Charles Mok discusses China's repressive digital practices, including the Great Firewall that censors the internet, massive government surveillance through tools like facial recognition, and the social credit system. He notes that China is exporting this model of digital control through projects like the Digital Silk Road and by providing technologies to other countries. However, China faces pushback in some Western nations and its efforts to influence global technology standards have met resistance from organizations like IETF and IEEE. Overall, China is actively working to spread its model of internet governance and fragment the global internet while facing challenges to its vision from advocates of multistakeholder governance.
In this presentation, Shail introduces IoT and associated trends. Shail has a lot of experience in Gesture Based Robot, Wireless Applications, Line follower Robot, Obstacle Avoider, Edge avoider etc. and his interest areas are also the same.
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace,
Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check,.
In 2018, IoT will see tremendous growth in all directions; the following 8 trends are the main developments we predict for next year:
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
Dr Alisdair Ritchie from the WMG, University of Warwick is taking us through his research on IoT security at the Midlands Cyber Security Expo 2019 #midscybersecurity19
In this presentation, Shail introduces IoT and associated trends. Shail has a lot of experience in Gesture Based Robot, Wireless Applications, Line follower Robot, Obstacle Avoider, Edge avoider etc. and his interest areas are also the same.
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace,
Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check,.
In 2018, IoT will see tremendous growth in all directions; the following 8 trends are the main developments we predict for next year:
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
Dr Alisdair Ritchie from the WMG, University of Warwick is taking us through his research on IoT security at the Midlands Cyber Security Expo 2019 #midscybersecurity19
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
The presentation touches upon issues of strategic futures, digital twins, blockchain and the development of skills in the context of investment policy.
IoT is one of the transformational trends that will shape the future of businesses in 2017 and beyond. Many firms see big opportunity in IoT uses and enterprises start to believe that IoT holds the promise to enhance customer relationships and drive business growth by improving quality, productivity, and reliability on one side, and on the other side reducing costs, risk, and theft.
On 2 and 3 October 2013, the GTP hosted a series of seminars and scenario planning workshops to capture ideas. In attendance at the "Imagine the Future" Seminar was a cross-sector mix of people including councillors, City and Provincial government officials, planners and urban designers, researchers, NGOS, built environment professionals, and members of the media.
This presentation by the Project Manager of the GTP considers the development drivers of the Voortrekker Road corridor for 2020, 2030 and 2040 under the theme of "the Network Society", a topic that has received a lot of attention of late.
8 key tech trends in a post covid-19 world editedAhmed Banafa
COVID-19 has demonstrated the importance of digital readiness, which allows business and people’s life to continue as usual during pandemics.
Building the necessary infrastructure to support a digitized world and stay current in the latest technology will be essential for any business or countryto remain competitive in a post-COVID-19 world.
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
Abdul Kader Baba CIO, Infrastructure South Africa on Managing Cybersecurity Risks and Compliance Requirements in the Public Sector at Public Sector Cybersecurity. #PublicSec2024
Delivered Key Note Address in National Seminar on
"Digital India: Use of Technology For Transforming Society" organized at Gaya College, Gaya on 28th & 29th January, 2017.
Gaya college-gaya-28-29.01.2017-presentation
Paradigm Shift in
Computing Technology, ICT & its Applications: Technical, Social, Economic and Environmental Perspective
Thailand’s Development towards Sustainable Foundation of IOTCheck Digital
TIME Consulting has given a presentation about "Thailand’s Development towards Sustainable Foundation of IOT" to senior executives and honorable delegates from APEC countries in the “Workshop on Internet of Things (IOT) Development for the Promotion of Information Economy” at the APEC TEL51 Meeting, Boracay Island, the Philippines on 14 May 2015.
It is a workshop focusing on addressing the ways to solve main problems restricting or deterring the long term development of IOT in the Asia-Pacific region. The topics of discussion include e.g. defining the gaps of IOT infrastructure development between developed economies and developing economies, the stage of industrialization and maturity of business model of IOT in APEC region, the regional cooperation and collaboration related to IOT in APEC region etc.
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
Compliance through Compulsion: The trend and impact of access restriction becoming a policy tool for compliance
ICANN-APAC TWNIC Engagement Forum 2023 / TWIGF
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
The presentation touches upon issues of strategic futures, digital twins, blockchain and the development of skills in the context of investment policy.
IoT is one of the transformational trends that will shape the future of businesses in 2017 and beyond. Many firms see big opportunity in IoT uses and enterprises start to believe that IoT holds the promise to enhance customer relationships and drive business growth by improving quality, productivity, and reliability on one side, and on the other side reducing costs, risk, and theft.
On 2 and 3 October 2013, the GTP hosted a series of seminars and scenario planning workshops to capture ideas. In attendance at the "Imagine the Future" Seminar was a cross-sector mix of people including councillors, City and Provincial government officials, planners and urban designers, researchers, NGOS, built environment professionals, and members of the media.
This presentation by the Project Manager of the GTP considers the development drivers of the Voortrekker Road corridor for 2020, 2030 and 2040 under the theme of "the Network Society", a topic that has received a lot of attention of late.
8 key tech trends in a post covid-19 world editedAhmed Banafa
COVID-19 has demonstrated the importance of digital readiness, which allows business and people’s life to continue as usual during pandemics.
Building the necessary infrastructure to support a digitized world and stay current in the latest technology will be essential for any business or countryto remain competitive in a post-COVID-19 world.
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
Abdul Kader Baba CIO, Infrastructure South Africa on Managing Cybersecurity Risks and Compliance Requirements in the Public Sector at Public Sector Cybersecurity. #PublicSec2024
Delivered Key Note Address in National Seminar on
"Digital India: Use of Technology For Transforming Society" organized at Gaya College, Gaya on 28th & 29th January, 2017.
Gaya college-gaya-28-29.01.2017-presentation
Paradigm Shift in
Computing Technology, ICT & its Applications: Technical, Social, Economic and Environmental Perspective
Thailand’s Development towards Sustainable Foundation of IOTCheck Digital
TIME Consulting has given a presentation about "Thailand’s Development towards Sustainable Foundation of IOT" to senior executives and honorable delegates from APEC countries in the “Workshop on Internet of Things (IOT) Development for the Promotion of Information Economy” at the APEC TEL51 Meeting, Boracay Island, the Philippines on 14 May 2015.
It is a workshop focusing on addressing the ways to solve main problems restricting or deterring the long term development of IOT in the Asia-Pacific region. The topics of discussion include e.g. defining the gaps of IOT infrastructure development between developed economies and developing economies, the stage of industrialization and maturity of business model of IOT in APEC region, the regional cooperation and collaboration related to IOT in APEC region etc.
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
Compliance through Compulsion: The trend and impact of access restriction becoming a policy tool for compliance
ICANN-APAC TWNIC Engagement Forum 2023 / TWIGF
全球數位威權趨勢及對台灣的挑戰和機遇
Digital Authoritarianism: Global Trends, Challenges and Opportunities for Taiwan
Keynote for Open Culture Foundation
April 8 2023
Taipei, Taiwan
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Chinese Digital Repression
1. Charles Mok | Cyber Policy Center, Stanford University | Feb 15 2023 | For Northeastern University
Chinese Digital Repression
2. Repressive Practices
Through technology and operations
• What is the Great Firewall (GFW)?
• What is censorship?
• Fear
• Friction
• Flooding
• Total control on infrastructure and backbone networks
3. Smart City
• Informatization of city management — transportation, public safety,
healthcare, environmental protection…
• Utlizing technologies: IoT, 5G, AI, Big Data, Cloud computing.
• Alibaba’s City Brain project (Hangzhou) — >20 cities in China plus Kuala
Lumpur, Macau, etc. by 2019.
• Huawei — leveraging 5G and communications technologies for land and air
transport coordination.
4. Massive Surveillance
• SkyNet project: surveillance camera network with facial recognition and AI.
• Leading vendors: Hikvision, SenseTime, Dahua, Huawei, ZTE, etc.
• BBC reporter John Sudworth (Guiyang, Guizhou; 2017) “caught in 7 minutes”:
“If you have nothing to hide, you have nothing to fear?”
• Massive deployment in Xinjiang.
5. Social Credit
• State Council document: “Guidelines of Social Credit System Construction (2014-2020)” (2014):
• The system aims to standardize assessment for businesses, organizations and individuals,
measuring financial, social and political worthiness.
• Rather than a single score to limit social activities of movements of individuals, it still focuses
more on business or marketplace behaviors.
• The system is still fragmented, not fully digitized and decisions largely made by humans rather
than AI.
• However, the system is still a flexible tool for rapid and strict enforcement when needed.
• Do not underestimate the acceptance by Chinese public — for social harmony, crime
prevention, in a “low trust” society.
6. Covid-19 Tracing
• A perfect opportunity to test the technology and social credit in order to trace and restrict
movements of people, record their vaccination and infection records, and testing their level of
acceptance.
• Real-name registration for apps rolled out by different levels of governments and municipalities,
often with different quarantine policies.
• Use of health code apps to control movements for political purpose by inserting a “red” code:
• A human rights lawyer restricted from traveling to Beijing (Nov, 2021).
• In the Henan banking crisis (2021), affected customers were placed under restriction to
prevent them from joining protests.
• These apps are dismantled in 2023, but….
7. Repressive Regulations
• Regulations since mid-1990s affirms the state’s sole and absolute right to
build, manage and control the Internet.
• Internet security falls under the control of the Ministry of Public Security.
• 2014: China’s Internet policies were centralized and controlled by the State
Internet Information Office (SIIO) and later upgraded to become the Central
Cyberspace Affairs Commission, chaired by Xi Jinping himself.
• By 2018, the Cyberspace Administration of China (CAC) was formed as the
top cyber regulator in China.
8. Rule by Law
Under CAC
• Cybersecurity Law (CSL) of 2017, amended/clarified in 2021.
• Amalgamatiion of previous Internet censorship laws, unifying control.
• Data sovereignty requirements, and state security agencies can seize data.
• “Critical information infrastructure” subject to national security review over data security,
procurement and cross-border data flows, etc.
• Should not “incite subversion of national sovereignty, overturn the socialist system, incite
separatism, break national unity, advocate terrorism or extremism, advocate ethnic hatred
and discrimination, disseminate violent, obscene, or sexual information, create or
disseminate false information to disrupt economic or social order.”
• Other recent major laws: Data Security Law (DSL), Personal Information Protection Law
(PIPL).
9. Exporting Repression
Digital Silk Road
• “Masterplan by Beijing to deploy its techno-authoritarian model” to Belt-and-Road countries
(since 2015).
• Dual-use technologies: military and industrial/civilian usages
• Next-generation national firewall — active surveillance and data analytics
• Thailand’s failed attempt in 2015; Cambodia, 2020.
• State financing for many Afircan and Asian countries to procure equipments and projects
from Huawei, ZTE etc.
• WSJ (2019): Uganda and Zambia governments intercepted encrypted communications
and social media messages and used cell location data to track political opponents.
10. China’s Global Data Harvest
• 5G and infrastructure: Huawei, ZTE, etc.
• US's Clean Network Initiative (2020) and sanctions by various western countries.
• Surveillance cameras: Hikvision, etc.
• Strong pushback in the UK, Australia, etc.
• Consumer products and services
• Mobile phones by Huawei, Xiaomi, etc.
• AliPay, WeChatPay
• Didi Chuxing
• Most of all — TikTok
• Also the balloons?
11. Finally, Technology Standards and Norms
• Growing global influence
• Unlimited cooperation between China and Russia
• Huawei as the proxy agent to advance China’s proposed standards: “New IP”
and “IPv6+”: advancing the idea of a strong regulatory binding between an IP
address and a user.
• Attempts to change the global tech standard decision processes:
• From IETF, IEEE, IAB, IRTF, W3C etc to ITU
• 2022 Election of ITU’s Secretary General: USA vs Russia
12. The Way Forward
• China is actively exporting its Internet governance model.
• China, working with Russia and other authoritarian regimes, will further fragment the
Internet
• Digital sovereignty being advanced by many governments, including democracies
• Multistakeholder model of Internet governance under continuous and escalating
threats
• Challenges and opportunities in global data trade
• Other challenges from new technologies, including AI, blockchain, digital currencies,
quantum computing, etc.
13. Charles Mok
Visiting Scholar
Global Digital Policy Incubator
Cyber Policy Center
Stanford University
@charlesmok
@charlesmok@mastodon.online
linkedin.com/in/charlesmok