China Is Gaining Technical Supremacy

Artificial Intelligence (AI) is a potentially transformational technology that will have broad social, economic, national security, and geopolitical implications for the UK, US and around the world. 

“Significant technology leadership is moving East” and causing a conflict of interests and values, Jeremy Fleming, director of government electronic surveillance agency GCHQ, said in a recent speech, warning that Western nations risk losing control of their Internet security.

GCHQ gathers communications from around the world to identify and disrupt threats to Britain and has a close relationship with the US National Security Agency and with the eavesdropping agencies of Australia, Canada and New Zealand in a consortium called "Five Eyes". 

Russia remains the biggest immediate threat to the West but China's long-term dominance of technology poses a much bigger problem, according to Fleming.

The West must urgently act to ensure China does not dominate important emerging technologies and gain control of the "global operating system", Fleming said. “Without action it is increasingly clear that the key technologies on which we will rely for our future prosperity and security won’t be shaped and controlled by the West; we are now facing a moment of reckoning,” Fleming says.

Pulling no punches, Fleming addressed the battle for leadership and control of key technologies like AI.

Fleming said that AI is a major research focus, along with robotics, drone detection and quantum computing, which might offer new ways to protect your own communications or break into other people's. He outlined the case of MI5, Britain's domestic security agency, which has a limited number of agents to follow terrorist suspects or foreign spies on the streets of the UK. How do you work out the best locations to position those agents, knowing your target will be moving, while ensuring your agents are not spotted themselves? The answer is to use technology to create an artificial simulated environment, like an advanced computer game mirroring the real world. This would allow staff to model different outcomes and work out how to maximise coverage of the suspect with minimal risk of discovery. 

if Britain wants to remain a global cyber power then it would have to develop "sovereign" quantum technologies, including cryptographic technologies, to protect sensitive information and capabilities.

Fleming said Quantum Computing, which uses the phenomena of quantum mechanics to deliver a leap forward in computation, was getting closer and posed huge opportunities but also risks. The West should forge ahead with developing quantum-proof algorithms, he said, "so we're also prepared for those adversaries who might use a quantum computer to look back at things that we currently think are secure".

This message has been reinforced by Professor Anthony Finkelstein, the outgoing British Chief Scientific adviser for national security. 

Prof. Finkelstein points to a series of challenges the UK faces in maintaining an edge. One is keeping pace with exponential technological change which fundamentally challenges the operating model of intelligence agencies.  The next is that "the focus for technological leadership is moving eastwards", he said in an echo of Fleming's remarks. Science and technology has itself become the focus for geopolitical competition. "It's a domain in which power is contested and which defines a state's capability," according to Finkelstein.

Britain should not take its status as a cyber power for granted, and it should work on developing “sovereign technologies” such as high-speed quantum computing and cryptographic technology to protect sensitive information, Fleming said. 

Brookings:       Metro:       SCMP:        Economic Times:      Bloomberg:      AP News:      Reuters:     BBC

You Might Also Read: 

The Cyber Security Top Ten Power List:

 

« Bad Cyber Security Behavior At Home Risks Being Taken Back To Work
2021 - Inside The Dark Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Norwegian Information Security laboratory (NISlab)

Norwegian Information Security laboratory (NISlab)

NISlab conducts international competitive research in information and cyber security and operates study programs in this area.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Oceania Cyber Security Centre (OCSC)

Oceania Cyber Security Centre (OCSC)

OCSC engages with government and industry to conduct research, develop training opportunities and build capacity for responding to current and emerging cyber security issues.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

AppOmni

AppOmni

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance.

CentricalCyber

CentricalCyber

CentricalCyber is a cyber risk consultancy and NIST CSF specialist set up to help business leaders better understand and manage cyber risk.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

Carahsoft Technology Corp

Carahsoft Technology Corp

Carahsoft Technology is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

Assurestor

Assurestor

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience.