Cyber Security Ultimately Is Military Security

Similar documents
United States Cyber Security in the 21st Century

working group on foreign policy and grand strategy

Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011

Chapter 2 Strengthening of the Japan-U.S. Alliance

Confrontation or Collaboration?

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Peaceful and Just Societies: A Key Factor in Financing for Sustainable Development

INTERNATIONAL RELATIONS

AREA STUDIES - CHINA: REGIONAL SUSTAINABLE DEVELOPMENT REVIEW Vol. III The Social Security System in China - Y. P. Liu

Is China Catching Up with the US?

China s Economic Espionage

A Detailed Strategy for Managing Corporation Cyber War Security

Standards Addressed by The Choices Program

The Implication of TMD System in Japan to China s Security

U.S. Defense Priorities OSD PA&E

APPROVED VERSION. Centro de Estudios Estratégicos de la Defensa Consejo de Defensa Suramericano Unión de Naciones Suramericanas.

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Oil and Gas Industry A Comprehensive Security Risk Management Approach.

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

MILITARY STUDENT AND HIGHER EDUCATION REFORM

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

Social Informatics Today and Tomorrow: Status, Problems and Prospects of Development of Complex Lines in the Field of Science and Education

THE WHITE HOUSE Office of the Press Secretary. Annex to U.S. - Gulf Cooperation Council Camp David Joint Statement

China s Perceptions of Cybersecurity

Comprehensive Exam International Relations, January 2014

DoD CIVILIAN LEADER DEVELOPMENT FRAMEWORK COMPETENCY DEFINITIONS. Leading Change

Although the dominant military confrontations of the 20 th century were centered on the

WRITTEN TESTIMONY OF

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge

Research Note Engaging in Cyber Warfare

Strengthening U.S.-Chinese Nuclear Security Cooperation: Challenges and Solutions

New Asian Security Concept For New Progress in Security Cooperation

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

Risk Nexus: Overcome by cyber risks? Tom Bossert CDS Risk Management

PEOPLE'S REPUBLIC OF CHINA. (New York, May 4, 2010) Please Check Against Delivery MISSION TO THE UNITED NATIONS

The Global Cyber Security Market

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents

James R. Clapper. Director of National Intelligence

Cultivation of Female Vocational College Students Professionalism

An Interactive Planning Approach to Shaping U.S.-Russian Relations

The Developmental Analysis of China s Information Technology Services

It's a MAD, MAD, MAD Cyber World

Development of Public Administration in China: Since 1978 Mao Shoulong (Draft)

GRADUATE INSTITUTE OF INTERNATIONAL AFFAIRS AND STRATEGIC STUDIES

General Assembly. United Nations A/69/723

Cybersecurity. Canisius College

Cyberspace Situational Awarness in National Security System

Cyber Security Strategy of Georgia

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Espionage and Intelligence. Debra A. Miller, Book Editor

Michael Yakushev PIR-Center, Moscow (Russia)

The National Counterintelligence Strategy of the United States

22 ND ANNUAL MEETING OF THE ASIA-PACIFIC PARLIAMENTARY FORUM RESOLUTION APPF22/RES 01

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

Bank of America. Effectively Managing Performance Measurement Systems

Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett

Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership

White Paper: Cyber Hawk or Digital Dove

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)

Good morning. It is my pleasure to be here today as we begin. this workshop on improving regional responses to transnational

Chinese Local Government Performance Appraisal Based on KPI

Trends Concerning Cyberspace

Does NATO s Article V Genuinely Protect Its Members?

Policies and Practices on Network Security of MIIT

How Effective are International Approaches for Global Cyber Security?

Statement of. William D. Green. Executive Chairman of the Board, Accenture. and

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

CHAPTER 11: The Problem of Global Inequality

QUALITY OF HUMAN RESOURCES: EDUCATION Vol. I - Social and Cultural Issues of Education - E.A. Nozhin SOCIAL AND CULTURAL ISSUES OF EDUCATION

Research on the Evaluation of Internet Company

2015 Global Cyber Intelligence and Security Competitive Strategy Innovation and Leadership Award

Framework. Australia s Aid Program to Papua New Guinea

Engaging Armed Groups the practical challenges: negotiation support

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

Research Project RM Assumed role of India in the international community in the short and medium

Game theory analysis on distortion of accounting information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE PERIOD

Study on the financing methods of China's listed companies

S. ll IN THE SENATE OF THE UNITED STATES

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

China s Cybersecurity Challenges and

Cyber Diplomacy A New Component of Foreign Policy 6

CYBER WARFARE AN ANALYSIS OF THE MEANS AND MOTIVATIONS OF SELECTED NATION STATES INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE

Inhibition of an Arms Race in Outer Space

The main object of my research is :

The European Response to the rising Cyber Threat

Health Care Challenges for the 21 st Century

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

YAN XUETONG ON CHINESE REALISM, THE TSINGHUA SCHOOL OF INTERNATIONAL RELATIONS, AND THE IMPOSSIBILITY OF HARMONY

Transcription:

Cyber Security Ultimately Is Military Security Reporter: ZUO Xiaoyu You Ji Professor of Macau University, School of Social Sciences. Research Area: national security. With deepening development of cyber technology, in the future the Cyber Army and Outer-space Force will not only become new combat forces, but also will become standardized combat forces, in parallel with traditional navy and air force. The expansion of cyberspace security has a very close link to military transformation. Reporter: Strengthening the Army by Cyber Force" is the slogan that is often mentioned in today s world. Can the Cyber technology solve most present security problems that military faces? You Ji: As it is well known, the development of cyber technologies began with the military needs. In the last century, the United States gradually expanded its military cyber-networking technologies to the civilian and the business through the market, evolving and resulting in a revolutionary force we see today. It has changed

fundamentally to people's daily life, and even becomes the most basic pattern of interpersonal relations. In this case, it is a military origin that turned cyber to be massively used in economy, society and culture. But we need to make clear that, although compared to cyber defense capabilities, the commercial and civil use is more extensive and with higher profile today, still, the core of cyber is of military. In fact, the core of the cyber security is military security. If there is no reliable defense cyber network as the first line of defense, the civilian cyber network will be very fragile. So, it is a strong military cyber-security that provides the Great Wall that is indispensable to the security of civil network. Reporter: From the national cyber security strategy point of view, to win the "war without smoke, how long should China go to fill the gap to a military cyber power? You Ji: Compared to developed countries, our military cyber technology still exists with a gap. In the last decade, China s cyber technology has developed very rapidly and fast, and is gradually narrowing the gap. The basis of a military cyber is the civilian electronic and information technology. The reason that China military cyber technology lagged behind in a period of time is because of overall weakness in basic electronics industry and Internet technology in the country, and that in turn is due to the fact that the cyber technology originally was born in the West. Now through substantial money and manpower input, the electronic technology in China now has come up to a leading position in the international community. Although still there is a large gap to the United States, in some key areas, these disparities are generally eroded to less a "generation gap".

If we can make it to less than a generation gap, then the US overwhelming military cyber capabilities against its adversaries can be undermined gradually to a comparative advantage, and major clashes between the great powers may not occur because of the relative balance of technologic powers that ensures mutual destruction. Because if there is no overwhelming advantage by a major power, to take a military action a country would have to take into account the cost of the action. In most cases, the US would think twice before taking actions. So for China in terms of national security, the shortcut is to rapidly develop our asymmetrical capabilities to confront adversary forces, not just we should have a new generation of aircrafts and submarines that are tangible combat platforms, but more importantly is to have an effective and intangible means, including cyber offensive and defensive system that are both military and civilian compatible. For the last five years, what makes Americans feel nervous and anxious is China has made a significant leap forward in its capability of both tangible and intangible weapons. Reporter: On April 27, China's first cyberspace Blue Book China Cyberspace Development Report (2015) was published. In consideration of China s establishment of a national network team, organizing the World Internet Conference, and proposal of double- seven (7 bottom lines for abiding by laws and national interests of domestic cyber networks, and 7 consensuses for Cyberspace to benefit mankind) strategic initiatives, what are your opinions on top-level design of the cyberspace governance? You Ji: National top-level design and cyber capability are conflicting concepts to some

degree. As we just said, the rapid rise of China's military cyber capability is based on the capability enhancement of its civil electronics industry. Here, there is a dependent relationship: without strong basis of civil electronics industry, it will be impossible for development of military cyber technologies. In Chinese this phenomenon or relation is called water without a source, or a tree without roots. The dialectical unity of top-level design and civil technology development is that, the basic civil electronic industry and the IT industry serves as the main industry, but as it is market-oriented, it is impossible to achieve a perfect national top-level design. The horizontal market competitive pattern will drive agents to make revolutionary breakthroughs in innovation capability, thus it renders out a driving force for leapfrog development of the military cyber as a whole. IT industrial development will provide selectivity, reality and possibility for planning top-level military capacity. Vice versa, the top-down design of military cyber also sets up high technical standards and requirements for the civil industry, pushing a hand to promote the main industry to develop. So this is an interdependent relationship. On the one hand, we emphasize government s appropriate input and intervention into the innovation or private areas, so to the best degree to play out private capital and innovative capabilities. On the other hand, we can turn private innovations into the practical capabilities - whether be it used for military or civilian- that is, in other words, to turn the power of knowledge into the achievements of high information technologies. No technical capability, no basis for national top-level design. Vice versa, no top-level design, it is difficult to get the cyber products into military capabilities. This is a complementary, independent relationship. National top-level design is very important, but it could not bring us with innovative designs, by the opposite, it could devise out imperfect or even

fault designs. So, it is a complex interaction that requires careful studies. Reporter: How can civil technology powers communicate with the top-level designers? You Ji: Shanghai forum as a platform facilitates very good communications. As scholars, we generally can sketch out some long-term trends in our speeches at the forum, particularly the keynote speech on big data by Professor Hui Zhibin which provides policy-makers a new way of thinking and brainstorming, and a new inspiration for design. Based on the international prospective forecasts, policy makers can make targeted planning, and this is the essence and significance of Shanghai Forum. Unfortunately, as a representative of the industry, Huawei's cyber security office didn t send a person to the Forum. Combining civil and academic forces is very important. My speech is a forward-looking forecast, and is relatively theory-based; while the Big Data research by Professor Hui Zhibin is more practical and operation-oriented that provides a richer, more detailed stuff for overall direction of the top level design. Russian scholars and American scholars present at the Forum made framework depictions from the perspectives of international scale and concepts. It could be used or implemented for the government policy making and management of the cyber networks, including governance of the government network system and governance of civil Internet interaction. Such speeches can be very good references. We hope we can make greater use of the platform-- Shanghai forum, to communicate and exchange with the industry elites.

Reporter: Global cyberspace order has developed from the beginning of spontaneous presence to present stage s conscious adjustment. At the "turning point of cyberspace governance, can you talk about your predictions on the future of global cyberspace order? You Ji: This is a complex issue. The US has dominant advantages in cyberspace power in today's world. If the US is willing to use the technological advantage to benefit the mankind, then mankind will get benefited. But if it uses it to attack, repress or retaliate against other countries, it could lead to a further militarization of the Internet technology, resulting in increase tensions in inter-state relations, and resulting in higher possibility of confrontations between countries because of the US cyber hegemony. The relatively eased environment currently could therefore fall into a more violent conflict. For example, should the US insists to prosecute the six PLA armymen discussed in the forum, it obviously would not be conducive to a healthy development of bilateral relations between it and China. We hope that peaceful use of cyber technology can become a principle that can be widely accepted worldwide, allowing it to better serve to the mankind.