Myanmar’s Cyber Security Bill

Myanmar’s military junta has drafted a draconian cyber security bill that has caused alarm among human rights campaigners and business groups for granting authorities sweeping powers over the Internet. The 36 pages outlining the proposed laws were given to mobile operators and telecoms license holders for comment just over a week after the army overthrew the elected government of Aun San Suu Kyi.  

Protests against the coup were held in Myanmar with tens of thousands marching in the the country’s largest city, YangonProtesters have accused the junta of drafting the Bill to restrict the mobilisation of its opponents. 

Protests against the coup in Myanmar are continuing, with thousands of people demonstrating outside China’s embassy in Yangon over allegations Beijing is supporting the junta and rumours that Chinese internet specialists had been flown in to help implement a controversial new cyber security law. 

President Biden has announced that the US is cutting off the generals’ access to $1bn (£720m) in funds in the US and the EU foreign policy chief, Josep Borrell, has also warned the bloc could impose fresh sanctions on Myanmar’s military.

Opponents of the coup have called on state civil servants and workers in  other industries to boycott work and put pressure on the junta in a statement claiming that the bill “violates human rights including the rights to freedom of expression, data protection and privacy, and other democratic principles and human rights in the online space”. The bill was an attempt “by the current military regime to oppress those who are against its rule, and to restrict the mobilisation and momentum of online resistance, we strongly condemn this action by the current military regime in accordance with our democratic principles”.

Law students have gone into the streets in university cities like Mandalay, joining young lawyers in shows of strength that echo the crowds of young people from the 1988 Revolution.

Using communications tools that were not then invented, protesters have appealed to international public  opinion public on social media, deploying video and graphics and using Twitter, Instagram, WhatsApp, Signal and a range of other apps on their mobile phones to make statements over the Internet criticising the new military government.  

Channel News Asia:      Jurist:        Telegraph:       Guardian:         Financial Times

You Might Also Read: 

Myanmar’s New Military Rulers Block Facebook:

 

« 3D Secure Authentication: What Is it, And Why Do I Need It?
Spotless Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Arsenal Insurance Company

Arsenal Insurance Company

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

Competence Center for Applied Security Technology (CAST)

Competence Center for Applied Security Technology (CAST)

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security.

ACI Worldwide

ACI Worldwide

ACI Worldwide powers electronic payments for more than 5,000 organizations around the world.

Falanx Group

Falanx Group

Falanx Group protect and defend businesses against global cyber security threats.

Fornetix

Fornetix

Key Orchestration by Fornetix is an advanced encryption key management ecosystem that automates the key lifecycle across the entire enterprise with groundbreaking precision and speed.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

Cybolt

Cybolt

Cybolt helps companies, organizations, and governments manage digital risks and live in an environment of confidence and certainty.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.