US Takes Aim at Illicit Advanced Technology Reaching China – BankInfoSecurity.com

Governance & Risk Management , Standards, Regulations & Compliance
The U.S. government on Thursday unveiled a task force aimed at preventing advanced technology from reaching repressive regimes, including the People’s Republic of China.
See Also: Live Webinar | Protect and Govern Sensitive Data
The task force’s work will focus on investigating and prosecuting criminal violations of export laws domestically and internationally in cooperation with allies.
Speaking to an audience at London think tank Chatham House, U.S. Deputy Attorney General Lisa O. Monaco decried autocracies that “seek tactical advantage through the acquisition, use, and abuse of America’s most innovative technology.”
“We will use intelligence and data analytics to target illicit actors, enhance public-private partnerships to harden supply chains, and identify early warning of threats to our critical assets, like semiconductors,” Monaco said.
The task force will be led by personnel in the Justice Department’s National Security Division and the Department of Commerce’s Bureau of Industry and Security.
Among the key technologies that will demand task force attention are artificial intelligence and cryptocurrency, Monaco said.
China’s appetite for Western advanced technology will also be a large focus of the task force, and Monaco repeated a common warning that Chinese domestic law requires companies operating there to cooperate with intelligence agencies, “which requires turning over data to the state.”
The task force will closely monitor the flow of capital to private technology companies and observe how the adversary nations are using the investment to prevent them from gaining “national security advantage,” Monaco added.
Her announcement comes at a moment of increased tension between China and the United States after President Joe Biden ordered the military to shoot down a Chinese spy balloon in American airspace. Even without the balloon incident, tensions between the two countries have mounted over multiple areas of disagreement that include sustained Chinese state-sponsored hacking of U.S. intellectual property and personal data (see: Feds: Chinese Hacking Group Undeterred by Indictment).
Senior Correspondent, ISMG
Asokan is a U.K.-based senior correspondent for Information Security Media Group’s global news desk. She previously worked with IDG and other publications, reporting on developments in technology, minority rights and education.

Covering topics in risk management, compliance, fraud, and information security.
By submitting this form you agree to our Privacy & GDPR Statement
whitepaper
whitepaper
whitepaper
whitepaper

Cloud Security
Critical Infrastructure Security
Critical Infrastructure Security
Endpoint Security
HIPAA/HITECH
Continue »
90 minutes · Premium OnDemand 
Overview
From heightened risks to increased regulations, senior leaders at all levels are pressured to improve their organizations’ risk management capabilities. But no one is showing them how – until now.
Learn the fundamentals of developing a risk management program from the man who wrote the book on the topic: Ron Ross, computer scientist for the National Institute of Standards and Technology. In an exclusive presentation, Ross, lead author of NIST Special Publication 800-37 – the bible of risk assessment and management – will share his unique insights on how to:
Sr. Computer Scientist & Information Security Researcher, National Institute of Standards and Technology (NIST)
Was added to your briefcase
US Takes Aim at Illicit Advanced Technology Reaching China
US Takes Aim at Illicit Advanced Technology Reaching China
Sign in now
Need help registering?
Contact support
Complete your profile and stay up to date
Contact Support
Create an ISMG account now
Create an ISMG account now
Need help registering?
Contact support
Sign in now
Need help registering?
Contact support
Sign in now
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.

source

Leave a Comment