Data Privacy Is Key To The Technology Battle With China

The US needs to get together with its allies to set privacy standards around new technologies like AI, according the President Biden's National Security Advisor, Jake Sullivan. Speaking at the recent summit meeting of the National Security Commission for Artificial Intelligence (NSCAI) Sullivan said that actions  aimed at setting multinational standards on 5G and other new technologies are now urgently needed.

One such initiative is the Quad Critical and Emerging Technology Working Group, composed of representatives from India, Australia, Japan and the United States, but with this project a number of disagreements have emerged over consumer data and how some American companies were treating it. 

In 2018, the EU used the the General Data Protection Regulation (GDPR) against US companies that were using European user data and the EU has continued to restrict data sharing. However, Sullivan said concerns about privacy wouldn’t necessarily be a barrier to better US and allied partnership on AI

In fact, privacy concerns actually undersline the US and EU's shared values and provide an important contrast with less democratic states like China and Russia, Sullivan said.

“I actually think there are innovations in the space and standards we can set that will give us the advantage over those societies that instead have shredded any notion of privacy... The large majority of the world actually is not ready to sign onto a vision of the future that says you have absolutely no privacy. No Trust. No security… big data owned by the government,” he said. 

Sullivan focused on emerging technologies like “privacy-preserving machine learning,” that can allow machine learning algorithms to process data without revealing personal information in the data itself. Such technologies “promise to overcome data privacy challenges while still delivering the value of big data,” he said. That tracks closely with the NSCAI Commission Report, which sought to help the United States to compete on AI.  

As AI is emerging as a vital technology the will likely become one of the most powerful tools in for the benefit of humanity. According to Sullivan “These advances are not science fair experiments; they are improving life and unlocking mysteries of the natural world. They are the kind of discoveries for which the label “game changing” is not a cliché.”

Sullivan argues that the US can use diplomacy and alliances to advocate for establishing privacy-protecting technical standards and norms in international bodies to persuade other nations have an alternative to embracing Chinese technology.

This process is already underway following President Biden's recent Executive Order to increase government monitoring of the digital supply chain and connected devices, as well as the user data those devices collect. 

The Order states, “Connected software applications are designed to be used on an end-point computing device and include the ability to collect, process, or transmit data via the Internet as an integral functionality... Connected software applications can access and capture vast swaths of information from users, including personal information and proprietary business information... Such data collection threatens to provide foreign adversaries with access to that information, which in turn presents a significant threat to US national security.”

NSCAI:      DefenseOne:      Torres Trade Law:     Govt. of Australia:

You Might Also Read: 

China Plans For Supremacy In AI & Quantum Computing:

 

« Security Orchestration Can Help Business SOAR
Power Generation Systems Need Blockchain Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

Wallarm

Wallarm

Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Aiuken Cybersecurity

Aiuken Cybersecurity

Aiuken is an international IT Security company, focused on communications and IT technologies, specialised in Security and Cloud Services solutions with high added value.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

Navixia

Navixia

As a leading Swiss IT security specialist, Navixia offers a global and pragmatic approach to information security.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

National Cryptologic Foundation (NCF) - USA

National Cryptologic Foundation (NCF) - USA

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.