Greg Austin, Professorial Fellow at the EastWest Institute
Aug 06, 2013
The United States is racing for the technological frontier in military and intelligence uses of cyber space. It is ahead of all others, and has mobilized massive non-military assets and private contractors in that effort.
Dan Steinbock, Founder, Difference Group
Jul 26, 2013
After the Snowden disclosures, U.S.-China cybersecurity issues threaten to spill over into economic relations. A series of bilateral initiatives would pave the way for multipolar cooperation.
Chen Ping, Deputy managing editor, Global Times
Jul 25, 2013
Six decades after the Korean War (1950-53) was ended by the signing of an armistice agreement, the two Koreas are still technically at war. The fragile truce, signed on July 27, 1953, has contributed to the volatility and hostility seen on the Korean Peninsula today.
Zhou Bo, Senior Fellow, Center for International Security and Strategy, Tsinghua University
Jul 18, 2013
For the Chinese military to become more transparent, the west needs to convince China that their intentions are not ill and, above all, win trust from China, writes Zhou Bo.
Chen Xiangyang, Director and Research Professor, CICIR
Jul 16, 2013
Are Russia and China attempting to counter US and Japanese influence in the Asia-Pacific by undertaking joint military exercises? Following Joint Sea-2013, Chen Xiangyang attempts to answer this question and explain the impact of China and Russia’s strategic partnership on the region.
Joan Johnson-Freese, Professor, US Naval War College
Jul 12, 2013
Since 2007, China's anti-satellite (ASAT) weapons program has grown substantially, including several highly protested tests and launches from. While many countries have developed ASAT weapons, it has been far more difficult to establish an internationally accepted set of rules to govern the use of these systems.
Fu Mengzi, VP, China Institutes of Contemporary Int'l Relations
Jul 11, 2013
China should be confident that justice is on its side, and demand that the US earnestly stop infringement and strengthen cyber security cooperation with China, writes Fu Mengzi.
Chen Jimin, Guest Researcher, Center for Peace and Development Studies, China Association for International Friendly Contact
Jul 10, 2013
Examining the implications of US intelligence programs following Edward Snowden’s leaking of classified intelligence documents, Chen Jimin posits that this dramatic international incident could be truly historic if major powers come together in cooperation to address the gaps in global cyber security norms.
Yoon Young-kwan, Professor Emeritus of International Relations, Seoul National University
Jul 10, 2013
The time has come for China to rebalance its traditional geostrategic interests with its new role as a global leader – and that means adopting a policy of disciplined engagement toward North Korea. Only then will an internationally coordinated response to the North's nuclear ambitions be possible.
Su Xiaohui, Deputy Director of Int'l & Strategic Studies, CIIS
Jul 05, 2013
Faced with harboring Edward Snowden and damaging the US-China relationship; or returning him to the United States and inducing anger from Chinese citizens, Su Xiaohui argues that the Chinese government’s chosen actions revealed great restraint.