Security News > 2023 > June > US cyber ambassador says China knows how to steal its way to dominance of cloud and AI
China has a playbook to use IP theft to seize leadership in cloud computing, and other nations should band together to stop that happening, according to Nathaniel C. Fick, the US ambassador-at-large for cyberspace and digital policy.
The ambassador described China's actions in the telecoms industry as "a playbook" and warned the nation will "Run it in cloud computing they will run it in AI, they will run it in every core strategic technology area that matters."
Fick also commented on AI - a technology he said might help Reg readers to tame messes made by their peers.
"One of the applicant good applications of AI that I'm most excited about is using AI to write better software. It's pretty exciting to see the bug rate go way down."
"The most dangerous course of action is the application of these technologies in lethal terms - so autonomous weapons biotechnology, to some extent cyber security, and the applications of AI to do really nefarious things using kind of existing lethal stuff."
Fick therefore suggested AI regulation needs to be a priority, as he believes its capabilities are growing exponentially and governments do not have the luxury of time to devise guardrails.
News URL
https://go.theregister.com/feed/www.theregister.com/2023/06/23/nate_fick_china_playbook_fightback/
Related news
- How AI Is Changing the Cloud Security and Risk Equation (source)
- China's Volt Typhoon reportedly breached Singtel in 'test-run' for US telecom attacks (source)
- Reminder: China-backed crews compromised 'multiple' US telcos in 'significant cyber espionage campaign' (source)
- Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage (source)
- T-Mobile US 'monitoring' China's 'industry-wide attack' amid fresh security breach fears (source)
- China has utterly pwned 'thousands and thousands' of devices at US telcos (source)
- Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks (source)