Tom Watkins, President and CEO of the Economic Council of Palm Beach County, FL
Mar 15, 2013
As tensions over cyber security increase between US and China, diplomats in both countries are walking a tightrope to resolve an issue that has become too big to ignore. Regardless of the differences, both must find a way to navigate the cyber security waters before it leads to a situation that spins out of control.
Li Zheng, Assistant Research Processor, China Institutes of Contemporary International Relations
Mar 08, 2013
The release of the Mandiant report may become an opportunity for China and the U.S. to open a pragmatic dialogue on cyber issues as well as in the military area, writes Li Zheng.
Yang Jian, VP of the Shanghai Institutes for International Studies
Feb 28, 2013
During the Cold War, deterrence was a strategy used to dissuade other nations from using nuclear weapons. Now, in order to avoid a cyber arms race, Yang Jian encourages the United States to end its strategy of cyberspace deterrence and institute a paradigm shift embracing global collective security.
Franz-Stefan Gady, Associate Editor, Diplomat
Feb 25, 2013
The most recent revelations of the activities of the Chinese Army Unit 61398 through the computer firm Mandiant has given the impression that the United States is entering a new phase of cyber conflict with the People’s Republic of China.
Feb 22, 2013
The recent allegation that Chinese military was behind hacker attacks” against US websites by certain US firms and media are not only annoying but also laughable, write officers at China's Ministry of National Defense.
Greg Austin, Professorial Fellow at the EastWest Institute
Feb 21, 2013
Although some Obama advisers have recommended harsh action in response to China’s cyberespionage, China is unlikely to respond as they may hope. The spying will continue and probably intensify regardless of what the United States does.
Zhang Yixuan, Editor of People’s Daily overseas edition
Feb 07, 2013
The New York Times recently claimed it was “attacked by Chinese hackers,” but the US has yet to produce any damning evidence to support the wild accusations.
Min Jiang, Assistant Professor of Communication at the UNC – Charlotte
Feb 06, 2013
This essay dissects the implications of China’s “Internet Sovereignty” policy following WCIT-12. Offered as an alternative vision to the U.S.’s “Internet freedom” agenda, the Chinese approach holds sway in the Global South as we enter a new Internet world no longer dominated by liberal democracies.
Franz-Stefan Gady, Associate Editor, Diplomat
Dec 21, 2012
Similar to the fictional “missile gap” during the Cold War, Franz Stefan-Gady argues that a the China-US relationship is in danger of falling into a fictional “cyber weapons gap.”
John J. Hamre, President and CEO of the Center for Strategic and International Studies
Dec 12, 2012
Every businessman that I know has experienced serious cyber attacks on his/her company. One CEO told me recently his company gets 60,000 attacking emails a day