China Wants FBI’s Help With Internet Security

China wants to have deeper Internet security, anti-terrorism and corruption cooperation with the United States, Chinese security officials told the visiting director of the FBI, state news agency Xinhua says.

Meeting in Beijing, Public Security Minister Guo Shengkun, told James B. Comey that China was willing to enhance strategic mutual trust and the respect of each others core interests, Xinhua said.

The two countries should "deepen law enforcement and security cooperation in the fields of Internet security and counter-terrorism", the report paraphrased Guo as saying.

Comey said the Federal Bureau of Investigation was willing to push forward pragmatic cooperation, Xinhua said. The report did not elaborate.

Hacking has been a sore spot in US-China relations. In September, President Barack Obama said he and Chinese President Xi Jinping had agreed that neither government would knowingly support cyber theft of corporate secrets to support domestic businesses.

China has also been seeking more counter-terrorism cooperation with Western countries, which the West has generally been unwilling to give, fearful of complicity in possible human rights abuses in China.

China has blamed Islamist militants for violence in its far western region of Xinjiang, where hundreds have been killed in the last few years. Rights groups and exiles say the problem stems more from anger at Chinese controls on the religion and culture of the Muslim Uighur people who call Xinjiang home, rather than from any cohesive militant group. China strongly denies any rights abuses in Xinjiang or elsewhere.

In a separate report recently, Xinhua cited domestic security chief Meng Jianzhu as telling Comey that China also wants more cooperation on recovering corrupt officials who have fled overseas, and their assets. The report also did not elaborate.

Last year, China pursued and brought home more than 600 suspected corrupt officials in a strategy dubbed "Operation Fox Hunt", as it widens a crackdown on deep-rooted graft launched by President Xi Jinping upon becoming Communist Party chief in late 2012.

Reuters: http://reut.rs/21xhssv

« U-Upload : Knowledge Straight To Your Brain
Is Apple Right To Resist The FBI? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

Conceptivity +360 Cybersecurity

Conceptivity +360 Cybersecurity

Conceptivity +360 Security addresses advanced cybersecurity and supply chain security issues in policy, regulatory, legislation, standardisation, compliance and project management areas.

Cybercrime Support Network (CSN)

Cybercrime Support Network (CSN)

CSN is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime.

Marcus Donald People

Marcus Donald People

Marcus Donald People is a UK IT recruitment specialist covering the following sectors: Infrastructure & Cloud, Information Security, Development, Business transformation.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Darkstrike / Qeros

Darkstrike / Qeros

Complete your defense in-depth strategy with Darkstrike, the world’s most advanced quantum-secure and ransomware-proof data platform for any use case, ensuring unconditional data security.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.

NST Cyber

NST Cyber

NST Cyber provides comprehensive Threat Exposure Management to Global banks and Forbes 2000 companies.

Cyvore Security

Cyvore Security

Cyvore combines cutting-edge AI, machine learning, and behavioral analytics to detect, investigate, and neutralize threats before they compromise your organization.