China Wants FBI’s Help With Internet Security

China wants to have deeper Internet security, anti-terrorism and corruption cooperation with the United States, Chinese security officials told the visiting director of the FBI, state news agency Xinhua says.

Meeting in Beijing, Public Security Minister Guo Shengkun, told James B. Comey that China was willing to enhance strategic mutual trust and the respect of each others core interests, Xinhua said.

The two countries should "deepen law enforcement and security cooperation in the fields of Internet security and counter-terrorism", the report paraphrased Guo as saying.

Comey said the Federal Bureau of Investigation was willing to push forward pragmatic cooperation, Xinhua said. The report did not elaborate.

Hacking has been a sore spot in US-China relations. In September, President Barack Obama said he and Chinese President Xi Jinping had agreed that neither government would knowingly support cyber theft of corporate secrets to support domestic businesses.

China has also been seeking more counter-terrorism cooperation with Western countries, which the West has generally been unwilling to give, fearful of complicity in possible human rights abuses in China.

China has blamed Islamist militants for violence in its far western region of Xinjiang, where hundreds have been killed in the last few years. Rights groups and exiles say the problem stems more from anger at Chinese controls on the religion and culture of the Muslim Uighur people who call Xinjiang home, rather than from any cohesive militant group. China strongly denies any rights abuses in Xinjiang or elsewhere.

In a separate report recently, Xinhua cited domestic security chief Meng Jianzhu as telling Comey that China also wants more cooperation on recovering corrupt officials who have fled overseas, and their assets. The report also did not elaborate.

Last year, China pursued and brought home more than 600 suspected corrupt officials in a strategy dubbed "Operation Fox Hunt", as it widens a crackdown on deep-rooted graft launched by President Xi Jinping upon becoming Communist Party chief in late 2012.

Reuters: http://reut.rs/21xhssv

« U-Upload : Knowledge Straight To Your Brain
Is Apple Right To Resist The FBI? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CS Group

CS Group

CS Group offers a complete range of security solutions from consultancy to security maintenance and from secure infrastructure design to security governance.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

Experis

Experis

Experis provide IT resourcing, project solutions and managed services. We enable organizations to cultivate individuals and teams prepared for the digital age.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

Clearvision

Clearvision

As an Atlassian Platinum Solution Partner, Clearvision works with teams in the UK and US, providing solutions for the Atlassian stack, Git and open source tooling.

Herzing College

Herzing College

Herzing College Ottawa offers an accelerated 12-month Cybersecurity Specialist training program. This program is developed by industry experts and based on leading IT security certifications.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

Sunnic

Sunnic

Sunnic is a leading provider of comprehensive digital data security technology.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.

Merlin Ventures

Merlin Ventures

Merlin Ventures is a strategic investor focused on driving growth and value for cybersecurity software companies with market-leading potential.

Octopus Cybersecurity

Octopus Cybersecurity

Octopus VAR is a Validation, Analysis and Reporting tool that gives risk managers and CISOs a powerful control mechanism and a deep view of operational risks.