Wednesday, January 19, 2022
More

    Latest Posts

    How to avoid falling into China’s ‘data trap’ – TechCrunch

    The TechCrunch Global Affairs Project Examine the increasingly intertwined relationships between the technology sector and global politics.

    Recent prominent data breaches such as hacking Personnel management room, Airline passengers With a list Hotel guests The data reveal how vulnerable both public and private systems remain to espionage and cybercrime. Less obvious is how foreign adversaries or competitors may target data that is less clearly relevant in terms of national security or espionage. Today, public opinion data, such as the types of data advertisers use to analyze consumer preferences, is as strategically valuable as traditional military objectives. As the definition of strategically valuable things becomes more and more ambiguous, the ability to identify and protect strategic data will become an increasingly complex and important national security challenge.

    This is especially true for people in nation-states like China who seek access to strategic data and use it to develop toolkits against adversaries.Last month, MI6 Chief Richard Moore I explained the threat About China’s “data trap”: “If you give other countries access to really important data about your society, over time you erode sovereignty, you lose control of that data,” Moore said. Insisted. And most governments are just beginning to grasp this threat.

    In last month’s parliamentary testimony, I insisted To defend democracy now, we need to better understand how certain datasets are collected and used by foreign enemies, especially China. Also, in the future, if you want to properly defend (and prioritize) the datasets you want to protect, you need to imagine how attackers would use them.

    The use of Chinese state technology to strengthen authoritarian control is a topic received Considerable attention in recent years. Targeting people in the Xinjiang Uygur Autonomous Region has been the focus of this discussion, aided by the invasive and highly compulsory use of surveillance technology. So, of course, when most people think about the risks of China’s “technical authoritarianism” globalizing, they also think about how invasive surveillance is globalized. However, the real problem is much more important and less detectable due to the nature of the digital and data-driven technologies involved.

    The Chinese Communist Party is already using big data collection to support efforts to create, manage and control a global operational environment. We understand that aggregating data that does not seem to be important in itself can bring enormous strategic value. Advertisers can use public opinion data to sell to us what they didn’t know they needed. Hostile actors, on the other hand, could use this data to inform promotional activities that overturn democratic discourse on digital platforms.

    The United States and other countries are properly focused on the risks of malicious cyber intrusions such as those mentioned above. OPM, Marriott When United Airlines Incidents caused by China-based attackers — however, data access does not have to be derived from malicious intrusion or tampering. Digital supply chain.. It simply requires adversaries like the state of China to abuse the usual legitimate business relationships that result in downstream data sharing. These routes have already been developed and are most visible due to mechanisms such as recently enacted data security legislation and other national security practices in China.

    Creating a legal framework for accessing data is the only way China is working to ensure access to national and global datasets. Another way is to own the market.recently Report, My co-author and I found that in the technical field we searched, China filed the most patent applications compared to other countries, but did not have a correspondingly high impact factor. did.

    But this did not mean that Chinese companies were not in control. In China, the R & D incentive structure allows researchers to develop applications with specific policy goals. Companies own the market and can later improve their products. Chinese leaders are striving to achieve global market advantage and set global technical standards, with access to more data abroad and ultimately across different platforms. We are very aware of facilitating the integration of.

    China is working on ways to marry data that is otherwise unobtrusive and produce results that can be very obvious as a whole. After all, if you give it to your right hand, you can process any data and create value. For example, in my 2019 report,Engineering Global ConsentI explained this issue through a case study of Global Tone Communications Technology (GTCOM), a company managed by the advertising department that provides translation services through machine translation. According to the PR, GTCOM is also incorporating products into the supply chains of companies such as Huawei and Alibaba. However, GTCOM does more than just provide translation services.According to company officials, the data collected through business activities is “provided.[s] Technical support and support for national security. “

    In addition, the Chinese government will collect data that is clearly useless, assuming better technological capabilities in the future. The same technology that contributes to day-to-day problem solving and standard service delivery can simultaneously strengthen the political control of China’s one-party system at home and abroad.

    To deal with this growing problem, “Tech Race” Not like China. The problem is not just to develop competing features, but to imagine future use cases and know which datasets are worth protecting. States and organizations need to develop ways to assess the value of data and the value that it may retain for potential parties who may access it now or in the future.

    We have already underestimated this threat by assuming that authoritarian regimes like China will undermine as the world becomes more and more digitally interconnected. Democracy does not intend to self-correct in response to the problems posed by the application of authoritarian technology. Risks need to be reassessed to keep track of the current threat landscape. Otherwise, you run the risk of falling into a “data trap” in China.
    Read more from the TechCrunch Global Affairs Project

    How to avoid falling into China’s ‘data trap’ – TechCrunch Source link How to avoid falling into China’s ‘data trap’ – TechCrunch

    The post How to avoid falling into China’s ‘data trap’ – TechCrunch appeared first on California News Times.

    Source link

    Latest Posts

    Don't Miss

    Stay in touch

    To be updated with all the latest news, offers and special announcements.