The Next Cyber Security Threat: Export Controls

The debate around cybersecurity tools and terrorists has been raging between government entities (US and non-US) and the computer industry for the last couple of years. The debate came to a head when a proposed rule was published in the USA federal register in 2015 that would introduce export controls on cybersecurity items and research. These have since been made official not only in the USA but also in Australia.

YOU ARE INVITED TO PARTICIPATE in a (free) workshop debate on how the Australian cyber security R&D community can be appropriately represented in future decisions by government on issues that affect our work, business and research.

When Monday July 4, 2016 from 3p.m. to 5p.m.
Where Deakin University’s Corporate Offices
550 Bourke St., level 3, Melbourne CBD Ask for the ACISP Export Controls workshop room

Agenda

3:15pm Tea/coffee/water/snacks in the open area adjacent to the room.
3:30pm Brief ppt background by Prof. Lynn Batten, Deakin University
3:40-5pm A panel discussion/round table with Melbourne lawyer Helaine Leggatt (Helaine specializes in IT law and was an invited speaker at Asiacrypt in Taiwan), Dr. Vanessa Teague, Melbourne University, Prof. Ed Dawson, Qld Univ Tech., and Damien Manuel, National Branch Director, Australian Information Security Assoc.
5:05-6pm Steering Committee Meeting for ACISP attendees.
6-7pm ACISP welcome reception

 

The cybersecurity control debates are not new. They have been around since the early 90’s, when the computer industry began the task of trying to move encryption technology controls from the International Traffic in Arms Regulations (ITAR) to the Commerce Control List (CCL). Movement of encryption technology from ITAR to CCL represented a relaxation of controls for products with embedded encryption technology. Up until that point encryption was viewed as a tool used only by governments. The act of moving encryption technology was perhaps the biggest factor in the explosive growth of the Internet. Today, encryption is a necessity for the protection of everything we do – from buying an item on the Internet to downloading purchased music or books, to protecting our bank transactions. In short, encryption has become ubiquitous. The major concern with encryption is that it can be used by terrorists and criminals to hide their plans and activities. Last year, the encryption debate expanded to include cybersecurity tools. (https://www.netiq.com/communities/cool-solutions/netiq- views/the-next-cyber-security-threat-export-controls/)