Egypt, Norway's Scatec explore deeper cooperation in renewable energy    Emergency summit in Doha as Gaza toll rises, Israel targets Qatar    Egypt's EDA, Korean pharma firms explore investment opportunities    CBE, banks to launch card tokenization on Android mobile apps    CIB completes EGP 2.3bn securitization for GlobalCorp in seventh issuance    Ex-IDF chief says Gaza war casualties exceed 200,000, legal advice 'never a constraint'    Right-wing figures blame 'the Left' for Kirk killing, some urge ban on Democratic Party    Egypt's FM heads to Doha for talks on Israel escalation    Egypt's Sisi ratifies €103.5m financial cooperation deal with Germany    Egypt strengthens inter-ministerial cooperation to upgrade healthcare sector    Egyptian government charts new policies to advance human development    Egypt advances plans to upgrade historic Cairo with Azbakeya, Ataba projects    Egyptian pound ends week lower against US dollar – CBE    Egypt expresses condolences to Sudan after deadly Darfur landslides    Egypt hosts G20 meeting for 1st time outside member states    Lebanese Prime Minister visits Egypt's Grand Egyptian Museum    Egypt to tighten waste rules, cut rice straw fees to curb pollution    Egypt seeks Indian expertise to boost pharmaceutical industry    Egypt prepares unified stance ahead of COP30 in Brazil    Egypt recovers collection of ancient artefacts from Netherlands    Egypt harvests 315,000 cubic metres of rainwater in Sinai as part of flash flood protection measures    Egyptian, Ugandan Presidents open business forum to boost trade    Al-Sisi says any party thinking Egypt will neglect water rights is 'completely mistaken'    Egypt's Sisi, Uganda's Museveni discuss boosting ties    Egypt, Huawei explore healthcare digital transformation cooperation    Foreign, housing ministers discuss Egypt's role in African development push    Greco-Roman rock-cut tombs unearthed in Egypt's Aswan    Egypt reveals heritage e-training portal    Sisi launches new support initiative for families of war, terrorism victims    Egypt expands e-ticketing to 110 heritage sites, adds self-service kiosks at Saqqara    Palm Hills Squash Open debuts with 48 international stars, $250,000 prize pool    On Sport to broadcast Pan Arab Golf Championship for Juniors and Ladies in Egypt    Golf Festival in Cairo to mark Arab Golf Federation's 50th anniversary    Germany among EU's priciest labour markets – official data    Paris Olympic gold '24 medals hit record value    A minute of silence for Egyptian sports    Russia says it's in sync with US, China, Pakistan on Taliban    It's a bit frustrating to draw at home: Real Madrid keeper after Villarreal game    Shoukry reviews with Guterres Egypt's efforts to achieve SDGs, promote human rights    Sudan says countries must cooperate on vaccines    Johnson & Johnson: Second shot boosts antibodies and protection against COVID-19    Egypt to tax bloggers, YouTubers    Egypt's FM asserts importance of stability in Libya, holding elections as scheduled    We mustn't lose touch: Muller after Bayern win in Bundesliga    Egypt records 36 new deaths from Covid-19, highest since mid June    Egypt sells $3 bln US-dollar dominated eurobonds    Gamal Hanafy's ceramic exhibition at Gezira Arts Centre is a must go    Italian Institute Director Davide Scalmani presents activities of the Cairo Institute for ITALIANA.IT platform    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



JASTA: We are all compromised, states and individuals
Published in Ahram Online on 20 - 10 - 2016

A key critique of JASTA is that it gives US domestic law precedence over the international agreements that regulate diplomatic relations, and overrides the sovereign rights and immunity of a country that protect it from being prosecuted.
This criticism assumes that the sovereignty of all countries around the globe is generally respected, safe from legal or illegal breaches, the privacy of their citizens respected as long as they do not participate in illegal activities.
It is an assumption that is incorrect in light of contemporary realities, especially in the age of the internet.
With this in mind, we must launch a global debate to redefine sovereignty, taking into account the advances in technology that surround us, upon which we have come to depend. Unfortunately, no one can manage this now, whether within or outside the United Nations.
It is clear that all IT-advanced countries—such as the US, Russia, China, Britain, India, Israel and to some extent Iran—would resist this kind of dialogue because it could conclude with new criteria restricting the ability of these countries to penetrate other, less IT-developed states.
What is certain here, is that even though these states are advanced in IT, they too can be breached. When presidential candidate Hilary Clinton was asked in the first debate with rival Donald Trump about the capabilities of the US in IT security and cyberwar, she said it is a great challenge for the US.
Clinton said those who hack US government sites, companies and banks to retrieve information for profit or harm the interests of the US must know that the US's capabilities on this matter are better and greater. But she did not tell us what these better and greater capabilities can do to protect the US state against cyber attacks.
Trump also did not clarify his vision of how to protect the US—its sovereignty over its information and citizens' data.
In response to another question about confronting IS, Clinton said she had a plan that includes heavy military bombardment and eliminating IS capabilities online. The answer is a clear indication of her intention to ask US internet companies to become part of this confrontation in the interest of national security—namely that these companies would work to control the actions of anyone considered to be an enemy of the US.
What is interesting here, is that companies which began in the US but became global players, such as Google, Microsoft, Apple and Facebook, could become part of a strategy to violate the sovereignty of all governments and privacy of individuals on behalf of the US government. In fact, these companies breach the privacy of individuals around the globe every day, with users' consent. They provide free internet surfing and social media, but ask—in fact require—each user to allow their personal data to be used for company purposes to improve free services such as internet surfing, email or iCloud. And of course, for use in advertising—a key source of income for these companies, according to their public justifications. If the user declines, they cannot use the site or download the app.
This makes such companies more influential and powerful than any international agreements or national constitutions regulating and protecting the privacy of individuals; they can easily challenge governments.
When the Indian government asked Facebook, which bought WhatsApp, to stop gathering and publishing private data on individuals using the app, Facebook administrators simply refused and viewed the request as interference in their operations. Many people don't really care about this, believing their private data is not worth much if it is made public or reused by known or unknown entities inside or outside their country.
The vast majority of WhatsApp and Facebook users around the world have no idea how their personal information, which may contain work secrets whether they are in government or not, is being used.
What happens to individuals also happens to governments, armies and companies, but in a more organised manner. The armies and intelligence agencies of major powers include special units for information warfare, focusing on two key elements.
First, defense to protect the state's information networks from foreign hacking; second, offense to hack the information networks of other countries. Hacking can be handled by an official institution or by pirates hired for the job.
The result, simply, is that seemingly peaceful relations between countries do not mean there are no sovereignty violations or calculated pressure in areas of informatics. In fact, these breaches often happen without our awareness; When we are informed, the published versions are full of holes and often suspect.
The writer is a political commentator.


Clic here to read the story from its source.