Breaking‼️
美東時間1月5日傍晚,川普以國家安全為由,用行政命令方式禁止阿里支付寶、微信支付、QQ錢包在內的8款中國應用程式(App)。
行政命令發佈後45天,禁止任何人與實體與這8款中國應用程式(App)進行交易。
按照日程,美國下任政府將在15天後,1月20日上任。
—
美國商務部長在同一時間發聲明表示,已指示商務部按行政命令執行禁令,「支持川普總統保護美國人民隱私與安全,免於受到中國共產黨的威脅。」
—
▫️8款App:
支付寶(Alipay)、掃描全能王(CamScanner)、QQ錢包(QQ Wallet)、茄子快傳(SHAREit)、騰訊QQ(Tencent QQ)、阿里巴巴旗下海外短視頻應用VMate、微信支付(WeChat Pay)和辦公型App WPS Office。
圖三:美國商務部聲明
圖四:美國國安顧問聲明
—
▫️白宮行政命令全文:
The White House
Office of the Press Secretary
FOR IMMEDIATE RELEASE
January 5, 2021
EXECUTIVE ORDER
- - - - - - -
ADDRESSING THE THREAT POSED BY APPLICATIONS AND OTHER SOFTWARE DEVELOPED OR CONTROLLED BY CHINESE COMPANIES
By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of title 3, United States Code,
I, DONALD J. TRUMP, President of the United States of America, find that additional steps must be taken to deal with the national emergency with respect to the information and communications technology and services supply chain declared in Executive Order 13873 of May 15, 2019 (Securing the Information and Communications Technology and Services Supply Chain). Specifically, the pace and pervasiveness of the spread in the United States of certain connected mobile and desktop applications and other software developed or controlled by persons in the People's Republic of China, to include Hong Kong and Macau (China), continue to threaten the national security, foreign policy, and economy of the United States. At this time, action must be taken to address the threat posed by these Chinese connected software applications.
By accessing personal electronic devices such as smartphones, tablets, and computers, Chinese connected software applications can access and capture vast swaths of information from users, including sensitive personally identifiable information and private information. This data collection threatens to provide the Government of the People's Republic of China (PRC) and the Chinese Communist Party (CCP) with access to Americans' personal and proprietary information -- which would permit China to track the locations of Federal employees and contractors, and build dossiers of personal information.
The continuing activity of the PRC and the CCP to steal or otherwise obtain United States persons' data makes clear that there is an intent to use bulk data collection to advance China's economic and national security agenda. For example, the 2014 cyber intrusions of the Office of Personnel Management of security clearance records of more than 21 million people were orchestrated by Chinese agents. In 2015, a Chinese hacking group breached the United States health insurance company Anthem, affecting more than 78 million Americans. And the Department of Justice indicted members of the Chinese military for the 2017 Equifax cyber intrusion that compromised the personal information of almost half of all Americans.
In light of these risks, many executive departments and agencies (agencies) have prohibited the use of Chinese connected software applications and other dangerous software on Federal Government computers and mobile phones. These prohibitions, however, are not enough given the nature of the threat from Chinese connected software applications. In fact, the Government of India has banned the use of more than 200 Chinese connected software applications throughout the country; in a statement, India's Ministry of Electronics and Information Technology asserted that the applications were "stealing and surreptitiously transmitting users' data in an unauthorized manner to servers which have locations outside India."
The United States has assessed that a number of Chinese connected software applications automatically capture vast swaths of information from millions of users in the United States, including sensitive personally identifiable information and private information, which would allow the PRC and CCP access to Americans' personal and proprietary information.
The United States must take aggressive action against those who develop or control Chinese connected software applications to protect our national security.
Accordingly, I hereby order:
Section 1. (a) The following actions shall be prohibited beginning 45 days after the date of this order, to the extent permitted under applicable law: any transaction by any person, or with respect to any property, subject to the jurisdiction of the United States, with persons that develop or control the following Chinese connected software applications, or with their subsidiaries, as those transactions and persons are identified by the Secretary of Commerce (Secretary) under subsection (e) of this section: Alipay, CamScanner, QQ Wallet, SHAREit, Tencent QQ, VMate, WeChat Pay, and WPS Office.
(b) The Secretary is directed to continue to evaluate Chinese connected software applications that may pose an unacceptable risk to the national security, foreign policy, or economy of the United States, and to take appropriate action in accordance with Executive Order 13873.
(c) Not later than 45 days after the date of this order, the Secretary, in consultation with the Attorney General and the Director of National Intelligence, shall provide a report to the Assistant to the President for National Security Affairs with recommendations to prevent the sale or transfer of United States user data to, or access of such data by, foreign adversaries, including through the establishment of regulations and policies to identify, control, and license the export of such data.
(d) The prohibitions in subsection (a) of this section apply except to the extent provided by statutes, or in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted before the date of this order.
(e) Not earlier than 45 days after the date of this order, the Secretary shall identify the transactions and persons that develop or control the Chinese connected software applications subject to subsection (a) of this section.
Sec. 2. (a) Any transaction by a United States person or within the United States that evades or avoids, has the purpose of evading or avoiding, causes a violation of, or attempts to violate the prohibition set forth in this order is prohibited.
(b) Any conspiracy formed to violate any of the prohibitions set forth in this order is prohibited.
Sec. 3. For the purposes of this order:
(a) the term "connected software application" means software, a software program, or group of software programs, designed to be used by an end user on an end-point computing device and designed to collect, process, or transmit data via the Internet as an integral part of its functionality.
(b) the term "entity" means a government or instrumentality of such government, partnership, association, trust, joint venture, corporation, group, subgroup, or other organization, including an international organization;
(c) the term "person" means an individual or entity;
(d) the term "personally identifiable information" (PII) is information that, when used alone or with other relevant data, can identify an individual. PII may contain direct identifiers (e.g., passport information) that can identify a person uniquely, or quasi-identifiers (e.g., race) that can be combined with other quasi-identifiers (e.g., date of birth) to successfully recognize an individual.
(e) the term "United States person" means any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States.
Sec. 4. (a) The Secretary, in consultation with the Secretary of the Treasury and the Attorney General, is hereby authorized to take such actions, including adopting rules and regulations, and to employ all powers granted to me by IEEPA, as may be necessary to implement this order. All agencies shall take all appropriate measures within their authority to implement this order.
(b) The heads of agencies shall provide, in their discretion and to the extent permitted by law, such resources, information, and assistance to the Department of Commerce as required to implement this order, including the assignment of staff to the Department of Commerce to perform the duties described in this order.
Sec. 5. Severability. If any provision of this order, or the application of any provision to any person or circumstance, is held to be invalid, the remainder of this order and the application of its other provisions to any other persons or circumstances shall not be affected thereby.
Sec. 6. General Provisions. (a) Nothing in this order shall be construed to impair or otherwise affect:
(i) the authority granted by law to an executive department, agency, or the head thereof; or
(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
DONALD J. TRUMP
THE WHITE HOUSE,
January 5, 2021.
同時也有10000部Youtube影片,追蹤數超過2,910的網紅コバにゃんチャンネル,也在其Youtube影片中提到,...
「data security example」的推薦目錄:
data security example 在 李怡 Facebook 的精選貼文
Battle between Freedom and Equality | Lee Yee
A netizen left a comment under my article from a couple of days ago, and said that if Trump is re-elected, he would turn “dictatorial”, and pursue “Trump thinking as mainstream”. He said that he “divides the United States and gave birth to racism, white nationalism, and xenophobia”, which is disastrous to human civilization, etc.
Under the constitutional system of the United States, one will have to step down after one re-election, and there is no way to bring about a dictatorship. Moreover, just look at all the stormy attacks mainstream media throws towards him, how is one to become a dictator? In a multicultural America, how could any almighty notion exist? As for racism and xenophobia, the cited example is him crowning the novel coronavirus “Chinese virus”, and the media claimed that this has caused a sharp increase in anti-Chinese speech online. But the virus did originate in China, did it not?
Other than the infiltration of Chinese interests that drove the U.S. media’s anti-Trump campaign, it has also been the “leftard” ideologies that have dominated academia and the press. How does one define “leftard”? Something that So Keng-chit said a few days ago was very appropriate, "the definition of “leftard” is that they replace strong and weak with “wrong and “right”; strong must be “wrong”, and weak must be “right”. Leftards uplift the weak by putting down the bullies to attain moral high grounds. The leftards must oppose the United States, for the see the United States as strong. The leftards sympathize with Saddam Hussein, because compared with the United States, Saddam Hussein is weak. They cannot see that Saddam Hussein is strong compared with the Iraqis. Hence the ‘tard’ in leftard.”
It is not that they cannot see, they are just intentionally not seeing. The mainstream media reports about Iraq after Saddam Hussein had fallen were that there was no longer a stronghold of a government, which led to the loss of societal management. Bombs were exploding daily, and blood flooded the land of the country. People lost homes and livelihoods. However, data showed that in the later phase of Saddam Hussein’s regime, Iraq’s population was 26 million, and the per capita GDP was only US$625, not to mention that the inflation rate was high in the three digits. After the United States attacked Iraq and introduced the democratic system, the Iraqi population has risen to 35 million, the per capita GDP has increased to US$4,600, and the inflation rate has dropped to 6%. Despite the global economic slowdown, the Iraqi economy has grown by an average of 9.9% per year for more than a decade.
In addition, the mainstream media rarely reported the substantial progress in Afghanistan’s economy and people’s livelihood after the United States eradicated the Taliban regime before establishing a democratic system in Afghanistan. It is rarely reported that after South Africa got rid of the white regime, social security was horrifying. It is because such truthful reporting is not politically correct.
Shouldn’t the motto of news publishing be “all news worth reporting”? When political correctness overrides this creed, there is no longer press freedom.
The so-called political correctness stems from anti-discrimination. Anti-discrimination means upholding the concept that “all men are born equal”, and to protect vulnerable groups. Anti-discrimination used to be a kind of progress, since the starting point is not the interests of the majority of society, but the moral and spiritual demands. But when this kind of protection gradually develops into a disregard towards differences and the diversity of human life, it becomes leftards who wave around the banner of political correctness. If the welfare of new immigrants is treated the same as that of local residents, how is that different from obliterating the long-term tax payment of local residents? Using Black Lives Matter to rationalize violence and chaos, you get Black Lives Better, and ignore the fundamental problems of the root causes of issues such as the Black community’s slighting of education; with the police worrying that law enforcement will cause them trouble, the crime in the Black areas will increase. Anti-discrimination has developed into a state where even praising women for being beautiful is discrimination. Obama once praised the Democratic vice presidential candidate Kamala Harris as the most beautiful State Attorney General in the United States, and was then accused of discrimination by feminists. He was forced to apologize. To protect LGBT, many American college toilets no longer distinguish between men and women, making women fearful.
“All men are born equal” is a false proposition. Some people are born with a silver spoon in their mouths, and others are born in the slums of Africa. How are they born equal? American conservative Russel Kirk said that we must pay attention to diversity and differences. Only before God and a fair court can there be true quality; all other attempts to achieve equality will inevitably lead to societal stagnation. If the balance of natural differences and conventions is tipped in order to pursue equality for all, then it will not be long before tyrants or despicable oligarchs start to create new inequalities.
Socialism waves around the banner of equality, and has been breeding tyranny for a whole century. Modern leftards is another form of pursuit of equality, one that is destroying the freedom of human society. Freedom is more important than equality. If there is no freedom, there will be no equality among people who are not free.
This U.S. general election may as well be regarded as a battle between freedom and equality.
data security example 在 李怡 Facebook 的最讚貼文
Living on in fear (Lee Yee)
Hong Kong people have been living on in fear. Contrary to the saying that since the implementation of the National Security Law, violence has been curbed, whereby peace has been restored and normality has returned, everyone, including law enforcement officials and those who have shown support for the law on orders, has been living on in fear. One of my friends, a journalist, said if one craves living on and working as usual, one should stay oblivious of the National Security Law, which will bring calmness and transcend fear and emotional entanglements. Contrariwise, getting overawed amounts to helping those in power that enacted the National Security Law gain their purpose. Yet sadly, by and large, the Chinese Communist Party(CCP) has had its way instantly.
Human fear is constituted by two elements: experiences and unknowable future.
Take the pandemic that has been ravaging across the globe and resurged in Hong Kong as an example. Firstly, COVID-19 keeps the world in fear because of the horrible experiences that it spreads fast and extensively without a trace, with the contracted and carriers showing no symptoms initially, and sustains a pretty long incubation period. Secondly, its resurgence and scale are both unpredictable. Precisely, the experiences and the unknowability have put a halt to the Book Fair, which was supposed to start tomorrow, and made all economists incapable of forecasting the world, China and Hong Kong’s economy. So people live in fear, for they do not have a clue how their lives are impacted by the economy.
Even though it is said that China’s legal system is being perfected day by day, that extradition to China is not hair-raising, that there will be very few cases in which the suspects are extradited to China, that the Chief Executive will keep tabs on the cases, that most cases will be heard by Hong Kong judges…those tranquilizers, which cannot pacify Hong Kong people, cannot even sedate the advocates who put forward the above pretexts for the experiences that there are a lot of uncertainties, flexibility and possible manipulation with National Security Law making breaches of law unknowable. Experiences and unknowability bring about fear.
Under a system in which state power is unchallengeable, the objective of enacting laws is to get the people intimidated. A despotism can definitely do so if it wants to slap the people down.
Sanctions from the U.S. could be actualized, but its intensity and scale are unknowable. If they are applied to big banks in Hong Kong, it will a disaster. Based on experiences and unknowability, officials and the pro-establishment camp are bound to be frightened.
The overwhelming majority of Hong Kong investors chose to put money into Hong Kong in the past for good experiences and knowability. In terms of experiences, business operations were not bothered by politics, and were benefited from the simple taxation, free economy and foreign exchange. When it comes to knowability, the implementation of common law and case law were not totally dependent on judges’ interpretations on laws and were free from political manipulation, therefore were comparatively predictable. It was not without reason that other cities were unable to squeeze in among the three international financial hubs known for adopting common law - New York, London and Hong Kong.
Since the National Security Law taking effect, not only has the number of emigrants increased, but there have also been signs that foreign investments will haul off while Facebook and Google were rumored yesterday to consider withdrawing from Hong Kong in the wake of the fact that quite a number of foreign internet companies have announced suspension of dealing with requests from the HKSAR government for users’ data. If these two most influential global companies pull out, the unknowability of the future economy of Hong Kong will become knowable pessimism.
Freedom from fear is most fundamental among the Four Freedoms proposed by the late U.S. President Franklin Roosevelt. Being free from fear is a prerequisite for freedom from fear of saying something wrong, freedom of religion and freedom of pursuing a better life.
In view of the experiences with the CCP and Hong Kong communist regime, and the uncertainties of the articles of the National Security Law, Hong Kong people and investors cannot stay away from fear. The protesters on the frontlines last year also admitted that they feared, but they went head-on against it for carrying on the movement, crystalizing in the end a new Hong Kong spirit named “mutual destruction”, which means being free from fear in protests. The primaries of the pan-democracy camp last weekend showcased to the CCP and Hong Kong communist regime that thousands of Hong Kong people would still come forward with a big NO even if a machete is pointed at them.