全球數位威權趨勢及對台灣的挑戰和機遇
Digital Authoritarianism: Global Trends, Challenges and Opportunities for Taiwan
Keynote for Open Culture Foundation
April 8 2023
Taipei, Taiwan
Wikimania 2013 keynote: One Internet Two SystemsCharles Mok
Charles Mok is a Legislative Councillor in Hong Kong representing the information technology sector. This document provides an overview of internet usage and censorship in China and Hong Kong. It notes that while Hong Kong has no censorship, certain laws like the Computer Crime Ordinance govern internet use. The document calls for more transparency around government requests for user data and content removal to ISPs to protect civil liberties. It also discusses China's increasing censorship and strategies to evade restrictions, as well as the balance Chinese authorities aim to strike between control and economic growth online.
Charles Mok discusses various threats facing the internet, including digital repression, surveillance, misinformation, internet shutdowns, and data/cyber sovereignty. He notes that data, standards, infrastructure, and values are fragmenting. Regulatory fragmentation is also occurring as democracies seek backdoors, while authoritarians view cybersecurity as a means of regime security and push for more government control over internet governance through conferences like the World Internet Conference. Overall, Mok argues the vision of "One World, One Internet" is under threat from increasing fragmentation across many areas.
Presentation for participants in MSU’s Institute of Public Utilities (IPU) Annual Regulatory Studies Program Camp NARUC, East Lansing, Michigan, 18 August 2015.
This document summarizes cyber risks in Hong Kong following the implementation of the National Security Law in 2020. It discusses how internet freedom has declined, with increased censorship and surveillance powers. New laws and proposals aim to further control the internet, such as requiring SIM card registration, strengthening anti-doxxing laws, and proposals to regulate crowdfunding and criminalize broad cybercrimes. Civil society has retreated amid arrests for online posts, media closures, and website blocking. Overall internet freedom has sharply declined and more restrictions are planned.
Internet Content Regulation: What it means in 2010Wendy Qi
The document discusses internet content regulation around the world. It defines internet content regulation and provides an overview of regulation from 1958 to 2010. It then examines which countries regulate internet content the most, why regulation occurs, and the primary methods of regulation including technical, legal, and self-censorship approaches. Case studies on regulation in China, Iran, and France are also presented.
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
The document summarizes China's new Cybersecurity Law and its potential impact on global businesses. It provides definitions of key terms in the law and outlines some of the law's main provisions, such as data localization requirements for critical information infrastructure operators and penalties for cyber attacks on Chinese infrastructure from foreign groups. The law establishes China's sovereignty over networks located within its borders and aims to strengthen protections for network operations, information, and critical infrastructure.
This document summarizes key points from a discussion on regulating the internet. It discusses arguments for net neutrality and challenges to claims of a "data explosion" necessitating tiered internet access. It also analyzes cases involving Google, including its settlements with regulators, and argues for a "prosumer law" approach focused on search neutrality, interoperability and truthful advertising rather than large fines. Overall it advocates for evidence-based internet policymaking that considers complex realities rather than ideological positions.
Presented by Klee Aiken and Maarten Van Horenbeeck at the 30th Annual FIRST Conference, in Kuala Lumpur, Malaysia.
https://www.first.org/conference/2018/program#pan-internet-of-governments-how-policymakers-became-interested-in-cyber
This document summarizes a presentation about governments working towards a global single market and understanding digital boundaries. It discusses the need to authenticate and protect citizen identity and data across borders while providing services. Barriers to cooperation between US state and local governments are outlined. Changes like increased technology adoption, mobility, and security threats require new approaches to identity management, information sharing, and mobile government services. Establishing consistent standards and strengthening cooperation between states and countries is key to addressing these challenges.
Great starting point for understanding some of the more relevant benefits, features, and operation of Distributed Ledger Technology (blockchain) and its uses, particularly for federal government missions.
Internet of Things, Various Names, One Concept, History of IoT, Applications of IoT, Challenges and Barriers in IoT, Internet Revolution, Future of IoT, Impact of the Internet, Internet Usage and Population Statistics
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
This document summarizes a presentation given by Adam Thierer on the Internet of Things (IoT) and wearable technology. It discusses:
- Definitions of the IoT and its key components, including sensors, wireless networks, data storage, and analytics capabilities.
- The large number of connected devices expected by 2020, and the economic opportunities of the IoT. Health and fitness are major drivers.
- Privacy and security as the most significant social policy concerns raised by the IoT. The IoT challenges traditional privacy frameworks due to its always-on data collection capabilities.
- Constructive solutions like privacy by design, consumer education, and allowing legal and social norms to adapt over time in
This document discusses the Internet of Things (IoT) and provides examples of connected devices. It notes that by 2020, 50 billion devices are estimated to be connected to the Internet. It discusses privacy issues regarding personal data collection and use by IoT devices. Security issues are also examined, such as vulnerabilities of connected devices to hacking. Intellectual property questions are raised about who owns works created by machines. The document concludes by stating that more regulation of IoT is expected.
Welcome to the world of Internet of Things wherein a glut of devices are connected to the internet which emanates massive amounts of data. But we have many hoops to jump before we can claim that crown starting with a huge number of devices lacking unified platform with serious issues of security standards threating the very progress of IoT.
This document discusses the network society and its implications for development in South Africa. It defines networks and describes how society is increasingly organized through various intersecting networks. It outlines how information networks are transforming interactions and driving global structural changes. It analyzes South Africa's position in the network society to date, including barriers to internet access and growth of social media. It envisions how networks and technologies like mobile, sensors, and big data could shape development by 2030 and 2040, with goals of universal internet access, job creation, improved public services, smart cities, and transitioning to sustainable networks and economies.
Cyber crime refers to criminal activity involving computers or networks, where they are tools, targets, or places of crime. Common cyber crimes in India include phishing, fraud, and intellectual property theft. The document outlines several types of cyber crimes such as hacking, cyber stalking, and phishing. It also discusses Indian cyber laws and prevention methods. Overall, the document provides an overview of cyber crimes in India, the relevant laws, and importance of prevention through security measures and awareness.
Similar to Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation (20)
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
This document discusses the trend of governments using access restrictions as a policy tool for compliance. It notes that censorship has existed as long as the internet, through methods like the Great Firewall of China. The document examines perspectives from 2011 that viewed access restrictions as minor inconveniences rather than censorship. It analyzes how the UK uses a protective DNS service to block malware while maintaining it is not censorship. Examples from Hong Kong and predictions for other Asian countries show how access restrictions have become mandated under national security laws. The document raises the question of whether similar trends could occur in other countries like the US and Taiwan.
This document summarizes Charles Mok's discussion from a 2023 technology conference on issues related to AI, blockchain, cybersecurity, data governance, and internet fragmentation. Key topics included the rapid advancement of AI models from ChatGPT to GPT-4, the collapse of FTX shaking confidence in cryptocurrency and blockchain applications, ongoing debates around internet standards-setting and regulatory approaches, and increasing geopolitical tensions contributing to fragmentation across digital technologies, infrastructure, and values. Mok concluded by questioning if collaboration on these issues can overcome growing divisions.
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyCharles Mok
- Web3 aims to decentralize the internet using blockchain technology, removing centralized intermediaries and allowing users to own their own data. This could enable new forms of direct participation like immutable voting. However, others are skeptical that people want to manage their own servers or infrastructure. There are also concerns that Web3 platforms could become controlled by venture capitalists like previous iterations. Some countries and organizations are experimenting with blockchain applications for areas like elections, funding, and transparency. Ensuring governance models are inclusive and address potential threats will be important as Web3 develops.
APAC Data Center Infrastructure ObservationsCharles Mok
Regulations in the APAC region are expected to favor edge data centers over solely cloud-based infrastructure due to data sovereignty requirements. Increased bandwidth availability in more APAC markets beyond major hubs could lead to greater data center distribution. While green data centers are important, regulations promoting them may not be top national priorities in all APAC countries at this time.
The document discusses issues around technology, data, and ethics for both the public and private sectors. It notes fragmentation of trust, truth, the internet, and data issues that regulators face. It argues regulations alone cannot solve most problems and that putting the pieces together requires data literacy for all stakeholders and joint data governance that empowers users, is consent-based, transparent, and holds organizations accountable. The document was presented by Charles Mok at an ISKO conference on data governance designed with user empowerment, consent, transparency, and accountability at its core.
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
This document summarizes the decline of internet freedom in Hong Kong over recent years. It describes how censorship was previously non-existent but increased after the national security law was passed in 2020. This allowed authorities to order taking down of online content and surveillance. Many websites and apps were blocked or self-censored in response. Real name registration for SIM cards was also introduced, tightening government control over online activities. The future may include further pressure on global internet platforms to censor in Hong Kong as well as local legislation increasing government powers over online speech.
Why open and interoperable Internet infrastructure is key to the Internet's c...Charles Mok
The document discusses why an open and interoperable Internet infrastructure is key to the continued success of the Internet. It notes issues like fragmentation, misinformation, censorship and surveillance that have arisen and questions how to re-empower users through technology and multistakeholderism while ensuring regulations lead to an improved Internet.
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
Charles Mok discusses the challenges with laws around misinformation, fake news, and harmful content globally. He notes that determining what is fake news or misinformation is difficult, as is deciding who should make that judgment. Laws introduced in Germany to stop hate speech have been copied by authoritarian regimes to censor dissent. Similarly, India's new IT rules give the government broad powers to censor content deemed unlawful on social media. Attempts to regulate disinformation raise issues around freedom of expression and the risk of increased censorship. Overall, the presentation cautions that establishing authorities to determine disinformation is problematic and enforcing such rules is not straightforward.
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsCharles Mok
The document discusses post-COVID security and privacy issues and trends as countries move from pandemic response to recovery. It summarizes contact tracing and exposure notification apps used in various countries and debates around balancing privacy and public health. Issues around vaccine passports and digital identity are also examined, including standards, privacy, inequality and implications. Emerging technologies could advance vaccine tracing but also enable health surveillance. Overall balances in these issues will be important for societies post-pandemic.
Charles Mok discusses the potentials and limitations of artificial intelligence (AI). While AI shows promise in areas like diagnosing diseases, fighting climate change, and translating languages, it also faces limitations. AI may struggle with tasks requiring "System 2" thinking like abstract reasoning, planning, and understanding cause and effect. It can also replicate and even amplify the biases of its human creators. To realize AI's full potentials, Mok argues we must know its limitations, impose proper oversight and controls, ensure ethics and equality are incorporated, and take a realistic approach focused on specific tasks rather than assuming it can solve all problems.
The document discusses issues around government regulation of online content and platforms in Hong Kong. It notes that the Hong Kong government and police have spread misinformation to justify increased regulation. A survey found 65% of countries asked platforms to restrict political, social, or religious content, but such censorship impedes free expression. Empowering governments over online content through regulation risks platforms engaging in self-censorship and limiting free speech.
The document summarizes new measures from Hong Kong's 2020-21 Budget related to innovation and technology. Key points include expanding talent admission schemes to attract more technology professionals, increasing funding for research and development initiatives, setting aside funds to support SMEs and startups, and allocating money towards developing Hong Kong as a smart city with initiatives like a smart traffic fund and 3D digital maps. Tax relief measures are also outlined to provide relief to individuals and businesses.
The document discusses Hong Kong's political situation and calls for democratic reform. It notes that the "one country, two systems" principle has eroded and public trust in the government has declined. It advocates implementing universal suffrage and resolving issues through democratic means to find a way forward for Hong Kong.
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Charles Mok
This document discusses emerging security issues related to fake news, AI, and privacy. It summarizes recent regulations on facial recognition in the US, UK, and EU. It also discusses misinformation campaigns related to protests in Hong Kong and how Twitter and Facebook have taken actions to suspend accounts spreading misinformation. The document explores how misinformation can be spread through deepfake videos and AI-generated fake news. It discusses efforts to combat fake news through fact checking and provides examples from Hong Kong and Taiwan. Finally, it calls for the IT industry to adopt an approach that puts people first, develops privacy-enabled technologies, and promotes openness and public awareness.
This document summarizes a roundtable discussion held on July 24, 2019 at Zerozone regarding Hong Kong's Interception of Communications and Surveillance Ordinance. The ordinance provides statutory authorization for law enforcement to conduct communication interception and covert surveillance to prevent serious crimes and protect public security, with oversight by an independent Commissioner. Post-Snowden, some are concerned about government surveillance via user data requests without court warrants.
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
7 Most Powerful Solar Storms in the History of Earth.pdfEnterprise Wired
Solar Storms (Geo Magnetic Storms) are the motion of accelerated charged particles in the solar environment with high velocities due to the coronal mass ejection (CME).
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...Toru Tamaki
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 :
- Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants.
- REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed ��live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Invited Remote Lecture to SC21
The International Conference for High Performance Computing, Networking, Storage, and Analysis
St. Louis, Missouri
November 18, 2021
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
1. Charles Mok | Cyber Policy Center, Stanford University | April 3, 2023 | Rikkyo University, Japan
Digital Authoritarianism,
Asian Techno-Geopolitics and
Technology Fragmentation
2. Chinese Digital Authoritarianism
Repressive Practices
• Through technology, operation and laws
• Beyond “GFW” (Great FireWall of China)
• From Censorship (passive) to Total Control (active)
• Fear; Friction; Flooding
• Misinformation strategy
• Starting with total control on infrastructure and backbone
3. Smart City to Massive Surveillance
• Informatization of city management — transportation, public safety,
healthcare, environmental protection….
• Utilizing technologies: IoT, 5G, AI, Big Data, Cloud computing….
• China’s SkyNet project: surveillance camera network with facial recognition
and AI
• BBC reporter John Sudworth (Guiyang, Guizhou Provincel 2017): “caught in 7
minutes”
• Massive deployment in Xinjiang and everywhere
4. Social Credit
• State Council document: “Guidelines of Social Credit System Construction (2014-2020)”:
• The system aims at standardizing assessment for businesses, organizations and individuals,
measuring
fi
nancial, social and political worthiness
• Rather than a single score to limit social activities of movements of individuals, it still focuses
more on business or marketplace behaviors
• The system is still fragmente now, not fully digitized and decisions are largely made by
humans rather than AI
• However, the system is still a
fl
exible tool for rapid and strict enforcement when “necessary”
• Do not under-estimate the acceptance by the average Chinese public — social harmony,
crime prevention, in a “low trust society”
5. Rule by Law
Under the CAC
• Cybersecurity Law (CSL) of 2017, amended/clari
fi
ed in 2021
• Amalgamation of previous Internet censorship laws and unifying control
• Data sovereignty requirements, and state security agencies can seize data
• Critical information infrastructure” subject to national security review over data security, procurement and cross-
border data
fl
ow, etc.
• Should not “invite subversion of national sovereignty, overturn the socialist system, incite separatism, break
national unity, advocate terrorism or extremism. advocate ethnic hatred and discrimination, disseminate violent,
obscene or sexual information, create or disseminate false information to disrupt economic or social order.”
• Other recent major laws: Data Security Law (DSL), Personal Information Protection Law (PIPL).
• Long-arm jurisdiction
• Tech crackdown
6. Exporting Repression
Digital Silk Road
• “Masterplan by Beijing to deploy its “techno-authoritarian model” to Belt and Road
countries (since 2015)
• Dual-use technologies: military and industrial/civilian usages
• Next-generation national
fi
rewall — active surveillance and data analytics
• Thailand (failed attempt in 2015); Cambodia ongoing e
ff
ort (since 2020)
• State
fi
nancing for many African and Asian nations to pay for equipments and projects
from Huawei, ZTE, etc.
• WSJ (2019): Uganda and Zambia’s governments intercepted encrypted communications
and social media messages and used cell locations to track political opponents.
7. China’s Global Data Grab
• 5G and infrastructure providers: Huawei, ZTE, etc.
• US-led sanctions
• Surveillance cameras and facial recognition: Hikvison etc.
• Strong pushbacks from western countries (UK, Australia, etc.)
• Consumer products and services
• Mobile phones by Huawei, Xiaomi, etc.
• AliPay, WeChatPay
• Didi Chuxing
• TikTok
• WeChat
8. Technology Standards
The tech and the process
• Targeted e
ff
orts to achieve growing global in
fl
uence
• Unlimited cooperation between China and Russia
• Huawei as proxy agent to advance China’s proposed standards, such as
“New IP” or “IPv6+”, promoting the idea of strong regulatory binding between
IP address and a user
• Attempts to change the global technical standards decision process:
• From multistakeholderism of IETF, IEEE, IAB, IRTF, W3C to state-led ITU
• 2022 Election of ITU’s Secretary General: USA vs Russia
9. But it’s not just China…
All over Asia
• Misinformation and election interference
• Illegal content especially CSAM (child sexual abuse materials)
• Cybersecurity and ransomware
• Every government wants to be able to remove content they don’t like
• India: IT Regulations
• Singapore: Protection from Online Falsehoods and Manipulation Act (POFMA) and foreign interference law
• Cambodia: National Internet Gateway, etc.
• Philippines: SIM card registration law
• Vietnam, Myanmar, etc.: Cybersecurity law
10. What about Hong Kong?
• NSL (2020)
• Personal Data (Privacy) Law amendments — anti-doxxing
• SIM card registration (from March 2023)
• Crowdfunding regulations consultation
• Misinformation law
• Cybersecurity law
• Article 23 legislation and NSL
11. Western democracies want more control too
• Problematic legislations in the west:
• UK’s Online Safety Bill, US’s EARN-IT Act, etc.
• Also Australia, Canada, EU, etc.
• Threats against end-to-end encryption
• Fixation on war on Big Tech: misguided?
• Losing the moral high ground over autocratic governments
13. The Internet will be fragmented
One world, one Internet no more
• Cyber sovereignty — beginning with data fragmentation
• Data residency laws everywhere
• Infrastructure fragmentation — from undersea cables to space satellites
• Semiconductor supply chain fragmentation
• App/web fragmentation — from GFW to TikTok — both sides now
• AI fragmentation
• Tech standards fragmentation
• Regulatory fragmentation
• Misinformation law, cybersecurity law, real-name registration law (e.g. SIM card rules) — call them by any names
• Both autocracies and democracies
15. Values fragmentation
World Internet Conference — China and friends
• Extension of the Digital Silk
Road
• “Internationalization” of
Internet and “cyberspace”
governance
16. Where do we go from here?
• Internet freedom cannot be taken for granted anywhere anymore
• It’s complicated — no simple solution
• Two battlegrounds, two strategies?
• Autocracies
• Democracies
• How can we strengthen multi-stakeholder participation?
• Empowering civil society and civil defenders
17. Charles Mok
Visiting Scholar, Global Digital Policy
Incubator, Cyber Policy Center, Stanford
University
Trustee, Internet Society
Director, Tech for Good Asia