The administration of the President of the United States Joe Biden plans to finalize rules next week aimed at cracking down on Chinese vehicle software and hardware.
US Commerce Secretary Gina Raimondo spoke about the mentioned intentions during a conversation with media representatives.
Chinese media have noted that for local car manufacturers involved in the supply chain, the scale of the impact of Washington’s planned restrictions will be negligible. The corresponding statement is explained by the fact that sales of brand vehicles from an Asian country in the United States market are at a low level.
At the same time, according to experts, the implementation of Washington’s mentioned intentions will have a significant impact on international automakers that sell their products in the US. It is also possible that the United States automotive industry may face sensitive costs as part of attempts to replace the Chinese supply chain.
Gina Raimondo, while talking to media representatives, stated that comments had been received from the industry about the mentioned plans. According to her, Washington does not want two million Chinese cars to take to the roads of the United States and only after that, there was an awareness of the threat associated with the relevant circumstance.
In September, the US Commerce Department proposed violating key Chinese software and hardware in connected vehicles on American roads due to national security concerns.
The proposed rule concerns hardware and software integrated into the Vehicle Connectivity System (VCS) and software integrated into the Automated Driving System (ADS). Washington claims that malicious access to these systems could allow adversaries to access and collect the US’ most sensitive data and remotely manipulate cars. In this context, the issue of cybersecurity is mentioned, which has become more relevant against the background of the active development of technologies, including artificial intelligence. For example, scammers also have access to AI, which allows them to perform more complex operations to deceive victims. One of the tools to counter this threat is the personal awareness of users. For example, an Internet search query such as how to know if my camera is hacked will allow anyone to get information about signs of unauthorized access to the device.