- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on June 29, 2016 @ 12:30

Image courtesy of Flickr user WOCinTech Chat

According to a recent survey by Tech London Advocates [1], London’s tech experts and cyber security professionals are ‘overwhelmingly opposed [2]’ to the UK’s recent decision to leave the EU [3]. Mainland Europe represents an  essential source of talent for the UK [4], which suffers an ‘alarming lack of digital skills’, and Brexit will likely raise barriers to Europeans’ freedom to work and travel in the UK. In fact, there are concerns that a potential dip in Britain’s economy may result in a technological brain drain, with British cyber professionals seeking higher pay [5] in countries such as the US. Negotiating the split will involve establishing whether British law enforcement will continue to benefit from the information sharing [6] arrangements of Europol’s European Cybercrime Centre (EC3), and whether it will continue to reflect the privacy and data protection legislation [7] of the EU or develop its own regulation standards. The attractive benefits of the EU’s ‘digital single market [8]’ means it’s likely Britain will continue to adhere to the data standards [9] of its continental counterparts in order to facilitate the flow of data across the Channel.

Staying with European data debates, the final changes to the US–EU data sharing agreement, Privacy Shield, have been agreed upon this week [10]. The new arrangement will regulate the transatlantic transfer of EU data by US companies, replacing the ‘Safe Harbour’ [11] model that was struck down last October [12] by the European Court of Justice. The scheme features ‘a number of additional clarifications and improvements [13]’ in response to concerns of US mass surveillance of European citizens. The new data transfer pact includes stronger restrictions and establishes the role of a US ombudsman [14] to handle complaints over American misuse of EU data. The final version of Privacy Shield was sent to European member states for review [15] this week, and the vote is expected to be held early next month.

Russia’s new mass surveillance bill [16] will require all messaging [17] services operating in Russia—such as WhatsApp, Telegram and Viber—to provide the Federal Security Service with backdoor access to citizens’ personal communications. Pitched as a counterterrorism bill, the legislation will also necessitate ISPs [17] to hold customers’ metadata for three years and real communication records for up to six months. The legislation has been dubbed ‘the big brother law [18]’ and companies that fail to comply will be subject to fines [19] of up to one million Rubles (AU$20,000). Russia’s lower house, the Duma, passed the bill last week and it’s now expected to move quickly [20] through Russia’s Federal Council and the Kremlin, into law.

China is also clamping down on data management, holding a second reading [21] of controversial new draft rules this week. The cybersecurity law will require Chinese citizens’ personal data be stored domestically, with any request to transfer [22] the data overseas requiring a government security evaluation. Importantly, the legislation will force network operators [23] to ‘comply with social morals and accept the supervision of the government’. While Chinese media outlets state [24] that these measures as designed to ‘protect the information infrastructure’, the bill is seen [25] internationally as ‘internet censorship enshrined in legislation’.

The US recently held its fifth annual military network defence test, Cyber Guard [26], in Virginia with nearly 1,000 participants from the military, government, private sector, academia and allied countries. The exercise, led by the US Cyber Command, the FBI and the Department of Homeland Security, required participants [27] to respond to a simulated network attack on US infrastructure. Over a week, participants were challenged by an active expert ‘red team’ to practice [28] inter-agency coordination, private sector cooperation and Five Eyes interoperability. Cyber Command is also working to establish a ‘Persistent Training Environment [29]’—a year-round cyber facility capable of simulating multiple scenarios simultaneously—which is expected to reach initial operating capability in 2019.

Closer to home, the Australian Department of Defence has announced a $12 million contribution [30] to the Australian National University’s new innovation centre for high performance computing, data analytics and cybersecurity. The $45 million research facility [31] will house 70 students, academics and staff from the Australian Signals Directorate. The initiative is part of efforts to boost the study of STEM subjects and address Australia’s cyber skills shortage.

For some in-depth reading, check out the Global Commission on Internet Governance: One Internet [32] report released by the Centre for International Governance Innovation [33] and Chatham House [34] this week. Notably, it proposes three potential outcomes for the internet: ‘a dangerous and broken cyberspace’, ‘unequal gains’ or ‘broad unprecedented progress’. Microsoft has also published a new report [35] this week, proposing a cybersecurity norm development model for both nation states and ICT industry. The paper addresses offensive, defensive and industry norms, as part of Microsoft’s ongoing work [36] to ‘advance trust in global ICT ecosystems’.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-126/

URLs in this post:

[1] Tech London Advocates: http://www.techlondonadvocates.org.uk/

[2] overwhelmingly opposed: https://www.theguardian.com/technology/2016/mar/04/britains-tech-sector-overwhelmingly-opposed-to-brexit

[3] decision to leave the EU: http://www.bbc.com/news/uk-politics-32810887

[4]  essential source of talent for the UK: http://www.ibtimes.co.uk/how-will-brexit-affect-cybersecurity-uk-what-experts-are-saying-about-leaving-eu-1567008

[5] seeking higher pay: http://www.scmagazineuk.com/updated-how-will-brexit-affect-the-cyber-security-industry-in-uk-and-europe/article/505343/

[6] continue to benefit from the information sharing: https://securityledger.com/2016/06/brexit-a-cybersecurity-perspective-abi-research/

[7] privacy and data protection legislation: http://www.infosecurity-magazine.com/news/analyst-brexit-cybersecurity/

[8] digital single market: https://ec.europa.eu/digital-single-market/en/digital-single-market

[9] likely Britain will continue to adhere to the data standards: http://arstechnica.co.uk/tech-policy/2016/06/brexit-trade-deals-will-force-uk-to-follow-eu-data-privacy-laws-anyway/

[10] agreed upon this week: http://www.wsj.com/articles/u-s-eu-agree-final-adjustments-to-data-privacy-shield-1466764267

[11] replacing the ‘Safe Harbour’: http://www.theinquirer.net/inquirer/news/2462940/safe-harbour-20-privacy-shield-could-come-into-force-next-month

[12] struck down last October: https://techcrunch.com/2015/10/06/europes-top-court-strikes-down-safe-harbor-data-transfer-agreement-with-u-s/

[13] a number of additional clarifications and improvements: http://fortune.com/2016/06/24/privacy-shield-improvements/

[14] establishes the role of a US ombudsman: http://www.bbc.com/news/technology-36619416

[15] European member states for review: http://www.reuters.com/article/us-eu-dataprotection-usa-idUSKCN0ZA1QT

[16] new mass surveillance bill: http://www.dailydot.com/politics/encryption-backdoor-russia-fsb/?tw=dd

[17] require all messaging: http://fortune.com/2016/06/21/russia-encryption-surveillance/

[18] the big brother law: https://www.theguardian.com/world/2016/jun/26/russia-passes-big-brother-anti-terror-laws

[19] subject to fines: http://www.ibtimes.co.uk/russia-demands-backdoor-spy-users-whatsapp-viber-telegram-messaging-apps-1566726#slideshow/1526520

[20] expected to move quickly: https://www.engadget.com/2016/06/24/russia-set-to-pass-bill-requiring-isps-to-eavesdrop-on-customer/

[21] second reading: http://fortune.com/2016/06/27/china-moves-toward-adopting-cybersecurity-law/

[22] request to transfer: http://www.reuters.com/article/us-china-cyber-lawmaking-idUSKCN0ZD1E4

[23] force network operators: http://www.cnbc.com/2016/06/27/china-moves-closer-to-passing-controversial-cybersecurity-law.html

[24] state: http://www.chinadaily.com.cn/china/2016-06/27/content_25874911.htm

[25] bill is seen: http://www.itnews.com.au/news/chinese-cybersecurity-laws-would-demand-censorship-onshore-data-421371

[26] Cyber Guard: http://www.armytimes.com/story/military/2016/06/21/us-military-cyber-attack-china-russia/86147512/

[27] required participants: http://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Cyber-Guard-16-FactSheet-FINAL.pdf

[28] to practice: http://www.defense.gov/News-Article-View/Article/803018/cyber-guard-2016-seeks-to-manage-complexity-in-invisible-domain

[29] Persistent Training Environment: http://www.defenseone.com/technology/2016/06/us-military-cant-train-fend-worst-cyber-attacks-infrastructure-yet/129317/

[30] $12 million contribution: http://www.itnews.com.au/news/asd-invests-12m-in-anu-cyber-security-innovation-hub-421197

[31] $45 million research facility: http://www.abc.net.au/news/2016-06-23/cyber-security-partnership-between-defence-and-anu-announced/7537934

[32] Global Commission on Internet Governance: One Internet: https://www.ourinternet.org/report

[33] Centre for International Governance Innovation: https://www.cigionline.org/

[34] Chatham House: https://www.chathamhouse.org/

[35] new report: https://mscorpmedia.azureedge.net/mscorpmedia/2016/06/Microsoft-Cybersecurity-Norms_vFinal.pdf?utm_source=&utm_medium=email&utm_campaign=2606

[36] part of Microsoft’s ongoing work: https://blogs.microsoft.com/on-the-issues/2016/06/23/cybersecurity-norms-nation-states-global-ict-industry/#sm.00019f22b6jovcvfsxo2iojmf8sgi

Copyright © 2016 The Strategist. All rights reserved.