Data Privacy Is Key To The Technology Battle With China

The US needs to get together with its allies to set privacy standards around new technologies like AI, according the President Biden's National Security Advisor, Jake Sullivan. Speaking at the recent summit meeting of the National Security Commission for Artificial Intelligence (NSCAI) Sullivan said that actions  aimed at setting multinational standards on 5G and other new technologies are now urgently needed.

One such initiative is the Quad Critical and Emerging Technology Working Group, composed of representatives from India, Australia, Japan and the United States, but with this project a number of disagreements have emerged over consumer data and how some American companies were treating it. 

In 2018, the EU used the the General Data Protection Regulation (GDPR) against US companies that were using European user data and the EU has continued to restrict data sharing. However, Sullivan said concerns about privacy wouldn’t necessarily be a barrier to better US and allied partnership on AI

In fact, privacy concerns actually undersline the US and EU's shared values and provide an important contrast with less democratic states like China and Russia, Sullivan said.

“I actually think there are innovations in the space and standards we can set that will give us the advantage over those societies that instead have shredded any notion of privacy... The large majority of the world actually is not ready to sign onto a vision of the future that says you have absolutely no privacy. No Trust. No security… big data owned by the government,” he said. 

Sullivan focused on emerging technologies like “privacy-preserving machine learning,” that can allow machine learning algorithms to process data without revealing personal information in the data itself. Such technologies “promise to overcome data privacy challenges while still delivering the value of big data,” he said. That tracks closely with the NSCAI Commission Report, which sought to help the United States to compete on AI.  

As AI is emerging as a vital technology the will likely become one of the most powerful tools in for the benefit of humanity. According to Sullivan “These advances are not science fair experiments; they are improving life and unlocking mysteries of the natural world. They are the kind of discoveries for which the label “game changing” is not a cliché.”

Sullivan argues that the US can use diplomacy and alliances to advocate for establishing privacy-protecting technical standards and norms in international bodies to persuade other nations have an alternative to embracing Chinese technology.

This process is already underway following President Biden's recent Executive Order to increase government monitoring of the digital supply chain and connected devices, as well as the user data those devices collect. 

The Order states, “Connected software applications are designed to be used on an end-point computing device and include the ability to collect, process, or transmit data via the Internet as an integral functionality... Connected software applications can access and capture vast swaths of information from users, including personal information and proprietary business information... Such data collection threatens to provide foreign adversaries with access to that information, which in turn presents a significant threat to US national security.”

NSCAI:      DefenseOne:      Torres Trade Law:     Govt. of Australia:

You Might Also Read: 

China Plans For Supremacy In AI & Quantum Computing:

 

« Security Orchestration Can Help Business SOAR
Power Generation Systems Need Blockchain Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

RSA Insurance Group

RSA Insurance Group

RSA is one of the world’s leading multinational quoted insurance groups. Commercial services include cyber risk insurance.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

LIFARS

LIFARS

LIFARS is a global leader in Digital Forensics and Cyber Resiliency Services.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

National Authority for Electronic Certification and Cyber Security (AKCESK)

National Authority for Electronic Certification and Cyber Security (AKCESK)

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

British Blockchain Association (BBA)

British Blockchain Association (BBA)

British Blockchain Association (BBA) is a not-for-profit organisation that promotes evidence-based adoption of Blockchain and Distributed Ledger Technologies (DLT) across the public and private sector

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Shearwater Group

Shearwater Group

Shearwater Group is an award-winning organisational resilience group that provides cyber security, advisory and managed security services to help secure businesses in a connected global economy.

ZARIOT

ZARIOT

ZARIOT's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.