The UN General Assembly has adopted a resolution on AI capacity building, led by China. This non-binding resolution seeks to enhance developing countries’ AI capabilities through international cooperation and capacity-building initiatives. It also urges international organisations and financial institutions to support these efforts.
The resolution comes in the context of the ongoing technology rivalry between Beijing and Washington, as both nations strive to influence AI governance and portray each other as destabilising forces. Earlier this year, the US promoted a UN resolution advocating for ‘safe, secure, and trustworthy’ AI systems, gaining the support of over 110 countries, including China.
China’s resolution acknowledges the UN’s role in AI capacity-building and calls on Secretary-General Antonio Guterres to report on the unique challenges developing countries face and provide recommendations to address them.
Microsoft is restructuring its retail strategy in mainland China, consolidating its retail channels amid reports of closing its network of authorised physical retailers. The tech giant did not confirm the closures or specify the number of stores affected but emphasised the need to adapt to changing customer needs.
Microsoft assured its products would remain available in China through retail partners and its website despite not operating physical stores directly in the region. However, the company did not detail which partners would continue to stock its products.
The change of strategy reflects Microsoft’s ongoing efforts to optimise its retail strategy in one of the world’s largest markets, ensuring accessibility and customer satisfaction through diverse channels, despite diplomatic and political challenges and restrictions.
A suspected Chinese state-linked hacking group is increasingly targeting Taiwanese entities, particularly those within government, education, technology, and diplomacy sectors, as reported by cybersecurity intelligence firm Recorded Future. In recent times, the relationship between China and Taiwan has faced escalating tensions. The cyber assaults attributed to the group dubbed RedJuliett occurred between November 2023 and April 2024, coinciding with Taiwan’s presidential elections in January and the subsequent change in leadership.
While RedJuliett has previously targeted Taiwanese organisations, the recent wave of attacks marked a significant escalation in scope. The hacking attempts by RedJuliett targeted over 70 Taiwanese entities, including universities, an optoelectronics firm, and a facial recognition company with government contracts. While the success of these infiltration attempts remains unclear, Recorded Future only confirmed the observed efforts to identify network vulnerabilities.
Recorded Future revealed that RedJuliett exploited a vulnerability in the SoftEther enterprise virtual private network (VPN) software to breach the servers of these organisations. The open-source VPN facilitates remote connections to an organisation’s networks. The modus operandi of RedJuliett aligns with tactics commonly associated with Chinese state-sponsored groups, as per Recorded Future’s analysis. The geolocations of IP addresses suggest that RedJuliett likely operates from Fuzhou, a city in China’s Fujian province facing Taiwan’s coast.
The report speculated that Chinese intelligence services in Fuzhou are likely engaged in intelligence gathering against Taiwanese targets to support Beijing’s policymaking on cross-strait relations through RedJuliett’s activities. While Taiwan’s Ministry of Foreign Affairs refrained from immediate comments, a spokesperson from the Chinese Foreign Ministry dismissed the allegations, citing a lack of credibility in Recorded Future’s claims.
Why does it matter?
China’s increased military exercises around Taiwan and diplomatic pressures have exacerbated tensions, particularly following the election of Taiwan’s President Lai Ching-te, labeled a ‘separatist’ by China. Amidst escalating cyberespionage activities globally, Recorded Future anticipates continued targeting of Taiwanese government agencies, universities, and critical technology firms by Chinese state-sponsored groups. The firm recommends organisations prioritise patching vulnerabilities promptly to enhance their cybersecurity.
Geologists are expressing concerns about potential Chinese censorship and bias in GeoGPT, a new AI chatbot backed by the International Union of Geological Sciences (IUGS). Developed under the Deep-time Digital Earth (DDE) program, which is heavily funded by China, GeoGPT aims to assist geoscientists, particularly in developing countries, by providing access to extensive geological data. However, issues around transparency and censorship have been highlighted by experts, raising questions about the chatbot’s reliability.
Critics like Prof. Paul Cleverley have pointed out potential censorship and lack of transparency in GeoGPT’s responses. Although DDE representatives claim that the chatbot’s information is purely geoscientific and free from state influence, tests with its underlying AI, Qwen, developed by Alibaba, suggest that certain sensitive questions may be avoided or answered inadequately. That contrasts with responses from other AI models like ChatGPT, which provide more direct information on similar queries.
Further concerns are raised about the involvement of Chinese funding and the potential for biassed data usage. Geoscientific research, which includes valuable information about natural resources, could be strategically filtered. Additionally, the terms of use for GeoGPT prohibit generating content that undermines national security or incites subversion, aligning with Chinese laws, which may influence the chatbot’s outputs.
The IUGS president, John Ludden, has stated that GeoGPT’s database will be made public once appropriate governance is ensured. However, with the project being predominantly funded by Chinese sources, geoscientists remain sceptical about the impartiality and transparency of GeoGPT’s data and responses.
The United States has introduced draft rules to regulate investments in China, particularly in AI and other advanced technology sectors that could pose national security threats. The US Treasury Department released these proposed rules following President Joe Biden’s executive order in August, which targets semiconductors, quantum computing, and AI investments. The draft rules require US individuals and companies to identify and report transactions that may be restricted or banned, aiming to prevent US expertise from aiding China’s technological advancements.
The Treasury’s proposed rules include various exceptions, such as transactions in the US national interest or involving publicly traded securities. The regulations would specifically ban transactions involving AI for certain end uses and systems using significant computing power but require notifications for other AI-related investments. These rules focus primarily on China, Macau, and Hong Kong, though they might be expanded later.
Former Treasury official Laura Black highlighted that these rules would necessitate increased due diligence by US investors when dealing with Chinese companies in the specified sectors. The regulations also align with existing export controls on advanced semiconductors to China, aiming to hinder China’s military modernisation efforts. Violations of these rules could result in criminal and civil penalties, including unwinding investments.d
Why does it matter?
Treasury officials have engaged with international partners to discuss these investment restrictions, with the European Commission and the United Kingdom considering similar measures to address outbound investment risks. Public comments on the proposed rules are open until 4 August, with final regulations expected by the end of the year.
As China edges closer to the proverbial ‘splinternet’ there is more talk of the advent of AI on the continent. According to IBM, ASI is a hypothetical software-based AI system with an intelligence scope beyond human intelligence, possessing cognitive functions and thinking skills well beyond that of known humans.
According to SoftBank CEO Masayoshi Son, at the implementation level, ASI will bring about real change to our societies in about ten years. The CEO assured investors of his company’s plans to tap in to the trend, pinpointing the company’s majority shareholder portfolio in the chip design firm, Arm.
Similar developments in China see Huawei releasing HarmonyOS, the beta version of a mobile operating system, and rival to Android on the continent. Versions of the software are carded to come to market housed in smartphones, tablets, computers, smartwatches, smart glasses and earbuds by year end. The company also plans to build an ecosystem around the OS. Such technological developments in China further behooves the East and West to approach the table of negotiations as equals in the field of AI and other emerging technologies governance.
China’s AI military commander substitutes for human military leaders in simulated war games hosted by the Joint Operations College of the National Defence University, amidst growing tensions with the US over the use of militarised AI in combat. The bots, the first of their kind, are completely automated, possess the perception and reasoning skills of human military leaders, and are learning at an exponential rate. They have also been programmed to illustrate the weaknesses of some of the country’s most celebrated military leaders such as General Peng Dehuai, and General Lin Biao.
The AI arms race between the two countries can be likened to the chicken and egg analogy, in that both countries have expressed interest in regulating the use of these unmanned implements on the battlefield; yet, there are increasing media coverage of either on-going experiments or caged prototypes in both countries. These include the rifle-toting robot dogs, and surveillance and attack drones, some of which reportedly have already been used in battlefields in Gaza and in the Ukraine. The situation renders international rule-making in the space increasingly difficult, particularly as other players, such as NATO seek to ramp up investments in tech-driven defence systems.
A US official is heading to Japan following discussions with the Dutch government to strengthen efforts to limit China’s semiconductor production capabilities. Alan Estevez, the US export policy chief, aims to build on a 2023 agreement between the USA, Japan, and the Netherlands to prevent China from accessing advanced chipmaking equipment, which could enhance its military.
US officials have had ongoing discussions with allies, including visits to the Netherlands, to prevent ASML from servicing certain equipment in China. While ASML expects to service most of its equipment sold to China, US rules prevent using American spare parts.
The Chinese Embassy in Washington did not respond to requests for comment.
Lawmakers criticised Microsoft for failing to prevent these cyberattacks, which exposed federal networks to significant risk. They highlighted a report by the Cyber Safety Review Board (CSRB) that condemned Microsoft for lack of transparency regarding the China hack, labelling it preventable. Smith acknowledged the report’s findings and stated that Microsoft acted on most of its recommendations. He emphasised the growing threat posed by nations like China, Russia, North Korea, and Iran, which are increasingly sophisticated and aggressive in their cyberattacks.
During the hearing, Smith defended Microsoft’s role, saying that the US State Department’s discovery of the hack demonstrated the collaborative nature of cybersecurity. However, Congressman Bennie Thompson expressed dissatisfaction, stressing that Microsoft is responsible for detecting such breaches. Given its substantial investments there, panel members also inquired about Microsoft’s operations in China. Smith noted that the company earns around 1.5% of its revenue from China and is working to reduce its engineering presence in the country.
Despite facing significant criticism over the past year, some panel members, including Republican Congresswoman Marjorie Taylor Greene, commended Smith for accepting responsibility. In response to the CSRB’s findings, Microsoft has pledged to prioritise security above all else, launching a new cybersecurity initiative in November to bolster its defences and ensure greater transparency moving forward.
The Dutch military intelligence and security service (MIVD) has raised alarms over a global Chinese cyber-espionage campaign, that successfully targeted ‘a significant number of victims’, including Western governments, international organisations and the defense industry. The Netherlands’ National Cyber Security Centre (NCSC) provided the details of this operation in the warning sharing how state-sponsored hackers exploited a vulnerability in FortiGate devices for ‘at least two months before Fortinet announced the vulnerability.’
This vulnerability, identified as CVE-2022-42475, was leveraged during a ‘zero-day period’ to compromise around 14,000 devices in Netherlands. In particular, the warning says that the had successfully breached the internal computer network of the Dutch Ministry of Defence. After gaining access, the hackers deployed a remote access trojan (RAT) named COATHANGER to perform reconnaissance and exfiltrate user account information from the Active Directory server. It, however, remains unclear how many of these systems were infected with the COATHANGER malware. The MIVD warned that identifying and removing these infections is particularly challenging.
“The NCSC and the Dutch intelligence services therefore state that it is likely that the state actor still has access to systems of a significant number of victims,” the report cautioned, emphasizing the ongoing threat posed by this extensive cyber-espionage campaign.