{"id":7474,"date":"2016-08-25T03:34:28","date_gmt":"2016-08-25T07:34:28","guid":{"rendered":"http:\/\/www.chinesepen.org\/english\/?p=7474"},"modified":"2016-08-25T03:34:28","modified_gmt":"2016-08-25T07:34:28","slug":"jonathan-katzenellenbogen-chinas-cyber-power","status":"publish","type":"post","link":"https:\/\/www.chinesepen.org\/english\/jonathan-katzenellenbogen-chinas-cyber-power","title":{"rendered":"Jonathan Katzenellenbogen: China\u2019s Cyber Power"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-7475 size-full\" src=\"http:\/\/www.chinesepen.org\/english\/files\/2016\/08\/China\u2019s-Cyber-Power.jpg\" alt=\"China\u2019s Cyber Power\" width=\"230\" height=\"350\" srcset=\"https:\/\/www.chinesepen.org\/english\/files\/2016\/08\/China\u2019s-Cyber-Power.jpg 230w, https:\/\/www.chinesepen.org\/english\/files\/2016\/08\/China\u2019s-Cyber-Power-197x300.jpg 197w\" sizes=\"(max-width: 230px) 100vw, 230px\" \/>The cyber domain has become central to the struggle for strategic advantage between the US and the West on the one hand, and China and other authoritarian states on the other.<\/p>\n<p>If there is any outsider, who can present a coherent view of China\u2019s rise as a cyber power, it is the author of this short book. Nigel Inkster was the deputy chief of the UK\u2019s Secret Intelligence Service, MI6, speaks Mandarain, is well versed in the country\u2019s history and seems to show a good understanding of the psyche of Beijing\u2019s leadership and its options. He is currently the Director of Future Conflict and Cyber Security at the International Institute for Strategic Studies in London.<\/p>\n<p>Informing China\u2019s stance is the Soviet era doctrine of information warfare as a tool to ensure internal political control and a favourable external narrative. The US, of course, has its own cyber war capacity, and its efficacy may have been damaged by Edward Snowden, who blew the whistle on the US&#8217;s extensive snooping programme. Where the West and the East importantly differ is the degree of liberty they are willing to tolerate in the cybersphere.<\/p>\n<p>China\u2019s Cyber Power argues that state control of the cyber domain is a critical factor in China\u2019s pursuit of military strength and protection from internal and external threats. \u201cWhat the leadership fear most of all is the prospect of an irrecoverable breakdown in internal order,\u201d writes Inkster.<\/p>\n<p>\u201cThere are signs that the Party\u2019s ideologues may be developing a vision for the Chinese cyber domain that enables it to exercise control over citizens by both filtering the information they access and compiling such detailed electronic data on individuals \u2013 including their entire browsing history and all their social-media posts \u2013 that any perceived infractions can be used as leverage against them,\u201d he writes.<\/p>\n<p>\u201cFor now, China appears to believe that it can have its cake and eat it: gaining the economic benefits that come from with global connectivity while excluding information as seen as detrimental to political and social stability,\u201d Inkster writes.<\/p>\n<p>On the external front, Inkster believes that the Chinese are heavily engaged in cyber espionage as a means of dulling the West&#8217;s technological edge. In the wake of an agreement between President Barack Obama and Chinese President Xi Jinping, Chinese efforts to cyber-steal American intellectual property and business secrets seem to be declining. But the international fault lines on cyber issues remain clear, as does cyber&#8217;s pivotal role in future armed conflicts.<\/p>\n<p>In 2000, then US President Bill Clinton likened Chinese efforts to censor what was on the web to trying to \u201cnail Jell-O to the wall.\u201d Beijing&#8217;s approach is nuanced as the authorities often refrain from censoring criticisms of the leadership, but do crack down on attempts to mobilize unauthorized public protest. The Chinese now live in what could be called a parallel web universe, overseen by a complex and multilayered monitoring and control system. This might strengthen the authoritarians&#8217; hold on power, although Inkster concludes, \u201cit will be some time before any safe conclusions can be reached about this experiment.\u201d<\/p>\n<p>The recent example of Zimbabwe shows how the cat and mouse game is playing out in an African country. Robert Mugabe&#8217;s regime is presently facing a challenge from Pastor Evan Mawarire\u2019s #This Flag, a protest movement that makes extensive use of the internet and social media.<\/p>\n<p>Shutting down the internet was probably considered too draconian, especially since opponents were likely to see it as sign of panic. When warnings about &#8220;misuse&#8221; of social media proved ineffective, says TechZim.co.zw, a Zimbabwean information technology site, the government opted instead to force Zimbabwe\u2019s three mobile network operators to suspend sales of cheap data bundles. Eliminating special mobile data promotion bundles is the ultimate squeeze on protest, TechZim suggests.<\/p>\n<p>Was Mugabe&#8217;s government advised by the Chinese? Inkster believes that a large number of African countries may find the Chinese model of internet control attractive. China\u2019s large footprint in Africa allows it to influence cyber policies through diplomatic pressure and help in telecommunications network development, he says. Chinese telecommunications giants Huawei and ZTE have built major systems in around 30 African countries. Huawei has established training centres in seven African states, a research and development facility in South Africa, and a network operations base in Cairo. Human Rights Watch has criticised both companies for providing equipment used to conduct political surveillance.<\/p>\n<p>\u201cChina may exploit its control of African telecommunications infrastructure for intelligence-gathering purposes,&#8221; writes Inkster. &#8220;There is no hard evidence to support this proposition, but it would scarcely be surprising if China were engaged in such activities, whether independently or in conjunction with the states concerned.&#8221;<\/p>\n<p>\u201cChinese engagement appears to have been translated into political support for some of Beijing\u2019s policies, a notable example being the 2015 cyber-security pact between the Chinese and South African governments, which made reference to collaboration on information security,\u201d he says.<\/p>\n<p>In July 2016 South Africa, along with others, supported China by voting against a UN resolution that would have required states to commit themselves to a policy of non-interference with the flow of online information. This diplomatic victory could be a sign that Beijing is winning the cyber Cold War in Africa.<\/p>\n<p>For the public, communications can be hidden from prying eyes through encrypted services such as WhatsApp, the use of Virtual Private Networks, which can camouflage internet addresses, and Tor, software that can hide the source of internet traffic. These devices are certainly sufficient to force prying eyes to work a lot harder.<\/p>\n<p>Publisher: Routledge, Taylor and Francis Group, for The International Institute for Strategic Studies (30 May 2016)<br \/>\nISBN 978-1-138-21116-2<br \/>\nSoftcover: 123 pages<br \/>\nA Kindle edition is also available<\/p>\n<p>Source:<span style=\"color: #0000ff;\"> <a style=\"color: #0000ff;\" href=\"http:\/\/www.defenceweb.co.za\/index.php?option=com_content&amp;view=article&amp;id=44668:book-review-chinas-cyber-power&amp;catid=57:Book%20Reviews&amp;Itemid=141\" target=\"_blank\">http:\/\/www.defenceweb.co.za\/index.php?option=com_content&amp;view=article&amp;id=44668:book-review-chinas-cyber-power&amp;catid=57:Book%20Reviews&amp;Itemid=141<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cyber domain has become central to t &hellip; <a href=\"https:\/\/www.chinesepen.org\/english\/jonathan-katzenellenbogen-chinas-cyber-power\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":7475,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[107],"tags":[1771,1770,1773,1772],"views":5879,"_links":{"self":[{"href":"https:\/\/www.chinesepen.org\/english\/wp-json\/wp\/v2\/posts\/7474"}],"collection":[{"href":"https:\/\/www.chinesepen.org\/english\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.chinesepen.org\/english\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.chinesepen.org\/english\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.chinesepen.org\/english\/wp-json\/wp\/v2\/comments?post=7474"}],"version-history":[{"count":1,"href":"https:\/\/www.chinesepen.org\/english\/wp-json\/wp\/v2\/posts\/7474\/revisions"}],"predecessor-version":[{"id":7476,"href":"https:\/\/www.chinesepen.org\/english\/wp-json\/wp\/v2\/posts\/7474\/revisions\/7476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.chinesepen.org\/english\/wp-json\/wp\/v2\/media\/7475"}],"wp:attachment":[{"href":"https:\/\/www.chinesepen.org\/english\/wp-json\/wp\/v2\/media?parent=7474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.chinesepen.org\/english\/wp-json\/wp\/v2\/categories?post=7474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.chinesepen.org\/english\/wp-json\/wp\/v2\/tags?post=7474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}