<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          US EUROPE AFRICA ASIA 中文
          Opinion / Web Comments

          Interpreting the second wave of cyber security threats to China

          By Xu Peixi (China.org.cn) Updated: 2013-03-04 18:05

          The U.S. has two times challenged China in the field of Internet governance. The first challenge came in the form of a speech delivered by former U.S. Secretary of State Hillary Clinton on Internet freedom following Google's withdrawal from the Chinese mainland. The second came earlier this month as a private security firm, Mandiant, released a report accusing the Chinese military of stealing U.S. intellectual property.

          I have discussed the first attack in an earlier publication. How to make sense of this new offensive -- a seemingly scheduled escalation -- of the previous hostility in terms of both rhetoric and substance? Observers feel reluctant to comment on the Mandiant report because they fail to understand the technical details. However, it is fairly easy to make sense of this dispute by reading the report itself and by some creative thinking.

          An important point to consider is that the China-U.S. conflict over Internet governance can be traced back to the first World Summit on Information Society (WSIS) in Geneva, 2003. China insisted on the role of state leadership in Internet governance, while the U.S. proposed market leadership. Both countries had their own reasons. For China, the state plays an important role in development and market issues. State authorities also manage the media to maintain social stability. The U.S. will not loosen its grip over core Internet resources because it is a gathering place for a myriad of commercial interests.

          The EU then offered to broker a deal between the two parties. In June 2005, the EU Council of Ministers outlined its position on Internet governance by proposing a new cooperation model to solve conflicts over the management of the Internet's core resources, namely the domain names systems, IP addresses, and the root server system. This new cooperation model stated that "the existing Internet governance mechanisms should be founded on a more solid democratic, transparent and multilateral basis, with a stronger emphasis on the public policy interest of all governments," and should be based on two principles ranging from "it should not replace existing mechanisms or institutions" to "it should contribute to the sustainable stability and robustness of the Internet." According to my European colleagues, this proposal was raised to bridge differences between China and U.S.

          When I was reading about this in 2005, I failed to see the value of the proposal itself and the significance of the role of EU in this grand dispute because I disliked state interference. In retrospect, both the EU proposal and the EU's role were a viable solution that accurately reflected the multi-stakeholder principle in Internet governance. One would expect that the U.S. would respond positively to the EU's stance because it clearly stated that the new model should not replace existing mechanisms, but U.S. simply said no.

          Why was U.S. so afraid of a European role? In 2005, Internet policy researchers did not fully grasp the reason why the U.S. preferred a G-2 mechanism when over 170 states and over 600 civil society groups who wanted to share their concerns. At that time, Internet policy researchers believed the U.S. did not approve of the word "public" in the proposal. After all, European values of public service media are inconsistent with the American view of private media. In hindsight, I believe that the U.S. dismissed the EU proposal because it will limit their power to manipulate public opinion.

          This psychological mechanism works particularly well regarding free speech and cyber attacks. Holding leverage makes it easy for the U.S. to strike a deal with China alone. Microsoft, Cisco, Yahoo, Skype, Sun Microsystems are all big players. When there isn't a deal, challenging China is just as simple, easy, and cheap. China can be made to look like whatever scapegoat the U.S. public wants; it can be a hero saving world economy or it can be an aggressor coming to gobble the U.S. up. It is one of the few nations that U.S. foreign policy advisers can still apply their public animosity skills. However, having the EU act as a middleman would complicate this game, so the U.S. rejected the idea.

          The only solution to the U.S.-China dispute over Internet governance in general, and cyber security in particular, is for U.S. policy-makers to realize that this is not a bilateral matter. Disputes like this are transnational in nature and involve many stakeholders. The failure at the WSIS summits has created lasting complications. The Google/U.S.-China row is only a very small fraction of the overall disputes, and this fraction is made visible by American officials because it played into their domestic needs.

          After the failures of the 2003-05 WSIS negotiations, the world was increasingly led by U.S. foreign policy makers and commercial media companies. 2010 onwards has been particularly disastrous. In January 2010, Hillary Clinton delivered a well-known speech at Newseum calling for more Internet freedoms. In March 2010, Google showcased its formal withdrawal from China citing cyber attacks. In May 2010, the Pentagon launched the U.S. Cyber Command, and in May 2010, the U.S. State Department gave 1.5 million dollars to the so-called Global Internet Freedom Consortium directly affiliated with Falun Gong. In June 2010, computer malware Stuxnet -- widely believed to be created by U.S. and Israel -- was discovered in Iranian and Indonesian computers. In May 2011, President Barack Obama signed an executive order laying out cyber-war guidelines, and two weeks ago, Obama signed a new executive order to strengthen cyber defenses. Most recently, Mandiant released its report titled "APT1: Exposing One of China's Cyber Espionage Units".

          Motivated by U.S. attempts to weaponize Internet, nations such as the U.K., South Korea, Germany and Iran followed suit to increase cyber war capabilities. The more energy the U.S. wastes on accusing and attacking others, the more the world community feels threatened by the U.S. monopoly on Internet governance. The more other nations challenge the U.S. in forums such as ITU, the more U.S. state authorities and businesses find it necessary to create a scapegoat. U.S. concerns ranging from creating jobs in the Pentagon to bringing jobs home through trade wars will only hurt global economic growth. It is not the way the world works. It is much ado about nothing.

          The author is associate professor at Communication University of China.

          Most Viewed Today's Top News
          ...
          主站蜘蛛池模板: 韩国午夜福利片在线观看| 91年精品国产福利线观看久久| 国产一区二区三中文字幕| 天天操夜夜操| 国产亚洲精品中文字幕| 久久伊人色| 图片区小说区av区| 国产真人无码作爱视频免费| 亚洲乱理伦片在线观看中字| 116美女极品a级毛片| 精品偷拍一区二区视频| 亚洲国家av一区二区| 在线A级毛片无码免费真人| 国产在线观看免费观看不卡| 欧美中文字幕在线看| 中文字幕亚洲综合小综合| 老王亚洲AV综合在线观看| 亚洲人成色7777在线观看| 国产激情一区二区三区在线 | 大地资源高清免费观看| 国产熟女精品一区二区三区| 国产99视频精品免费视频36| 日韩中文字幕高清有码| 日韩av在线一卡二卡三卡| 啊灬啊灬啊灬快灬高潮了电影片段| 亚洲中文字幕人成影院| 免费高潮了好湿h视频| 麻豆一区二区三区精品视频| 18禁无遮挡啪啪无码网站破解版| 少妇被无套内谢免费看| 久久精品国产亚洲av麻豆软件| 97亚洲色欲色欲综合网| 中文字幕国产精品二区| 国产91专区一区二区| 精品一日韩美女性夜视频| 好大好深好猛好爽视频免费| jlzz大jlzz大全免费| 亚洲色欲或者高潮影院| 久久se精品一区精品二区国产| 日本成熟少妇激情视频免费看 | 成人国产精品中文字幕|