Greg Austin, Professorial Fellow at the EastWest Institute
May 26, 2015
Is it government policy in China to pass on commercial secrets obtained via cyberespionage to civil sector firms?
Li Zheng, Assistant Research Processor, China Institutes of Contemporary International Relations
May 15, 2015
Fear-mongering about efforts to improve Internet security ignores an important reality: The new rules may bring bigger and better opportunities for cooperation between Chinese and American technology firms.
Franz-Stefan Gady, Associate Editor, Diplomat
Mar 25, 2015
China’s controversial new anti-terrorism law would require foreign companies to install “backdoors” to give authorities remote access to computers and networks, and has been placed under review due to Western concerns. Since China still has to rely on foreign technology in the immediate future, the law might have been used to tell the United States government not to engage in what Beijing called “reckless behavior,” or to further expose U.S. hypocrisy in its own cyber espionage practices.
Wang Yuzhu, Research Fellow, Institute for World Economy Studies, SIIS
Mar 12, 2015
The U.S. is concerned over China’s new anti-terrorism law due to additional network security regulations that would affect its enterprises in China. Since Chinese governments, banks, and research institutes are almost entirely dominated by foreign IT companies, there is justified concern over domestic cyber security. Strict regulation in law could ensure that all investors are treated equally without favoritism.
Franz-Stefan Gady, Associate Editor, Diplomat
Mar 03, 2015
The USCC assessment on the weaknesses of China’s People’s Liberation Army (PLA) offered little new analysis on PLA’s cyber-warfare capabilities. This is due to impossibility of finding a comprehensive assessment of China’s military cyber capabilities on the public record. Much of the debate surrounding the PLA’s cyber war capabilities is mere speculation based on evidence of its undoubted success in cyber espionage.
Stephen Harner, Former US State Department Official
Feb 26, 2015
China’s Great Firewall restricts access to the main Internet communication platforms in the U.S. (Facebook, Twitter, Google), thus leading to a general western perception that China lacks Internet openness and access altogether. Stephen Harner argues that Internet protectionism actually allowed China to create rival services (Baidu, Alibaba, Tencent) that have developed into a thriving Internet industry.
Franz-Stefan Gady, Associate Editor, Diplomat
Jan 15, 2015
Lu Wei, China’s cyber czar has stressed “cyber sovereignty” as China’s official Internet policy. While the recent Sony hack may reveal that China was complicit in the unlawful breach of cyber norms, Gady argues that China and the U.S. need to find less politically sensitive ways to cooperate on mutually beneficial Internet issues, while circumventing their disagreements in other domains.
Lu Chuanying, Fellow and Secretary-general of the Research Center for the International Governance of Cyberspace, SIIS
Jan 12, 2015
The recent Sony hack should increase dialogue between China and the U.S. on how to respond to cyber attacks and how to improve cooperation in cyber governance. Both countries are suspicious of the other’s activities, but existing interconnected Internet infrastructure requires new forms of dialogue and accountability.
Nathan Gardels, Editor-in-chief, THEWORLDPOST
Dec 23, 2014
China’s leaders need to look hard at the “Chinese Dream” they are trying to realize for their country and decide if that dream rests more on cooperation at this critical moment with the world’s other largest economy, the United States, or on an absurd and outdated allegiance to the bizarre and historically obsolete feudal regime of the Kim family in Pyongyang.
Lu Wei, Minister, China's State Internet Information Office
Dec 16, 2014
China-U.S. relations in the field of the Internet is now an important component of the new model of major power relationship. To a great extent, the Internet will decide the future of both countries.