China Is Gaining Technical Supremacy

Artificial Intelligence (AI) is a potentially transformational technology that will have broad social, economic, national security, and geopolitical implications for the UK, US and around the world. 

“Significant technology leadership is moving East” and causing a conflict of interests and values, Jeremy Fleming, director of government electronic surveillance agency GCHQ, said in a recent speech, warning that Western nations risk losing control of their Internet security.

GCHQ gathers communications from around the world to identify and disrupt threats to Britain and has a close relationship with the US National Security Agency and with the eavesdropping agencies of Australia, Canada and New Zealand in a consortium called "Five Eyes". 

Russia remains the biggest immediate threat to the West but China's long-term dominance of technology poses a much bigger problem, according to Fleming.

The West must urgently act to ensure China does not dominate important emerging technologies and gain control of the "global operating system", Fleming said. “Without action it is increasingly clear that the key technologies on which we will rely for our future prosperity and security won’t be shaped and controlled by the West; we are now facing a moment of reckoning,” Fleming says.

Pulling no punches, Fleming addressed the battle for leadership and control of key technologies like AI.

Fleming said that AI is a major research focus, along with robotics, drone detection and quantum computing, which might offer new ways to protect your own communications or break into other people's. He outlined the case of MI5, Britain's domestic security agency, which has a limited number of agents to follow terrorist suspects or foreign spies on the streets of the UK. How do you work out the best locations to position those agents, knowing your target will be moving, while ensuring your agents are not spotted themselves? The answer is to use technology to create an artificial simulated environment, like an advanced computer game mirroring the real world. This would allow staff to model different outcomes and work out how to maximise coverage of the suspect with minimal risk of discovery. 

if Britain wants to remain a global cyber power then it would have to develop "sovereign" quantum technologies, including cryptographic technologies, to protect sensitive information and capabilities.

Fleming said Quantum Computing, which uses the phenomena of quantum mechanics to deliver a leap forward in computation, was getting closer and posed huge opportunities but also risks. The West should forge ahead with developing quantum-proof algorithms, he said, "so we're also prepared for those adversaries who might use a quantum computer to look back at things that we currently think are secure".

This message has been reinforced by Professor Anthony Finkelstein, the outgoing British Chief Scientific adviser for national security. 

Prof. Finkelstein points to a series of challenges the UK faces in maintaining an edge. One is keeping pace with exponential technological change which fundamentally challenges the operating model of intelligence agencies.  The next is that "the focus for technological leadership is moving eastwards", he said in an echo of Fleming's remarks. Science and technology has itself become the focus for geopolitical competition. "It's a domain in which power is contested and which defines a state's capability," according to Finkelstein.

Britain should not take its status as a cyber power for granted, and it should work on developing “sovereign technologies” such as high-speed quantum computing and cryptographic technology to protect sensitive information, Fleming said. 

Brookings:       Metro:       SCMP:        Economic Times:      Bloomberg:      AP News:      Reuters:     BBC

You Might Also Read: 

The Cyber Security Top Ten Power List:

 

« Bad Cyber Security Behavior At Home Risks Being Taken Back To Work
2021 - Inside The Dark Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Astra

Astra

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

NRI Secure Technologies

NRI Secure Technologies

NRI SecureTechnologies is a Cybersecurity group company of the Nomura Research Institute (NRI) and a global provider of next-generation Managed Security Services and Security Consulting.

Quick Heal Technologies

Quick Heal Technologies

Quick Heal Technologies is a leading IT security solutions provider focused on endpoint and network security solutions.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

ITRenew

ITRenew

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services.

DataTribe

DataTribe

DataTribe is a cyber startup foundry, leveraging deep experience and expertise to build and launch successful product companies.

Quintillion Consulting

Quintillion Consulting

Quintillion Consulting is a strategic risk based consulting firm. We help companies safeguard the core business and IT capabilities that deliver competitive advantage.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

North West Cyber Resilience Centre (NWCRC)

North West Cyber Resilience Centre (NWCRC)

The North West Cyber Resilience Centre is a trusted, not-for-profit venture between Greater Manchester Police and Manchester Digital.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

SkillsDA

SkillsDA

SkillsDA is pureplay company in cyber security involved in capacity building towards National Security.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.