<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区

          Time for a global pact on cyber security after US spook scandal

          Updated: 2013-11-01 07:06

          By Kerry Brown(HK Edition)

            Print Mail Large Medium  Small

          For a hugely self-controlled, understated politician, it was as close as you would ever get to hearing an expression of raw rage. But German Chancellor Angela Merkel's anger on being informed of the US intelligence agencies intercepting her mobile phone as early as 2002, before she had even come to power, was palpable. "You do not spy on your allies", she said, after arriving for a meeting of the European Union in Brussels in late October soon after the news broke. It simply isn't done.

          But the whole concept of a straightforward "ally" is questionable here. Allies in one area can also be competitors in another. Politically, of course, Germany and the US are very close. But commercially, everyone is out for themselves, and both countries have to do what they can to support the interests of their companies and their own competitiveness and growth.

          In this context, gaining advantage by snooping on what others are doing, even when they are diplomatic friends, is evidently highly tempting. The US government has categorically denied that it engages in commercial espionage on its allies. But electronic communication and the explosion of signals intelligence as opposed to human sources of covert information (what intelligence agencies euphemistically call 'unconventional sources') means that the ways in which governments can tiptoe into the affairs of others has burgeoned. Regulations are shady, boundaries unclear, protocols weak or non-existent. If the means are there, the more cynical might say why not use them to further commercial advantage, especially as there are no clear rules telling you what to do.

          At the moment a fog of virtual war prevails. Claims and counter claims are made. Security establishment elites in Europe and the US loudly declaim against China as the greatest practitioner of invasive cyber espionage. But the Edward Snowden case, which exploded in Hong Kong, has revealed the US's hypocrisy. Now there is a need for ground rules the main players can agree on to at least create some clarity.

          In the opening era of the global explosion of e-mail, the Internet, mobile phones and information technology, there was perhaps an argument for reaping the dividends of surveillance where they could be found. Those naive enough to speak on open lines about sensitive things, or send out restricted material on non-protected systems were asking for prying attention. But there are no excuses now. A generation has grown up who are IT savvy and know that we live in a world of frightening transparency. Everything, in theory, is visible to anyone who wants to hack into it.

          Time for a global pact on cyber security after US spook scandal

          One of the few viable solutions to this chaos of transparency and anarchic mutual surveillance at the moment is internationally agreed and monitored protocols. Everyone has a reason now to start restraining their behavior. Self-interest is finally starting to kick in. The free-for-all that Snowden's material and WikiLeaks seem to give evidence for is unsustainable.

          What an international treaty sponsored by a body such as the United Nations might look like on setting out ground rules for cyber-activity is another matter. But new technologies in the past have always occurred while they bring a certain amount of disruption. Innovation by its very nature upsets established patterns and challenges conventions. A global treaty on cyber-activity would need to work out what areas are considered legitimate and illegitimate for states to start targeting. There would need to be hard thinking about the parameters of what constitutes a security threat, and what in fact is simply commercial information. There would need to be ways for states to take other nations to arbitration, much like for trade cases in the World Trade Organization, when they feel, as Germany now does, that their sovereignty has been violated by the actions of another power.

          The author is professor of Chinese Politics and director of the China Studies Center at the University of Sydney and leads the Europe China Research and Advice Network (ECRAN) funded by the EU.

          (HK Edition 11/01/2013 page9)

          主站蜘蛛池模板: 免费播放岛国影片av| 色WWW永久免费视频| 在线亚洲精品国产二区图片欧美| 国产精品7m凸凹视频分类大全| 影视先锋av资源噜噜| 日韩精品中文字幕国产一| 日韩国产中文字幕精品| brazzers欧美巨大| 亚洲欧美日韩在线不卡| 亚洲一区二区精品另类| 久久伊人精品影院一本到综合| 午夜福利免费视频一区二区| 色老头亚洲成人免费影院| 久久天天躁狠狠躁夜夜avapp | 老司机精品一区在线视频| 激情一区二区三区成人文| 亚洲国产精品无码久久电影| 精品无码国产一区二区三区av| 国产亚洲视频免费播放| 久久国产乱子伦免费精品无码 | 国产一级精品毛片基地| h动态图男女啪啪27报gif| 大地资源高清播放在线观看| 国产成人免费一区二区三区| 亚洲日本高清一区二区三区| 国产SUV精品一区二区88L| 日韩av日韩av在线| 欧美国产日韩亚洲中文| 福利一区二区在线播放| 亚洲精品二区在线观看| 亚洲欧美自偷自拍视频图片| 国产成人久久精品激情91| 四虎国产精品久久免费精品| 欧美最大胆的西西人体44| 国产人妻熟女呻吟在线观看| 精品在免费线中文字幕久久| 国产精品一区在线蜜臀| 在线国产你懂的| 欧洲成人在线观看| 手机看片AV永久免费| 久久91精品国产91久久麻豆|