Collision in Cyberspace is Unavoidable: The View from Chinese Analysts

2011-09-29 (China Military News cited fromhttp://blogs.cfr.org/asia/2011/09/28/collision-in-cyberspace-is-unavoidable-the-view-from-chinese-analysts/”> cfr.org ) — http://www.rmlt.com.cn/qikan/2011-08-16/”>People’s Tribune Magazine (人民论坛杂志) has a collection of twelve articles on cyberspace and cyber conflict by Chinese analysts at think tanks and academic institutes. All of the articles are worth glancing at, but four—”http://www.rmlt.com.cn/qikan/2011-08-16/28359.html”>A Sovereign Country Must Have Strong Defense” by Min Dahong, director of the Network and Digital Media Research Office at the China Academy of Social Sciences; “http://www.rmlt.com.cn/qikan/2011-08-16/28365.html”>America’s ‘Pandora’s Box’ Cyber Strategy Confuses the World” by Shen Yi from Fudan University’s Department of International Politics; “http://www.rmlt.com.cn/qikan/2011-08-16/28360.html”>Cyber Power ‘Shuffles the Cards’: How China Can Overtake the Competition” by Tang Lan, assistant director of the Institute of Information and Social Development Studies at the China Institute of Contemporary International Relations; and “http://www.rmlt.com.cn/qikan/2011-08-16/28356.html”>How to Construct China’s Cyber Defenses” by Liu Zengliang, from the PLA National Defense University—do a particularly good job of illustrating what some Chinese analysts are saying about U.S.-China relations in cyberspace.  The picture is not pretty. All see cyberspace as an emerging, critical area of competition and are notably pessimistic about the future. Conflict seems almost inevitable.

Reading the essays, it is clear that Chinese analysts believe the United States is ahead in the competition.  U.S. strengths include “core technology, experts, high military expenditures, and an integrated command system.”  In contrast to the perception in the West that China possesses a comprehensive strategy uniting the diplomatic, military, and technological components of cyber, these analysts are not impressed. Beijing is said to lack a coherent vision of what it wants to accomplish.

The analysts tend to point to China as a victim—victim of cyberattacks and of pernicious claims from other countries that China could be behind any of the widely reported attacks on embassies, international organizations, government agencies, or companies. Blaming the attacks on http://www.theregister.co.uk/2011/09/22/japan_military_hack_follow_up/”>Mitsubishi Heavy on Chinese hackers? Clearly evidence of Cold War thinking and of Western countries’ concern over and distrust of China’s rise.

On the positive side, all of the analysts point to cybersecurity as requiring international cooperation.  This of course has a positive spin, but there is an undercurrent that suggests international cooperation actually means the use of various international fora to promote Chinese views.  “We must create and utilize various types of occasions for interaction, set topics of discussion, fight for the right to express and disseminate China’s views, begin to develop public cyber diplomacy, and establish a favorable international image,” writes Tang Lan.

These articles are not official statements. But taken together with China’s proposed http://blogs.cfr.org/asia/2011/09/15/china-and-information-vs-cybersecurity/”>International Code of Conduct for Information Security, they suggest that some observers in China feel that the United States has gained momentum in cyberspace with the introduction of the http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf”>International Strategy for Cyberspace and the DoD http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/DoD_Strategy_for_Operating_in_Cyberspace_July_2011.pdf”>Strategy for Operating in Cyberspace.  As we get closer to the http://www.chathamhouse.org/research/international-security/current-projects/international-cyber-conference-london-1-2-november-”>International Cyber Conference, London, in November and beyond, we can expect China to push back and try and shape the discussions about cyberspace to fit its own interests.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Scroll To Top