China Is Gaining Technical Supremacy

Artificial Intelligence (AI) is a potentially transformational technology that will have broad social, economic, national security, and geopolitical implications for the UK, US and around the world. 

“Significant technology leadership is moving East” and causing a conflict of interests and values, Jeremy Fleming, director of government electronic surveillance agency GCHQ, said in a recent speech, warning that Western nations risk losing control of their Internet security.

GCHQ gathers communications from around the world to identify and disrupt threats to Britain and has a close relationship with the US National Security Agency and with the eavesdropping agencies of Australia, Canada and New Zealand in a consortium called "Five Eyes". 

Russia remains the biggest immediate threat to the West but China's long-term dominance of technology poses a much bigger problem, according to Fleming.

The West must urgently act to ensure China does not dominate important emerging technologies and gain control of the "global operating system", Fleming said. “Without action it is increasingly clear that the key technologies on which we will rely for our future prosperity and security won’t be shaped and controlled by the West; we are now facing a moment of reckoning,” Fleming says.

Pulling no punches, Fleming addressed the battle for leadership and control of key technologies like AI.

Fleming said that AI is a major research focus, along with robotics, drone detection and quantum computing, which might offer new ways to protect your own communications or break into other people's. He outlined the case of MI5, Britain's domestic security agency, which has a limited number of agents to follow terrorist suspects or foreign spies on the streets of the UK. How do you work out the best locations to position those agents, knowing your target will be moving, while ensuring your agents are not spotted themselves? The answer is to use technology to create an artificial simulated environment, like an advanced computer game mirroring the real world. This would allow staff to model different outcomes and work out how to maximise coverage of the suspect with minimal risk of discovery. 

if Britain wants to remain a global cyber power then it would have to develop "sovereign" quantum technologies, including cryptographic technologies, to protect sensitive information and capabilities.

Fleming said Quantum Computing, which uses the phenomena of quantum mechanics to deliver a leap forward in computation, was getting closer and posed huge opportunities but also risks. The West should forge ahead with developing quantum-proof algorithms, he said, "so we're also prepared for those adversaries who might use a quantum computer to look back at things that we currently think are secure".

This message has been reinforced by Professor Anthony Finkelstein, the outgoing British Chief Scientific adviser for national security. 

Prof. Finkelstein points to a series of challenges the UK faces in maintaining an edge. One is keeping pace with exponential technological change which fundamentally challenges the operating model of intelligence agencies.  The next is that "the focus for technological leadership is moving eastwards", he said in an echo of Fleming's remarks. Science and technology has itself become the focus for geopolitical competition. "It's a domain in which power is contested and which defines a state's capability," according to Finkelstein.

Britain should not take its status as a cyber power for granted, and it should work on developing “sovereign technologies” such as high-speed quantum computing and cryptographic technology to protect sensitive information, Fleming said. 

Brookings:       Metro:       SCMP:        Economic Times:      Bloomberg:      AP News:      Reuters:     BBC

You Might Also Read: 

The Cyber Security Top Ten Power List:

 

« Bad Cyber Security Behavior At Home Risks Being Taken Back To Work
2021 - Inside The Dark Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

SecDev

SecDev

SecDev is a consulting firm working at the intersection of geopolitical, digital, urban, energy and cyber risk.

Zadara Storage

Zadara Storage

Zadara provide complete data backup and protection delivered as a fully-managed service.

Swedish Civil Contingencies Agency (MSB)

Swedish Civil Contingencies Agency (MSB)

MSB's Information Assurance Department is responsible for supporting and coordinating work relating to Sweden's national societal information security.

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

Norsk Akkreditering

Norsk Akkreditering

Norsk Akkreditering is the national accreditation body for Norway. The directory of members provides details of organisations offering certification services for ISO 27001.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

ADVA Optical Networking

ADVA Optical Networking

ADVA is a company founded on innovation and focused on helping our customers succeed. Our technology forms the building blocks of a shared digital future and empowers networks across the globe.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

Black Belt Secure

Black Belt Secure

We provide critical cybersecurity services such as managed security, ransomware mitigation, penetration testing, system auditing and compliance services to your organization.

Hakai Security

Hakai Security

Hakai is a consulting firm specializing in information security that offers customized services and products to meet the needs and goals of each business.