Blog Layout

TechScape: how China became an AI superpower ready to take on the United States

Aug 14, 2022

 

China had its sputnik moment in March 2016. That month an artificial intelligence programme, AlphaGo,  beat a South Korean grandmaster at Go , an extremely complex and demanding Chinese board game. The five game series was watched by an audience of more than 280 million viewers across China. In May 2017  AlphaGo defeated China’s 19-year-old prodigy Ke Jie ; two months later the Chinese government issued an AI strategy which projected that the country would become the global centre of AI innovation by 2030. By year’s end, China accounted for nearly half of all AI venture funding globally.

That is the story of how China became an AI powerhouse, as told by Kai-Fu Lee, a renowned expert in the field,  in his book AI Superpowers. Lee, a 60-year-old former president of Google China who has witnessed the country’s tech revolution first-hand, is now chairman and chief executive of Beijing-based tech investment firm Sinovation Ventures. The book was published three years ago and it predicted that China would win the AI contest with the United States – the other great power in AI.

This week I interviewed Lee and asked him if  China  was, as he predicted, winning. He is diplomatic – “both countries are equally strong” – but says they are emerging with strengths in different areas: the US in enterprise software (stuff that businesses use); China in manufacturing and image recognition. He describes both countries as being “equally strong in aggregate” but individually stronger in discrete categories.

But first I should crowbar in my regulatory AI explainer just in case you’re wondering what it’s all about (by the way, it’s one of those classic bits of tech that is already embedded in multiple aspects of your life).

AI can explain …

As Lee explains in his book, the neural network form of AI mimics the underlying architecture of the brain in computer form. This involves constructing layers of artificial neurons (which, in humans, transmit information between bits of the brain and the rest of our nervous system) that receive and transmit information in a way similar to our networks of biological neurons. These networks are then fed lots and lots of examples of a given phenomenon – chess moves, pictures of animals, sounds – and they then identify patterns within the data.

In his book Lee uses the example of cats: under the neural network approach a program is given millions of sample photos labelled ‘cat’ or ‘no cat’, letting the program figure out for itself what features in the millions of images are most closely correlated to the ‘cat’ label.

Lee writes: “Neural networks require large amounts of two things: computing power and data. The data ‘trains’ the program to recognise patterns by giving it many examples, and the computing power lets the program parse those examples at high speeds.” Juiced up neural networks are now described as “deep learning”. He adds that AI algorithms – a set of instructions that a computer program follows to complete a task or produce a single outcome – will hit white-collar jobs as a consequence because they can process data, and make decisions based on it, much more efficiently.

“Much of today’s white-collar workforce is paid to take in and process information, and then make a decision or recommendation based on that information – which is precisely what AI algorithms do best.”

And here we are three years on. One former US government official has already given his verdict on the AI superpower contest. Nicolas Chaillan, the Pentagon’s first ever chief software officer,  resigned this year  because he could not stand to watch China overtake the US in AI, machine learning and cyber capabilities. “We have no competing fighting chance against China in 15 to 20 years. Right now, it’s already a done deal; it is already over in my opinion,” he told the Financial Times, adding that China was set to dominate the future of the world, controlling everything from media narratives to geopolitics.

No fighting chance?

If you want a primer on how China became a tech powerhouse in such a short period of time, Lee’s book is a good place to start (this year he published another book on AI, co-written with speculative fiction author Chen Qiufan, called AI 2041). It explains how a combination of government support and innate entrepreneurial zeal soon propelled the Chinese tech sector from copying US platforms at first (Twitter, Facebook, eBay) to producing dominant domestic services like WeChat (the app that does everything) and a global phenomenon like TikTok. Much of Lee’s confidence in China’s role in the global AI contest is down to those factors.

Lee says coronavirus has accelerated AI use in the US and China. We are on Zoom and he gestures to the blurred screen behind him as an example. “The blurred background is made by AI. Without AI, how could you discern what’s me and what’s background?” He says in the US lockdown has boosted AI’s use at work, citing the success of Romania-founded but New York-based UiPath, which sells AI-based software that automates workaday tasks for businesses such routine tasks such as reading documents and filling in forms. “Companies have all this data that becomes a treasure trove of information on which they can help make the company more efficient,” says Lee, who sees data as a key factor in developing AI programmes. And China generates a lot of data.

In China, he says the pandemic has raised use of robotics in factories as well as automated vehicles for delivering goods. “And of course it spills over to restaurants where there are robotic waiters in quite a few Chinese restaurants. Not fancy restaurants and not McDonald’s but … medium to low price sit down restaurants, where it would be safer if a robot delivered your food to you. It’s not a humanoid robot. It’s a tray on wheels that comes to your table.”

Lee sees language processing and understanding as a big development for AI. “The ability to basically answer questions, understand text and language and make very meaningful responses to questions,” he says, which will transform search engines. He adds that AI will enable the creation of customised videos to keep you entertained or informed, while the  metaverse  – a digital world where we can lead our social and professional lives virtually – will be populated not just by avatars of our real selves but also AI avatars. “A key part of the metaverse is it will be inhabited by not just humans but by digital humans.” The process of discovering new drugs will also be transformed, he adds.

We also dwell on the negatives. Lee declines to comment on concerns about use of facial recognition in China, where there has been  pushback , but says autonomous weapons including drones are “a very big concern”. He says: “How to regulate that is an issue that faces all of us. Just as chemists spoke up about chemical weapons and biologist about biological weapons, I hope governments will start listening to AI scientists. It’s probably impossible to stop it altogether. But there should be some ways to at least reduce or minimise the most egregious uses.”

Lee says the next wave of investment and entrepreneurship will be in so-called deep tech, which refers to the big advances in technology like AI,  quantum computing  and blockchain.

“If you are a superstar new grad, 10 years ago, you’re probably thinking what apps should I build? Today, you’re probably thinking, ‘Should I get a PhD?’”

Meta’s messaging issues

WhatsApp, which is owned by Facebook parent Meta,  announced on Monday  that it is launching a new setting that allows users’ messages to disappear after 24 hours. Meta has put the brake on plans to launch end-to-end encryption of its Facebook and Instagram messaging services, until 2023 at least. But the NSPCC’s reaction to the WhatsApp move – “poorly thought out” – underlines that tension between Meta and regulators, politicians and campaigners over privacy persists.

TechSavvi offers advanced cybersecurity services to protect your business from these type of attacks.

26 Apr, 2024
In continuation of Microsoft’s series of data security incidents, employees accidentally exposed internal data to the public. The leak exposed an unprotected Azure storage server containing code, scripts, and configuration files. Microsoft has announced that it has fixed a security breach that exposed internal company credentials and files to the open internet. The breach was first discovered by security researchers from cybersecurity firm SOC Radar. According to their report, an internal error resulted in an Azure storage server without password protection being given public access. The exposed data was primarily related to Microsoft’s Bing search engine, including configuration files, code, and scripts that employees used to access a range of internal systems and databases. Consequently, bad actors could identify and access locations for Microsoft's internal data. So far, it has not been made clear how long the data has been exposed. Anuj Mudaliar Assistant Editor - Tech, SWZD opens a new window opens a new window Anuj Mudaliar is a content development professional with a keen interest in emerging technologies, particularly advances in AI. As a tech editor for Spiceworks, Anuj covers many topics, including cloud, cybersecurity, emerging tech innovation, AI, and hardware. When not at work, he spends his time outdoors - trekking, camping, and stargazing. He is also interested in cooking and experiencing cuisine from around the world.
26 Apr, 2024
AT&T is notifying 51 million former and current customers, warning them of a data breach that exposed their personal information on a hacking forum. However, the company has still not disclosed how the data was obtained. These notifications are related to the recent leak of a massive amount of AT&T customer data on the Breach hacking forums that was offered for sale for $1 million in 2021. When threat actor ShinyHunters first listed the AT&T data for sale in 2021, the company told BleepingComputer that the collection did not belong to them and that their systems had not been breached. Last month, when another threat actor known as 'MajorNelson' leaked the entire dataset on the hacking forum, AT&T once again told BleepingComputer that the data did not originate from them and their systems were not breached. After BleepingComputer confirmed that the data belonged to AT&T and DirectTV accounts, and TechCrunch reported AT&T passcodes were in the data dump, AT&T finally confirmed that the data belonged to them. While the leak contained information for more than 70 million people, AT&T is now saying that it impacted a total of 51,226,382 customers. "The [exposed] information varied by individual and account, but may have included full name, email address, mailing address, phone number, social security number, date of birth, AT&T account number and AT&T passcode," reads the notification. "To the best of our knowledge, personal financial information and call history were not included. Based on our investigation to date, the data appears to be from June 2019 or earlier." BleepingComputer contacted AT&T as to why there is such a large difference in impacted customers and was told that some of the people had multiple accounts in the dataset. "We are sending a communication to each person whose sensitive personal information was included. Some people had more than one account in the dataset, and others did not have sensitive personal information," AT&T told BleepingComputer. The company has still not disclosed how the data was stolen and why it took them almost five years to confirm that it belonged to them and to alert customers. Furthermore, the company told the Maine Attorney General's Office that they first learned of the breach on March 26, 2024, yet BleepingComputer first contacted AT&T about it on March 17th and the information was for sale first in 2021. While it is likely too late, as the data has been privately circulating for years, AT&T is offering one year of identity theft protection and credit monitoring services through Experian, with instructions enclosed in the notices. The enrollment deadline was set to August 30, 2024, but exposed people should move much faster to protect themselves. Recipients are urged to stay vigilant, monitor their accounts and credit reports for suspicious activity, and treat unsolicited communications with elevated caution. For the admitted security lapse and the massive delay in verifying the data breach claims and informing affected customers accordingly, AT&T is facing multiple class-action lawsuits in the U.S. Considering that the data was stolen in 2021, cybercriminals have had ample opportunity to exploit the dataset and launch targeted attacks against exposed AT&T customers. However, the dataset has now been leaked to the broader cybercrime community, exponentially increasing the risk for former and current AT&T customers. Update 4/10/24: Added statement from AT&T about discrepancy in numbers. BILL TOULAS Bill Toulas is a tech writer and infosec news reporter with over a decade of experience working on various online publications, covering open-source, Linux, malware, data breach incidents, and hacks.
26 Apr, 2024
Home improvement retailer Home Depot confirmed with multiple publishers that it suffered a data break due to a third-party SaaS vendor inadvertently exposing a subset of employee data. IntelBroker, the threat actor behind the attack claims it has the information of 10,000 Home Depot employees. A Home Depot software vendor suffered a data breach leading to the compromise of an undisclosed number of employees. IntelBroker, the threat actor behind the attack claims it has the information of 10,000 Home Depot employees. Home improvement retailer Home Depot confirmed with multiple publishers that it suffered a data break due to a third-party software vendor inadvertently exposing a subset of employee data. Reportedly, the breach was caused by a misconfigured software-as-a-service (SaaS) application.
More Posts
Share by: