Myanmar’s Cyber Security Bill

Myanmar’s military junta has drafted a draconian cyber security bill that has caused alarm among human rights campaigners and business groups for granting authorities sweeping powers over the Internet. The 36 pages outlining the proposed laws were given to mobile operators and telecoms license holders for comment just over a week after the army overthrew the elected government of Aun San Suu Kyi.  

Protests against the coup were held in Myanmar with tens of thousands marching in the the country’s largest city, YangonProtesters have accused the junta of drafting the Bill to restrict the mobilisation of its opponents. 

Protests against the coup in Myanmar are continuing, with thousands of people demonstrating outside China’s embassy in Yangon over allegations Beijing is supporting the junta and rumours that Chinese internet specialists had been flown in to help implement a controversial new cyber security law. 

President Biden has announced that the US is cutting off the generals’ access to $1bn (£720m) in funds in the US and the EU foreign policy chief, Josep Borrell, has also warned the bloc could impose fresh sanctions on Myanmar’s military.

Opponents of the coup have called on state civil servants and workers in  other industries to boycott work and put pressure on the junta in a statement claiming that the bill “violates human rights including the rights to freedom of expression, data protection and privacy, and other democratic principles and human rights in the online space”. The bill was an attempt “by the current military regime to oppress those who are against its rule, and to restrict the mobilisation and momentum of online resistance, we strongly condemn this action by the current military regime in accordance with our democratic principles”.

Law students have gone into the streets in university cities like Mandalay, joining young lawyers in shows of strength that echo the crowds of young people from the 1988 Revolution.

Using communications tools that were not then invented, protesters have appealed to international public  opinion public on social media, deploying video and graphics and using Twitter, Instagram, WhatsApp, Signal and a range of other apps on their mobile phones to make statements over the Internet criticising the new military government.  

Channel News Asia:      Jurist:        Telegraph:       Guardian:         Financial Times

You Might Also Read: 

Myanmar’s New Military Rulers Block Facebook:

 

« 3D Secure Authentication: What Is it, And Why Do I Need It?
Spotless Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

Spanish National Cybersecurity Institute (INCIBE)

Spanish National Cybersecurity Institute (INCIBE)

INCIBE undertakes research, service delivery and coordination for building cybersecurity at the national and international levels.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

SmartContractAudits.com

SmartContractAudits.com

SmartContractAudits.com is the leading platform for finding companies providing smart contract auditing services.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

Riddle&Code

Riddle&Code

Riddle&Code is a product-led services company specializing in onboarding industries to Web3. The team's mission is to provide a trusted connection between the digital and physical worlds.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

link22

link22

link22 offers a high level of expertise within IT security and system solutions. We help public and private actors with highly secure IT-solutions.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Security Risk Advisors (SRA)

Security Risk Advisors (SRA)

Security Risk Advisors deliver cybersecurity services to leading companies in the Financial Services, Healthcare, Pharmaceuticals, Technology and Retail industries.

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.