PRC JOURNAL: CHINA, US SHOULD STRENGTHEN DIALOGUE, COOPERATION ON CYBER SECURITY
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
06586901
Release Decision:
RIPPUB
Original Classification:
U
Document Page Count:
7
Document Creation Date:
December 28, 2022
Document Release Date:
March 2, 2017
Sequence Number:
Case Number:
F-2016-02039
Publication Date:
May 7, 2013
File:
Attachment | Size |
---|---|
![]() | 263.01 KB |
Body:
�
Approved for Release: 2017/02/15 C06586901
UNCLASSIFIED//
ENVELOPE
RAAUZYUW RUEIFBS2555 1270158�UUUU--RUZDZSE.
ZNR UUUUU ZUI RUEOMCG2742 1270159
HEADER
070158Z MAY 13
FM OSC RESTON VA
TO RUZFNEL/547IS NELLIS AFB NV
RUZDADA/AFIAA AMHS BOLLING AFB DC
RAYWAP/ATTORNEY GENERAL D BRANCH
RUZDADA/BUREAU OF ALCOHOL TOBACCO FIREARMS WASHI
RUEPPOG/CDR PSYOPGP FT BRAGG NC//ASOF�POG�SB//
RUOIAAA/CDR USPACOM HONOLULU HI
RUZFMXI/CDR USTRANSCOM INTEL CELL SCOTT AFB IL
RUEPNGA/CDRNGIC CHARLOTTESVILLE VA
RUEPWDC/DA AMHS WASHINGTON DC
RHEBAAA/DEPT OF ENERGY WASHINGTON DC//IN-1//
ZEN/DEPT OF TREASURY WASHINGTON DC
RHEFDIA/DIA WASHINGTON DC
RAYASAJ/DIO CANBERRA
RUEPMAX/GISA FT BRAGG NC
RAYAIK/HQJOC WASP
RUZDJWC/JWAC DAHLGREN VA
RUZDNAI/NASIC WRIGHT PATTERSON AFB OH
ZEN/NGA WASHINGTON DC
RUETIAA/NSACSS FT GEORGE G MEADE MD
RAYWBFA/ONA CANBERRA
RUCXONI/ONI WASHINGTON DC//2140//
RHHJJPI/PACOM IDHS HONOLULU HI
RUEKJCS/SECDEF WASHINGTON DC
RUEHC/SECSTATE WASHINGTON DC//INR//
RUDWNCR/SUSLAK SONGNAM KOR
RHHJRAP/USARPAC INTEL FT SHAFTER HI//APIN//
RUCQSAB/USSOCOM INTEL MACDILL AFB FL
BT
CONTROLS
UNCLAS
SECTION 1 OF 3
QWQ
CITE OSC RESTON VA 985122
UNCLASSIFIED//
(b)(3)
21 of 32 3/19/2016 8:33 AM
Approved for Release: 2017/02/15 C06586901
Approved for Release: 2017/02/15 C06586901
UNCLASSIFIED//
WARNING: TOPIC: INTERNATIONAL POLITICAL, MILITARY, TELECOM
SERIAL: CPP20130424787010
/******** THIS IS A COMBINED MESSAGE ********/
BODY
COUNTRY: CHINA, UNITED STATES
SUBJ: (U) PRC JOURNAL: CHINA, US SHOULD STRENGTHEN DIALOGUE,
COOPERATION ON CYBER SECURITY
SOURCE: BEIJING LIAOWANG IN CHINESE 15 APR 13 NO. 15,
P 52(U)
TEXT:
(U) Article by Shen Yamei: "The United States Sets Off a
Cyberspace 'Supremacy Offensive'"
Publications
OSC Translated Text
(U) This product may contain copyrighted material; authorized use
is for national security purposes of the United States Government
only. Any reproduction, dissemination, or use is subject to the
OSC usage policy and the original copyright.
The United States has always viewed the world with an intense
hegemonic logic, and it has been difficult for them to
scientifically acknowledge the new changes in their own
environment and the international environment, to say nothing of
objectively acknowledging China.
Recently, for no reason at all, US officials have denounced
Chinese Internet secret-stealing activities as being a threat to
US security, stirring up a "China Internet threat theory" and
greatly elevating Internet problems as large problems in Sib-US
relations. This is interfering with the hard work of China's
current development of a new model major power relationship with
the United States. China must expose the motives of the United
States in this round of attacks, and at the same time, must also
cleverly eliminate differences of opinion between China and the
UNCLAS SUIEW
22 of 32 3/19/2016 8:33 AM
Approved for Release: 2017/02/15 C06586901
Approved for Release: 2017/02/15 C06586901
UNCLASSIFIED//
United States in terms of Internet development and applications.
China must work hard to transform cyberspace into a new domain
for Sino-US dialogue and cooperation.
From the official speeches regarding the national situation since
Obama's reelection, Assistant to the President for National
Security Affairs the National Security Advisor Donilon's speech
to the Asia Society, the remarks of Under Secretary of State
Hormats on a recent visit to China, etc., it is apparent that the
United States is putting every effort into using these trips to
seize the high ground in cyberspace for the future. The United
States has defamed China's Internet development from the
economic, political, security, and other levels, and deduced from
it a reproduction of the "China threat theory." In one aspect,
this is also a manifestation of the fact that the United States
has always viewed the world with an intense hegemonic logic, and
it has been difficult for them to scientifically acknowledge the
new changes in their own environment and the international
environment, to say nothing of objectively acknowledging China.
The root origin of the various problems between China and the
United States rests in the ebb and flow of the two sides' power
and the obvious changes in attitudes. The United States has
always held very deep strategic misgivings about China.
Economically, faced with the phenomenon of a large-scale shifting
of wealth within the current international system ti xi, the
United States has been unwilling to acknowledge the natural
endowment of resources and system zhi du advantages that have
brought about a rapid development of the Chinese economy, and at
the same time, it has also been unwilling to squarely face the
deep-level structural issue of a modest decline in its own
competitive ability. Instead, it is blaming this on the outside
world's activities of stealing via the Internet US intellectual
property rights and commercial secrets, and it has illogically
shifted "the majority of the blame" onto China. This aspect
exposes the US sense of egotistic self-important stubbornness.
It is even to the point that the United States has distorted the
overall trend in the international situation of "the East rising
and the West declining" since the financial crisis into the
relevant nations pirating US developmental achievements. In
another respect, this denouncement also completely overlooks the
arduous hard work of the other nations of the world, including
China, in search of development on the road to reform.
Politically, the United States is anxiously establishing
UNCLASSIFIED//
23 of 32 3/19/2016 8:33 AM
Approved for Release: 2017/02/15 C06586901
Approved for Release: 2017/02/15 C06586901
UNCLASSIFIED//
behavioral standards for cyberspace, and they have come out with
this regulation formulation process with the intention of
crowding out China. The techniques of the United States in vying
for supremacy in the Internet domain share the same lineage with
its usual tricks used in the handling of geopolitical issues in
the Asia-Pacific, the Middle East, etc., namely, first building
up and maintaining low intensity tension over the relevant issue,
and then appearing to step in as an intermediary, a balancer, or
mediator. Essentially, the United States is using the process of
establishing rules and regulations, in which it is the leader, to
constrain the other participants. Actually, back in August 2011,
China, Russia, and other nations had already submitted a draft
for an "international conduct standard for informati on security"
to the United Nations, proposing that the international community
formulate and implement international cyberspace standards. But
the United States is now re-issuing a proposal of similar
content, ignoring the contribution that China has already made to
the international conversation on Internet security, and this
exposes their global Internet strategy of a supremacy offensive.
/****** BEGINNING OF SECTION 2 ******
CITE OSC RESTON VA 985122
In terms of security, the United States needs to establish a
target, and thereby drape its Internet attack activities in a
veneer of legality and ethics. In recent years, the United States
has strengthened its cyber warfare preparations, formulated cyber
warfare regulations, and promoted a cyber command headquarters to
increase and accelerate the intensity and speed of cyber military
building. It has already incisively and thoroughly brought into
play its advantages in network security technology and in policy
and mechanism management. In the 2011 Strategy for Operating in
Cyberspace, the US Department of Defense clearly listed the
Internet as the fifth battlefield after sea, land, air, and
space. It even stated that it would take military action against
serious Internet attack activities. The US Government, Congress,
military, media, and interest groups have coordinated with each
other to contemptuously accused China of developing strategic
Internet weapons, concoct lies about China carrying out Internet
attacks against the US key infrastructure, and the like. They
are using this to get their own piece of the pie in the national
political agenda, the defense budget, and other actual
interests.
In reality, it is the US' own actions in the domain of cyber
UNCLASSIFIED//
24 of 32 3/19/2016 8:33 AM
Approved for Release: 2017/02/15 C06586901
Approved for Release: 2017/02/15 C06586901
UNCLASSIFIED//
offense and defense that have put people in a state of high
vigilance. In the example of the Iran nuclear issue, the United
States kicked off a war of attrition early on in network,
intelligence, and other secret action domains. In June of last
year, The New York Times revealed that a network attack plan
codenamed "Operation Olympic Games," that was aimed at Iran's
nuclear facility, was formulated during the George W. Bush
administration, and that after Obama took office, he accelerated
the progression of this plan. Iran has frequently suffered
computer virus attacks in recent years that have caused the
Bushehr nuclear power plant, the Natanz uranium enrichment base,
large petroleum corporations' internal networks, network
operators, and other such industrial companies, as well as
electronic government affairs and civilian networks, to be
affected. It is publicly accepted that the main actors behind
the scenes are the United States and Israel. US intelligence
evaluations have also pointed out that the 2010 "Stuxnet"
computer virus delayed Iran's possession of nuclear power by at
least a year and a half. Some scholars in the United States have
even recommended that Congress win US hackers over to its side,
and that if they agree to only attack those nations and entities
approved by Congress, then the government would give them
immunity from prosecution, or even provide them with funding. It
is obvious at a glance who is building a hacker empire.
In the Chinese view, the frequent occurrence of global Internet
security incidents has really increased the urgency to protect
Internet security. Still Internet attacks possess the
characteristics of being transnational, anonymous, and deceptive.
There is a great deal of uncertainty about the origin of the
attacks, and this makes it difficult for any given nation
fighting alone to achieve absolute Internet security. The issue
of Internet security can completely become an excellent platform
for creating international cooperation.
At this time, as the new content in international relations of
the transition of authority between a rising power and the power
holding onto its position is bestowed upon Sino-US relations, the
differences of opinion and conflicts between China and the United
States h ave seen a trend of being distributed over a wider area,
running deeper, and being more closely connected. Scientifically
acknowledging the differences of opinions is helpful to making
the development of a new model major power relationship achieve
possession of a definite object in view and pointedly putting an
end to the drama of power politics. One could say that the
conflicts and differences of opinions between China and the United
UNCLASSIFIED//
25 of 32 3/19/2016 8:33 AM
Approved for Release: 2017/02/15 C06586901
Approved for Release: 2017/02/15 C06586901
UNCLASSIFIEDll
States in the aspect of Internet security are by no means
fundamental or irreconcilable, but rather, that they contain the
advantageous conditions for being transformed into conversation
and cooperation, and they will not have a destructive effect on
Sib-US relations by any means. Based on the considerations for
building a new model major power relationship and promoting the
establishment of international cyberspace regulations, the two
nations of China and the United States should strengthen dialogue
and actively promote cooperation in the areas of striking out
against Internet crime and the administration of the Internet to
reach more understanding and consensus on cyber sovereignty and
military control of the Internet. The Chinese are steadfast
advocates of Internet security cooperation, and they are
optimistic about China and the United States holding more
frequent direct conversations about this, and seeking to solve
the problems through normal law enforcement cooperation and
consultation while working hard to make the Internet become an
active factor in spurring Sino-US relations.
Description of Source: Beijing Liaowang in Chinese -- weekly
general affairs journal published by China's official news agency
Xinhua, carrying articles on political, social, cultural,
international, and economic issues
Source Metadata
Source
Source
Source
Source
Source
Source
Name:
Type(s):
City:
Country:
Start Date:
End Date:
Language(s):
Article Metadata
Document ID:
Content Type:
/****** BEGINNING OF
Processing Ind:
Precedence:
Country(s):
Region(s):
Subregion(s):
Topic(s):
Attachments:
Liaowang
Publications
Beijing
China
15 Apr 13
15 Apr 13
Chinese
CPP20130424787010
Translation/Transcription
SECTION 3
******
OSC Translated Text
Routine
China, United States
Asia, Americas
East Asia, North Americas
INTERNATIONAL POLITICAL, MILITARY, TELECOM
UNCLASSIFIEDll
26 of 32 3/19/2016 8:33 AM
Approved for Release: 2017/02/15 C06586901
Approved for Release: 2017/02/15 C06586901
UNCLASSIFIED//
(Attachment not included: C2P20130424787010001.pdf) 1w0415s.pdf
(U) This product may contain copyrighted material; authorized use
is for national security purposes of the United States Government
only. Any reproduction, dissemination, or use is subject to the
OSC usage policy and the original copyright.
CABLETYPE: FBISEMS ACP 1.0.
AD1VIIN
BT
#2557
NNNN
UNCLASSIFIED//
27 of 32 3/19/2016 8:33 AM
Approved for Release: 2017/02/15 C06586901