Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-8bljj Total loading time: 0 Render date: 2024-07-05T13:00:34.407Z Has data issue: false hasContentIssue false

5 - Privacy Risks in Myanmar's Emerging ICT Sector

from Part I - Structural Constraints and Opportunities

Published online by Cambridge University Press:  07 September 2019

Kamran Emad
Affiliation:
Myanmar from 2013 to 2015, most recently focusing on the human rights impacts of ICT sector growth at the Myanmar Centre for Responsible Business in Yangon.
Erin McAuliffe
Affiliation:
University of Michigan.
Get access

Summary

Before the long-awaited 2015 general election, a cyber-group operating under the name Union of Hacktivists1 became infamous for launching several DDoS (distributed denial of service)2 attacks on Burmese media sites, including The Irrawaddy and Eleven Media. Unleashed Research Labs, a cybersecurity firm, traced the origins of these attacks to a military-operated network run by the Defense Services Computer Directorate, attributing the attacks on independent media outlets to the work of government — namely military — employees (Hindstrom 2016). Although the intention was simply platform and content defacement, these attacks emphasize the risks individuals, institutions and corporations face in storing and sharing information online. As more content is exchanged online and more information, particularly personal information, is stored by mobile providers, such risks are likely to shift from defacement attacks to identity theft and privacy violations. Given Myanmar's weak central regulations and the government's ability to access consumer and provider information under the 2013 Telecommunications Law, individuals and organizations are increasingly at risk of privacy violations.

Myanmar's transition is unique. Not only is the country emerging from the longest modern-day military government but the political transition also parallels the introduction of affordable smartphones and mobile technologies available for public consumption across the country. This availability and affordability of information and communications technologies (ICTs) is certainly exciting for the Myanmar public; however, security and privacy risks are high due to a patchwork regulatory framework and rapid growth in mobile penetration. During military rule, modern ICT infrastructure and services were largely unavailable to the public because of high prices. Alongside high economic barriers to entry, punitive regulations emphasized the government's ability to restrict an individual's usage of ICTs while failing to provide a coherent strategy for addressing macro-level issues in the sector. These issues range from cyber-attacks to data collection standards imposed on industry stakeholders. Today, the ICT regulatory framework remains largely unrestricted by laws or institutions, with the exception of the 2013 Telecommunications Law, which allows the government to seize information on ICT users and disable communications services based on broad legal language that is highly unspecific (MCRB, IHRB and DIHR 2015). While the government did enact the Law Protecting the Privacy and Security of Citizens in 2017, the law's ambiguous language provides little clarity or assurance to individuals. This existing legal environment protects the government while putting the public at risk of unwanted surveillance.

Type
Chapter
Information
Myanmar Media in Transition
Legacies, Challenges and Change
, pp. 137 - 148
Publisher: ISEAS–Yusof Ishak Institute
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×