Doing this has given the U.S. the means to eavesdrop on the
majority of the world's computers, according to Kaspersky, other cyber
researchers and, reportedly, former U.S. operatives.
Surprised? You
shouldn’t be. This pot’s been calling kettles
black for so long you’d have to be idiot-thick not to figure out that they were
over-compensating to veil their own transgressions.
So what now, now that we have relative certainty that the
entire planet’s been compromised by U.S. intelligence agencies? And, perhaps worse, they’ve been doing so in
the context of accusing pretty much any and every other (other?) “bad guy” of
doing the same thing while purporting to be holier than all those other “thou’s.”
But wait, the U.S. only conducts espionage to ensure our national security, not, for instance, to gather and store data on its own citizens or, ahem, to gain commercial
benefit for American companies.
Nonsense.
I'll leave the former be for now, but as for the latter, while there’s no evidence - yet - to believe the U.S. has stolen intellectual property from foreign firms with the express purpose of transferring
such knowledge to domestic firms, that’s – perhaps - only because the need has
not yet been perceived.
But have American intelligence agencies eavesdropped on others to leverage benefits for American companies, for instance, in terms of intelligence related to the negotiation of trade agreements, etc.?
Well, yeah. Duh. And, that, yes, confers commercial advantage.
But have American intelligence agencies eavesdropped on others to leverage benefits for American companies, for instance, in terms of intelligence related to the negotiation of trade agreements, etc.?
Well, yeah. Duh. And, that, yes, confers commercial advantage.
Hey, I’m an American.
I get it. I understand. Indeed, I don’t oppose it, per se.
What I oppose is the utter hypocrisy of painting other
kettles blacker than our pots.
Look, national governments are national governments, and spies
will be spies - humankind has conducted espionage on its neighbors since the
first caveperson leaned out to peer into the neighboring hole to see how the “other
side” were making their fires. So let’s
be intellectually honest about the whole thing.
So, before we let this latest revelation escalate us towards yet more techno-nationalist (nonsensical) market access barriers in one or another country, consider the below instead. After all, none of this is sustainable - we are risking our future, a future largely and increasingly dependent on the global and interdependent information economy.
Manifesto for a post-Cyber Future
- Today’s interconnected world is powered by global, intertwined infrastructures built on technologies provided by a wide range of information and communications technology (ICT) vendors sourcing inputs from a vast global supplier ecosystem, enabling networks that span multiple markets;
- This complex, intertwined ecosystem is potentially vulnerable to those that wish to use technology for purposes it was never intended, to steal, corrupt, damage or disable.
- In this context, the integrity of networks and data are essential to our societal and personal well-being, and that integrity is increasingly threatened;
- Maintaining or restoring confidence in network and data security is critically necessary to maintaining and enhancing the global digital economy and our day-to-day lives as individuals;
- Governments have a responsibility to secure the networks their citizens use, and to ensure the integrity of the data within such networks, as well as legitimate law enforcement and national security obligations;
- No longer is technology designed, developed and deployed only in one country; no longer can any country or large company claim to rely on a single sourcing model;
- Physical and digital supply chains fueling the information and communications technology industry eclipse borders;
- Geography-based or otherwise “techno-nationalist” approaches to securing networks and data are inconsistent with commercial and technological realities in what has become a global and interdependent information age;
- Network security and data integrity are not single country or company issues, they are functions of how ICT products are made, used, and maintained, not by whom or where they are made, or by the relationship any vendor may have with any particular government;
- Geographic-based restrictions in any form risk both retaliation, replication and the fragmentation of global ICT supply chains, as well as undermining the advancement of global best practices and standards on network security and data integrity;
Resolved:
- States should seek to agree appropriate conventions among themselves governing acceptable behavior in cyberspace, while refraining from hyperbolic rhetoric and market-distorting policies, laws, regulations and practices in the name of “cyber” or national security;
- Governments should offer additional clarity and transparency in terms of their mandates, regulations and practices related to data monitoring, collection, processing and storage;
- Industry should accelerate initiatives to defining certifiable standards, disciplines and best practices for network security and data integrity; from product conception through research and development; from coding to sourcing; from assembly to shipment; from deployment to servicing to end-of-life.
- Public-private partnerships should cement the results, codified as appropriate, whether through international covenants or global industry standards bodies.
- States should seek to agree appropriate conventions among themselves governing acceptable behavior in cyberspace, while refraining from hyperbolic rhetoric and market-distorting policies, laws, regulations and practices in the name of “cyber” or national security;
- Governments should offer additional clarity and transparency in terms of their mandates, regulations and practices related to data monitoring, collection, processing and storage;
- Industry should accelerate initiatives to defining certifiable standards, disciplines and best practices for network security and data integrity; from product conception through research and development; from coding to sourcing; from assembly to shipment; from deployment to servicing to end-of-life.
- Public-private partnerships should cement the results, codified as appropriate, whether through international covenants or global industry standards bodies.