Data Privacy Is Key To The Technology Battle With China

The US needs to get together with its allies to set privacy standards around new technologies like AI, according the President Biden's National Security Advisor, Jake Sullivan. Speaking at the recent summit meeting of the National Security Commission for Artificial Intelligence (NSCAI) Sullivan said that actions  aimed at setting multinational standards on 5G and other new technologies are now urgently needed.

One such initiative is the Quad Critical and Emerging Technology Working Group, composed of representatives from India, Australia, Japan and the United States, but with this project a number of disagreements have emerged over consumer data and how some American companies were treating it. 

In 2018, the EU used the the General Data Protection Regulation (GDPR) against US companies that were using European user data and the EU has continued to restrict data sharing. However, Sullivan said concerns about privacy wouldn’t necessarily be a barrier to better US and allied partnership on AI

In fact, privacy concerns actually undersline the US and EU's shared values and provide an important contrast with less democratic states like China and Russia, Sullivan said.

“I actually think there are innovations in the space and standards we can set that will give us the advantage over those societies that instead have shredded any notion of privacy... The large majority of the world actually is not ready to sign onto a vision of the future that says you have absolutely no privacy. No Trust. No security… big data owned by the government,” he said. 

Sullivan focused on emerging technologies like “privacy-preserving machine learning,” that can allow machine learning algorithms to process data without revealing personal information in the data itself. Such technologies “promise to overcome data privacy challenges while still delivering the value of big data,” he said. That tracks closely with the NSCAI Commission Report, which sought to help the United States to compete on AI.  

As AI is emerging as a vital technology the will likely become one of the most powerful tools in for the benefit of humanity. According to Sullivan “These advances are not science fair experiments; they are improving life and unlocking mysteries of the natural world. They are the kind of discoveries for which the label “game changing” is not a cliché.”

Sullivan argues that the US can use diplomacy and alliances to advocate for establishing privacy-protecting technical standards and norms in international bodies to persuade other nations have an alternative to embracing Chinese technology.

This process is already underway following President Biden's recent Executive Order to increase government monitoring of the digital supply chain and connected devices, as well as the user data those devices collect. 

The Order states, “Connected software applications are designed to be used on an end-point computing device and include the ability to collect, process, or transmit data via the Internet as an integral functionality... Connected software applications can access and capture vast swaths of information from users, including personal information and proprietary business information... Such data collection threatens to provide foreign adversaries with access to that information, which in turn presents a significant threat to US national security.”

NSCAI:      DefenseOne:      Torres Trade Law:     Govt. of Australia:

You Might Also Read: 

China Plans For Supremacy In AI & Quantum Computing:

 

« Security Orchestration Can Help Business SOAR
Power Generation Systems Need Blockchain Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

WatchGuard

WatchGuard

WatchGuard is a leader in network security, secure Wi-Fi, and network intelligence products and services for SMBs and Enterprises worldwide.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

NFIR

NFIR

NFIR is a specialist in the field of cyber security incident response and digital forensics.

Learn How To Become

Learn How To Become

At LearnHowToBecome.org, our mission is to help any job-seeker understand what it takes to build and develop a career. We cover many specialist areas including cybersecurity.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

Trickest

Trickest

Trickest enables Enterprises, MSSPs, and Ethical Hackers to build automated offensive security workflows from prototype to production.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.

Interpres Security

Interpres Security

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure.

Prowler

Prowler

Prowler is at the forefront of the Open Cloud Security movement, championing a new era of transparency, customizability, and community-driven security for cloud environments.