China Passes Controversial Counter-terrorism Law

cliparts

China has passed a controversial new anti-terrorism law recently that requires technology firms to help decrypt information, but not install security "backdoors" as initially planned, and allows the military to venture overseas on counter-terror operations.

Chinese officials say their country faces a growing threat from militants and separatists, especially in its unruly Western region of Xinjiang, where hundreds have died in violence in the past few years.

The law has attracted deep concern in Western capitals, not only because of worries it could violate human rights such as freedom of speech, but because of the cyber provisions. US President Barack Obama has said that he had raised concerns about the law directly with Chinese President Xi Jinping.

While a provision in an initial draft that would require companies to keep servers and user data within China was removed from the final law, technology companies will still have to provide help with sensitive encryption information if law enforcement authorities demand it.

Speaking after China's largely rubber-stamp parliament passed the law, Li Shouwei, deputy head of the parliament's criminal law division under the legislative affairs committee, said China was simply doing what other Western nations already do in asking technology firms to help fight terror.
"This rule accords with the actual work need of fighting terrorism and is basically the same as what other major countries in the world do," Li told reporters.

This will not affect the normal operation of tech companies and they have nothing to fear in terms of having "backdoors" installed or losing intellectual property rights, he added. The installing of security "backdoors" was also initially mooted by China for the law.

Officials in Washington have argued the law, combined with new draft banking and insurance rules and a slew of anti-trust investigations, amounts to unfair regulatory pressure targeting foreign companies.

China's national security law adopted in July requires all key network infrastructure and information systems to be "secure and controllable".
The anti-terrorism law also permits the People's Liberation Army to get involved in anti-terrorism operations overseas, though experts have said China faces big practical and diplomatic problems if it ever wants to do this.

An Weixing, head of the Public Security Ministry's counter-terrorism division, said China faced a serious threat from terrorists, especially "East Turkestan" forces, China's general term for Islamists separatists it says operate in Xinjiang.

"Terrorism is the public enemy of mankind, and the Chinese government will oppose all forms of terrorism," An said.

Rights groups, though, doubt the existence of a cohesive militant group in Xinjiang and say the unrest mostly stems from anger among the region's Muslim Uighur people over restrictions on their religion and culture.

The new law also restricts the right of media to report on details of terror attacks, including a provision that media and social media cannot report on details of terror activities that might lead to imitation, nor show scenes that are "cruel and inhuman".

Reuters: http://reut.rs/1IxTMB5

« North Korea's 'Paranoid' Computer Operating System
Investing In Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Zybert Computing

Zybert Computing

Zybert Computing provide server solutions with built-in security and information protection features for the SME market.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

AppRiver

AppRiver

AppRiver is a global provider of cloud-based email and web security solutions that protect businesses worldwide from today's ever-changing online threats.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

Zix

Zix

Zix offers secure email encryption, threat protection, archiving, DLP and BYOD security for hospitals, financial services, government, and more.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Octiga

Octiga

Octiga is an office 365 cloud security provider. It offers Office 365 monitoring, incident response and recovery tools.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Technation

Technation

Technation proudly represents the Canadian technology companies that are furthering our nation and the world into the future through innovation, creativity and ingenuity.