U.S. think tanks’ construction and enlightenment on my country’s cyber security issues

In today's globalized world,cyber securitybecome an influenceNational Securityimportant factors. In recent years, Western think tanks havecyber securityThe construction of issues and their implications has become an important research area. This article mainly analyzes the research results of the six major American think tanks on China's cyber security issues, discusses the construction of China's cyber security issues by Western think tanks and the reasons for their formation, and reveals the enlightenment for China from American and European think tanks.

Overview of the achievements of American think tanks

U.S. think tanks’ research on China’s cyber security issues mainly focuses on four aspects:cyberspace securityunderstanding of the current situation, the development prospects of China’s cyberspace, the strategic game between China and the United States in cyberspace, and the United States’ strategy to deal with China’s cyberspace strategy. Among these topics, Western think tanks generally regard China's development of cyberspace technology as a disruption and challenge to the international order, and believe that the United States needs to implement a deterrence strategy in cyberspace to prevent China from using cyberspace to undermine the United States' regional and global influence. At the same time, some think tanks believe that there is room for cooperation between China and the United States in the field of cybersecurity and call for cooperation on the basis of mutual benefit and mutual trust.Cybersecurity cooperation, jointly committed to global cyberspace security and stability.

Think tank researchThe researchers mainly come from policy-making think tanks that study international issues. They serve as the "outside brains" of the U.S. government and provide important consulting references for the U.S. government's decision-making. Many of these researchers are top experts in the field of science and technology or China issues. They have a consensus on China-related network security issues and jointly publish reports. Therefore, the views of these reports on China-related network security may directly affect the United States’ China policy in the future and have a greater influence on public opinion.

Think tank sample collection and research results

This article mainly selects relevant research results from six American think tanks: the Brookings Institution, the Center for Strategic and International Studies, the Carnegie Endowment for International Peace, the RAND Think Tank, the Center for a New American Security, and the National Bureau of Asian Research. Perform analysis. These think tanks’ research on China’s cyber security covers many levels, including the current understanding of cyber space security, the development prospects of China’s cyber space, the strategic game between China and the United States in cyber space, and the United States’ strategies to deal with China’s cyber space strategy. Through an in-depth analysis of the research results of these think tanks, we can find that Western think tanks generally regard the development of China’s cyberspace technology as a disruption and challenge to the international order.

Western think tanks’ construction of China’s cyber security issues

The construction of China's cyber security issues by U.S. think tanks is mainly carried out from four levels: economic, security, technology and policy. They generally believe that China's network security issues are closely related to its military development. China's network information technology development has a huge impact on network security. National policies have promoted the formation of China's network information strategy, and information technology has promoted the development of China's digital economy. At the same time, these think tanks regard the rise of China’s cyber technology capabilities as a challenge to U.S. authority, believe that China’s cyber strategy threatens U.S. security interests, and that China’s participation in international governance disrupts international rules.

The causes and impact of the issue construction in Western think tanks

The main reasons for the formation of Western think tanks' construction of China's cyber security issues include global power shifts, government positions, and new Cold War mentality. The global power shift has led to the fragmentation and fragmentation of the Internet, making cyberspace a new area of competition between great powers. The government's stance affects the perception of China's cybersecurity. The U.S. government's emphasis on cybersecurity and changes in its China policy have affected the construction of China's cybersecurity issues by U.S. think tanks. The new Cold War mentality has hindered the process of Sino-Western cyber cooperation, making Western think tanks more inclined to regard China as a threat in cyberspace.

The construction of these issues has had a profound impact on the global cyberspace security situation. They have not only influenced the formulation of security strategies by the United States and Europe towards China, but also shaped the public opinion of Western people towards China, and even changed the global cyberspace security situation.

The influence of Western think tank construction and China’s countermeasures

The construction of China's cyber security issues by American think tanks not only affects the government's formulation of China's security strategy, but also shapes Western public opinion on China. For example, the research results of the Brookings Institution have directly influenced the policy making of the U.S. government. For example, the risks of Chinese technology companies operating in the United States have increased the complexity of the challenges faced by U.S. policymakers and recommended that the United States implement timely data privacy legislation. . Against this background, the U.S. government launched the "Clean Network Plan" to suppress Chinese high-tech companies represented by Huawei and took a series of actions against Chinese students.

These research results have also shaped Western public opinion on China. Western think tanks have become an important platform for the United States to export values to the world. By publishing information about cyber attacks, they condemn China's unilateral actions and provide public opinion support for its crackdown on malicious behaviors in cyberspace.

Faced with this situation, China needs to adopt response strategies, including strengthening the tracking and analysis of Western think tanks to understand and respond to the West's attitudes and strategies towards China's cyber security. At the same time, China also needs tonetwork sovereigntyOn the basis of this, actively participate in and lead the international governance of cyberspace to safeguard my country’s legitimate rights and interests in cyberspace. In addition, China also needs to actively engage in in-depth cooperation with other countries on the basis of network sovereignty and seek consensus on network data sovereignty, cyber espionage, data management, etc., in order to promote the common progress of global cyberspace security.

Implications for China:

Faced with the construction of China's cybersecurity issues by U.S. think tanks, China needs to draw inspiration from them and take action. First, China needs to strengthen its tracking and analysis of Western think tanks to understand and respond to Western attitudes and strategies toward China’s cyber security. Secondly, China should actively participate in and lead the international governance of cyberspace on the basis of cyber sovereignty to safeguard my country's legitimate rights and interests in cyberspace. In addition, China should also actively engage in in-depth cooperation with other countries on the basis of network sovereignty and seek consensus on network data sovereignty, cyber espionage, data management, etc., so as to promote the common progress of global cyberspace security.

At the practical level, China should actively formulate and improveCybersecurity Lawregulations and policies to protect the countryinformation securityand combating cybercrime. At the same time, we also need to strengthen the research and development and innovation of network technology to enhance our country's strength and competitiveness in the field of network technology, so as to occupy a favorable position in the global cyberspace.

China also needs to promote the establishment of a just, equitable, open and inclusive society by strengthening exchanges and cooperation at home and abroad.Global cyberspace governance system. This will not only help enhance my country’s voice in international cyberspace, but also help promote peace, stability and development in cyberspace.

In general, in the face of American think tanks’ construction of China’s cybersecurity issues, we need to have a clear understanding, active response strategies, and firm practical actions. Only in this way can we win the initiative in the cyberspace field and ensure our country's cyber security and development.

Chief Security Insights:

The construction of China's cybersecurity issues by American think tanks has undoubtedly had a profound impact on the global cyberspace security situation. However, China has sufficient capabilities and wisdom to deal with this challenge. China will continue to firmly defend its cyber sovereignty and actively participate in and lead global cyberspace governance to safeguard national cyber security and cyber sovereignty. By strengthening the tracking and analysis of Western think tanks, China can better understand and respond to Western attitudes and strategies towards China's cyber security, thereby more effectively ensuring my country's cyber security and development.

First, China needs to strengthen its tracking and analysis of Western think tanks to understand and respond to Western attitudes and strategies towards China’s cyber security. This includes continuing to pay attention to the research trends of Western think tanks and in-depth analysis of their research results and opinions, so as to keep abreast of Western views and attitudes towards China's cyber security, so as to formulate cyber security strategies that adapt to the current international environment.

Secondly, China should actively participate in and lead the international governance of cyberspace on the basis of cyber sovereignty to safeguard my country's legitimate rights and interests in cyberspace. This includes actively promoting the international community to respect the principle of cyber sovereignty and promoting the formulation of fair, equitable, open, and inclusive global cyberspace governance rules and mechanisms. At the same time, we must also actively participate in global cyberspace governance to safeguard my country's legitimate rights and interests in cyberspace.

China should also actively engage in in-depth cooperation with other countries on the basis of network sovereignty and seek consensus on network data sovereignty, cyber espionage, data management, etc., so as to promote the common progress of global cyberspace security. This includes strengthening exchanges and cooperation with other countries in the field of cybersecurity, seeking consensus on network data sovereignty, cyber espionage, data management, etc., jointly responding to network security challenges, and promoting common progress in global cyberspace security.

Finally, China also needs to strengthen network technology research and development and innovation to enhance our country's strength and competitiveness in the field of network technology, so as to occupy a favorable position in global cyberspace. This includes strengthening the research and development and innovation of network technology, improving my country’s strength and competitiveness in the field of network technology, and thus occupying a favorable position in the global cyberspace.

In the face of the construction of China's cyber security issues by American think tanks, we need to have a clear understanding, active response strategies, and firm practical actions. Only in this way can we win the initiative in the cyberspace field and ensure our country's cyber security and development.

references:

[1] Rush Doshi, Emily de la Breuer. China as a "cyber power": Beijing's two voices in the telecommunications field [J]. Brookings Institution, April 2021.
[2] Saif Khan, Carrick Flynn. Maintaining China’s dependence on advanced computer chips [J]. Brookings Institution, April 2020.
[3] Robert Williams. Beyond Huawei and TikTok: Unpacking U.S. concerns about Chinese technology companies and digital security [J]. Brookings Institution, October 30, 2020.
[4] James Andrew Lewis, Eugenia Lostri. Artificial Intelligence Strategy and the Development of Autonomous Vehicles [J]. Center for Strategic and International Studies, April 19, 2021.
[5] William Carter. China’s progress in the field of artificial intelligence [J]. Center for Strategic and International Studies, September 30, 2019.
[6] Sam Sachs. How China’s cybersecurity standards affect business activities in China [J]. Center for Strategic and International Studies, August 2, 2018.
[7] Jonathan Hillman. Huawei’s “Safe City[J]”. Center for Strategic and International Studies, November 4, 2019.
[8] James Andrew Lewis. ZTE, Telecom Wars, and Cyber Espionage [J]. Center for Strategic and International Studies, June 25, 2018.
[9] George Perkovic, Ariel Levitt, Liu Jinghua. Sino-US cyber core C3 stability [J]. Carney Foundation, April 8, 2021.
[10] Lorand Laskaj, Adam Segal. China’s Encryption Debate[J]. Carnegie Endowment for International Peace, May 30, 2019.
[11] Gregory Allen. Understanding China’s Artificial Intelligence Strategy: Clues to China’s Strategic Thinking on Artificial Intelligence and National Security [J]. Center for a New American Security, February 6, 2019.
[12] Zhang Aimei. Warring States: China’s Cybersecurity Strategy [J]. Center for a New American Security, December 3, 2014.
[13] Emily Delabreul. Cyber Power Strategy: China’s Digital Ambition[J]. National Bureau of Asian Research, April 28, 2021.
[14] Adam Searle. China’s Vision for Cyber Sovereignty and Global Governance of Cyberspace [J]. National Bureau of Asian Research, August 24, 2020.
[15] Adam Segal. Cybersecurity in Stabilizing U.S.-China Relations[J]. National Bureau of Asian Research, September 4, 2015.

Original article, author: Chief Security Officer, if reprinted, please indicate the source: https://cncso.com/en/construction-of-cybersecurity-in-china-and-its-implications.html

Like (1)
Previous November 8, 2023 8:00 am
Next November 20, 2023 12:00 am

related suggestion