{"id":21695,"date":"2015-07-22T12:25:38","date_gmt":"2015-07-22T02:25:38","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=21695"},"modified":"2015-07-22T12:27:17","modified_gmt":"2015-07-22T02:27:17","slug":"cyber-wrap-80","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-80\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/a><\/p>\n Tony Abbott\u2019s Telecommunications Sector Security Reforms continue<\/a>s to cause angst with major telco and tech firms. The proposed amendments<\/a> to legislation including the Telecommunications Act<\/em> and Telecommunications (Interception and Access) Act<\/em> would force telcos to supply security agencies with details of proposed supplier arrangements and purchases, and give government the authority to veto purchases deemed to pose a threat to national security. Three major\u00a0 telco industry groups have developed a joint submission to the Attorney\u2011General criticizing the reforms as unecessary and disproportionate.<\/p>\n Meanwhile more Australian companies are seeking insurance to mitigate the risks of a cyber incident, although brokers have warned<\/a> that insurance cannot replace proper risk management practices. This is advice backed up by former GCHQ Director Sir David Ormand and NSA chief Admiral\u00a0Mike Rogers who warned<\/a> London city financial firms that even the most cyber secure companies must assume their cyber defences will be breached at some point.<\/p>\n Paul Coyer from Forbes<\/em><\/a> has written a great piece discussing the dynamics of the US\u2013China cyber relationship. Coyer points out that China\u2019s behaviour in cyberspace and international cyber security discussions is driven by a deep sense of vulnerability in the face of America\u2019s enormous technological advantage\u2014a feeling that has grown as the full extent of the relationship between major US hardware and software firms and the NSA was revealed by Edward Snowden. China\u2019s National Security Law and Cyber Security Law, discussed last week<\/a>, is clearly informed by this insecurity, emphasising the principle of sovereignty in the information space and its links to national security.<\/p>\n The Hacking Team<\/a> breach has highlighted existing concerns about the transfer of cyber surveillance technology across borders. Mari Batashevski<\/a> has published a long piece on the role that Hacking Team and similar firms, often Israeli, play in installing and operating cyber surveillance systems in states like Uzbekistan and Kazakhstan. Back in May<\/a> the US Commerce Department released draft regulations that require permits to export encrypted software and cyber surveillance technologies, based on principles agreed by Wassenaar Arrangement<\/a> members (including Australia) in December 2013. Some US tech firms have criticised<\/a> the proposed regulations as flawed.<\/p>\n