{"id":34640,"date":"2020-04-27T06:00:52","date_gmt":"2020-04-27T06:00:52","guid":{"rendered":"http:\/\/8f16cfd4-0c70-4db7-ada5-f457405d875e"},"modified":"2020-04-27T06:00:52","modified_gmt":"2020-04-27T06:00:52","slug":"tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/","title":{"rendered":"Tech experts concerned by lack of notice in International Production Orders Bill"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2020\/03\/16\/2da95ba2-1a20-4688-ba15-3340174777ed\/thumbnail\/770x578\/e90046bb7dd0fd34ce37d0563438c930\/australia-australian-canberra-parliament-house-in-the-distance.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A coalition of technology experts and civil liberties groups have said they are concerned the proposed <em>International Production Orders Bill<\/em>, which would allow Australian law enforcement to gain access to data from overseas telco and service providers, does not contain a notice provision to subjects of data requests.<\/p>\n<p>&#8220;In general, users have a universal right to notice. The <em>International Production Orders Bill<\/em> does not provide any requirement, or even mechanism, for government officials to notify data subjects of requests,&#8221; the group said in a <a href=\"https:\/\/www.aph.gov.au\/DocumentStore.ashx?id=2a847a6d-1caa-493f-8011-a37af680a7a0&amp;subId=680272\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">submission<\/a> [PDF] to the Parliamentary Joint Committee on Intelligence and Security (PJCIS) and its <a href=\"https:\/\/www.zdnet.com\/article\/telecommunications-international-production-orders-bill-sent-to-pjcis\/\">review<\/a> of the Bill.<\/p>\n<p>&#8220;Providing notice &#8212; even if delayed to where necessary to protect an ongoing investigation &#8212; should be a duty of governments. It should not be left to the discretion of providers and individuals cannot be barred from exercising their rights.&#8221;<\/p>\n<p>The group &#8212; which includes Google, Reporters Without Borders, Electronic Frontier Foundation, Internet Society, and individuals such Stanford cybersecurity expert Riana Pfefferkorn &#8212; also noted that Australia&#8217;s Administrative Appeals Tribunal (AAT) falls short of the mark for judicial review, yet law enforcement under the Bill would be able to skirt judges and head to the AAT for approval.<\/p>\n<p>At the start of the year, the <a href=\"https:\/\/www.zdnet.com\/article\/afp-and-nsw-police-used-australias-encryption-laws-seven-times-in-2018-19\/\">latest annual report<\/a> on telecommunications interception showed the Australian Federal Police <a href=\"https:\/\/www.zdnet.com\/article\/home-affairs-report-reveals-deeper-problems-with-australias-encryption-laws\/\">obtained 557 interception warrants through AAT members<\/a>, compared with 77 through the various Federal Court judges, and NSW Police obtained 1,512 interception warrants through AAT members, compared with only 101 through Federal Circuit Court judges.<\/p>\n<p><strong>See also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/how-the-b-team-watches-over-australias-encryption-laws-and-cybersecurity\/\">How the B-Team watches over Australia&#8217;s encryption laws and cybersecurity<\/a><\/strong>&nbsp;&nbsp;<\/p>\n<p>The group said it was unclear if AAT reviews met the threshold for independent and judicial review.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>&#8220;The Tribunal, however, is not a court; the AAT is part of the executive branch, falls under the portfolio of the Attorney-General, and its members are appointed by the Governor-General.&#8221;<\/p>\n<p>The Attorney-General&#8217;s Department has <a href=\"https:\/\/www.zdnet.com\/article\/how-the-b-team-watches-over-australias-encryption-laws-and-cybersecurity\/\">previously said<\/a> the mean duration of warrant-related appointments is 18 minutes.<\/p>\n<p>&#8220;The shortest amount of time recorded for an appointment that proceeded is 1 minute,&#8221; the department said. &#8220;The data is not subject to auditing.&#8221;<\/p>\n<p>The <a href=\"https:\/\/www.zdnet.com\/article\/new-bill-to-prepare-australian-law-enforcement-for-the-us-cloud-act\/\">Bill is a precondition<\/a> for Australia to obtain a proposed bilateral agreement with the United States in order to implement the US <em>Clarifying Lawful Overseas Use of Data Act<\/em> (the CLOUD Act).<\/p>\n<p>The submission added that the CLOUD Act is not a basis for the &#8220;extra-territorial jurisdiction over foreign providers&#8221; that Australia would like to think it is.<\/p>\n<p>&#8220;The Bill treats the mere existence of a CLOUD Act agreement as the basis for jurisdiction. Under the bill, the very fact that a provider is located in a country with whom Australia has an international agreement means that the provider is subject and ostensibly bound by an international production order,&#8221; it said.<\/p>\n<p>&#8220;The Bill would seek to subject service providers to civil penalties if they fail to comply. These provisions contravene the text and the spirit of the CLOUD Act.&#8221;<\/p>\n<p>The group urged PJCIS to drop the Bill, but if a CLOUD Act agreement with the United States were to be struck, it said the text of that agreement should be released for public scrutiny.<\/p>\n<p>In a submission published last week, the Western Australia Police Force <a href=\"https:\/\/www.zdnet.com\/article\/wa-police-seeks-clarification-on-what-production-orders-bill-gives-it-access-to\/\">asked for clarification<\/a> on what the Bill would give it access to, while the Australian Privacy Foundation has said the Bill is <a href=\"https:\/\/www.zdnet.com\/article\/australian-privacy-foundation-labels-cloud-act-readying-bill-as-deeply-flawed\/\">deeply flawed<\/a>.<\/p>\n<h3>Related Coverage<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Collection of technology experts and civil liberties groups state the Administrative Appeals Tribunal does not constitute judicial review.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34641,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-34640","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tech experts concerned by lack of notice in International Production Orders Bill 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tech experts concerned by lack of notice in International Production Orders Bill 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-27T06:00:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Tech experts concerned by lack of notice in International Production Orders Bill\",\"datePublished\":\"2020-04-27T06:00:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\\\/\"},\"wordCount\":578,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\\\/\",\"name\":\"Tech experts concerned by lack of notice in International Production Orders Bill 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill.jpg\",\"datePublished\":\"2020-04-27T06:00:52+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tech experts concerned by lack of notice in International Production Orders Bill\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tech experts concerned by lack of notice in International Production Orders Bill 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/","og_locale":"en_US","og_type":"article","og_title":"Tech experts concerned by lack of notice in International Production Orders Bill 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-27T06:00:52+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Tech experts concerned by lack of notice in International Production Orders Bill","datePublished":"2020-04-27T06:00:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/"},"wordCount":578,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/","url":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/","name":"Tech experts concerned by lack of notice in International Production Orders Bill 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill.jpg","datePublished":"2020-04-27T06:00:52+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tech-experts-concerned-by-lack-of-notice-in-international-production-orders-bill\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Tech experts concerned by lack of notice in International Production Orders Bill"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34640"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34640\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34641"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}