<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          US EUROPE AFRICA ASIA 中文
          Opinion / Web Comments

          Interpreting the second wave of cyber security threats to China

          By Xu Peixi (China.org.cn) Updated: 2013-03-04 18:05

          The U.S. has two times challenged China in the field of Internet governance. The first challenge came in the form of a speech delivered by former U.S. Secretary of State Hillary Clinton on Internet freedom following Google's withdrawal from the Chinese mainland. The second came earlier this month as a private security firm, Mandiant, released a report accusing the Chinese military of stealing U.S. intellectual property.

          I have discussed the first attack in an earlier publication. How to make sense of this new offensive -- a seemingly scheduled escalation -- of the previous hostility in terms of both rhetoric and substance? Observers feel reluctant to comment on the Mandiant report because they fail to understand the technical details. However, it is fairly easy to make sense of this dispute by reading the report itself and by some creative thinking.

          An important point to consider is that the China-U.S. conflict over Internet governance can be traced back to the first World Summit on Information Society (WSIS) in Geneva, 2003. China insisted on the role of state leadership in Internet governance, while the U.S. proposed market leadership. Both countries had their own reasons. For China, the state plays an important role in development and market issues. State authorities also manage the media to maintain social stability. The U.S. will not loosen its grip over core Internet resources because it is a gathering place for a myriad of commercial interests.

          The EU then offered to broker a deal between the two parties. In June 2005, the EU Council of Ministers outlined its position on Internet governance by proposing a new cooperation model to solve conflicts over the management of the Internet's core resources, namely the domain names systems, IP addresses, and the root server system. This new cooperation model stated that "the existing Internet governance mechanisms should be founded on a more solid democratic, transparent and multilateral basis, with a stronger emphasis on the public policy interest of all governments," and should be based on two principles ranging from "it should not replace existing mechanisms or institutions" to "it should contribute to the sustainable stability and robustness of the Internet." According to my European colleagues, this proposal was raised to bridge differences between China and U.S.

          When I was reading about this in 2005, I failed to see the value of the proposal itself and the significance of the role of EU in this grand dispute because I disliked state interference. In retrospect, both the EU proposal and the EU's role were a viable solution that accurately reflected the multi-stakeholder principle in Internet governance. One would expect that the U.S. would respond positively to the EU's stance because it clearly stated that the new model should not replace existing mechanisms, but U.S. simply said no.

          Why was U.S. so afraid of a European role? In 2005, Internet policy researchers did not fully grasp the reason why the U.S. preferred a G-2 mechanism when over 170 states and over 600 civil society groups who wanted to share their concerns. At that time, Internet policy researchers believed the U.S. did not approve of the word "public" in the proposal. After all, European values of public service media are inconsistent with the American view of private media. In hindsight, I believe that the U.S. dismissed the EU proposal because it will limit their power to manipulate public opinion.

          This psychological mechanism works particularly well regarding free speech and cyber attacks. Holding leverage makes it easy for the U.S. to strike a deal with China alone. Microsoft, Cisco, Yahoo, Skype, Sun Microsystems are all big players. When there isn't a deal, challenging China is just as simple, easy, and cheap. China can be made to look like whatever scapegoat the U.S. public wants; it can be a hero saving world economy or it can be an aggressor coming to gobble the U.S. up. It is one of the few nations that U.S. foreign policy advisers can still apply their public animosity skills. However, having the EU act as a middleman would complicate this game, so the U.S. rejected the idea.

          The only solution to the U.S.-China dispute over Internet governance in general, and cyber security in particular, is for U.S. policy-makers to realize that this is not a bilateral matter. Disputes like this are transnational in nature and involve many stakeholders. The failure at the WSIS summits has created lasting complications. The Google/U.S.-China row is only a very small fraction of the overall disputes, and this fraction is made visible by American officials because it played into their domestic needs.

          After the failures of the 2003-05 WSIS negotiations, the world was increasingly led by U.S. foreign policy makers and commercial media companies. 2010 onwards has been particularly disastrous. In January 2010, Hillary Clinton delivered a well-known speech at Newseum calling for more Internet freedoms. In March 2010, Google showcased its formal withdrawal from China citing cyber attacks. In May 2010, the Pentagon launched the U.S. Cyber Command, and in May 2010, the U.S. State Department gave 1.5 million dollars to the so-called Global Internet Freedom Consortium directly affiliated with Falun Gong. In June 2010, computer malware Stuxnet -- widely believed to be created by U.S. and Israel -- was discovered in Iranian and Indonesian computers. In May 2011, President Barack Obama signed an executive order laying out cyber-war guidelines, and two weeks ago, Obama signed a new executive order to strengthen cyber defenses. Most recently, Mandiant released its report titled "APT1: Exposing One of China's Cyber Espionage Units".

          Motivated by U.S. attempts to weaponize Internet, nations such as the U.K., South Korea, Germany and Iran followed suit to increase cyber war capabilities. The more energy the U.S. wastes on accusing and attacking others, the more the world community feels threatened by the U.S. monopoly on Internet governance. The more other nations challenge the U.S. in forums such as ITU, the more U.S. state authorities and businesses find it necessary to create a scapegoat. U.S. concerns ranging from creating jobs in the Pentagon to bringing jobs home through trade wars will only hurt global economic growth. It is not the way the world works. It is much ado about nothing.

          The author is associate professor at Communication University of China.

          Most Viewed Today's Top News
          ...
          主站蜘蛛池模板: 97精品尹人久久大香线蕉| 最新亚洲精品国偷自产在线| 久久亚洲精品情侣| 色吊丝一区二区中文字幕| 精品无码久久久久国产电影| 亚洲欧洲日产国产av无码| 五级黄高潮片90分钟视频| 亚洲无av码一区二区三区| 国产偷窥熟女高潮精品视频| 欧美性大战xxxxx久久久√| 久久精品国产福利亚洲av| 亚洲一区二区中文av| 国产香蕉精品视频一区二区三区| 亚洲国产精品色一区二区| 国产欧美日韩亚洲一区二区三区| 无码欧亚熟妇人妻AV在线外遇| 精品无码国产污污污免费| 日韩午夜在线视频观看| 午夜在线欧美蜜桃| 日韩av片无码一区二区不卡 | 无码抽搐高潮喷水流白浆| 2021国产精品视频网站| 亚洲少妇人妻无码视频| 欧美乱码卡一卡二卡四卡免费| 猫咪网网站免费观看| 99精品国产一区二区三区不卡 | 欧美xxxxhd高清| 亚洲精品乱码久久观看网| 国产精品亚洲а∨天堂2021| 一本久久a久久精品综合| 欧美一区二区三区欧美日韩亚洲 | 国产中文字幕精品在线| 亚洲综合精品一区二区三区 | 国产亚洲精品在av| 人妻无码中文专区久久app| 国产女人被狂躁到高潮小说| 亚洲男人在线天堂| 国内精品久久人妻无码网站| 99久久精品午夜一区二区| VA在线看国产免费| 日本一区二区三区18岁|