The world now accepts that protecting our atmosphere, hydrosphere, lithosphere and biosphere — the “global commons” — is the responsibility of all countries. The same norm must apply to cyberspace, which is critical to our everyday life, economic well-being and security.
At a time when cyber attacks are increasing worldwide, US Secretary of State Hillary Clinton was right to declare that an attack on one nation’s computer networks “can be an attack on all.” Indeed, the attacks are a reminder that as a new part of the global commons cyberspace already has come under threat.
Cyberspace must be treated, along with outer space, international waters and international airspace, as property held in common for the good of all. And like ocean piracy and airplane hijacking, cyber-crime cannot be allowed to go unpunished if we are to safeguard our common assets and collective interests.
Naming China among a handful of countries that have stepped up Internet censorship, Clinton warned that “a new information curtain is descending across much of the world.” Her statement, with its allusion to the Cold War-era Iron Curtain, amounted to an implicit admission that the central assumption guiding US policy on China since the 1990s — that assisting China’s economic rise would usher in greater political openness there — has gone awry.
The strategy of using market forces and the Internet to open up a closed political system simply is not working. Indeed, the more economic power China has accumulated, the more adept it has become in extending censorship to cyberspace.
China has proven that a country can blend control, coercion and patronage to stymie the Internet’s liberalizing elements. Through discreet but tough controls, Beijing pursues a policy of wai song, nei jin — relaxed on the outside, vigilant internally.
Google is now crying foul over “ a highly sophisticated and targeted attack on our corporate infrastructure originating from China.” But, despite its corporate motto — “Don’t be evil” — Google itself was instrumental in aiding online censorship in China, having custom-built a search engine that purges all references and Web sites that the Chinese government considers inappropriate. Now Google itself has become a victim of China’s growing cyber prowess, in the same way that appeasement of Adolph Hitler boomeranged onto France and Britain.
China deploys tens of thousands of “ cyber-police” to block Web sites, patrol cyber-cafes, monitor the use of cellular telephones and track down Internet activists. But the threat to the new global commons comes not from what China does domestically. Rather, it comes from the way in which the know-how that China has gained in fashioning domestic cyber oversight is proving invaluable to it in its efforts to engage in cyber intrusion across its frontiers.
Canadian researchers have discovered a vast Chinese surveillance system called “GhostNet,” which can compromise computers abroad through e-mail messages that automatically scan and transfer documents to a digital storage facility in China. This is what happened when computers of the Tibetan government-in-exile in Dharamsala, India, were attacked last year.
India’s national security adviser recently said his office was targeted yet again by hackers.
“People seem to be fairly sure it was the Chinese,” he said.
Officials in Germany, Britain and the US have acknowledged that hackers believed to be from China also have broken into their government and military networks.
The state-sponsored transnational cyber threat is at two levels. The first is national, with the hackers largely interested in two objectives. One is to steal secrets and gain an asymmetrical advantage over another country. Cyber intrusion in peacetime allows the prowler to read the content and understand the relative importance of different computer networks so that it knows what to disable in a conflict situation. The other objective is commercial: to pilfer intellectual property.
The second level of cyber threat is against chosen individuals. The most common type of intrusion is an attempt to hack e-mail accounts. The targets also can face Trojan-horse attacks by e-mail to breach their computers and allow the infiltrators to corrupt or transfer files remotely.
If a cyber attack is camouflaged, it is not easy to identify the country of origin. Through the use of so-called “false-flag espionage” and other methods, attacks can be routed through the computers of a third country. Just as some Chinese pharmaceutical firms exported to Africa spurious medicines with “Made in India” labels, some Chinese hackers are known to have routed their cyber intrusion through computers in Russia, Iran, Cuba and other countries.
But like their comrades in the pharmaceuticals industry, hackers tend to leave telltale signs. There are many cases in which the attacks have originated directly from China.
It seems unlikely that these hackers, especially those engaged in cyber espionage, pilferage, and intimidation, are private individuals with no links to the Chinese government. It is more likely that they are tied to the People’s Liberation Army (PLA).
In war, this irregular contingent of hackers would become the vanguard behind which the PLA takes on the enemy. Systematic cyber attacks constitute a new frontier of asymmetrical warfare at a time when the world already confronts other unconventional threats, including transnational terrorism.
With security and prosperity now dependent on the safekeeping of cyberspace, cybercrime must be effectively countered as an international priority. If not, cyberspace will become the new global-commons battlefield.
Brahma Chellaney is a professor of strategic studies at the Center for Policy Research in New Delhi.
COPYRIGHT: PROJECT SYNDICATE
There is much evidence that the Chinese Communist Party (CCP) is sending soldiers from the People’s Liberation Army (PLA) to support Russia’s invasion of Ukraine — and is learning lessons for a future war against Taiwan. Until now, the CCP has claimed that they have not sent PLA personnel to support Russian aggression. On 18 April, Ukrainian President Volodymyr Zelinskiy announced that the CCP is supplying war supplies such as gunpowder, artillery, and weapons subcomponents to Russia. When Zelinskiy announced on 9 April that the Ukrainian Army had captured two Chinese nationals fighting with Russians on the front line with details
On a quiet lane in Taipei’s central Daan District (大安), an otherwise unremarkable high-rise is marked by a police guard and a tawdry A4 printout from the Ministry of Foreign Affairs indicating an “embassy area.” Keen observers would see the emblem of the Holy See, one of Taiwan’s 12 so-called “diplomatic allies.” Unlike Taipei’s other embassies and quasi-consulates, no national flag flies there, nor is there a plaque indicating what country’s embassy this is. Visitors hoping to sign a condolence book for the late Pope Francis would instead have to visit the Italian Trade Office, adjacent to Taipei 101. The death of
The Chinese Nationalist Party (KMT), joined by the Taiwan People’s Party (TPP), held a protest on Saturday on Ketagalan Boulevard in Taipei. They were essentially standing for the Chinese Communist Party (CCP), which is anxious about the mass recall campaign against KMT legislators. President William Lai (賴清德) said that if the opposition parties truly wanted to fight dictatorship, they should do so in Tiananmen Square — and at the very least, refrain from groveling to Chinese officials during their visits to China, alluding to meetings between KMT members and Chinese authorities. Now that China has been defined as a foreign hostile force,
On April 19, former president Chen Shui-bian (陳水扁) gave a public speech, his first in about 17 years. During the address at the Ketagalan Institute in Taipei, Chen’s words were vague and his tone was sour. He said that democracy should not be used as an echo chamber for a single politician, that people must be tolerant of other views, that the president should not act as a dictator and that the judiciary should not get involved in politics. He then went on to say that others with different opinions should not be criticized as “XX fellow travelers,” in reference to