Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

End of Bibblio RCM includes -->
5/13/2022
04:00 PM
Becky Bracken, Editor, Dark Reading
Becky Bracken, Editor, Dark Reading
News

Black Hat Asia: Democracy's Survival Depends on Taming Technology

The conference opens with stark outlook on the future of global democracy -- currently squeezed between Silicon Valley and China.

BLACK HAT ASIA 2022 – Technology is an existential threat to global democracy — requiring a shift to a transnationally regulated, culturally sensitive tech ecosystem that provides space for democracies to flourish.

That's the word from Samir Saran, president of the Observer Research Foundation, in the opening keynote for Black Hat Asia 2022.

"Democracy is turning on itself, and technology is the tool," Saran said. "If democracy is to survive, technology will have to be tamed." 

Big Tech vs. Red Tech 
Caught between Big Tech in Silicon Valley and what Saran called the "Red Tech" of the Chinese Communist Party, it's time for the world to establish meaningful global regulation of massive social and enablement platforms, which have often run amok and been used against the populations they purport to serve, Saran explained during the address, titled "#HackingDemocracy." 

Silicon Valley's ability to pick and choose who has a platform, seemingly based on the whims of owners, and its unwillingness to control the spread of hate speech and disinformation, primarily because it's good for business, are suffocating American democracy and should be reined in, he argued.

Big Tech in the US enjoys a quasi-utility status but uses its immense influence to fend off any sort of meaningful regulation, he explained from his bookshelf-lined office in India (his talk was remote). However, compared with the untamed censorship, malicious intent, and brutal wielding of Red Tech against populations, US-based companies are still the best hope for establishing new ground rules that can hold boardrooms and powerful figures accountable. "Perhaps even elected ones ...," Saran suggested. 

China's Plan to Divide Democracies 
China's Red Tech is more dangerous to democracy because, as Saran explained, it's used to "control the domestic population and also make mischief abroad." 

Chinese Big Tech has been able to insert itself into global democratic discourse and divide wherever possible through the use of deepfakes, fake news, and its formidable troll army, Saran warned. 

"The business model of China tech is to divide democracies," he said. "The Chinese are ensuring they are part of any conversation, any political discourse in free societies — democratic countries." 

Saran credits Chinese tech for maintaining the country's "brand" despite the COVID-19 outbreak in Wuhan by dominating and gaming the news cycle. "They were never held accountable for what happened in Wuhan," Saran said. 

But thanks to the so-called Great Firewall of China, no other countries have the same access to make similar troubles for the Chinese Communist Party. This is no longer tenable, and Saran recommends a global ultimatum to Beijing: Let the world in or we'll block you from the world. 

Can China Be Held Accountable? 
Saran said global tech's reaction to Russia's invasion of Ukraine by blocking Russian interests proves the sector has the ability to hold power accountable. 

"Can these same platforms work together to see that Chinese propaganda is offloaded?" he asked. "Can they take action against Chinese manipulation?" 

The question is whether they're willing to give up the Chinese market in the name of democracy. 

Going for a Transnational Future
Transnational tech platforms also have an obligation to provide services with more cultural nuance, he said. 

"Facebook in India will have to have a different texture than Meta in the United States," Saran said, adding that ultimately, it's about taking better care of the people behind the usernames. 

Regulations could be an important part of the picture given that regional laws aren't one-size-fits-all for a culturally diverse globe, Saran added. 

"Transnational corporations need to have another level of regulation with some standards and accountability." 

Comment  | 
Print  | 
More Insights
//Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31108
PUBLISHED: 2022-06-28
Mermaid is a JavaScript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. An attacker is able to inject arbitrary `CSS` into the generated graph allowing them to change the styling of elements outside of the generat...
CVE-2022-31229
PUBLISHED: 2022-06-28
Dell PowerScale OneFS, 8.2.x through 9.3.0.x, contain an error message with sensitive information. An administrator could potentially exploit this vulnerability, leading to disclosure of sensitive information. This sensitive information can be used to access sensitive resources.
CVE-2022-31230
PUBLISHED: 2022-06-28
Dell PowerScale OneFS, versions 8.2.x-9.2.x, contain broken or risky cryptographic algorithm. A remote unprivileged malicious attacker could potentially exploit this vulnerability, leading to full system access.
CVE-2022-2145
PUBLISHED: 2022-06-28
Cloudflare WARP client for Windows (up to v. 2022.5.309.0) allowed creation of mount points from its ProgramData folder. During installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files.
CVE-2022-28621
PUBLISHED: 2022-06-28
A remote disclosure of sensitive information vulnerability was discovered in HPE NonStop DSM/SCM version: T6031H03^ADP. HPE has provided a software update to resolve this vulnerability in HPE NonStop DSM/SCM.