Haste Makes Waste

  • 来源:北京周报
  • 关键字:Cyber security,Damaging cooperation
  • 发布时间:2014-06-05 14:16

  Allegations of cyber spying are counterproductive to Sino-U.S. relations

  Washington broke out in full legalistic fury and filed judicial litigation against five Chinese military officers on May 19, accusing them of hacking into U.S. corporations’ networks to steal trade secrets.

  In fact, the U.S. Government has sought to include the so-called “cyber threat from China” into judicial and legislative fields since 2013. On February 20, 2013, it issued a report titled Administration Strategy on Mitigating the Theft of U.S. Trade Secrets, establishing a strategy to prevent foreign competitors and governments from stealing trade secrets by any method including via cyber space. While claiming “cyber spying” has become a major threat to U.S. cyber security, the United States widely singles out China as a cyber threat and accuses the Chinese military of hacking.

  Feeling insecure

  Filing lawsuits is not Washington’s ultimate goal. It conceded that the lawsuit was aimed at conveying a public message to China and forcing Beijing to “take actions.” But why did Washington abandon the existing China-

  U.S. cyber security working group and dialogue mechanisms, only to take such a provocative unilateral action? The reason is that today’s cyber world may not follow what is in accordance with Washington’s strategic conception and arrangement. Washington has clearly become anxious as China poses a strong challenge to U.S. interests in cyber space.

  Cyber security has undoubtedly been at the core of Washington’s multiple interests in cyber space. The U.S. security concept changed following the September 11 terrorist attacks in 2001. Former U.S. Secretary of Defense Donald Rumsfeld once said there is no way for the country to find out when and where U.S. interests would be attacked, or when Americans would be at risk of terrorist attacks. Its sense of insecurity is particularly strong in the realm of cyber space.

  In one way, the United States has realized the fragility resulting from high reliance on the Internet. By carrying out a cyber military buildup, it seeks to develop deterrent and preemptive cyber strength, so as to obtain absolute military advantage—all compiled in cyber space. In another way, it has learned that the Internet has developed beyond any country’s control, such that related problems can only be solved through international cooperation and coordination. To maximize U.S. interests, the country has kept control of rights to distribute important Internet resources and formulate technical standards in the cyber world, aiming to firmly hold dominance over the Internet.

  China has been targeted as Washington’s top imaginary rival as the latter pursues dominant military strength in the cyber world. One explanation of U.S. behavior is today’s strategic architecture in which China is rising as a strong power. Another reason is that the United States believes China is highly capable of conducting cyber warfare. An investigation of the U.S.-based Foreign Affairs magazine showed that China’s capabilities of cyber warfare are second only to the United States. Therefore, the United States finds learning the real strength of the Chinese military’s cyber attack and defense abilities is crucial to its security. During talks with Beijing about Internet issues, Washington repeatedly requested China enhance transparency of cyber space and establish a mutual trust mechanism, citing the need to “eliminate miscalculation.” It also suggested carrying out direct dialogue between the two country’s military forces.

  However, since the related mechanisms have just been formed, they have yet to satisfy Washington’s strategic needs. By exaggerating recent events, Washington intends to observe Beijing’s reactions, so that it can uncover Beijing’s stance and its Internet coordination and response mechanism. By choosing military officers as the trigger, Washington may try to force the Chinese military to directly respond, which will facilitate its intended test.

  Damaging cooperation

  It is well known that the U.S. PRISM surveillance scandal has had a great impact on international cyber space development. One direct consequence is that countries have realized the urgency to efficiently guarantee their rights in cyber space. They have opposed the United States’ dominance in cyber affairs, demanding shared governance of the Internet. They have also called for reforms of the Internet, such as the globalization of the Internet Corporation for Assigned Names and Numbers (ICANN). In this context, the United States was forced to adjust its policies, and agreed to shift responsibility for overseeing the ICANN to “the global multistakeholder community.” The international community believes that the coming two years will be a key period for remapping territory in the cyber world.

  Currently, China is actively involved in the reform of cyber space governance. It has made suggestions at international events and its ideas have been accepted by more and more countries. Identifying with China’s stance, many countries appeal to let international organizations with greater legitimacy, like the UN, be responsible for international Internet-related issues, so as to promote justice and fairness in the cyber world. Now China has become a significant player in cyber space governance reform, which Washington views as a threat. By making accusations against the so-called spies from the Chinese military, the United States most likely intended to damage the Chinese Government’s reputation, distract its focus, and disrupt China’s plan to participate in global Internet affairs.

  However, haste generally makes waste. Washington is hurrying to test Beijing’s reacting mechanism, but has instead destroyed a bilateral cooperative mechanism, into which they have invested an enormous amount of time and energy. Furthermore, by ignoring international principles and stirring conflicts, it will cause damage to international cooperation over cyber space.

  Chinese President Xi Jinping called for building a China-U.S. “new-type major-power relationship” characterized by non-confrontation, mutual respect and win-win cooperation during a meeting with his U.S. counterpart Barack Obama in June 2013. If the United States continues to act the way it has, much greater efforts will be necessary to extend such a relationship into cyber space.

  The author is deputy director of the Institute of Information and Social Development Studies, China Institutes of Contemporary International Relations

  U.S. Record of Global Surveillance

  A Chinese Internet information body complained of “unscrupulous” surveillance by U.S. intelligence agencies over the rest of the world and called for an immediate cessation of the practice in a report issued on May 26. The document, titled The United States’ Global Surveillance Record, said the U.S. secret surveillance activities directed against China and other nations include:

  —Collecting nearly 5 billion mobile phone call records across the globe every day;

  —Tapping German Chancellor Angela Merkel’s cellphone for more than 10 years;

  —Plugging into the main communication networks between Yahoo’s and Google’s overseas data centers, and stealing the data of hundreds of millions of customers;

  —Monitoring cellphone apps for years and grabbing private data;

  —Waging large-scale cyber attacks against China, with both Chinese leaders and the telecom giant Huawei as targets.

  (Source: Xinhua News Agency)

  By Li Yan

……
关注读览天下微信, 100万篇深度好文, 等你来看……
阅读完整内容请先登录:
帐户:
密码: