China Wants FBI’s Help With Internet Security

China wants to have deeper Internet security, anti-terrorism and corruption cooperation with the United States, Chinese security officials told the visiting director of the FBI, state news agency Xinhua says.

Meeting in Beijing, Public Security Minister Guo Shengkun, told James B. Comey that China was willing to enhance strategic mutual trust and the respect of each others core interests, Xinhua said.

The two countries should "deepen law enforcement and security cooperation in the fields of Internet security and counter-terrorism", the report paraphrased Guo as saying.

Comey said the Federal Bureau of Investigation was willing to push forward pragmatic cooperation, Xinhua said. The report did not elaborate.

Hacking has been a sore spot in US-China relations. In September, President Barack Obama said he and Chinese President Xi Jinping had agreed that neither government would knowingly support cyber theft of corporate secrets to support domestic businesses.

China has also been seeking more counter-terrorism cooperation with Western countries, which the West has generally been unwilling to give, fearful of complicity in possible human rights abuses in China.

China has blamed Islamist militants for violence in its far western region of Xinjiang, where hundreds have been killed in the last few years. Rights groups and exiles say the problem stems more from anger at Chinese controls on the religion and culture of the Muslim Uighur people who call Xinjiang home, rather than from any cohesive militant group. China strongly denies any rights abuses in Xinjiang or elsewhere.

In a separate report recently, Xinhua cited domestic security chief Meng Jianzhu as telling Comey that China also wants more cooperation on recovering corrupt officials who have fled overseas, and their assets. The report also did not elaborate.

Last year, China pursued and brought home more than 600 suspected corrupt officials in a strategy dubbed "Operation Fox Hunt", as it widens a crackdown on deep-rooted graft launched by President Xi Jinping upon becoming Communist Party chief in late 2012.

Reuters: http://reut.rs/21xhssv

« U-Upload : Knowledge Straight To Your Brain
Is Apple Right To Resist The FBI? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

Bangladesh Association of Software & Information Services (BASIS)

Bangladesh Association of Software & Information Services (BASIS)

BASIS is the national trade body for Software & IT Enabled Service industry of Bangladesh.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

First Point Group (FPG)

First Point Group (FPG)

First Point Group provide a global technological recruitment service worldwide. Within that we have a specialist team of Cyber Security recruiters.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

Industrial Cybersecurity Center (CCI)

Industrial Cybersecurity Center (CCI)

CCI is the first center of its kind that comes from industry without subsidies, independent and non-profit, to promote and contribute to the improvement of Industrial Cybersecurity.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

Enginsight

Enginsight

Enginsight provides a comprehensive solution for monitoring and securing your servers and clients.

Winbond Electronics

Winbond Electronics

Winbond is a Specialty memory IC company. Product lines include Code Storage Flash Memory, TrustME® Secure Flash, Specialty DRAM and Mobile DRAM.

Birch Cline Cybersecurity

Birch Cline Cybersecurity

Birch Cline specializes in helping Local Government and Education agencies, as well as mid-market organizations, build and maintain successful cybersecurity programs.

VulnCheck

VulnCheck

VulnCheck helps organizations outpace adversaries with vulnerability intelligence that predicts avenues of attack with speed and accuracy.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

SolidityScan

SolidityScan

SolidityScan is an advanced smart contract scanning tool designed to uncover vulnerabilities and proactively address risks within your code.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

Verax AI

Verax AI

Verax Protect helps security leaders mitigate the risks of using AI in the workplace by actively stopping the leakage of any sensitive data, harmful or malicious responses, and other security threats.