LINE

    Text:AAAPrint
    Voices

    Call for cyber defense, global cooperation

    1
    2015-08-12 11:21China Daily Editor: Si Huan

    Following U.S. media reports in late July that the Barack Obama administration plans to take revenge on China for "cyberattacks", Bloomberg reported on Friday that computers of American Airlines and Sabre, a U.S. company which runs an air travel reservation system, might have been attacked by China-based hackers. On Monday NBC news reported that Chinese hackers have been accessing the private emails of top U.S. national security and trade officials since April 2010.

    This has raised fear among people that tensions between China and the U.S. may intensify, with some even saying a large-scale cyber warfare seems unavoidable, which, in turn, calls for the need to clarify the concept of cyber warfare. In general, people equate cyber warfare with "destroying enemy telecommunication devices" or "hacking enemy databases" as in a real physical war, which, in fact, is only a small part of it.

    Conflicts in cyberspace are not new, and cyber warfare can be defined as activities to gain advantage in public opinion or export ideologies through online channels, or activities to obtain intelligence and carry out surveillance to do so.

    The U.S. is a master at both. It has been playing up the "China cyberthreat" theory even while conducting surveillance against its allies, including Germany and Japan - and WikiLeaks has exposed the dark side of the U.S. by releasing classified documents.

    Cyber warfare is asymmetric, because even a single hacker can launch an attack against a state. "No absolute security" is a quote often used by cybersecurity experts. This asymmetry is also a threat to the existing world order, because weaker states or organizations can harm the interests of regional and even global powers, and vice-versa. The difficulty in locating the attacker is the main reason behind this asymmetry.

    To fully secure itself, the U.S. has been developing a shield against the invisible spear of cyberattack. It has already listed web-tracking as a priority research area and making progress. For example, it was reported that the U.S. traced the source of the attack on Sony to the Democratic People's Republic of Korea because of the bugs in the DPRK's monitoring system. The U.S. is also believed to have installed thousands of programs in China's computer networks that can alert the U.S. against cyberattacks in advance.

    Another tactic to thwart attacks is to put potential attackers under pressure. The U.S.' latest cyber strategy - of imposing economic sanctions, initiating judicial action and even launching military strikes against attackers - is designed to deter opponents from launching attacks. The New York Times has reported that Washington's "revenge" may also include attacks on key targets in China and stealing information from it.

    So, what can China do to establish an active rapid response system? The newly established central Internet security and information group, headed by top leader Xi Jinping, can mobilize enough resources and coordinate with relevant departments to deal with emergencies. The departments include public security agencies to analyze attacks, diplomatic organizations to deal with the problems diplomatically, and publicity departments to prevent rumors from creating chaos in the public.

    Like the U.S., China also needs to develop its cyber defense technology in order to deter potential attackers, with online tracking technology being a key part of the process so that the location (and perhaps identity) of the attacker can be known. It should also unambiguously declare its cyberspace sovereignty through key strategic documents, which offer legal basis for China to defend its cyberspace.

    Moreover, China should more actively participate in global cooperation on cybersecurity, and strengthen dialogues and coordination with Russia, the U.S. and the European Union. Also, drafting an international covenant against cyber warfare would be in the great interest of China and send the international community a clear signal about China's stance on cybersecurity, as well as its determination to defend itself against attacks.

    The author is a researcher in cybersecurity at CCID Think Tank, affiliated to the Ministry of Industry and Information Technology.

      

    Related news

    MorePhoto

    Most popular in 24h

    MoreTop news

    MoreVideo

    News
    Politics
    Business
    Society
    Culture
    Military
    Sci-tech
    Entertainment
    Sports
    Odd
    Features
    Biz
    Economy
    Travel
    Travel News
    Travel Types
    Events
    Food
    Hotel
    Bar & Club
    Architecture
    Gallery
    Photo
    CNS Photo
    Video
    Video
    Learning Chinese
    Learn About China
    Social Chinese
    Business Chinese
    Buzz Words
    Bilingual
    Resources
    ECNS Wire
    Special Coverage
    Infographics
    Voices
    LINE
    Back to top Links | About Us | Jobs | Contact Us | Privacy Policy
    Copyright ©1999-2018 Chinanews.com. All rights reserved.
    Reproduction in whole or in part without permission is prohibited.
    主站蜘蛛池模板: 宜黄县| 龙川县| 南投市| 高清| 永善县| 元朗区| 武乡县| 保山市| 武平县| 遂昌县| 新安县| 拉萨市| 铜川市| 鹤庆县| 开远市| 田东县| 永春县| 抚宁县| 铜川市| 信阳市| 南投市| 天长市| 阿拉尔市| 广安市| 五寨县| 资源县| 裕民县| 绥滨县| 天等县| 黎平县| 黄骅市| 石狮市| 炎陵县| 平利县| 山丹县| 陈巴尔虎旗| 浦城县| 靖江市| 阿拉善左旗| 江津市| 应城市|