SlideShare a Scribd company logo
Charles Mok 莫乃光 | Cyber Policy Center, Stanford University | 開放⽂化基⾦會 數位公⺠研討會 | 2023.4.8
全球數位威權趨勢
及對台灣的挑戰和機遇
Digital Authoritarianism: Global Trends, Challenges and
Opportunities for Taiwan
全球數位威權趨勢
Global Digital Authoritarianism Trends
• Rising Digital Repression and Techno Autocracy
• Through technology, operation and laws 透過技術、運作和法律⼿段
• Censorship, Surveillance, Disinformation 內容審查、監察、虛假資料
• Internet Shutdowns 封閉網際網路
• Democracies too ⺠主國家也不能倖免
• UK’s Online Safety Bill, etc.: Limits on E2EE 網絡安全法例對點對點加密的限制
• Removal of “disinformation” or “illegal” content 移除「假消息」和「非法內容」的法例
去年,我們在談論「網絡分裂」
Last year, we were discussing the “Splinternet”
今年,我們要談談「網路碎片化」
This year, we are talking about “Fragmentation”
• Data Fragmentation: Cyber or Digital Sovereignty beginning with Data Sovereignty and Data Residency Laws
數據碎片化:數位主權由數據本⼟法例要求開始
• Infrastructure Fragmentation: From undersea cables to space satellites
基建碎片化:由海底電纜到太空衛星
• Semiconductor Supply Chain Fragmentation — 半導體供應鏈碎片化
• User Experience Fragmentation: Apps or websites, from GFW to TikTok — it’s both sides now
⽤⼾體驗碎片化:由中國防火長城到各國禁⽤TikTok等應⽤
• AI Fragmentation — ⼈⼯智能碎片化
• Technology Standards Fragmentation: The standards, the process, the authority
科技標準碎片化:標準、程序、權⼒
• Regulatory Fragmentation: Misinformation laws, cybersecurity laws, real-name and registration requirements, etc. in both
autocratic and democratic countries
規管碎片化:立法規管假消息、網絡安全等,要求個⼈實名或企業登記,無論在專制及⺠主都⼀樣

Recommended for you

Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...

Iurii Garasym, Director of Corporate Security at ELEKS and President of Cloud Security Alliance Lviv Chapter The future crimes and predestination of cybersecurity. Thoughts aloud in a whiskey bar. Iurii’s professional goal is to make business survivable. He focuses on security program development/improvement based on emerging security solutions and integrates those into business goals, objectives, strategy and activities.

Cybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrencyCybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrency

Slides from Tony Martin-Vegue's presentation at PRMIA 2018 Risk Management and Regulatory Compliance Round Table in San Francisco, CA | April 11, 2018 "Cybersecurity Aspects of Blockchain and Cryptocurrency" Abstract: Many companies are considering blockchain technologies to make transactions faster, more secure and cost effective. If you are performing risk analysis on these emerging technologies, you ask be asking yourself: how do I even start to analyze risk when there are so many unknowns? A successful analysis requires a paradigm shift in thinking into two areas: casting aside the defense-in-depth metaphor to describe security controls; and, how we assess and analyze risk of new and emerging technologies that have a high degree of uncertainty. This talk will cover how to reframe your assessments for emerging technologies, such as blockchain, and how risk quantification methodologies such as Factor Analysis of Information Risk (FAIR) can help answer some of these questions and produce a credible risk assessment.

cryptocurrencyrisk managementblockchain
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat

Cybercrime is nothing new. What is different now is the intimacy, reach and size of those attacks. There are hundreds of billions in losses each year. This unsettling state of affairs has created a binary world with really only two kinds of companies: those that have been hacked and admit it, and those that have been hacked and don't admit it or don’t know it yet. Worse yet, for the vast majority of individuals, very few of us have been untouched whether we know it or not. In NTT i³’s book “CyberCrime: Radically Rethinking the Global Threat,” Rich Boyer, Chief Architect for Security and Dr. Kenji Takahashi, VP Product Management for Security examine the current arms race between cybercriminals and their diverse and agile toolkits and the radically new approaches to cybersecurity that the enterprise must adopt to compete and win.

datacyber securityinformation security
中美科技戰的下⼀個焦點:海底電纜
The next focal point of China-US techno-political con
fl
ict
由2019開始,美國禁⽌新建海底電纜連接中國包括香港
Since 2019: US ban on new undersea cables to China & Hong Kong
今天,新建海纜都要繞過南中國海
Now, it’s all about avoiding the South China Sea
截圖 2023-04-03 14.41.06
中國如何回應美國禁⽌海纜登陸?
China’s retaliatory response to US undersea cable ban
• Financial Times: “A cable under construction
called SJC2, which will connect Japan to
Singapore as well as Taiwan and Hong Kong,
has been delayed by more than a year
because of Chinese objections and lengthy
permit issues, according to industry
executives.
“China held up approval for sea-
fl
oor
prospecting for the cable — owned by a
consortium including China Mobile, Chunghwa
Telecom and Meta — for several months in its
territorial waters around Hong Kong. The
authorities cited concerns that the contractor
might conduct spying or install extraneous
equipment….”
IEEE ComSec Tech Blog

Recommended for you

Internet of things
Internet of thingsInternet of things
Internet of things

This document provides an overview of the Internet of Things (IoT). It discusses the history and development of IoT from 1997 to present day. Key points covered include the extraordinary benefits of IoT such as status updates, diagnostics, upgrades, control/automation, and location mapping. The document also addresses security and privacy challenges with collecting and sharing personal data through connected devices. Example applications of IoT highlighted are in manufacturing, infrastructure, transportation, healthcare, and media/advertising. The future of IoT is predicted to focus on enterprise, home, and government sectors, with enterprise being the largest at an estimated 9.1 billion devices by 2019.

CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin

This document provides a high-level summary of a cybersecurity briefing presented by Paul C Dwyer on March 26th 2015. It discusses various cyber threats including cybercrime, cyber warfare, cyber espionage, and more. Specific topics covered include the cyber threat landscape, what cyber threats want to achieve, cybercrime drivers and statistics, the progression of threats over the past 10 years, cybercrime tools and operations, and predictions for the future of cybersecurity challenges.

20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton

The document discusses cybersecurity issues and strategies. It provides background on the Internet Security Alliance (ISA), including its mission, priority programs, and board of directors. It then analyzes the changing threat landscape, characteristics of new attackers, insider threats, and the advanced persistent threat (APT). The document calls for a total risk management approach across technical, economic, legal and human resources functions to address cybersecurity challenges.

Who’s the Contractor? The Case of SeaWeMe-6
誰是外判商?看 SeaWeMe-6 海纜個案
• Cable connecting Singapore to France with
consortium members including: China
Telecom, China Mobile, China Unicom,
Microsoft, Orange SA (France), Singtel,
Bangladesh Submarine Cable, Bharti Airtel
(India), Sri Lanka Telecom, Telecom Egypt, etc.
• Consortium members rejected HMN Tech
(formerly Huawei Marine Networks) as
contractor
• China Telecom and China Unicom left the
consortium, replaced by Telecom Malaysia
Berhad, Telin (Indonesia)
斷網:台灣可能正在⾯對最⼤的網絡風險
Cutting o
ff
Taiwan: Possibly the biggest cyber threat
台灣的網絡及數據安全危機
Taiwan’s Cybersecurity and Data Protection Crisis
台灣的網絡及數據安全危機
Taiwan’s Cybersecurity and Data Protection Crisis
• “Taiwan is barraged by 20 to 40 million cyberattacks from abroad per month” 台灣在⾯
對每個⽉2-4千萬的網絡攻擊
• Insu
ffi
cient data protection regulations 數據安全保障法律不⾜
• Insu
ffi
cient
fi
nes 處罰不⾜
• Inconsistent requirements for incident noti
fi
cations 事故通知要求不⼀致
• Government bodies exempted 政府部⾨獲得豁免
• Passing the buck: Lack of independent data and privacy regulator 沒有獨立數據/個資/
隱私監管機關,各政府部⾨互相推諉

Recommended for you

Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx

This presentation provides an overview of cyber security. It begins with an introduction to cyber security, explaining that it refers to the technologies and processes designed to protect computers, networks, and data from unauthorized access and cyber attacks. It then covers the importance of cyber security, citing increased cyber crimes, vulnerabilities in various industries, and the CIA triad model of ensuring data confidentiality, integrity, and availability. Additionally, it distinguishes between security, which protects data, and privacy, which relates to controlling how personal information is used. Finally, it briefly defines cyber crimes and common types like hacking, phishing, malware, and ransomware, before offering some safety tips to avoid becoming a victim.

Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security

Cyber-Security subtopic in Internet Governance educational series Online course https://eliademy.com/app/a/courses/85b737f8cd/1

cyber securityinternet governance
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....

The document provides an introduction to cyber security for board members. It defines cyber security as how individuals and organizations reduce the risk of cyber attacks by protecting devices, services, and personal information from theft or damage. It discusses the National Cyber Security Centre's role in understanding, guiding, responding to, and preventing cyber security incidents. It also highlights myths about cyber security and analyzes the costs of the TalkTalk data breach to demonstrate cyber security's importance. The document concludes that cyber security is a board-level responsibility given organizations' reliance on digital technology and potential costs of cyber incidents.

Challenges with Taiwan’s Government Digital Transformation
台灣政府數位轉型的挑戰
• Who is in charge? MODA? 誰是話事⼈?誰能負
責?數位發展部?
• How is “digital policy” de
fi
ned? 什麼是數位政
策?是否包括⾏政權⼒和責任?
• Who’s in charge of IT strategy, budget,
development and operation? Centralized vs.
decentralized? 誰管資訊技術策略、預算、開
發、運作?集中或分散治理?
• “MODA to lead by example rather than by
regulation”
成也立法/管治,敗也立法/管治
Legislative/Governance Gridlock?
• Digital Intermediary Service Bill 數
位中介服務法
• eID
• Open Information Legislation 開放
資料法
• The e
ff
ect on international data
exchange and trade opportunities
due to insu
ffi
cient data protection
governance regime
數據保障法例和治理的落後對參與
國際數據交換及貿易的影響
• Toward Digital Diplomacy 數位外交
Taiwan as a digital hub?
台灣可以成為區域數位樞紐嗎?
• Infrastructure. Law. Governance. 基建、法律、管治
• View from the private sector 企業怎看?
• Companies who want to move to Taiwan are forced to go to Singapore
希望來台的企業轉向新加坡
• Competitive advantages over Japan: Cost, language (English), human resource
比較⽇本的競爭優勢:成本、語⾔(英語)、⼈才
• Bureaucracy, tax and foreign exchange controls make it hard to attract regional
headquarters; companies can only set up o
ffi
ce for their Taiwan business only
官僚治理、稅務和外匯限制令企業難以在台設立區域總部,只能在台設立管理台灣本地業務
的辦公室
Charles Mok 莫乃光
Visiting Scholar, Cyber Policy
Center, Stanford University
Trustee, Internet Society
Founder, Tech for Good Asia

Recommended for you

Policy Implications of the Digital Economy
Policy Implications of the Digital EconomyPolicy Implications of the Digital Economy
Policy Implications of the Digital Economy

Clyde Wayne Crews Jr., VP for Policy and Director of Technology Studies at the Competitive Enterprise Institute, wrote about the splinternets concept for Forbes in 2001, calling splinternets multiple Internets “where prespecified ground rules regarding privacy and other governance issues replace regulation and central planning.”

splinternetsinternetweb
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing

The document discusses Internet of Things (IoT) and cybersecurity challenges in manufacturing. It provides an overview of the evolving threat landscape, including common hacking techniques like spearphishing and malware. The presentation emphasizes the importance of cyber hygiene practices for manufacturers such as updating software, using strong unique passwords, training employees on security basics, and not browsing as an administrator. It promotes attending an upcoming cybersecurity forum to learn more on topics that will help protect manufacturing organizations from emerging threats.

L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx

This document discusses digital forensics. It begins with an overview of cybercrime and digital forensics, defining cybercrime as illegal computer-related activities and digital forensics as the process of examining digital evidence in a forensically sound manner. The document then outlines the typical digital forensic process, which involves steps to protect the investigation scene, obtain evidence, preserve evidence, verify evidence, analyze evidence, trace evidence, and present findings in court. Regulations and standards for digital forensics from countries and organizations are also reviewed.

More Related Content

Similar to 全球數位威權趨勢及對台灣的挑戰和機遇

Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
Khalizan Halid
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ankit Ranjan
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...
IT Arena
 
Cybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrencyCybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrency
Tony Martin-Vegue
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
NTT Innovation Institute Inc.
 
Internet of things
Internet of thingsInternet of things
Internet of things
Rushana Bandara
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
OCTF Industry Engagement
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
NavanathDarwante1
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
Glenn McKnight
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
zayadeen2003
 
Policy Implications of the Digital Economy
Policy Implications of the Digital EconomyPolicy Implications of the Digital Economy
Policy Implications of the Digital Economy
Competitive Enterprise Institute
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
CentraComm
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
Net Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetNet Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open Internet
Cybera Inc.
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
Rohana K Amarakoon
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
KARANSINGHD
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
S.M. Towhidul Islam
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
SharifulShishir
 

Similar to 全球數位威權趨勢及對台灣的挑戰和機遇 (20)

Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...
 
Cybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrencyCybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrency
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
 
Policy Implications of the Digital Economy
Policy Implications of the Digital EconomyPolicy Implications of the Digital Economy
Policy Implications of the Digital Economy
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Net Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetNet Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open Internet
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 

More from Charles Mok

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
Charles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
Charles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Charles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
Charles Mok
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
Charles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
Charles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Charles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Charles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
Charles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
Charles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
Charles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
Charles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
Charles Mok
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
Charles Mok
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
Charles Mok
 

More from Charles Mok (20)

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 

Recently uploaded

[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
Matthew Sinclair
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 

Recently uploaded (20)

[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 

全球數位威權趨勢及對台灣的挑戰和機遇

  • 1. Charles Mok 莫乃光 | Cyber Policy Center, Stanford University | 開放⽂化基⾦會 數位公⺠研討會 | 2023.4.8 全球數位威權趨勢 及對台灣的挑戰和機遇 Digital Authoritarianism: Global Trends, Challenges and Opportunities for Taiwan
  • 2. 全球數位威權趨勢 Global Digital Authoritarianism Trends • Rising Digital Repression and Techno Autocracy • Through technology, operation and laws 透過技術、運作和法律⼿段 • Censorship, Surveillance, Disinformation 內容審查、監察、虛假資料 • Internet Shutdowns 封閉網際網路 • Democracies too ⺠主國家也不能倖免 • UK’s Online Safety Bill, etc.: Limits on E2EE 網絡安全法例對點對點加密的限制 • Removal of “disinformation” or “illegal” content 移除「假消息」和「非法內容」的法例
  • 3. 去年,我們在談論「網絡分裂」 Last year, we were discussing the “Splinternet”
  • 4. 今年,我們要談談「網路碎片化」 This year, we are talking about “Fragmentation” • Data Fragmentation: Cyber or Digital Sovereignty beginning with Data Sovereignty and Data Residency Laws 數據碎片化:數位主權由數據本⼟法例要求開始 • Infrastructure Fragmentation: From undersea cables to space satellites 基建碎片化:由海底電纜到太空衛星 • Semiconductor Supply Chain Fragmentation — 半導體供應鏈碎片化 • User Experience Fragmentation: Apps or websites, from GFW to TikTok — it’s both sides now ⽤⼾體驗碎片化:由中國防火長城到各國禁⽤TikTok等應⽤ • AI Fragmentation — ⼈⼯智能碎片化 • Technology Standards Fragmentation: The standards, the process, the authority 科技標準碎片化:標準、程序、權⼒ • Regulatory Fragmentation: Misinformation laws, cybersecurity laws, real-name and registration requirements, etc. in both autocratic and democratic countries 規管碎片化:立法規管假消息、網絡安全等,要求個⼈實名或企業登記,無論在專制及⺠主都⼀樣
  • 5. 中美科技戰的下⼀個焦點:海底電纜 The next focal point of China-US techno-political con fl ict
  • 7. 今天,新建海纜都要繞過南中國海 Now, it’s all about avoiding the South China Sea 截圖 2023-04-03 14.41.06
  • 8. 中國如何回應美國禁⽌海纜登陸? China’s retaliatory response to US undersea cable ban • Financial Times: “A cable under construction called SJC2, which will connect Japan to Singapore as well as Taiwan and Hong Kong, has been delayed by more than a year because of Chinese objections and lengthy permit issues, according to industry executives. “China held up approval for sea- fl oor prospecting for the cable — owned by a consortium including China Mobile, Chunghwa Telecom and Meta — for several months in its territorial waters around Hong Kong. The authorities cited concerns that the contractor might conduct spying or install extraneous equipment….” IEEE ComSec Tech Blog
  • 9. Who’s the Contractor? The Case of SeaWeMe-6 誰是外判商?看 SeaWeMe-6 海纜個案 • Cable connecting Singapore to France with consortium members including: China Telecom, China Mobile, China Unicom, Microsoft, Orange SA (France), Singtel, Bangladesh Submarine Cable, Bharti Airtel (India), Sri Lanka Telecom, Telecom Egypt, etc. • Consortium members rejected HMN Tech (formerly Huawei Marine Networks) as contractor • China Telecom and China Unicom left the consortium, replaced by Telecom Malaysia Berhad, Telin (Indonesia)
  • 12. 台灣的網絡及數據安全危機 Taiwan’s Cybersecurity and Data Protection Crisis • “Taiwan is barraged by 20 to 40 million cyberattacks from abroad per month” 台灣在⾯ 對每個⽉2-4千萬的網絡攻擊 • Insu ffi cient data protection regulations 數據安全保障法律不⾜ • Insu ffi cient fi nes 處罰不⾜ • Inconsistent requirements for incident noti fi cations 事故通知要求不⼀致 • Government bodies exempted 政府部⾨獲得豁免 • Passing the buck: Lack of independent data and privacy regulator 沒有獨立數據/個資/ 隱私監管機關,各政府部⾨互相推諉
  • 13. Challenges with Taiwan’s Government Digital Transformation 台灣政府數位轉型的挑戰 • Who is in charge? MODA? 誰是話事⼈?誰能負 責?數位發展部? • How is “digital policy” de fi ned? 什麼是數位政 策?是否包括⾏政權⼒和責任? • Who’s in charge of IT strategy, budget, development and operation? Centralized vs. decentralized? 誰管資訊技術策略、預算、開 發、運作?集中或分散治理? • “MODA to lead by example rather than by regulation”
  • 14. 成也立法/管治,敗也立法/管治 Legislative/Governance Gridlock? • Digital Intermediary Service Bill 數 位中介服務法 • eID • Open Information Legislation 開放 資料法 • The e ff ect on international data exchange and trade opportunities due to insu ffi cient data protection governance regime 數據保障法例和治理的落後對參與 國際數據交換及貿易的影響 • Toward Digital Diplomacy 數位外交
  • 15. Taiwan as a digital hub? 台灣可以成為區域數位樞紐嗎? • Infrastructure. Law. Governance. 基建、法律、管治 • View from the private sector 企業怎看? • Companies who want to move to Taiwan are forced to go to Singapore 希望來台的企業轉向新加坡 • Competitive advantages over Japan: Cost, language (English), human resource 比較⽇本的競爭優勢:成本、語⾔(英語)、⼈才 • Bureaucracy, tax and foreign exchange controls make it hard to attract regional headquarters; companies can only set up o ffi ce for their Taiwan business only 官僚治理、稅務和外匯限制令企業難以在台設立區域總部,只能在台設立管理台灣本地業務 的辦公室
  • 16. Charles Mok 莫乃光 Visiting Scholar, Cyber Policy Center, Stanford University Trustee, Internet Society Founder, Tech for Good Asia