R. Abrahamsen and A. Leander, Routledge Handbook of Private Security Studies, 2015.

R. Abrahamsen, C. Michael, and . Williams, Security Beyond the State: Private Security in International Politics, 2010.

J. Agar, The Government Machine: A Revolutionary History of the Computer, 2003.

Y. Algan and T. Cazenave, L'Etat en mode start-up, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01498788

C. Aradau and T. Blanke, The (Big) Data-Security Assemblage: Knowledge and Critique, Big Data & Society, vol.2, issue.2, pp.1-12, 2015.

J. Assange, When Google Met Wikileaks, 2014.

J. Ball, J. Borger, and G. Greenwald, Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security'. The Guardian, 2013.

R. Barbrook and A. Cameron, The Californian Ideology, vol.1, pp.44-72, 1995.

H. Barty-king, Girdle Round the Earth: History of Cable and Wireless, 1980.

B. Foster, J. , and R. W. Mcchesney, Surveillance Capitalism: Monopoly-Finance Capital, the Military-Industrial Complex, and the Digital Age, 2014.

, Monthly Review, vol.66, issue.3

J. R. Beniger, The Control Revolution: Technological and Economic Origins of the Information Society, 1986.

C. Bertholet and L. Létourneau, Ubérisons l'État ! Avant que d'autres ne s'en chargent, 2017.

S. Biddle, Apple Logs Your iMessage Contacts -and May Share Them With Police'. The Intercept, vol.28, 2016.

D. Bigo, Sociology of Transnational Guilds'. International Political Sociology, vol.10, issue.4, pp.398-416, 2016.

E. Black, IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America's Most Powerful Corporation, 2012.

L. Bonelli, Les modernisations contradictoires de la police nationale, L'État démantelé, pp.102-119, 2010.
URL : https://hal.archives-ouvertes.fr/halshs-01075423

B. Buzan and O. Waever, Regions and Powers: The Structure of International Security, 2003.

N. Cardozo, Requiring Judicial Review for Every Gag Order Is a Simple Way to Have Our Backs: Apple Does but Google and Facebook Fall Short'. Electronic Frontier Foundation, 2017.

S. Cassini, Terrorisme : Accord Entre La France et Les Géants Du Net'. Les Échos, 2015.

P. Charbon, Genèse du vote de la loi de 1837, origine du monopole des télécommunications, L'État et les télécommunications en France et à l'étranger, pp.11-22, 1991.

R. J. Deibert, Black Code: Inside the Battle for Cyberspace, 2013.

A. Desrosières, The Politics of Large Numbers: A History of Statistical Reasoning. Translated by Camille Naish, 2002.

. Dib, Recommendations'. Defense Innovation Board, 2017.

P. N. Edwards, The Closed World: Computers and the Politics of Discourse in Cold War America, 1996.

J. Ellul, The Presence of the Kingdom, vol.2, 1989.

V. Eubanks, Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor, 2018.

. Europol, EU Internet Referral Unit -YEAR ONE REPORT, 2016.

P. Flichy, Dynamics Of Modern Communication: The Shaping And Impact Of New Communication Technologies, 2009.

M. Foucault, What Is Enlightenment?' In The Foucault Reader, 1984.

, Penal Theories and Institutions: Lectures at the Collège de France, pp.1971-1972, 2018.

T. Fox-brewster, Forget About Backdoors, This Is The Data WhatsApp Actually Hands To Cops, 2017.

S. Frohman, Scott Frohman LinkedIn Profile'. LinkedIn, 2018.

C. Fuchs and D. Trottier, Towards a Theoretical Model of Social Media Surveillance in Contemporary Society, Communications-European Journal of Communication Research, vol.40, issue.1, pp.113-148, 2015.

S. Gallagher, Reveals Breadth of Surveillance by NSA, Others'. Ars Technica, Transparency Report, 2017.

A. R. Galloway, Protocol: How Control Exists after Decentralization, 2004.

R. Girard, What Is Happening Today Is Mimetic Rivalry on a Global Scale, South Central Review, vol.19, pp.22-27, 2002.

, Global Top 100 Companies by Market Capitalisation, 2017.

J. Goldsmith and T. Wu, Google's European Revolving Door'. 2016. Google Transparency Project, 2006.

, Google's Revolving Door (US)'. 2017. Google Transparency Project, 2017.

D. Graeber, The Utopia of Rules: On Technology, Stupidity, and the Secret Joys of Bureaucracy, 2015.

K. D. Haggerty and R. V. Ericson, The Surveillant Assemblage, British Journal of Sociology, vol.51, issue.4, pp.605-627, 2000.

B. E. Harcourt, Exposed -Desire and Disobedience in the Digital Age, 2015.

S. Harris, @War: The Rise of the Military-Internet Complex, 2014.

D. R. Headrick, The Invisible Weapon: Telecommunications and International Politics, pp.1851-1945, 2012.

B. Hibou, The Bureaucratization of the World in the Neoliberal Era, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01356586

C. Hope and K. Mccann, Google, Facebook and Twitter Told to Take down Terror Content within Two Hours or Face Fines'. The Telegraph, 2017.

, Hybrid Rule and State Formation: Public-Private Power in the 21st Century, 2015.

D. Isaac, M. Streitfeld, and K. Benner, Silicon Valley's Ambivalence Toward Trump Turns to Anger'. The New York Times, 2017.

M. L. Jones, The Spy Who Pwned Me, 2017.

D. Y. Jose, J. C. Wong-in-san, and C. , Silicon Valley Appears Open to Helping US Spy Agencies after Terrorism Summit'. The Guardian, 2016.

W. Knight, There's a Big Problem with AI: Even Its Creators Can't Explain How It Works'. MIT Technology Review, 2017.

A. Léchenet, L'influence Tentaculaire Des Géants Américains, 2017.

C. Lécuyer, Making Silicon Valley: Innovation and the Growth of High Tech, 1930.

Y. Levine, Surveillance Valley: The Secret Military History of the Internet, 2018.

J. Mclaughlin, Spy Chief Complains That Edward Snowden Sped Up Spread of Encryption by 7 Years'. The Intercept, vol.25, 2016.

J. Menn and D. Volz, Exclusive: Google, Facebook Quietly Move toward Automatic Blocking of Extremist Videos'. Reuters, 2016.

C. Mills and . Wright, The Power Elite, 1959.

T. Mitchell, The Limits of the State: Beyond Statist Approaches and Their Critics, The American Political Science Review, vol.85, issue.1, p.77, 1991.

E. Morozov, To Save Everything, Click Here: The Folly of Technological Solutionism, 2013.

E. Nakashima and H. Tsukayama, Why People like Edward Snowden Say They Will Boycott Google's Newest Messaging App, 2016.

J. Nesbit, Google's True Origin Partly Lies in CIA and NSA Research Grants for Mass Surveillance, 2017.

C. O'neil, Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy, 2016.

P. Pezziardi and H. Verdier, Des startups d'État à l'État plateforme, 2017.

S. M. Powers and M. Jablonski, The Real Cyber War: The Political Economy of Internet Freedom, 2015.

S. T. Roberts, Commercial Content Moderation: Digital Laborers' Dirty Work, The Intersectional Internet: Race, Sex, Class, and Culture Online, pp.147-60, 2016.

M. Rogers and G. Eden, The Snowden Disclosures, Technical Standards, and the Making of Surveillance Infrastructures', International Journal of Communication, vol.11, issue.0, p.22, 2017.

T. Romm, Behind the Scenes at President Trump's Private Talks with the Tech Industry, 2017.

A. Rouvroy, The End(s) of Critique : Data-Behaviourism vs. DueProcess'. In Privacy, Due Process and the Computational Turn, 2012.

I. Rubinstein and J. Van-hoboken, Privacy and Security in the Cloud: Some Realism About Technical Solutions to Transnational Surveillance in the PostSnowden Era, Maine Law Review, vol.66, issue.2, pp.488-533, 2014.

D. E. Sanger and S. Frenkel, Five Eyes" Nations Quietly Demand Government Access to Encrypted Data'. The New York Times, 2018.

J. C. Scott, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, 1998.

E. Schmidt and J. Cohen, The New Digital Age: Transforming Nations, Businesses, and Our Lives, 2013.

E. Schmidt and J. Rosenberg, How Google Works, 2015.

. Singh-guiliani, N. Neema, and . Shah, The CLOUD Act Doesn't Help Privacy and Human Rights: It Hurts Them'. Lawfare. 16, 2018.

A. Smith, Franken-Algorithms: The Deadly Consequences of Unpredictable Code', The Guardian, 2018.

B. Smith, The CLOUD Act Is an Important Step Forward, but Now More Steps Need to Follow'. Microsoft on the Issues (blog), 2018.

. Statista, Most Valuable Companies in the World, 2018.

K. Swisher, Trump's Ludicrous Attack on Big Tech'. The New York Times, 2018.

O. Tesquet, Palantir, l'encombrant Ami Américain Du Renseignement Français, 2017.

. Theluddbrarian, Challenging the Tech Companies from Within. LibrarianShipwreck, 28, 2018.

F. Tréguer, Intelligence Reform and the Snowden Paradox: The Case of France, Media and Communication, vol.5, issue.1, pp.17-28, 2017.

, US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance, UTIC Deliverable, vol.5, 2018.

F. Turner, From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism, 2006.

, Draft Options Paper on Strategic Approaches to Encryption, Computer Mediated Transactions'. American Economic Review, vol.100, issue.2, pp.1-10, 2010.

, Beyond Big Data', Business Economics, vol.49, issue.1, pp.27-31, 2014.

S. Vergnolle, Understanding the French Criminal Justice System as a Tool for Reforming International Legal Cooperation and Cross-Border Data Requests, 2017.

, Data Protection, Privacy and European Regulation in the Digital Age

D. Volz, Spy Agency NSA Triples Collection of U.S. Phone Records: Official...' Reuters, 2018.

K. Walker, Digital Security and Due Process: A New Legal Framework for the Cloud Era, 2017.

J. Webb, T. Schirato, and G. Danaher, , 2002.

M. C. Williams, The Public, the Private and the Evolution of Security Studies, Security Dialogue, vol.41, issue.6, pp.623-653, 2010.

C. M. Wong, US Cross-Border Data Deal Could Open Surveillance Floodgates'. Human Rights Watch, 2017.

S. Zuboff, Big Other: Surveillance Capitalism and The Prospects of an Information Civilization, Journal of Information Technology, vol.30, issue.1, pp.75-89, 2015.