China Passes Controversial Counter-terrorism Law

cliparts

China has passed a controversial new anti-terrorism law recently that requires technology firms to help decrypt information, but not install security "backdoors" as initially planned, and allows the military to venture overseas on counter-terror operations.

Chinese officials say their country faces a growing threat from militants and separatists, especially in its unruly Western region of Xinjiang, where hundreds have died in violence in the past few years.

The law has attracted deep concern in Western capitals, not only because of worries it could violate human rights such as freedom of speech, but because of the cyber provisions. US President Barack Obama has said that he had raised concerns about the law directly with Chinese President Xi Jinping.

While a provision in an initial draft that would require companies to keep servers and user data within China was removed from the final law, technology companies will still have to provide help with sensitive encryption information if law enforcement authorities demand it.

Speaking after China's largely rubber-stamp parliament passed the law, Li Shouwei, deputy head of the parliament's criminal law division under the legislative affairs committee, said China was simply doing what other Western nations already do in asking technology firms to help fight terror.
"This rule accords with the actual work need of fighting terrorism and is basically the same as what other major countries in the world do," Li told reporters.

This will not affect the normal operation of tech companies and they have nothing to fear in terms of having "backdoors" installed or losing intellectual property rights, he added. The installing of security "backdoors" was also initially mooted by China for the law.

Officials in Washington have argued the law, combined with new draft banking and insurance rules and a slew of anti-trust investigations, amounts to unfair regulatory pressure targeting foreign companies.

China's national security law adopted in July requires all key network infrastructure and information systems to be "secure and controllable".
The anti-terrorism law also permits the People's Liberation Army to get involved in anti-terrorism operations overseas, though experts have said China faces big practical and diplomatic problems if it ever wants to do this.

An Weixing, head of the Public Security Ministry's counter-terrorism division, said China faced a serious threat from terrorists, especially "East Turkestan" forces, China's general term for Islamists separatists it says operate in Xinjiang.

"Terrorism is the public enemy of mankind, and the Chinese government will oppose all forms of terrorism," An said.

Rights groups, though, doubt the existence of a cohesive militant group in Xinjiang and say the unrest mostly stems from anger among the region's Muslim Uighur people over restrictions on their religion and culture.

The new law also restricts the right of media to report on details of terror attacks, including a provision that media and social media cannot report on details of terror activities that might lead to imitation, nor show scenes that are "cruel and inhuman".

Reuters: http://reut.rs/1IxTMB5

« North Korea's 'Paranoid' Computer Operating System
Investing In Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

Tech Industry Forum (TIF)

Tech Industry Forum (TIF)

Tech Industry Forum is a not-for-profit, membership driven trade body. We bring together end users and some of the UK’s leading cloud, software, platform, infrastructure, and service providers.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

NTIC Cyber Center

NTIC Cyber Center

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

CSC Digital Brand Services

CSC Digital Brand Services

Our brand protection and security expertise give our customers peace of mind that no matter how fast the digital world changes, their intellectual property and digital assets will be secure.

Blackfoot Cybersecurity

Blackfoot Cybersecurity

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations.

Onclave Networks

Onclave Networks

Onclave Networks is a global cybersecurity leader, transforming the future of securing all IT/OT devices and systems.

Single Point of Contact

Single Point of Contact

Single Point of Contact is a Managed IT Services provider that helps businesses to achieve a seamless and secure IT environment.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.

iTRUSTXForce

iTRUSTXForce

iTRUSTXForce is a global provider of DigitalX (cybersecurity, privacy, and digital trust) services. We offer comprehensive services that focus on delivering outcomes for our clients.

Cyber Security Certification Australia (CSCAU)

Cyber Security Certification Australia (CSCAU)

CSCAU is the world’s first 'for mission' industry council set up to address small and medium-sized business (SMB) cyber resilience through annually updated certifiable standards.