日批在线视频_内射毛片内射国产夫妻_亚洲三级小视频_在线观看亚洲大片短视频_女性向h片资源在线观看_亚洲最大网

Global EditionASIA 中文雙語Fran?ais
Opinion
Home / Opinion / Featured Contributors

Australia opens Pandora's box with surveillance bill

By Xu Ke | chinadaily.com.cn | Updated: 2019-04-25 16:22
Share
Share - WeChat
An exhibition stand of Huawei at the PT Expo China in Beijing, Sept 26, 2018. [Photo/ VCG]

At the end of 2018, Australia became another "surveillance state" with the passing of the Telecommunications and Other Legislation Amendment Bill or the Assistance and Access Bill 2018.

What's in the bill?

The bill establishes a technical assistance mechanism between law enforcement departments, intelligence agencies and private institutions. In short, it authorizes Australia's national law enforcement to issue mandatory "Technical Assistance Notices", "Technical Capability Notices" and "Computer Access and Assistance Orders" to all communication providers. Upon receiving the notification and instruction, the communication provider must undertake a number of activities, for example, decrypting specific communications, installing specific software on the network, modifying or replacing services, providing assistance in accessing facilities, and providing source code, third-party provider profiles, network device encryption schemes, and more.

The power of the bill is not limited to within Australia. In fact, any organizations or individuals providing communication services to Australia are subject to its jurisdiction, whether its "company, server, manufacturing location" is located in Australia or not. More shockingly, the law imposes an extraordinary duty of confidentiality. The private sector, which assists law enforcement, cannot disclose the details of the instructions it receives, or even the instructions themselves. Otherwise, the violators will be put into prison for up to five years.

In The Spirit of the Laws, Montesquieu warned: "Constant experience shows us that every man invested with power is apt to abuse it, and to carry his authority as far as it will go." The bill, with its secrecy, broad jurisdiction and powers that can set up "backdoors" of systems, has caused widespread fear among Australians, with many thinking the law has opened "Pandora's box" of "surveillance states".

The history of 'surveillance states'

The origins of modern surveillance states can be traced back to the US government' s military occupation of the Philippines in the 1890s. Christopher J. Coyne, a professor at George Mason University in the United States said in the book Tyranny Comes Home that under the leadership of Ralph Van Deman, the father of US military intelligence, the American occupier established an advanced monitoring agency at the time to suppress rebels and dissidents.

In May 1917, Vanderman took charge of the Military Intelligence Section (MIS), a similar surveillance facility in the United States, and which would eventually evolve into the US National Security Agency (NSA). In 1955, the United States further launched an intelligence gathering and analysis network consisting of five English-speaking countries: the United States, Britain, Canada, Australia, and New Zealand. This is the so-called "five-eye alliance." As a result, the five countries can globally intercept and monitor telephone exchanges, faxes, mails and other information transmitted by satellite communications.

After 9/11, the US surveillance became more intensified. Shortly after the attack, the US government introduced the Patriot Act, the Accuracy Act and the Foreign Intelligence Surveillance Act, which formed a comprehensive intelligence surveillance network. According to a survey by Privacy International in 2007 covering 47 countries, the United States ranked first in the monitoring index. But the United States didn't stop there. In 2013, Edward Snowden, a technical analyst at the Central Intelligence Agency (CIA), exposed the Prism program. In this seven-year top-secret electronic surveillance, monitored individuals include non-Americans who use related company services, or any US citizen who communicates with foreigners, including email, video and voice conversations, and social network details, and so on, can be described as large-scale indiscriminate monitoring. Surveillance states were finally formed.

As for the bill, it is largely a "one-time trial" of the "five-eye alliance." It smartly uses Australia's lack of "benefits" of the "Bill of Rights" and uses Australia as a breakthrough to force large global technology companies to yield. It's no wonder that Sharon Bradford Franklin, head of monitoring and cybersecurity policy at New America, said the bill was in fact the backdoor of the encrypted backdoor for the United States.

Curbing the spread of 'surveillance states'

The emergence of surveillance states is rooted in the irrational panic of the people against foreign countries and the use of such panic by the government. These sentiments and circumstances have been reflected in the unprovoked attacks on the Chinese government and Chinese companies over the past few years.

In August 2018, the Australian government banned Chinese telecommunications equipment manufacturers such as Huawei and ZTE from providing 5G technology and products, as well as the use of Chinese telecommunications equipment in domestic broadband networks. Behind this decision is vague "national security". For example, the West has repeatedly accused China of its "Intelligence Law", especially the particular Article 7 of the law, under which Chinese enterprises will cooperate with the Chinese government in carrying out acts of theft.

However, the Intelligence Law does not require organizations and citizens to unconditionally "support, assist and cooperate" with "national intelligence". On the contrary, the so-called "support, assistance and cooperation" must be carried out "in accordance with the provisions of other laws".

In other words, the Intelligence Law does not create new obligations or responsibilities in addition to existing laws. The claim that Chinese companies are forced to allow national security services access to all data on their networks or devices is completely illusory.

Needless to say, with the rapid development of science and technology, the use of communications technology to carry out major crimes and terrorist activities emerge in endlessly, but this does not mean that the threat of other countries can be infinitely exaggerated, let alone expand their own network monitoring power.

To bring cyber-surveillance and government decisions based on national security back to rationality and transparency and to prevent illegal access to information and safeguard international cooperation is a consensus among countries. It is the only way to prevent Australia from sliding into the abyss of a surveillance state, thereby preventing countries from falling into misunderstanding and hostility.

Xu Ke, executive Director of Center for Digital economy and legal Innovation, University of International Business and Economics

The opinions expressed here are those of the writer and do not necessarily represent the views of China Daily and China Daily website.

 

Most Viewed in 24 Hours
Top
BACK TO THE TOP
English
Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US
主站蜘蛛池模板: 青春草av| 国产三级精品视频 | 91精品国产综合久久久久久久 | 国产主播av| 欧美第一视频 | 老熟妇毛片 | 国产第一页在线 | 日韩成人动漫 | 欧美色图一区 | 另类图片亚洲色图 | 国产在线网 | www成人免费视频 | 欧美丰满xx000| 亚洲21p | 黄网站色视频 | 少妇一级淫片免费放中国 | 玖玖精品| 天天操欧美 | 伊人狼人久久 | 国产亚洲天堂 | 99re视频这里只有精品 | 黄色av免费观看 | 日韩少妇视频 | 欧美亚州 | 国产a级片视频 | 亚洲涩网 | 在线观看国产欧美 | 欧美日韩国产一级 | 久久亚洲视频 | 青青操在线视频 | 中文字幕69 | 偷拍女澡堂bbbbbccccc | 在线看日韩av | 欧美大片在线看免费观看 | 国产h视频 | 久久久噜噜噜久久久 | 亚洲天堂av中文字幕 | 亚洲图片日韩 | 亚洲色图图片 | 日韩小视频在线 | 久久久久久91香蕉国产 |