{"id":230041,"date":"2017-07-25T06:43:20","date_gmt":"2017-07-25T10:43:20","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/cybersecurity-ecosystem-of-tomorrow-new-straits-times-online.php"},"modified":"2017-07-25T06:43:20","modified_gmt":"2017-07-25T10:43:20","slug":"cybersecurity-ecosystem-of-tomorrow-new-straits-times-online","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/eco-system\/cybersecurity-ecosystem-of-tomorrow-new-straits-times-online.php","title":{"rendered":"Cybersecurity ecosystem of tomorrow &#8211; New Straits Times Online"},"content":{"rendered":"<p><p>    ON July 15, Indonesia announced a partial ban on Telegram,    which swiftly responded by shutting down the channels reported    by the Indonesian government. The ban seemed a culmination of    the governments frustration over Telegrams silence on    complaints about channels used to recruit Indonesians into    militant groups.  <\/p>\n<p>    The application was confirmed by Indonesias National Police    chief General Tito Karnavian as one of the means to receive    terror-related materials in the recent stabbing of two police    officers at a mosque in Jakarta. Yet, it is perhaps the lack of    reciprocation from Telegram on complaints made since last year,    which may have escalated tensions in the spheres of governance    in cyberspace.  <\/p>\n<p>    Telegram is not the first application caught in a skirmish with    states over national security concerns. Conflict between the    government and private sector occurs due to the structure of    the Internet, which is not designed to keep cyberspace secure    from threats to networks or discriminate against the transfer    of information.  <\/p>\n<p>    A network for a small community back then, the Internet was    created with the presumed understanding that actors belonged in    a close circle and were essentially benevolent. However, the    expansion of cybersphere in the 1990s migrated more than 50    million users online.  <\/p>\n<p>    In December 2000, an ITU report estimated that there were four    million Malaysian users online and last year, the figure grew    to 21 million.  <\/p>\n<p>    The greater integration of cybersphere in daily life increases    the surface for cyberattacks. In 2015, CyberSecurity Malaysia    recorded 1,714 incidents, but the first quarter of last year    registered 2,470 incidents.  <\/p>\n<p>    The private sector drives Internet patronage, with technology    giants such as Google, Microsoft and Facebook providing    essential services for Internet users. The technology    communitys large footprint online translates offline and    impinges on traditional roles in the security architecture. The    governments role as a user of such services presents    difficulties to the states responsibility as the protector of    the population.  <\/p>\n<p>    Chinas cyber laws passed last year bring data centres to    Chinese soil, where corporations are required to host data    locally. This places control over data within the regulations    of China, thus empowering the state to secure information    systems. However, this is not the case with other nations, as    Indonesias situation with Telegram illustrates. States have to    work with private companies to ensure the experience online and    offline is protected.  <\/p>\n<p>    Yet, harmonisation can be an uphill climb, especially where    interests do not align. The widely broadcasted legal kerfuffle    between Apple and the United States Federal Bureau of    Investigation (FBI) stemmed from the FBIs request to unlock an    iPhone belonging to the San Bernardino shooter in 2015. The    FBIs concern relates to strong encryption that prohibits    authorities from solving cases to stop terrorist attacks    swiftly. The FBIs request was for Apple to provide a    backdoor to Apples programmes in the interest of national    security. Apple declined the request on the grounds of data    privacy.  <\/p>\n<p>    That cyberspace provides an avenue to air grievances outside    the control of governments was addressed in the United Nations    Human Rights Committee general comment No. 34 following the    Arab uprisings in 2011. Encryption and anonymity are attached    to the concept of freedom of expression, which is most    important to end users.  <\/p>\n<p>    Corporations, programmers and data centres that are suddenly    called to play the role of honest brokers may experience    difficulties in suiting up as participants in security.    National security issues are not their initial trade, and    perspectives on national security may differ in accordance to    locality  terrorism, its definitions and its amplification is    only one national security concern. Additionally, parts of Asia    where national security is seen as the sole responsibility of    the state may not have the institutional knowledge and    mechanisms of a multi-stakeholder system. If there is little    trust between stakeholders, there can be suspicion on the part    of the private sector towards the intention of states, as the    Apple versus FBI case suggests.  <\/p>\n<p>    Roles and responsibility should link cybersecurity players and    authorities in a smooth system online and offline. The fear of    over-regulation or being caught amid a political fight may lose    private sector interest to participate.  <\/p>\n<p>    However, failure to construct a healthy ecosystem may affect    the direction of policies. While the WannaCry ransomware    affected more than 230,000 computers in more than 150    countries, the Malaysian Communications and Multimedia    Commission did not receive a single report, though this is not    because there were no incidents in Malaysia. LGMS, a    cybersecurity firm in Malaysia, found WannaCry in at least 10    devices. In the current threat to cybersphere, there is    tremendous pressure for the fledgling environment of    information sharing between stakeholders in Malaysia to mature    rapidly.  <\/p>\n<p>    The National Cyber Coordination and Command Centre (NC4) was    formed with the intention of coordinating cooperation between    public and private sectors. Yet, NC4 was created for cyber    threats of national proportions and may not be the platform of    outreach needed for threats not limited to cybersphere.  <\/p>\n<p>    Details of the cybersecurity bill passed by Deputy Prime    Minister Datuk Seri Dr Ahmad Zahid Hamidi to Attorney-General    Tan Sri Mohamed Apandi Ali are still pending, but one hopes it    addresses the gaps in the ecosystem and aims to remedy them.  <\/p>\n<p>    With the private sector expected to play a large role in    providing cybersecurity services, there has to be mechanisms    that ensure national security is fortified without sacrificing    private sector innovation. After the Telegram debacle,    cyberspace users need the giants to play well together for a    safe experience online and offline.  <\/p>\n<p>    **The writer is an analyst on foreign policy and security    studies at the Institute of Strategic and International Studies    Malaysia  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link: <\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.nst.com.my\/opinion\/columnists\/2017\/07\/260536\/cybersecurity-ecosystem-tomorrow\" title=\"Cybersecurity ecosystem of tomorrow - New Straits Times Online\">Cybersecurity ecosystem of tomorrow - New Straits Times Online<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> ON July 15, Indonesia announced a partial ban on Telegram, which swiftly responded by shutting down the channels reported by the Indonesian government. The ban seemed a culmination of the governments frustration over Telegrams silence on complaints about channels used to recruit Indonesians into militant groups. The application was confirmed by Indonesias National Police chief General Tito Karnavian as one of the means to receive terror-related materials in the recent stabbing of two police officers at a mosque in Jakarta.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/eco-system\/cybersecurity-ecosystem-of-tomorrow-new-straits-times-online.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[33],"tags":[],"class_list":["post-230041","post","type-post","status-publish","format-standard","hentry","category-eco-system"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/230041"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=230041"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/230041\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=230041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=230041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=230041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}