China Wants FBI’s Help With Internet Security

China wants to have deeper Internet security, anti-terrorism and corruption cooperation with the United States, Chinese security officials told the visiting director of the FBI, state news agency Xinhua says.

Meeting in Beijing, Public Security Minister Guo Shengkun, told James B. Comey that China was willing to enhance strategic mutual trust and the respect of each others core interests, Xinhua said.

The two countries should "deepen law enforcement and security cooperation in the fields of Internet security and counter-terrorism", the report paraphrased Guo as saying.

Comey said the Federal Bureau of Investigation was willing to push forward pragmatic cooperation, Xinhua said. The report did not elaborate.

Hacking has been a sore spot in US-China relations. In September, President Barack Obama said he and Chinese President Xi Jinping had agreed that neither government would knowingly support cyber theft of corporate secrets to support domestic businesses.

China has also been seeking more counter-terrorism cooperation with Western countries, which the West has generally been unwilling to give, fearful of complicity in possible human rights abuses in China.

China has blamed Islamist militants for violence in its far western region of Xinjiang, where hundreds have been killed in the last few years. Rights groups and exiles say the problem stems more from anger at Chinese controls on the religion and culture of the Muslim Uighur people who call Xinjiang home, rather than from any cohesive militant group. China strongly denies any rights abuses in Xinjiang or elsewhere.

In a separate report recently, Xinhua cited domestic security chief Meng Jianzhu as telling Comey that China also wants more cooperation on recovering corrupt officials who have fled overseas, and their assets. The report also did not elaborate.

Last year, China pursued and brought home more than 600 suspected corrupt officials in a strategy dubbed "Operation Fox Hunt", as it widens a crackdown on deep-rooted graft launched by President Xi Jinping upon becoming Communist Party chief in late 2012.

Reuters: http://reut.rs/21xhssv

« U-Upload : Knowledge Straight To Your Brain
Is Apple Right To Resist The FBI? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

CERT Tonga

CERT Tonga

CERT Tonga is the national Computer Emergency Response Team for Tonga.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

Cynamics

Cynamics

Cynamics is the only network monitoring solution built specifically for Smart City, Public Safety and Critical Infrastructure networks.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

Netenrich

Netenrich

The Netenrich operations intelligence platform is built from the ground up to help enterprises resolve everyday and futuristic problems for stable, secure environments and infrastructures.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.

Smartcomply

Smartcomply

Smartcomply is an automated and AI-powered cybersecurity and compliance platform that aids businesses in reducing the time and money spent on cybersecurity and compliance.