformation","tag-acces-au-marche","tag-apple","tag-arabie-saoudite","tag-backdoor","tag-blackberry","tag-cloud-computing","tag-communications-mobiles","tag-communications-securisees","tag-contraintes-legales","tag-donnees-confidentielles","tag-emirats-arabes-unis","tag-espionnage","tag-faille-de-securite","tag-gouvernement","tag-habilitations","tag-hackers","tag-inde","tag-informatique-dans-les-nuages","tag-nokia","tag-os","tag-piratage","tag-porte-derobee","tag-protection-des-donnees","tag-rim","tag-securite-informatique","tag-securite-nationale","tag-symantec","tag-systeme-dexploitation","tag-systeme-dinformation","tag-uscc"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1391"}],"version-history":[{"count":0,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1391\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}