R. Abrahamsen and A. Leander, Routledge Handbook of Private Security Studies, 2015.

R. Abrahamsen and M. C. Williams, Security Beyond the State: Private Security in International Politics, 2010.

C. Aradau and T. Blanke, The (Big) Data-security assemblage: Knowledge and critique, Big Data & Society, vol.2, issue.2, p.2053951715609066, 2015.

J. Assange, When Google Met Wikileaks, 2014.

K. Ball and L. Snider, The Surveillance-Industrial Complex: A Political Economy of Surveillance. Taylor and Francis, 2014.

R. Barbrook and A. Cameron, The Californian ideology. Mute, vol.1, pp.44-72, 1995.

J. P. Barlow, A Cyberspace Independence Declaration, 1996.

H. Barty-king, Girdle Round the Earth: History of Cable and Wireless, 1980.

M. Bauer, H. Lee-makiyama, E. Van-der-marel, and B. Verschelde, The Costs of Data Localisation: Friendly Fire on Economic Recovery (ECIPE Occasional Paper No. 12). Brussels: European Centre for International Political Economy, 2014.

D. Bigo, Sociology of Transnational Guilds. International Political Sociology, vol.10, issue.4, pp.398-416, 2016.

D. Bigo, J. Jeandesboz, M. Martin-mazé, and F. Ragazzi, National programmes for mass surveillance of personal data in EU Member States and their compatibility with EU law (Study for the European Parliament's Committee on Civil Liberties, Justice and Home Affairs No. PE 509.979). Brussels: European Parliament, vol.509979, 2014.

E. Black, IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America's Most Powerful Corporation, 2012.

L. Boltanski and È. ;. Chiapello, Les modernisations contradictoires de la police nationale, Gallimard. 66 tech Bonelli, pp.102-117, 1999.

P. Bourdieu, On the State, 2014.

P. Bourdieu, Séminaires sur le concept de champ, 1972-1975. Actes de la recherche en sciences sociales, pp.4-37, 2014.

J. Brito and T. Watkins, Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy (Working Paper). Mercatus Center, 2011.

R. Brust, Letters of the Law: National Security Letters Help the FBI Stamp out Terrorism but Some Disapprove, ABA Journal, vol.98, p.56, 2012.

A. A. Casilli, Digital Labor Studies Go Global: Toward a Digital Decolonial Turn, International Journal of Communication, vol.11, issue.0, p.21, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01625688

A. Chander and U. P. Lê, Data Nationalism, Emory Law Review, vol.64, issue.677, pp.678-739, 2015.

P. Charbon, Genèse du vote de la loi de 1837, origine du monopole des télécommunications, L'État et les télécommunications en France et à l'étranger, pp.11-22, 1991.

T. Christakis, Legal Opinion on the Microsoft Ireland Case (Supreme Court of the United States) (SSRN Scholarly Paper No. ID 3086820), Social Science Research Network, 2017.

G. Coleman, , vol.23, pp.511-516, 0365.

R. J. Deibert, Black Code: Inside the Battle for Cyberspace, 2013.

C. Doyle, National Security Letters in Foreign Intelligence nvestigations: Legal Background, 2015.

D. Easton, An Approach to the Analysis of Political Systems, World Politics, vol.9, issue.3, pp.283-400, 1957.

A. G. Ferguson, The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement, 2017.

P. Flichy, Une histoire de la communication moderne : espace public et vie privée, 1991.

J. B. Foster and R. W. Mcchesney, Surveillance Capitalism: Monopoly-Finance Capital, the Military-Industrial Complex, and the Digital Age, Monthly Review, issue.3, p.66, 2014.

C. Fuchs, Political Economy and Surveillance Theory, Critical Sociology, vol.39, issue.5, pp.671-687, 2013.

C. Fuchs and D. Trottier, Towards a theoretical model of social media surveillance in contemporary society, Communications-European Journal of Communication Research, vol.40, issue.1, pp.113-135, 2015.

A. Gasparin and . De, Exposé des motifs et projet de loi sur les lignes télégraphiques présentés par M. le ministre de l'Intérieur, Procés-verbaux de la chambre des députés, pp.189-196, 1837.

R. Girard, What Is Happening Today Is Mimetic Rivalry on a Global Scale, South Central Review, vol.19, issue.2/3, pp.22-27, 2002.
DOI : 10.2307/3189861

B. Glaser and A. Strauss, The Discovery of Grounded Theory: Strategies for Qualitative Research, 1999.

J. Goldsmith and T. Wu, Who Controls the Internet?: Illusions of a Borderless World, 2006.
DOI : 10.1108/sd.2007.05623kae.001

K. D. Haggerty and R. V. Ericson, The surveillant assemblage, British Journal of Sociology, vol.51, issue.4, pp.605-622, 2000.

S. Harris, @War: The Rise of the Military-Internet Complex, 2014.

D. R. Headrick, The Invisible Weapon: Telecommunications and International Politics, pp.1851-1945, 2012.

B. Hibou, La bureaucratisation du monde à l'ère néolibérale, 2012.

, Hybrid Rule and State Formation: Public-Private Power in the 21st Century, 2015.

M. Jacomy, P. Girard, B. Ooghe, and T. Venturini, Hyphe, a Curation-Oriented Approach to Web Crawling for the Social Sciences, International AAAI Conference on Web and Social Media, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01293078

C. Kuner, Data Nationalism and Its Discontents: A Response to Anupam Chander & Uyê P. Lê, Emory Law Journal Online, p.64, 2015.

C. Lécuyer, Making Silicon Valley: Innovation and the Growth of High Tech, 1930.

Y. Levine, Surveillance Valley: The Secret Military History of the Internet, 2018.

S. Levy, Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age, 2001.

D. Lyon, Surveillance After Snowden, 2015.

J. Manes, Online Service Providers and Surveillance Law Transparency, Yale Law Journal Forum, vol.125, p.343, 2015.

A. Mattelart, The globalization of surveillance, Polity, 2010.

R. W. Mcchesney, Digital Disconnect: How Capitalism is Turning the Internet Against Democracy, 2013.

C. W. Mills, The Power Elite, 1959.

T. Mitchell, The Limits of the State: Beyond Statist Approaches and Their Critics, vol.85, p.77, 1991.

E. Morozov, To Save Everything, Click Here: The Folly of Technological Solutionism, 2013.

V. Mosco, To the Cloud: Big Data in a Turbulent World, 2014.

F. Pasquale, The Black Box Society: The Secret Algorithms That Control Money and Information, 2015.

C. Peoples and N. Vaughan-williams, Critical Security Studies: An Introduction, 2010.

J. Pohle, M. Hösl, and R. Kniep, Analysing internet policy as a field of struggle, Internet Policy Review, vol.5, issue.3, pp.426-445, 2011.

G. Poupard, Towards European Digital Sovereignty, p.36, 2016.

S. M. Powers and M. Jablonski, The Real Cyber War: The Political Economy of Internet Freedom, 2015.

B. C. Project, Don't Panic": Making Progress on the "Going Dark" Debate. Cambridge: Berkman Center for Internet and Society, 2016.

S. T. Roberts, Commercial Content Moderation: Digital Laborers' Dirty Work, The Intersectional Internet: Race, Sex, Class, and Culture Online, pp.147-160, 2016.

M. Rogers and G. Eden, The Snowden Disclosures, Technical Standards, and the Making of Surveillance Infrastructures, International Journal of Communication, vol.11, issue.0, p.22, 2017.

A. Rouvroy, The end(s) of critique : data-behaviourism vs. due-process, Privacy, Due Process and the Computational Turn. Routledge, 2012.

I. Rubinstein and J. Van-hoboken, Privacy and Security in the Cloud: Some Realism About Technical Solutions to Transnational Surveillance in the Post-Snowden Era, Maine Law Review, vol.66, issue.2, pp.488-533, 2014.

D. Schiller, Digital Capitalism-Networking the Global Market System (Reprint), 2000.

D. Schiller, Digital Depression: Information Technology and Economic Crisis, 2014.

M. Schulze, Clipper Meets Apple vs. FBI-A Comparison of the Cryptography Discourses from 1993 and 2016. Media and Communication, vol.5, pp.54-62, 2017.

E. Siokas, Network Analysis of EU-Funded R&D Collaboration in the European Security Research Programme: Actors and Industries, The Emergence of EU Defense Research Policy, pp.221-245, 2018.

C. Tilly and S. Tarrow, Contentious Politics, 2015.

F. Tréguer, Hackers vs States: Subversion, Repression and Resistance in the Online Public Sphere, vol.91, pp.639-652, 2015.

F. Tréguer, From Deep State Illegality to Law of the Land: The Case of Internet Surveillance in France, Presented at the 7th Biennial Surveillance & Society Conference, 2016.

F. Tréguer, French Constitutional Council Strikes Down "Blank Check Provision" in the 2015 Intelligence Act, 2016.

F. Tréguer, Intelligence Reform and the Snowden Paradox: The Case of France, Media and Communication, vol.5, issue.1, pp.17-28, 2017.

F. Tréguer, Pouvoir et résistance dans l'espace public : une contre-histoire d'Internet (XVe-XXIe siècle) (phdthesis). EHESS-Paris, 2017.

M. Wagner, Warrantless Wiretapping, Retroactive Immunity, and the Fifth Amendment. 70 tech George Washington Law Review, vol.78, p.204, 2009.

J. Webb, T. Schirato, and G. Danaher, , 2002.

B. Weinstein, Legal Responses and Countermeasures to National Security Letters, Washington University Journal of Law & Policy, vol.47, p.217, 2015.

M. C. Williams, The Public, the Private and the Evolution of Security Studies, Security Dialogue, issue.6, pp.623-630, 2010.

S. Zuboff, The second idea is nevertheless true. I think it's something most of the actors agree-not all. What are the conditions under which it is possible to have a better oversight? And the way to construct a bridge where this idea of trust will not be claimed because, it will be obvious in practice. Because the more you speak about trust, and that's really one of the law of sociology, it's because you are obliged to speak about trust, because nobody is trusting. It's about distrust, the practice is distrust, so you speak about trust. You never speak about trust as alone. If you have never divorced you don't understand what I am saying, because we have found your position, despite the diversity, was very strong in terms of saying the same form of narrative about what a private [company] have done, what they were obliged to do, what they have never done, and you insisted, vol.30, pp.75-89, 2015.