Routledge Handbook of Private Security Studies, 2015. ,
Security Beyond the State: Private Security in International Politics, 2010. ,
The Government Machine: A Revolutionary History of the Computer, 2003. ,
L'Etat en mode start-up, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01498788
The (Big) Data-Security Assemblage: Knowledge and Critique, Big Data & Society, vol.2, issue.2, pp.1-12, 2015. ,
When Google Met Wikileaks, 2014. ,
Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security'. The Guardian, 2013. ,
The Californian Ideology, vol.1, pp.44-72, 1995. ,
Surveillance Capitalism: Monopoly-Finance Capital, the Military-Industrial Complex, and the Digital Age, Monthly Review, vol.66, issue.3, 1980. ,
The Control Revolution: Technological and Economic Origins of the Information Society, 1986. ,
Ubérisons l'État! Avant que d'autres ne s'en chargent, 2017. ,
Apple Logs Your IMessage Contacts-and May Share Them with Police'. The Intercept, vol.28, 2016. ,
, Sociology of Transnational Guilds'. International Political Sociology, vol.10, issue.4, pp.398-416, 2016.
IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America's Most Powerful Corporation, 2012. ,
Les modernisations contradictoires de la police nationale, L'État démantelé, pp.102-119, 2010. ,
URL : https://hal.archives-ouvertes.fr/halshs-01075423
Regions and Powers: The Structure of International Security, 2003. ,
Requiring Judicial Review for Every Gag Order Is a Simple Way to Have Our Backs: Apple Does but Google and Facebook Fall Short'. Electronic Frontier Foundation, 2017. ,
Terrorisme: Accord Entre La France et Les Géants Du Net'. Les Échos, 2015. ,
Genèse du vote de la loi de 1837, origine du monopole des télé-communications'. In L'État et les télécommunications en France et à l'étranger, 18371987, pp.11-22, 1991. ,
Black Code: Inside the Battle for Cyberspace, 2013. ,
The Politics of Large Numbers: A History of Statistical Reasoning. Translated by Camille Naish, 2002. ,
Recommendations'. Defense Innovation Board, 2017. ,
The Closed World: Computers and the Politics of Discourse in Cold War America, 1996. ,
The Presence of the Kingdom, 1989. ,
Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor, 2018. ,
EU Internet Referral Unit -YEAR ONE REPORT, 2016. ,
Dynamics of Modern Communication: The Shaping and Impact Of New Communication Technologies, 2009. ,
What Is Enlightenment?' In The Foucault Reader, 1984. ,
, Penal Theories and Institutions: Lectures at the Collège de France, 1971-1972. Translated by Graham Burchell, 2018.
Forget About Backdoors, This Is the Data WhatsApp Actually Hands to Cops, 2017. ,
Scott Frohman LinkedIn Profile'. LinkedIn, 2018. ,
Towards a Theoretical Model of Social Media Surveillance in Contemporary Society, Communications-European Journal of Communication Research, vol.40, issue.1, pp.113-148, 2015. ,
Reveals Breadth of Surveillance by NSA, Others'. Ars Technica, Transparency Report, 2017. ,
Protocol: How Control Exists after Decentralization, 2004. ,
What Is Happening Today Is Mimetic Rivalry on a Global Scale, South Central Review, vol.19, pp.22-27, 2002. ,
Google's European Revolving Door'. 2016. Google Transparency Project, Who Controls the Internet?: Illusions of a Borderless World, 2006. ,
, The Utopia of Rules: On Technology, Stupidity, and the Secret Joys of Bureaucracy, 2015.
The Surveillant Assemblage, British Journal of Sociology, vol.51, issue.4, pp.605-627, 2000. ,
Exposed -Desire and Disobedience in the Digital Age, 2015. ,
@War: The Rise of the Military-Internet Complex, 2014. ,
The Invisible Weapon: Telecommunications and International Politics, pp.1851-1945, 2012. ,
The Bureaucratization of the World in the Neoliberal Era, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01356586
Google, Facebook and Twitter Told to Take down Terror Content within Two Hours or Face Fines'. The Telegraph, 2017. ,
, Hybrid Rule and State Formation: PublicPrivate Power in the 21st Century, 2015.
The Spy Who Pwned Me, 2017. ,
Silicon Valley Appears Open to Helping US Spy Agencies after Terrorism Summit'. The Guardian, 2016. ,
There's a Big Problem with AI: Even Its Creators Can't Explain How It Works'. MIT Technology Review, 2017. ,
L'influence Tentaculaire Des Géants Américains, 2017. ,
Making Silicon Valley: Innovation and the Growth of High Tech, pp.1930-1970, 2007. ,
Surveillance Valley: The Secret Military History of the Internet, 2018. ,
Challenging the Tech Companies from Within'. LibrarianShipwreck, 28, 2018. ,
Spy Chief Complains That Edward Snowden Sped Up Spread of Encryption by 7 Years'. The Intercept, vol.25, 2016. ,
Exclusive: Google, Facebook Quietly Move toward Automatic Blocking of Extremist Videos'. Reuters, 25, 2016. ,
The Power Elite, 1959. ,
The Limits of the State: Beyond Statist Approaches and Their Critics, The American Political Science Review, vol.85, issue.1, p.77, 1991. ,
To Save Everything, Click Here: The Folly of Technological Solutionism, 2013. ,
Why People like Edward Snowden Say They Will Boycott Google's Newest Messaging App, 2016. ,
Google's True Origin Partly Lies in CIA and NSA Research Grants for Mass Surveillance, 2017. ,
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy, 2016. ,
Des startups d'État à l'État plateforme, 2017. ,
The Real Cyber War: The Political Economy of Internet Freedom, 2015. ,
Commercial Content Moderation: Digital Laborers' Dirty Work, The Intersectional Internet: Race, Sex, Class, and Culture Online, pp.147-60, 2016. ,
The Snowden Disclosures, Technical Standards, and the Making of Surveillance Infrastructures', International Journal of Communication, vol.11, issue.0, p.22, 2017. ,
Behind the Scenes at President Trump's Private Talks with the Tech Industry, 2017. ,
The End(s) of Critique: Data-Behaviourism vs. Due-Process'. In Privacy, Due Process and the Computational Turn, 2012. ,
Privacy and Security in the Cloud: Some Realism About Technical Solutions to Transnational Surveillance in the Post-Snowden Era, Maine Law Review, vol.66, issue.2, pp.488-533, 2014. ,
Five Eyes" Nations Quietly Demand Government Access to Encrypted Data'. The New York Times, 2018. ,
Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, 1998. ,
, The New Digital Age: Transforming Nations, Businesses, and Our Lives, 2013.
, How Google Works, 2015.
The CLOUD Act Doesn't Help Privacy and Human Rights: It Hurts Them'. Lawfare. 16, 2018. ,
Franken-Algorithms: The Deadly Consequences of Unpredictable Code', The Guardian, 2018. ,
The CLOUD Act Is an Important Step Forward, but Now More Steps Need to Follow'. Microsoft on the Issues (blog), 2018. ,
Most Valuable Companies in the World, 2018. ,
Silicon Valley's Ambivalence Toward Trump Turns to Anger'. The New York Times, 2017. ,
Trump's Ludicrous Attack on Big Tech'. The New York Times, 2018. ,
Palantir, l'encombrant Ami Américain Du Renseignement Français, 2017. ,
Intelligence Reform and the Snowden Paradox: The Case of France, Media and Communication, vol.5, issue.1, pp.17-28, 2017. ,
US Technology Companies and State Surveillance in the PostSnowden Context: Between Cooperation and Resistance, UTIC Deliverable, vol.5, 2018. ,
From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism, 2006. ,
, Draft Options Paper on Strategic Approaches to Encryption, 2015.
, Computer Mediated Transactions'. American Economic Review, vol.100, issue.2, pp.1-10, 2010.
Beyond Big Data', Business Economics, vol.49, issue.1, pp.27-31, 2014. ,
Understanding the French Criminal Justice System as a Tool for Reforming International Legal Cooperation and Cross-Border Data Requests'. Georgia Tech Scheller College of Business Research Paper. Data Protection, Privacy and European Regulation in the Digital Age, 2017. ,
, Spy Agency NSA Triples Collection of U.S. Phone Records: Official . . .'. Reuters, 2018.
Digital Security and Due Process: A New Legal Framework for the Cloud Era, 2017. ,
, , 2002.
The Public, the Private and the Evolution of Security Studies, Security Dialogue, vol.41, issue.6, pp.623-653, 2010. ,
US Cross-Border Data Deal Could Open Surveillance Floodgates'. Human Rights Watch, 2017. ,
Big Other: Surveillance Capitalism and The Prospects of an Information Civilization, Journal of Information Technology, vol.30, issue.1, pp.75-89, 2015. ,