Data Privacy Is Key To The Technology Battle With China

The US needs to get together with its allies to set privacy standards around new technologies like AI, according the President Biden's National Security Advisor, Jake Sullivan. Speaking at the recent summit meeting of the National Security Commission for Artificial Intelligence (NSCAI) Sullivan said that actions  aimed at setting multinational standards on 5G and other new technologies are now urgently needed.

One such initiative is the Quad Critical and Emerging Technology Working Group, composed of representatives from India, Australia, Japan and the United States, but with this project a number of disagreements have emerged over consumer data and how some American companies were treating it. 

In 2018, the EU used the the General Data Protection Regulation (GDPR) against US companies that were using European user data and the EU has continued to restrict data sharing. However, Sullivan said concerns about privacy wouldn’t necessarily be a barrier to better US and allied partnership on AI

In fact, privacy concerns actually undersline the US and EU's shared values and provide an important contrast with less democratic states like China and Russia, Sullivan said.

“I actually think there are innovations in the space and standards we can set that will give us the advantage over those societies that instead have shredded any notion of privacy... The large majority of the world actually is not ready to sign onto a vision of the future that says you have absolutely no privacy. No Trust. No security… big data owned by the government,” he said. 

Sullivan focused on emerging technologies like “privacy-preserving machine learning,” that can allow machine learning algorithms to process data without revealing personal information in the data itself. Such technologies “promise to overcome data privacy challenges while still delivering the value of big data,” he said. That tracks closely with the NSCAI Commission Report, which sought to help the United States to compete on AI.  

As AI is emerging as a vital technology the will likely become one of the most powerful tools in for the benefit of humanity. According to Sullivan “These advances are not science fair experiments; they are improving life and unlocking mysteries of the natural world. They are the kind of discoveries for which the label “game changing” is not a cliché.”

Sullivan argues that the US can use diplomacy and alliances to advocate for establishing privacy-protecting technical standards and norms in international bodies to persuade other nations have an alternative to embracing Chinese technology.

This process is already underway following President Biden's recent Executive Order to increase government monitoring of the digital supply chain and connected devices, as well as the user data those devices collect. 

The Order states, “Connected software applications are designed to be used on an end-point computing device and include the ability to collect, process, or transmit data via the Internet as an integral functionality... Connected software applications can access and capture vast swaths of information from users, including personal information and proprietary business information... Such data collection threatens to provide foreign adversaries with access to that information, which in turn presents a significant threat to US national security.”

NSCAI:      DefenseOne:      Torres Trade Law:     Govt. of Australia:

You Might Also Read: 

China Plans For Supremacy In AI & Quantum Computing:

 

« Security Orchestration Can Help Business SOAR
Power Generation Systems Need Blockchain Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

National Trading Standards eCrime Team (NTSeCT)

National Trading Standards eCrime Team (NTSeCT)

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 260 certified security consultants helping companies and authorities prevent and manage cyber threats.

SoftLock

SoftLock

Softlock is a regional leader in Information Security providing solutions, consulting, integration and testing services to protect information assets, identities and supporting infrastructure.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

CyberForce Global

CyberForce Global

CyberForce Global are at the forefront of start-up technology recruitment in areas including cybersecurity, IT infrastructure, software, fintech, blockchain and more.

Softsource vBridge

Softsource vBridge

Softsource vBridge are an ICT systems integrator providing specialist technology solutions, professional services, technical expertise and data centre services.

Dialog Enterprise

Dialog Enterprise

Dialog Enterprise is the corporate ICT solutions arm of Dialog Axiata, Sri Lanka’s leading connectivity provider.