<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区

          Time for a global pact on cyber security after US spook scandal

          Updated: 2013-11-01 07:06

          By Kerry Brown(HK Edition)

            Print Mail Large Medium  Small

          For a hugely self-controlled, understated politician, it was as close as you would ever get to hearing an expression of raw rage. But German Chancellor Angela Merkel's anger on being informed of the US intelligence agencies intercepting her mobile phone as early as 2002, before she had even come to power, was palpable. "You do not spy on your allies", she said, after arriving for a meeting of the European Union in Brussels in late October soon after the news broke. It simply isn't done.

          But the whole concept of a straightforward "ally" is questionable here. Allies in one area can also be competitors in another. Politically, of course, Germany and the US are very close. But commercially, everyone is out for themselves, and both countries have to do what they can to support the interests of their companies and their own competitiveness and growth.

          In this context, gaining advantage by snooping on what others are doing, even when they are diplomatic friends, is evidently highly tempting. The US government has categorically denied that it engages in commercial espionage on its allies. But electronic communication and the explosion of signals intelligence as opposed to human sources of covert information (what intelligence agencies euphemistically call 'unconventional sources') means that the ways in which governments can tiptoe into the affairs of others has burgeoned. Regulations are shady, boundaries unclear, protocols weak or non-existent. If the means are there, the more cynical might say why not use them to further commercial advantage, especially as there are no clear rules telling you what to do.

          At the moment a fog of virtual war prevails. Claims and counter claims are made. Security establishment elites in Europe and the US loudly declaim against China as the greatest practitioner of invasive cyber espionage. But the Edward Snowden case, which exploded in Hong Kong, has revealed the US's hypocrisy. Now there is a need for ground rules the main players can agree on to at least create some clarity.

          In the opening era of the global explosion of e-mail, the Internet, mobile phones and information technology, there was perhaps an argument for reaping the dividends of surveillance where they could be found. Those naive enough to speak on open lines about sensitive things, or send out restricted material on non-protected systems were asking for prying attention. But there are no excuses now. A generation has grown up who are IT savvy and know that we live in a world of frightening transparency. Everything, in theory, is visible to anyone who wants to hack into it.

          Time for a global pact on cyber security after US spook scandal

          One of the few viable solutions to this chaos of transparency and anarchic mutual surveillance at the moment is internationally agreed and monitored protocols. Everyone has a reason now to start restraining their behavior. Self-interest is finally starting to kick in. The free-for-all that Snowden's material and WikiLeaks seem to give evidence for is unsustainable.

          What an international treaty sponsored by a body such as the United Nations might look like on setting out ground rules for cyber-activity is another matter. But new technologies in the past have always occurred while they bring a certain amount of disruption. Innovation by its very nature upsets established patterns and challenges conventions. A global treaty on cyber-activity would need to work out what areas are considered legitimate and illegitimate for states to start targeting. There would need to be hard thinking about the parameters of what constitutes a security threat, and what in fact is simply commercial information. There would need to be ways for states to take other nations to arbitration, much like for trade cases in the World Trade Organization, when they feel, as Germany now does, that their sovereignty has been violated by the actions of another power.

          The author is professor of Chinese Politics and director of the China Studies Center at the University of Sydney and leads the Europe China Research and Advice Network (ECRAN) funded by the EU.

          (HK Edition 11/01/2013 page9)

          主站蜘蛛池模板: 久久精品夜色国产亚洲av| 亚洲成人网在线观看| 国产成人精品日本亚洲专区6| 99国精品午夜福利视频不卡99| 无码囯产精品一区二区免费| 国产精品爽黄69天堂A| 日韩精品人妻系列无码av东京 | 中文字幕在线精品国产| 国产一区二区日韩在线| 亚洲最大成人免费av| 噜噜综合亚洲av中文无码| 国产精品多p对白交换绿帽| 狠狠色噜噜狠狠亚洲AV| 亚洲精品乱码久久久久久中文字幕 | 一区二区不卡国产精品| 国产精品人妻久久无码不卡| 一本av高清一区二区三区| 亚洲熟伦熟女新五十熟妇| 国产精品一区二区中文| 精品乱码一区二区三四五区 | 不卡国产一区二区三区| 国产免费久久精品99reswag| 国产自在自线午夜精品| 91区国产福利在线观看午夜| 性xxxxxx中国寡妇mm| 欧美激情内射喷水高潮| 国产精品99一区二区三区| 伊人色综合一区二区三区影院视频| 麻豆精品久久久久久久99蜜桃| 在线A级毛片无码免费真人| av大片| 久久午夜色播影院| 日韩在线视频线观看一区| 精品国产一区二区三区国产馆| 国产成人啪精品午夜网站 | 日韩av天堂综合网久久| 人妻无码中文专区久久app| 国产一级黄色片在线播放| 欧美熟妇乱子伦XX视频| 九九热在线视频精品免费| 久久毛片少妇高潮|