男女羞羞视频在线观看,国产精品黄色免费,麻豆91在线视频,美女被羞羞免费软件下载,国产的一级片,亚洲熟色妇,天天操夜夜摸,一区二区三区在线电影

Time for a global pact on cyber security after US spook scandal

Updated: 2013-11-01 07:06

By Kerry Brown(HK Edition)

  Print Mail Large Medium  Small

For a hugely self-controlled, understated politician, it was as close as you would ever get to hearing an expression of raw rage. But German Chancellor Angela Merkel's anger on being informed of the US intelligence agencies intercepting her mobile phone as early as 2002, before she had even come to power, was palpable. "You do not spy on your allies", she said, after arriving for a meeting of the European Union in Brussels in late October soon after the news broke. It simply isn't done.

But the whole concept of a straightforward "ally" is questionable here. Allies in one area can also be competitors in another. Politically, of course, Germany and the US are very close. But commercially, everyone is out for themselves, and both countries have to do what they can to support the interests of their companies and their own competitiveness and growth.

In this context, gaining advantage by snooping on what others are doing, even when they are diplomatic friends, is evidently highly tempting. The US government has categorically denied that it engages in commercial espionage on its allies. But electronic communication and the explosion of signals intelligence as opposed to human sources of covert information (what intelligence agencies euphemistically call 'unconventional sources') means that the ways in which governments can tiptoe into the affairs of others has burgeoned. Regulations are shady, boundaries unclear, protocols weak or non-existent. If the means are there, the more cynical might say why not use them to further commercial advantage, especially as there are no clear rules telling you what to do.

At the moment a fog of virtual war prevails. Claims and counter claims are made. Security establishment elites in Europe and the US loudly declaim against China as the greatest practitioner of invasive cyber espionage. But the Edward Snowden case, which exploded in Hong Kong, has revealed the US's hypocrisy. Now there is a need for ground rules the main players can agree on to at least create some clarity.

In the opening era of the global explosion of e-mail, the Internet, mobile phones and information technology, there was perhaps an argument for reaping the dividends of surveillance where they could be found. Those naive enough to speak on open lines about sensitive things, or send out restricted material on non-protected systems were asking for prying attention. But there are no excuses now. A generation has grown up who are IT savvy and know that we live in a world of frightening transparency. Everything, in theory, is visible to anyone who wants to hack into it.

Time for a global pact on cyber security after US spook scandal

One of the few viable solutions to this chaos of transparency and anarchic mutual surveillance at the moment is internationally agreed and monitored protocols. Everyone has a reason now to start restraining their behavior. Self-interest is finally starting to kick in. The free-for-all that Snowden's material and WikiLeaks seem to give evidence for is unsustainable.

What an international treaty sponsored by a body such as the United Nations might look like on setting out ground rules for cyber-activity is another matter. But new technologies in the past have always occurred while they bring a certain amount of disruption. Innovation by its very nature upsets established patterns and challenges conventions. A global treaty on cyber-activity would need to work out what areas are considered legitimate and illegitimate for states to start targeting. There would need to be hard thinking about the parameters of what constitutes a security threat, and what in fact is simply commercial information. There would need to be ways for states to take other nations to arbitration, much like for trade cases in the World Trade Organization, when they feel, as Germany now does, that their sovereignty has been violated by the actions of another power.

The author is professor of Chinese Politics and director of the China Studies Center at the University of Sydney and leads the Europe China Research and Advice Network (ECRAN) funded by the EU.

(HK Edition 11/01/2013 page9)

主站蜘蛛池模板: 金坛市| 库车县| 辉县市| 和龙市| 巴林左旗| 噶尔县| 井研县| 正宁县| 故城县| 宜川县| 偏关县| 苍南县| 林周县| 象山县| 东海县| 会理县| 平湖市| 灵丘县| 新郑市| 五莲县| 龙州县| 来宾市| 富顺县| 增城市| 陇川县| 宝丰县| 东明县| 轮台县| 忻城县| 图木舒克市| 阳朔县| 西充县| 江口县| 宜丰县| 武鸣县| 衡东县| 黎城县| 彭水| 怀宁县| 安化县| 东城区| 淳化县| 上思县| 海安县| 曲水县| 宁海县| 陕西省| 西峡县| 阿合奇县| 鄂州市| 南陵县| 壤塘县| 九龙城区| 南宁市| 济阳县| 甘孜| 息烽县| 衡山县| 东至县| 大化| 安龙县| 灵武市| 榆中县| 新津县| 安庆市| 腾冲县| 安阳市| 太谷县| 肇庆市| 奇台县| 肇东市| 无锡市| 齐齐哈尔市| 池州市| 集贤县| 塘沽区| 吐鲁番市| 南江县| 伊川县| 法库县| 雷州市| 吉安市|