Surveillance tech companies should not sell to despots, EU says
And U.S. Secretary of State Hillary Clinton warns surveillance companies that their products could be used to breach human rights
IDG News Service - Surveillance technology companies have a moral obligation not to sell to repressive regimes, said Europe's Digital Agenda Commissioner on Friday. Her views were echoed by the U.S. secretary of state who said that companies cannot pretend they don't know what their technology is used for in countries like Syria and Iran.
"Every actor, public and private, must take up their responsibilities. Companies should be transparent about the technology they are selling in certain countries. If technology is used by certain repressive governments to identify innocent citizens and put their life or freedom in danger, we ought to know," said European Commissioner Neelie Kroes, speaking at the iFreedom conference on Internet freedom in The Hague, Netherlands.
Kroes is concerned that despotic governments can use information and communication technologies as tools of surveillance and repression and as means to track and spy on those defending human rights.
"In such areas, we can react with legal measures such as sanctions, as we have done in the case of Syria. But, for me, this is not just a legal issue, it is a moral issue. I think it is high time for the industry to decide where they stand, and what they are going to do. If not as a moral issue, then as an issue of corporate reputation: being known for selling despots the tools of their repression is, to say the least, bad PR," she said, according to a transcript of her speech.
However in a letter to the Wall Street Journal, Tatiana Lucas, world program director for think-tank Intelligence Support Systems, said this issue "makes U.S. manufacturers gun-shy about developing, and eventually exporting, anything that can remotely be used to support government surveillance."
"We expect that most countries outside the U.S. and Western Europe will begin to place intercept mandates on social networks, especially following the Arab Spring. This would give U.S. companies an opportunity to develop such tools and thus create jobs," Lucas said. "Additionally, in some countries U.S. companies are already refusing to provide intercept support and are banned from doing business. But Chinese equivalents, with lawful-intercept features, crop up in their absence. Like it or not, many countries will adopt the Chinese model, leaving U.S. companies and job growth behind."
U.S. Secretary of State Hillary Clinton, also speaking at the conference in The Hague, took issue with this point of view. "When companies sell surveillance equipment to the security agency of Syria or Iran, there can be no doubt it will be used to violate rights," she said, according to a transcript of her speech.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts