China Passes Controversial Counter-terrorism Law

cliparts

China has passed a controversial new anti-terrorism law recently that requires technology firms to help decrypt information, but not install security "backdoors" as initially planned, and allows the military to venture overseas on counter-terror operations.

Chinese officials say their country faces a growing threat from militants and separatists, especially in its unruly Western region of Xinjiang, where hundreds have died in violence in the past few years.

The law has attracted deep concern in Western capitals, not only because of worries it could violate human rights such as freedom of speech, but because of the cyber provisions. US President Barack Obama has said that he had raised concerns about the law directly with Chinese President Xi Jinping.

While a provision in an initial draft that would require companies to keep servers and user data within China was removed from the final law, technology companies will still have to provide help with sensitive encryption information if law enforcement authorities demand it.

Speaking after China's largely rubber-stamp parliament passed the law, Li Shouwei, deputy head of the parliament's criminal law division under the legislative affairs committee, said China was simply doing what other Western nations already do in asking technology firms to help fight terror.
"This rule accords with the actual work need of fighting terrorism and is basically the same as what other major countries in the world do," Li told reporters.

This will not affect the normal operation of tech companies and they have nothing to fear in terms of having "backdoors" installed or losing intellectual property rights, he added. The installing of security "backdoors" was also initially mooted by China for the law.

Officials in Washington have argued the law, combined with new draft banking and insurance rules and a slew of anti-trust investigations, amounts to unfair regulatory pressure targeting foreign companies.

China's national security law adopted in July requires all key network infrastructure and information systems to be "secure and controllable".
The anti-terrorism law also permits the People's Liberation Army to get involved in anti-terrorism operations overseas, though experts have said China faces big practical and diplomatic problems if it ever wants to do this.

An Weixing, head of the Public Security Ministry's counter-terrorism division, said China faced a serious threat from terrorists, especially "East Turkestan" forces, China's general term for Islamists separatists it says operate in Xinjiang.

"Terrorism is the public enemy of mankind, and the Chinese government will oppose all forms of terrorism," An said.

Rights groups, though, doubt the existence of a cohesive militant group in Xinjiang and say the unrest mostly stems from anger among the region's Muslim Uighur people over restrictions on their religion and culture.

The new law also restricts the right of media to report on details of terror attacks, including a provision that media and social media cannot report on details of terror activities that might lead to imitation, nor show scenes that are "cruel and inhuman".

Reuters: http://reut.rs/1IxTMB5

« North Korea's 'Paranoid' Computer Operating System
Investing In Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Government Communications Headquarters (GCHQ)

Government Communications Headquarters (GCHQ)

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

Cyber Indemnity Solutions (CIS)

Cyber Indemnity Solutions (CIS)

CIS is an InsurTech company focused on licensing innovative cyber risk insurance solutions to the global insurance industry.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

Lawley Insurance

Lawley Insurance

Lawley is a full-service, independent insurance agency. Specialty insurance products include Cyber Security.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

Swiss CyberSecurity

Swiss CyberSecurity

Swiss CyberSecurity is a non-profit group based in Geneva, set up to provide information and as a forum for discussion of topics related to CyberSecurity.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

Tonex

Tonex

Tonex providing industry-leading technology training, courses, seminars, workshops, and consulting services to companies and government organizations around the world.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.

Quantum Squint

Quantum Squint

Quantum Squint is a cutting-edge cybersecurity company specializing in the use of advanced regression management techniques to detect, analyze, and prevent vulnerabilities in digital systems.