China Is Gaining Technical Supremacy

Artificial Intelligence (AI) is a potentially transformational technology that will have broad social, economic, national security, and geopolitical implications for the UK, US and around the world. 

“Significant technology leadership is moving East” and causing a conflict of interests and values, Jeremy Fleming, director of government electronic surveillance agency GCHQ, said in a recent speech, warning that Western nations risk losing control of their Internet security.

GCHQ gathers communications from around the world to identify and disrupt threats to Britain and has a close relationship with the US National Security Agency and with the eavesdropping agencies of Australia, Canada and New Zealand in a consortium called "Five Eyes". 

Russia remains the biggest immediate threat to the West but China's long-term dominance of technology poses a much bigger problem, according to Fleming.

The West must urgently act to ensure China does not dominate important emerging technologies and gain control of the "global operating system", Fleming said. “Without action it is increasingly clear that the key technologies on which we will rely for our future prosperity and security won’t be shaped and controlled by the West; we are now facing a moment of reckoning,” Fleming says.

Pulling no punches, Fleming addressed the battle for leadership and control of key technologies like AI.

Fleming said that AI is a major research focus, along with robotics, drone detection and quantum computing, which might offer new ways to protect your own communications or break into other people's. He outlined the case of MI5, Britain's domestic security agency, which has a limited number of agents to follow terrorist suspects or foreign spies on the streets of the UK. How do you work out the best locations to position those agents, knowing your target will be moving, while ensuring your agents are not spotted themselves? The answer is to use technology to create an artificial simulated environment, like an advanced computer game mirroring the real world. This would allow staff to model different outcomes and work out how to maximise coverage of the suspect with minimal risk of discovery. 

if Britain wants to remain a global cyber power then it would have to develop "sovereign" quantum technologies, including cryptographic technologies, to protect sensitive information and capabilities.

Fleming said Quantum Computing, which uses the phenomena of quantum mechanics to deliver a leap forward in computation, was getting closer and posed huge opportunities but also risks. The West should forge ahead with developing quantum-proof algorithms, he said, "so we're also prepared for those adversaries who might use a quantum computer to look back at things that we currently think are secure".

This message has been reinforced by Professor Anthony Finkelstein, the outgoing British Chief Scientific adviser for national security. 

Prof. Finkelstein points to a series of challenges the UK faces in maintaining an edge. One is keeping pace with exponential technological change which fundamentally challenges the operating model of intelligence agencies.  The next is that "the focus for technological leadership is moving eastwards", he said in an echo of Fleming's remarks. Science and technology has itself become the focus for geopolitical competition. "It's a domain in which power is contested and which defines a state's capability," according to Finkelstein.

Britain should not take its status as a cyber power for granted, and it should work on developing “sovereign technologies” such as high-speed quantum computing and cryptographic technology to protect sensitive information, Fleming said. 

Brookings:       Metro:       SCMP:        Economic Times:      Bloomberg:      AP News:      Reuters:     BBC

You Might Also Read: 

The Cyber Security Top Ten Power List:

 

« Bad Cyber Security Behavior At Home Risks Being Taken Back To Work
2021 - Inside The Dark Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

Malomatia

Malomatia

Malomatia is a leading provider of technology services and solutions in Qatar including information security.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

International Cybersecurity Forum (FIC)

International Cybersecurity Forum (FIC)

The International Cybersecurity Forum (FIC) has established itself as the benchmark event in Europe in terms of digital security and trust.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Vertex Cyber Security

Vertex Cyber Security

Vertex provide Cyber Security Services to small to large businesses including Advise, Consulting, Adding Security Partnership, Penetration Testing, ISO 27001-2 and Audits.

Intel Ignite

Intel Ignite

Intel Ignite is an internationally renowned acceleration program for early-stage deep tech startups.

Cyber and Fraud Centre – Scotland

Cyber and Fraud Centre – Scotland

The Cyber and Fraud Centre – Scotland exists to ensure Scottish organisations are as resilient as they can be against cyber and fraud crime.

Umbrella Cyber

Umbrella Cyber

Umbrella Cyber specialises in Cyber Essentials and Cyber Essentials Plus Certification and penetration testing.

Trofi Security

Trofi Security

Trofi Security provides Information Technology and Information Security services to organizations in both the public and private sectors.