{"id":30093,"date":"2016-12-21T12:56:20","date_gmt":"2016-12-21T01:56:20","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=30093"},"modified":"2016-12-21T12:56:20","modified_gmt":"2016-12-21T01:56:20","slug":"cyber-wrap-148","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/figure>\n

This week we continue our look back at some of the year\u2019s biggest cyber stories in our final cyber wrap for 2016!<\/p>\n

China finally adopted<\/a> its controversial new cybersecurity law on 7 November, much to the dismay of the international community. The law states that companies must provide\u00a0\u2018technical support\u2019<\/a>\u00a0and data access to the government on matters of crime and national security, the vague definition of which has led to concerns that encryption back doors will be demanded. Any data gathered by companies in China will now have to be stored in-country\u2014a requirement known as\u00a0data-localisation<\/a>\u2014and companies will be subject to invasive security certification processes, which some believe could pose a\u00a0threat to intellectual property<\/a>\u00a0rights. Despite official denials from the Chinese Foreign Ministry, such concerns sparked an outcry from the international business community<\/a> and a petition to Premier Li Keqiang from more than 40 global business groups.<\/p>\n

The legislation also requires\u00a0real-name registration<\/a>\u00a0for instant messaging services and criminalises online content that undermines \u2018national honour\u2019<\/a> or subverts China\u2019s sovereignty. Online privacy advocates<\/a> are worried that the law will further repress freedom of online expression in China, and lead to increasing self-censorship. The implementation rules are still to be formulated, and are expected to\u00a0come into force<\/a>\u00a0on 1 June 2017. Watch this space.<\/p>\n

Privacy and data protection took a front seat in the European debate in 2016. The new US\u2013EU data sharing agreement, Privacy Shield, was\u00a0agreed in June this year<\/a>. The agreement regulates the transatlantic transfer of EU data by US companies,\u00a0in place of the \u2018Safe Harbour\u2019<\/a>\u00a0model that was\u00a0struck down last October<\/a>\u00a0by the European Court of Justice. The scheme features \u2018a number of additional clarifications and improvements<\/a>\u2019 in response to concerns about US mass surveillance of European citizens. The new data transfer pact, designed by the US Department of Commerce and the European Commission, and which includes stronger restrictions was brought into force<\/a> on 12 July.<\/p>\n

Europe\u2019s data protection focus continued with string of crackdowns on various corporations. Microsoft received a\u00a0formal notice<\/a>\u00a0in July for collecting \u2018excessive\u2019 user data through Windows 10 and failing to comply with the French Data Protection Act. The Chair of the National Data Protection Commission, France\u2019s privacy watchdog, accused<\/a>\u00a0the company of continuing to transfer data to the US under the provisions of the old Safe Harbour agreement.<\/p>\n

Privacy feathers were also ruffled in August when WhatsApp\u00a0announced<\/a>\u00a0a new information sharing deal with Facebook, involving the disclosure of user phone numbers. However, 28 European data collection authorities pushed back with an\u00a0open letter<\/a>\u00a0to WhatsApp\u2019s CEO. This protest, along with investigations in the\u00a0UK, France and Italy<\/a> prompted Facebook to\u00a0stop collecting WhatsApp user data<\/a>\u00a0from its European customers. Other companies, including Google<\/a>, also had run-ins with European privacy regulators this year, and the continent\u2019s focus on data protection is likely to continue into 2017.<\/p>\n

The rift between the US government and Apple over access to the iPhone used by Syed Farook, one of the San Bernardino attackers<\/a>, became the focal point of the encryption debate this year. US law enforcement’s\u00a0push<\/a>\u00a0for Apple to build a back door into the smart phone was resisted and described<\/a> by Apple CEO Tim Cook as dangerous government \u2018overreach\u2019. But in an unexpected twist, the Department of Justice revealed that a third party had provided an\u00a0alternative method<\/a>\u00a0to access Farook\u2019s phone data that ultimately rendered Apple\u2019s cooperation unnecessary.<\/p>\n

The divisive court case prompted the release of controversial draft legislation<\/a> intended to\u00a0outlaw end-to-end encryption<\/a>, and the creation of a bipartisan encryption working group<\/a> under the House Judiciary Committee and House Energy and Commerce Committee. The group just released its year-end report<\/a>, concluding that \u2018any measure that weakens encryption works against the national interest\u2019, laying the ground work for further debate next year.<\/p>\n

Russian efforts to influence the US Presidential election campaign caused a major splash this year. The media coverage was dominated by the leak of Democratic National Committee (DNC) donor lists and opposition research by supposed lone-hacker Guccifer 2.0<\/a> and the dissemination of more than 20,000 confidential DNC emails via Wikileaks<\/a>. In October, the US Intelligence Community released a statement that it was \u2018confident\u2019<\/a> that the Russian government was behind these incidents, which were allegedly designed to undermine Hillary Clinton\u2019s candidacy and ensure a more Putin-friendly<\/a> administration under Donald Trump. While Trump continues to dismiss the intel agencies\u2019 conclusion as a \u2018laughing point\u2019<\/a>, President Obama is pushing in the opposite direction, suggesting<\/a> that Russian President Vladimir Putin had a direct hand in these operations and ordering a full investigation<\/a> into the issue. The US has been criticised<\/a> for its lack of response to these incidents and Obama says the US will respond \u2018at a time and place of our own choosing\u2019<\/a>. The key question is how these tensions will play out under the new Trump administration.<\/p>\n

There are a whole range of interesting cyber developments on the horizon so be sure to follow ICPC\u2019s commentary in 2017. See you next year!<\/p>\n","protected":false},"excerpt":{"rendered":"

This week we continue our look back at some of the year\u2019s biggest cyber stories in our final cyber wrap for 2016! China finally adopted its controversial new cybersecurity law on 7 November, much to …<\/p>\n","protected":false},"author":390,"featured_media":30097,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,728,1606],"class_list":["post-30093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-hacking","tag-presidential-election-2016"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"This week we continue our look back at some of the year\u2019s biggest cyber stories in our final cyber wrap for 2016! China finally adopted its controversial new cybersecurity law on 7 November, much to ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-21T01:56:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/12\/light-and-shadow-1118293_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1501\" \/>\n\t<meta property=\"og:image:height\" content=\"985\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/12\/light-and-shadow-1118293_1920.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/12\/light-and-shadow-1118293_1920.jpg\",\"width\":1501,\"height\":985},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/#primaryimage\"},\"datePublished\":\"2016-12-21T01:56:20+00:00\",\"dateModified\":\"2016-12-21T01:56:20+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"This week we continue our look back at some of the year\u2019s biggest cyber stories in our final cyber wrap for 2016! China finally adopted its controversial new cybersecurity law on 7 November, much to ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-12-21T01:56:20+00:00","og_image":[{"width":1501,"height":985,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/12\/light-and-shadow-1118293_1920.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/12\/light-and-shadow-1118293_1920.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/12\/light-and-shadow-1118293_1920.jpg","width":1501,"height":985},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/#primaryimage"},"datePublished":"2016-12-21T01:56:20+00:00","dateModified":"2016-12-21T01:56:20+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-148\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30093"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=30093"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30093\/revisions"}],"predecessor-version":[{"id":30098,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30093\/revisions\/30098"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/30097"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=30093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=30093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=30093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}