男女羞羞视频在线观看,国产精品黄色免费,麻豆91在线视频,美女被羞羞免费软件下载,国产的一级片,亚洲熟色妇,天天操夜夜摸,一区二区三区在线电影
US EUROPE AFRICA ASIA 中文
Opinion / Op-Ed Contributors

Best way to fight cyber threat

By Wang Honggang (China Daily) Updated: 2014-07-25 07:40

It seems that the US has mastered the art (and science) of using its cyber power to keep churning out claims that run counter to facts in order to maintain its hold over other countries as far as information technology is concerned and prevent the leak of its essential commercial and state secrets. Su's case is the latest US effort to use, as it alleges, "rampant Chinese industrial espionage" as an excuse to continue and intensify its espionage.

Washington has come under fire since Snowden exposed the NSA's global surveillance program. Also, Snowden's revelations compelled many countries to take counter-espionage measures against the US. As a result, the US has become desperate to turn the tide of global opinion by launching a publicity campaign to justify its cyber surveillance program on the pretext that it is meant to predict and mitigate possible national security threats.

The US has been trying relentlessly to direct global attention toward China by portraying it as a country that hacks security networks of other countries to steal trade secrets. The indictment of five Chinese military officers by the US Department of Justice and the case against Su, based on muddy facts and lax evidence, show how desperate Washington is to distract attention from the NSA's criminal activities.

The technological advancement by China, too, is a factor prompting the US' campaign to stem cyber-enabled theft of high-tech data. China is narrowing the gap with the US in comprehensive national strength and thus putting enormous pressure on Washington to upgrade its industrial technologies. No wonder the US continues to restrict the export of high technology to China and strengthen its cyber security.

Although there has been no explicit allegation of the Chinese government's involvement in Su's case, the underlying logic of the complaint hints at Chinese entities, insinuating that the Chinese government, military and State-owned companies are the buyers of the alleged stolen data.

As a victim of cyber attack, China respects and follows all the laws of cybersecurity. The US is thus making a mockery of itself by branding China a "hacking empire" in order to maintain its cyber hegemony and blunt world anger against its global surveillance program.

The governance of cyberspace commands the concerted efforts of the international community, and despite the differences between Beijing and Washington over cybersecurity, there is enough room for dialogue and cooperation between the two major players in a wide range of cyber issues, including the formulation of norms of state behavior in cyberspace. It will be of great help to not only the two countries, but also the international community as a whole if Washington puts its differences aside to join hands with Beijing in dealing with cyber threats and making cyberspace a more secure sphere.

The author is deputy director of the Institute of American Studies at the China Institutes of Contemporary International Relations.

Previous Page 1 2 Next Page

Most Viewed Today's Top News
...
主站蜘蛛池模板: 元朗区| 那坡县| 会理县| 梁平县| 三明市| 益阳市| 嵊泗县| 若羌县| 富源县| 永州市| 周宁县| 张家界市| 利津县| 灵石县| 高州市| 康定县| 彝良县| 视频| 台东市| 运城市| 洛川县| 南召县| 松江区| 陵水| 卫辉市| 阳曲县| 嘉峪关市| 浦县| 休宁县| 舒城县| 三原县| 玉山县| 赤城县| 泽州县| 绵竹市| 芜湖县| 涪陵区| 阿巴嘎旗| 南召县| 朝阳县| 浪卡子县| 涟水县| 石渠县| 阿拉善左旗| 六枝特区| 永兴县| 雅江县| 巧家县| 开阳县| 贡嘎县| 奉贤区| 治县。| 安义县| 乌审旗| 漾濞| 盐亭县| 临安市| 宁陵县| 金门县| 积石山| 武义县| 瑞丽市| 彩票| 瑞丽市| 随州市| 林周县| 怀来县| 秦皇岛市| 云和县| 大连市| 宁晋县| 区。| 龙山县| 鹰潭市| 嘉义市| 西华县| 宜阳县| 寿阳县| 河间市| 依安县| 镇平县| 漳平市|