Go homepage(回首页)
Upload pictures (上传图片)
Write articles (发文字帖)

The author:(作者)
published in(发表于) 2016/3/21 8:11:31
Surveillance VS privacy of information, attitudes of States,

English

中文

Surveillance VS privacy of information, attitudes of States-information monitoring, privacy, information on Prism-IT

In mid-February, a Chinese student in America to the school asked for half a month to Chinese new year, when she was returned to United States Shi, at the Los Angeles Airport was United States Customs questioning. The students were asked to hand in your mobile phone for United States Customs officials found in her app to chat with my friends, she said: "I don't like this school, not really want to go to school, hang is only temporary identity. "United States customs that she tried to cover up to United States the true purpose, refused her entry.

United States Customs and border protection service of the public affairs experts said that all United States international visitors are checked, such inspections include mobile phone, Ipad and other electronic equipment. In the age of big data, usage of electronic devices and the high degree of dependence on, and so Government oversight of civil electronic equipment known as "invasion of privacy" is suspect.

Dang United States "Prism", the United Kingdom of "era" scheme, Germany after seeing Trojan horses one by one, people questioning the information between the monitoring and the protection of citizens ' privacy growing: Government oversight is to protect the country from terrorism, harassment, or the private lives of citizens are placed under tight surveillance? How can we in the freedom of information, the State sought a balance between security and privacy?

Australia

New data: national or invasion of privacy?

To protect the country against terrorist crimes, beginning in March 2015, the mandatory retention of communications data Bill in Australia to take effect. Australia Government passed legislation, forcing Australia's telecommunications operator Telstra and Optus communication saves the user data, such as telephone records, IP addresses, message details, address and other data, shelf life is 2 years. The Bill declares, interfaces, and the content of the message will not be called, that is, metadata does not contain a call and e-mail content, Web browsing history, anything related to personal privacy.

A new data method, Australia who disagree. Most people believe that new laws could protect the country from terrorists persecution, very strong support, but also willing to use their own tax dollars to pay the high cost of Internet companies to store data-sharing needs, about $ 131 million a year. And civil liberties advocates are opposed, they feel that metadata can describe the life of users accurate, master metadata has the potential disclosure of personal privacy.

But whether they are against or not, this new method of data are already being implemented. Australian media also interviewed an expert on data, gave three suggestions to evade data retention plan to the public: do not use the mobile phone network, using an encrypted text messages and phone calls; use virtual private networking to hide traffic, Australia outside of email and social media platforms.

India

Security services can be monitored without court order information

In 2013, the India Government has initiated a broad coverage of surveillance systems, this system allows the Government to eavesdrop on answering machines in the dialogue, reading personal emails and text messages, monitoring Facebook, Twitter and other social networks to post and track individuals on the Google search and trace. Security services do not need to monitor orders of the Court, and told the operator, communications material is available.

India part senior officials of the Ministry of the Interior has the power to approve a special phone number, email, and social media monitoring account. India total of 9 Government departments allowed to exercise this power, including India Central Bureau of investigation, India intelligence service and tax department. In this regard, India times of Bad Gastein in an interview with the India Government officials, the officials said, for the protection of individuals and families, arrested terrorists, stop criminal behavior is very important, so monitoring is also essential.

India Telecom Ministry officials denied the possibility of abuse monitoring system. If the Government reading personal email, listening on the phone, that is in good, not an invasion of privacy. India Department of the Interior is also sufficient intelligence information, would only allow monitoring or recording, not free to decide who to listen on the phone.

In fact, India has no formal privacy law, the new monitoring system is based on the United Kingdom in 1885 for its "India Telegraph Bill" works, the Bill would give the Government access to private conversations freely. India information technology officials said Murli deora, the monitoring system to protect the privacy of citizens, because telecommunications companies not involved in information monitoring, only the Government has the power to do so.

United Kingdom

"Time" plan: compared to "Prism", so that

June 21, 2013, United Kingdom Wei reported burst material, United Kingdom Government communications headquarters is operation a items name for "times" of plans, through on North America across Atlantic fiber of United Kingdom ashore at installed intercept device, United Kingdom intelligence institutions--Government communications headquarters to achieved information listens, and secretly collection global range within of netizens information, as mail between, and Facebook positioning, and Internet track and communications records,.

"Time" scheme has been running for 18 months, United Kingdom Government Communications Headquarters spied on the transmission of international phone and network information of fiber-optic cable, optical fiber cable monitoring more than 200. The greatest advantage of this information is obtained from a fiber-optic cable can be stored for up to 30 days, so that intelligence analysts had enough time on the analysis of the data obtained.

United Kingdom Government Communications Headquarters listening through the fiber technology, became with the United States national security agency intelligence alongside giant, is suspected in the two goals identified, communication to the public records access and Exchange, such as reading the phone records, e-mail content, social networking information such as login.

"Time" plan revealed, United Kingdom Government Communications Headquarters, insiders say, these monitoring plans in advance to be the lawful authority of the Government, and provided documentation to show that the monitoring plan in the investigation the suspect realized a breakthrough, the protection of public safety.

Some telecommunications companies to avoid business is affected, unwilling United Kingdom intelligence authorities under passive cooperation under provided legal, often choose to "some or all" communications services overseas. In this process, enterprises and overseas communication service providers had to contend with United Kingdom authorities privately reached an agreement allowing intelligence agencies "appropriate legal authorization" contact to the United Kingdom Overseas traffic.

Of course, the Government Communications Headquarters worry about intelligence agencies and telecommunications companies that "partnership" scale once made public, may lead to legal proceedings. Out of this concern, the Government communications headquarters to lobby, trying to avoid the public knew about monitoring activities. Government Communications Headquarters also assisted United Kingdom Home Office, organizations on monitoring activities supportive of politicians engaged in "media" by these people take turns to say eliminating the public pressure of the authorities, while the guardian and other media-related pressure monitor oversight reports.

United States

"Prism": stop terrorism than privacy protection?

In 2007, Bush, United States National Security Agency and the Federal Bureau of investigation launched a top-secret electronic surveillance plan, the "Prism". United States National Security Agency will have direct access to United States Internet company hub in mining data, gathering intelligence, 9 involved international Internet giants including Microsoft, Yahoo, Google, Apple, Facebook, PalTalk, YouTube, Skype and AOL.

"Prism" scheme mainly monitor ten types of information: e-mail, instant messaging, video, photos, store data, voice chat, file transfer, video conferencing, login time, and social networking information and therefore, the national security agency can monitor a person's ongoing network search. Meanwhile, the "Prism" plan to be able to monitor depth of the instant communication and saving of data, monitoring objects, including any license in the United States for use outside the participating company's customer service, or any communication with foreign persons of United States citizens.

In June 2013, Obama publicly acknowledged the plan, defended Obama saying: "you can't have 100% security cases, also has 100% 100% privacy and convenience. "He emphasized that this project is not directed against United States citizens or in the United States who aims to counter terrorism and protect American security, and after Congressional authorization, and was United States foreign intelligence surveillance court oversight.

In fact, "9·11" incident, the United States Congress passed the Patriot Act, which gives the Executive Branch the power to gather information and be approved by the federal judge, finds its constitutionality. However, the Washington Post pointed out in 2012, "9·11" incident, the United States has created a basic unregulated Government power, authority, arbitrary justice system, unlicensed, secret evidence, secret court, continuous monitoring of civil and 10 reasons such as extraordinary rendition, has let United States is no longer the "land of the free". The Washington Post also says with exasperation, United States only thing people can look forward to is, the Government can use these powers wisely.

The Dragnet of countries: victims of ordinary data

In 2014, the United States of book publishing in the age of the Dragnet country attracted media and public attention, Julie ya·angewen in the book, the author describes in detail her research on how businesses and Government departments on the collection of personal data, and test how to escape the United States Government "Dragnet" Manhunt.

Author Julia Lisa ya·angewen from privacy this angle starting, wants to through this this book told readers, regardless of is using phone also is computer, above of all data are is can was track and download of, General of data analysis Division through collection personal data, on can inferred out using who of interest hobby, and purchase mode, and mental course and so on, to in page of advertising Shang displayed using who by interested in of commodity information, or will these data sold third party. An Gewen finally wrote, information sharing and openness of the online world, although privacy is the United States Constitution, one of the foundations, but require both privacy and personal background characteristics, these two points is very difficult to be compatible.

Germany

Government Trojan virus to monitor citizens

Germany famous hacker "computer troublemakers Club" has leaks, Germany official abuse of a network monitoring software, this software is Germany officially called "State Trojans", once it has been installed, the operator can browse each other's data on a computer hard drive, and continuous monitoring of a variety of chats and conversations.

Subsequently, the Germany Interior Ministry spokeswoman said Government officials need to get court approval to use these software, desktops, laptops, and Smartphones to invade suspects.

In this regard, Germany hacker chaos computer club spokesman said the Club question, in his view, reading other people's typing, it is equivalent to monitor their thoughts. What's more, system vulnerabilities can exist in any Trojan software, which has been found and the risk of being used.

Compared to the Internet economy, Germans are more concerned about the protection of data and privacy. In fact, Germany has the strictest privacy laws in the world. In 1977, the Federal Government issued applies to the entire Germany's Federal Data Protection Act, constraints include areas such as electronic communications and the Internet, preventing personal information leaks lead to privacy violations. So, the Government established the Federal Commissioner for data protection and freedom of information, and to oversee government bodies with respect to the protection of personal data Act; Germany States the data protection Commissioner, in a similar way to supervise the actions of State Government agencies. In 2004, Germany the Telecommunications Act came into force, not only for the Internet, the use of electronic communications in the fields of personal data make clear, also called for the establishment of dedicated information protection personnel, to safeguard Germany social security.

No one knows, "Germany wings" plane crash passenger with mental illness

The Germans had attached great importance to "information on the right to self-determination", that is, whether it's a walk in the Park, or to eat dessert, this information is personal, without my consent, or there is no other legitimate reasons, and no person or Government can know the information that is "informational self-determination."

However, the "message of self-determination" borders and where to draw the line? "Germany wing" after the crash, controversy has not stopped regarding protection of personal information.

On March 24, 2015, "Germany wings" airline flight from Spain Barcelona flew to Germany Dusseldorf crashed in France crashed in the South, all 150 people on board were killed. Survey shows that mentally ill co-pilot captain of the andelieyasi·lubici deliberately use the bathroom outside the locked cockpit door and flew into a mountain.

"Germany wing," the spokesman said, unless the pilot company to my own report, organizations simply do not have the opportunity to learn the relevant information. Lubitz deposited in the Federal Aviation Authority archives are marked with the SIC code, meaning that needed special and regular medical examinations. "Germany wing" does not know about it, even know that tagging code alone, still can't know what Lubitz suffers from what illness, because strict personal information protection law does not allow employers to employees doing such research. In addition, Lubitz doctors to keep patient information confidential obligations, he is not entitled to disclosure of patient information.


信息监控VS个人隐私,各国态度如何 - 信息监控,个人隐私,棱镜门 - IT资讯

2月中旬,一名中国留美学生向学校请了半个月假回国过年,当她重返美国时,在洛杉矶机场被美国海关盘问。该留学生被要求上交手机供美国海关检查,官员在她和朋友的微信聊天中发现,她曾表示:“我不喜欢这个学校,不是真的想上学,只是临时挂一下身份。”美国海关因此认定她隐瞒了来美国的真实目的,拒绝她入境。

美国海关及边境保卫局的公共事务专家称,所有到达美国的国际访客都要经过检查,这种检查包括手机、Ipad等电子设备。在大数据时代中,人们对电子设备的使用率和依赖度极高,正因此,政府对公民电子设备的监督素有“是否侵犯个人隐私”的嫌疑。

当美国的“棱镜门”、英国的“时代”计划、德国的木马病毒一一曝光后,人们对信息监控与公民隐私保护之间的质疑日益加深:到底政府监督是为了保护国家免受恐怖主义的侵扰,还是将公民的私生活都置于严密的监控之下呢?我们又该如何在信息自由、国家安全和隐私保护之间寻求平衡?

澳大利亚

新数据法:保护国家or侵犯隐私?

为了保护国家防止有组织的恐怖犯罪,自2015年3月开始,《强制保留通讯数据法案》在澳大利亚生效。澳大利亚政府通过立法,强制澳大利亚的通信运营商Telstra和Optus保存用户的通信数据,例如电话记录、IP地址、短信的详细信息、数据的地址等,保存期限是2年。该法案声明,不会调用接口和消息的内容,即元数据不包含通话及电子邮件内容、网络浏览记录等任何涉及个人隐私的内容。

新数据法一出,澳大利亚人各持己见。大部分人认为,新数据法可以保护国家不受恐怖分子迫害,他们十分支持,也愿意用自己的纳税钱来承担分摊互联网公司储存数据需要的高成本,每年约为1.31亿澳元。而公民自由的倡导者们则持反对意见,他们觉得元数据可以描绘用户们准确的生活,掌握了元数据就有可能泄露个人隐私。

但无论反对与否,这部新数据法都已经在实施。澳媒还专门采访研究数据的专家,给了公众三点建议来规避数据保留计划:不使用手机网络,使用加密短信和电话;使用虚拟专用网络来隐藏流量;使用澳大利亚以外的电子邮件和社交媒体平台。

印度

安全部门无需法院命令就可监控个人信息

2013年,印度政府启动了覆盖面广阔的监控系统,这一系统允许政府窃听录音电话中的对话,阅读私人电子邮件和短信,监控Facebook、Twitter等社交网上的发帖,并追踪个人在谷歌上的搜索目标和痕迹。安全部门不需要法院的监控命令,也无须告诉运营商,就可以获取通讯材料。

印度内政部部分高官还有权力批准对特殊电话号码、电子邮件以及社交媒体账号进行监控。印度共有9个政府部门获准行使此项权力,包括印度中央调查局、印度情报局以及税务部门。对此,《印度斯坦时报》采访了印度政府某官员,该官员说,对于保护个人和家庭来说,恐怖分子落网、制止犯罪行为是很重要的,所以监控也是必须的。

印度电信部高官否认了监控系统存在滥用的可能性。如果政府读取个人的电子邮件、监听了电话,那也是处于好心,不是侵犯个人隐私。而且印度内政部门也是在掌握了足够的情报信息后,才会批准监听或录音,不会随意决定监听谁的电话。

事实上,印度并没有正式的隐私法,新的监控系统是根据英国1885年为其制定的“印度电报法案”运转的,该法案赋予政府监听私人对话的自由。印度信息技术部高官迪欧拉称,这一监控系统有利于保护公民的个人隐私,因为通讯公司不会参与到信息监控中去,只有政府部门有权力这么做。

英国

“时代”计划:相比“棱镜门”,有过之而无不及

2013年6月21日,英国《卫报》爆料,英国政府通讯总部正在运作一项名为“时代”的计划,通过对北美洲跨大西洋光纤的英国上岸处装设拦截器,英国情报机构——政府通讯总部得以实现信息监听,并暗中收集全球范围内的网民信息,如邮件往来、Facebook定位、互联网追踪和通讯记录等。

“时代”计划已运行18个月,英国政府通讯总部一直暗中监视传输国际电话和网络信息的光纤电缆,所监控的光纤电缆超过200条。这样做的最大优势便是能将从光纤电缆中获取的信息储存长达30天,使得情报分析专家有足够时间对所获得的数据进行分析。

英国政府通讯总部通过光纤进行的监听技术,成为了与美国国家安全局比肩的情报巨头,两者更是在嫌疑目标的确定、对民众通讯记录的获取等方面互通有无,如读取通话记录、电子邮件内容、社交网站的登录方式等信息。

“时代”计划曝光后,英国政府通讯总部的内部人士表示,这些监听计划都在事前得到政府的合法授权,并提供了相关文件以证明监听计划在侦查嫌疑犯、保护公共安全方面实现了突破。

一些电信企业为避免业务受到影响,不愿意在英国情报当局要求下,被动提供法律规定的合作,往往选择将“部分或全部”通信服务转移到海外。在这一过程中,企业及海外通信服务商不得不与英国当局私下达成协议,允许情报机构在“适当法律授权”下接触到英国境外的通信数据。

当然,政府通信总部担心情报机构与电信企业的这种“合作”规模一旦公开,可能招致法律诉讼。出于这种担忧,政府通信总部展开积极游说,极力避免公众对监听活动知情。政府通信总部还协助英国内政部,组织对监听活动持支持态度的政界人士从事“媒体应对”,通过这些人的轮番表态消除当局的舆论压力,同时对《卫报》等媒体有关监听的监督报道施压。

美国

“棱镜门”:阻止恐怖主义高于隐私保护?

自2007年小布什时期起,美国国家安全局和联邦调查局就开始实施一项绝密的电子监听计划,即“棱镜”计划。美国国家安全局可以直接进入美国网际网路公司的中心服务器里挖掘数据、收集情报,参与其中的9家国际网络巨头包括微软、雅虎、谷歌苹果Facebook、PalTalk、YouTube、Skype和AOL。

“棱镜”计划主要监控十类信息:电子邮件、即时消息、视频、照片、存储数据、语音聊天、文件传输、视频会议、登录时间和社交网络资料,因此,国家安全局可以实时监控一个人正在进行的网络搜索内容。同时,“棱镜”计划能够对即时通信和既存资料进行深度监听,许可的监听对象包括任何在美国以外地区使用参与计划公司服务的客户,或是任何与国外人士通信的美国公民。

2013年6月,奥巴马公开承认该计划,奥巴马辩护称:“你不能在拥有100%安全的情况下,同时拥有100%隐私和100%便利。”他强调,这一项目不针对美国公民或在美国的人,目的在于反恐和保障美国人安全,而且经过国会授权,并被美国外国情报监视法庭监管。

事实上,“9·11”事件后,美国国会通过了《爱国者法案》,其中赋予了行政部门收集信息的权力,并得到联邦大法官的批准,认定其合宪。然而,《华盛顿邮报》在2012年指出,“9·11”事件后,美国造就了一个大权在握、权力基本不受监管的政府,任意的司法制度、无证搜查、秘密证据、秘密法庭、连续监视公民和非常规引渡等10条理由,已让美国不再是“自由之邦”。《华盛顿邮报》还无奈地表示,美国民众唯一能够期望的就是,政府能明智地使用这些权力。

《拉网式国家》:大数据下的普通受害人

2014年,由美国时代图书出版社发行的《拉网式国家》引起了媒体与民众的关注,作者茱莉娅·安格温在该书中详细记述了她是如何研究商业机构和政府部门对个人数据的收集,并成功试验如何逃脱美国政府这种“拉网式”的搜捕。

作者茱莉娅·安格温从隐私这个角度出发,想通过这本书告诉读者,无论是使用手机还是电脑,上面的所有数据都是能被追踪和下载的,普通的数据分析师通过收集个人数据,就能推断出使用者的兴趣爱好、购买模式、心路历程等等,从而在网页的广告上显示使用者所感兴趣的商品信息,或者将这些数据卖给第三方。安格温最后写到,网络世界的信息具有互通性和公开性,尽管隐私权是美国宪法的基础之一,但既要求隐私,又要彰显个人背景特质,这两点兼容起来十分困难。

德国

政府用木马病毒监控公民

德国知名黑客组织“电脑捣乱者俱乐部”曾爆料,德国官方滥用一种网络监控软件,这种软件被德国官方称为“国家木马”,一旦它被安装,操作者就可以浏览对方电脑硬盘上的数据,并持续监控各种聊天和对话。

随后,德国内政部发言人声明,政府官员需要获得法院批准才能使用这些软件,来入侵嫌疑人的台式机、笔记本和智能手机

对此,德国黑客俱乐部混沌计算机俱乐部发言人表示质疑,他认为,阅读其他人的打字,就相当于监视他们的思考。何况,任何木马软件的系统都会存在漏洞,这就有被发现和被利用的危险。

比起互联网经济,德国人更关注对数据和隐私的保护。事实上,德国拥有世界上最严格的隐私保护法律。1977年,联邦政府出台了适用于整个德国的《联邦数据保护法》,约束范围包括电子通信、互联网等领域,防止因个人信息泄露导致的侵犯隐私行为。于是,政府内部设立了联邦数据保护与信息自由专员,来监督政府机构在保护个人数据方面的行为;德国各州也有数据保护专员,以类似的方式监督各州政府机构的行为。2004年,德国《电信法》生效,不仅对互联网、电子通信等领域中个人数据的使用做出了明确规定,还要求设立专职信息保护人员,来维护德国社会的信息安全。

没人知道“德国之翼”空难副驾驶患有精神疾病

德国人历来重视“信息自决权”,即无论是去公园散步,或者去吃甜点,这些信息都归个人所有,没有经过本人的同意,或者没有其他正当理由,任何人或政府都不能知道这些信息,也就是“信息自我决定”。

然而,“信息自决权”的边界和底线在哪里呢?“德国之翼”坠机事件后,关于个人信息保护的争议一直都没有停。

2015年3月24日,“德国之翼”航空公司一架从西班牙巴塞罗那飞往德国杜塞尔多夫的客机在法国南部坠毁,机上150人全部遇难。调查显示,患有精神疾病的副驾驶安德烈亚斯·卢比茨故意将上厕所的机长锁在驾驶舱门外并驾机撞山。

“德国之翼”发言人表示,除非飞行员自己向公司报备,公司根本没有机会了解到相关信息。卢比茨存放在联邦飞行局的档案里标记有SIC代码,意思是需要特殊和定期的医学检查。而“德国之翼”并不知道此事,就算知道,仅凭标注的代码,还是无法知道卢比茨到底患有何种病症,因为严格的个人信息保护法不允许雇主对雇员做这样的调查。另外,卢比茨的医生有对病患信息的保密义务,他无权披露病人的信息。






If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)





QQ:154298438
QQ:417480759