Welcome!

Agile Computing Authors: Peter Silva, Elizabeth White, Roger Strukhoff, Jeev Trika, Olivier Huynh Van

Related Topics: Cloud Security

Cloud Security: Article

Rights of a Sovereign Nation or Invasion of an Open Internet?

Politicizing the actions of governments towards Internet security

The headlines are no surprise to those in the Internet business. "Police in Central China have shut down a hacker training operation that openly recruited thousands of members online…" (AP) We've know China, Russia, and several of the former Soviet block countries are the source of sophisticated hacking, and those activities have at least been tolerated, if not directly supported, but the host governments.

The recent dispute between Google and China's government brings another question into the breach – does a national government have the right to censor or control the flow of information in or out of the country? While China may be in the news, citizen journalists in Tehran have been severely punished for attempting to Tweet, email, blog, or transmit cell phone images outside of the country. Under the umbrella of national security do countries like Iran have the right to control that information, or develop teams of professional hackers to go out and look into the accounts of residents and citizens?

Communications Assistance for Law Enforcement Act (CALEA): To amend title 18, United States Code, to make clear a telecommunications carrier's duty to cooperate in the interception of communications for Law Enforcement purposes, and for other purposes.

DCSNet, an abbreviation for Digital Collection System Network, is the FBI's point-and-click surveillance system that can perform instant wiretaps on almost any communications device in the US (Wikipedia)

I think we can all agree that any state which sponsors cyber attacks on another nation, either through direct objectives, or by turning a "blind eye" to the activities of criminal groups or organizations is a bad thing, which the entire global-connected world should fight. There is no justification for state-sponsored or state-tolerated denial of service, disruption or access to personal and private data, nor online theft.

The Rights of a Sovereign Nation
As Americans, we can get very sanctimonious in our approach to human rights, national ethics, or national morals. We believe we are always right, based on our religious or cultural beliefs, and other nations and cultures should learn from us and change their errant ways to be more like Americans. This means it is probably OK for the national Security Agency, or other three-lettered government agencies to tap, monitor, or perform other forms of espionage – as long as it is done under the context of national security, or even better if you can throw the word "anti-0terrorism" in the conversation.

Thus activities such as DCSNet, or laws such as CALEA, do not bother us too much. However when China tries to look into the systems using a similar premise of national security, the world has an uproar of indignity, not understanding how those people can possibly violate the privacy of email and other systems.

So the question is – "does a nation have the right to set its own laws, cyber-policies, and regulations regarding the Internet and other information systems?"

The Electronic Frontier Foundation has strong opinions on the topic. As a long time advocate (since 1990) for protecting the civil liberties of Internet users, both through protecting the rights of users and educating law enforcement agencies, the EFF includes the following points in its stated mission:

  • Develop among policy-makers a better understanding of the issues underlying free and open telecommunications, and support the creation of legal and structural approaches which will ease the assimilation of these new technologies by society.
  • Raise public awareness about civil liberties issues arising from the rapid advancement in the area of new computer-based communications media.
  • Support litigation in the public interest to preserve, protect, and extend First Amendment rights within the realm of computing and telecommunications technology.

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

(1st Amendment to the US Constitution)

Law enforcement and national security agencies of countries around the world would object to the American equivalent of the First Amendment, citing the current world situation, or the sovereign rights of a nation allow it to write, establish, modify, interpret, or change such laws as needed to meet an existing or desired environment.

With global connections to a global community governments are struggling to understand how to control or manage information flows within the country. Twenty years ago it was easy for a government to determine exactly what materials would be used in the education of an 8 year old primary school student. Today, a student in Vietnam, Mongolia, or New Jersey basically have the same access to educational materials as any other student in the world, as well as news, intercommunications, and citizen journalism.

And we must also acknowledge the inherent use of deception by governments and other lobbyist organizations. In the world of governments, what you see is not necessarily what you get. The media is used as a mouthpiece of government policy (when it can be controlled), and without a strong governmental "noise filter" and open citizen journalist community you may not get the real story – only the story a government or organization wants you to receive. They believe it is their right as a sovereign nation's government of deliver you the news they believe you need to know, or they want you to know.

Some Guidelines for Responsible Cyber-Government
There are priorities. While we all understand national intelligence agencies will always do what they do best – access information they believe will give their respective nation some level of political, economic, or military advantage, the priority should be to protect citizens (including the context of global citizens) from malicious attacks on their personal data and ability to do business and communicate via the Internet.

Hacker schools, such as the China-based Black Hawk Safety Net, cannot be tolerated by a reasonable global community. If a government supports the activities network-enabled criminal activities, then that government should be identified and the world given the means to protect themselves from that risk. The US Government has taken some openly advertised steps in this direction by authorizing the US Air Force to establish the USAF Cyber Command.

The new Air Force Cyber Command "will train and equip forces to conduct sustained global operations in and through cyberspace, fully integrated with air and space operations," said Major General Charles Ickes.

Of course that capability can both defend – and attack as needed to meet military and national objectives.

Leaving users once again at the mercy of governments to both act responsibly, and in the interest of a global community. Sure, we have our work cut out for us. Like most individual users and people depending on the Internet for our livelihoods and futures, the burden is ultimately on us to protect ourselves from intrusion, theft, and denial of service.

More Stories By John Savageau

John Savageau is a life long telecom and Internet geek, with a deep interest in the environment and all things green. Whether drilling into the technology of human communications, cloud computing, or describing a blue whale off Catalina Island, Savageau will try to present complex ideas in terms that are easily appreciated and understood.

Savageau is currently focusing efforts on data center consolidation strategies, enterprise architectures, and cloud computing migration planning in developing countries, including Azerbaijan, The Philippines, Palestine, Indonesia, Moldova, Egypt, and Vietnam.

John Savageau is President of Pacific-Tier Communications dividing time between Honolulu and Burbank, California.

A former career US Air Force officer, Savageau graduated with a Master of Science degree in Operations Management from the University of Arkansas and also received Bachelor of Arts degrees in Asian Studies and Information Systems Management from the University of Maryland.

@ThingsExpo Stories
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Vidyo, Inc., has joined the Alliance for Open Media. The Alliance for Open Media is a non-profit organization working to define and develop media technologies that address the need for an open standard for video compression and delivery over the web. As a member of the Alliance, Vidyo will collaborate with industry leaders in pursuit of an open and royalty-free AOMedia Video codec, AV1. Vidyo’s contributions to the organization will bring to bear its long history of expertise in codec technolo...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
SYS-CON Events announced today that China Unicom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE F...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...