DIPLOMACY IN CHINA’S RACE FOR CYBER-ENABLED POWER 2014 Polity (UK) Wiley (USA) 1.

Slides:



Advertisements
Similar presentations
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
Advertisements

Technology Management and Policy / RdN ROLE AND NATURE OF TECHNOLOGY POLICY MANAGEMENT IN ENGINEERING SCHOOLS  Dr. Richard de Neufville  Professor of.
CHINA’S RACE FOR CYBER-ENABLED POWER August 2014 Polity Wiley 1 Greg Austin, Presentation at Brookings Institution, 9 December 2014.
U.S.-China Relations Institutions Ideologies Interests.
Nepal it is essential to have political stability and effective and visionary leadership, proper plans and policies.
The Virtual State Business, Government & Society Spring 2000.
The Role of Social Partners and Social dialogue
High Level Executive Round Table of the 08 th Nov The Kilimo Trust: regional solutions to local problems 1 Presented by Prof. Joseph Mukiibi.
Strategic Partnership of Europe, Russia, and the US.
Internet of Things: The way to Smart Sustainable Cities Cristina Bueti Adviser (ITU) 1.
Public Relations Strategies and Tactics Tenth Edition
World Cities Adapted from a presentation by David Palmer & Phil Kline.
Economic Reforms ( ). People’s Republic of China , PRC, Beijing Chairman: Mao Zedong 5-Star Red Flag Republic of China government retreated.
World Cities. Top Ten Cities,1950 (estimated from various sources) City Pop (in millions) Lat Long New York, USA N 74 W London, UK8.752 N 0 Tokyo,
The Black Sea Region: New Challenges and Opportunities for Regional Cooperation ( ANALYSES from Ukraine) prof. Grygorii Perepelytsia.
Power Transition Theory and U.S.-China Relations Professor David Skidmore September 28, 2010 University of Macau.
China and space security National Defense University, PLA, China National Defense University, PLA, China Zhong Jing.
Territorial impacts of globalization on European Regions Van Hamme Gilles IGEAT-ULB Liege meeting November 2010.
Introduction to Management of Technology (MOT)
Horizon 2020 Secure Societies Security Research and Industry DG Enterprise and Industry 2013.
Professor Song CHEN, Ph.D. Deputy Dean, School of Economics & Management Tongji University Oct. 7, 2013 The Changing National.
STRATEGY KAZAKHSTAN 2050 NEW POLITICAL COURSE OF THE ESTABLISHED STATE
Change in Cuba. Perception is Reality Centrally Planned Economy: Cuba – North Korea – Iran Cuba's past dealings with foreign investors suggest caution.
Chapter Five Copyright, John Wiley and Sons, Inc. Chapter Five three Learning Concepts – Chapter 5 1. Understand why countries differ in their overall.
“Asia Broadband Program” 2 nd OECD Workshop on Broadband Session III: Policy Issues June 5, 2002 Tetsuo YAMAKAWA Ministry of Public Management, Home Affairs,
Innovation Systems Research Network MCRI Theme III: Social Inclusion and Civic Engagement David A. Wolfe, Ph.D. Program on Globalization and Regional Innovation.
Copyright © 2004 Sherif Kamel Global IT Management Sherif Kamel The American University in Cairo.
Case Study - Samsung SDS -
Business Key Terms & Definitions. Competitiveness Liking competition or inclined to compete.
Social and Professional Issues in IT Roshan Chitrakar.
THE VALUE OF TOLERANCE IN THE SOCIETY IN THE 21 ST CENTURY NGUYEN THI PHUONG MAI PhD Candidate Institute of Philosophy The Vietnam Academy of Social Science.
Chapter 22 Foreign Policy
Internationalisation of Finnish Public Research Organisations Dr. Antti Pelkonen Senior Scientist, VTT Technical Research Centre of Finland
8 - 1 Chapter 8: Location Strategies Outline  The Strategic Importance of Location  Factors That Affect Location Decisions  Labor Productivity.
Why study Chinese diplomacy Diplomacy is a means to make China communicate with the world and protect its security from external dangers Diplomacy is a.
CHINA: RISING SCIENTIFIC SUPERPOWER? Richard P. Suttmeier, University of Oregon
This project is financed by Ministry of European Union and the Republic of Turkey. Improving the Quality of Vocational Education and Training in Turkey.
The “Rise” of China – and its Coming “Fall”?. On the Minds of China’s Leaders… Significant leadership change in 2012 National security Stability & control.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
The Changing Role of Military Officers and Defense Officials in Dealing with Future Defence and Security Challenges.
The international community’s response to climate change Halldor Thorgeirsson Deputy Executive Secretary UNFCCC.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Athens, Greece May 15, 2005 Global Public Policy.
Highlights on the New ICT Strategy After the 25 th January Revolution Dr. Mohamed Salem Minister of Communications and Information Technology October 2011.
International Telecommunication Union Committed to connecting the world Shaping tomorrow’s smart sustainable cities today Nasser Saleh Al Marzouqi Chairman,
1 Abdul Waheed Khan Communication and Information Sector UNESCO Building Knowledge Societies.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BIG Question: Does “CULTURE” + “DIPLOMACY” = Peace and Stability.
Unclassified MG. L. HOXHA Skopje, 21 st of June 2005 REPUBLIC OF ALBANIA MINISTRY OF DEFENCE GENERAL STAFF OF THE ARMED FORCES.
CARIBBEAN WORKSHOP ON E-GOVERNMENT BEST PRACTICES Port of Spain, Trinidad & Tobago, July 26-28, 2005.
"Innovation-based Growth – the Development and the Future Challenges of the Finnish Innovation Environment” Timo Kekkonen Director, Confederation of Finnish.
Innovation Development Strategy
Delivering the 2030 Agenda for Peaceful, Just and Inclusive Societies
STRATEGIC THINKING AND PLANNING FOR BUSINESS
Atlantic Bridge Dr Helen McBreen, INVESTMENT DIRECTOR
Designing a Dynamic IP System in the Republic of Belarus
DIGITAL INCLUSION: Libraries connecting communities in the last mile
Conducting Foreign Relations pgs
iCity Development In China
BRIDGING DIVIDES: towards digital dividends for all
ICT: Driving Innovation in Asia-Pacific
Priority 3 NMP: generalities
Foreign Policy; a brief introduction
As a Responsible Country in the World (2001- )
Supported by ITU-BTRC Asia-Pacific Regulators’ Roundtable
ESS Vision 2020.
China’s Foreign Affairs and International Relations
New East Asian Alliances
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Chapter 17 Creating American Foreign Policy.
ESS Vision 2020.
Presentation transcript:

DIPLOMACY IN CHINA’S RACE FOR CYBER-ENABLED POWER 2014 Polity (UK) Wiley (USA) 1

CHINA’S GOAL To become an advanced information society … … the widespread exploitation in all sectors of the economy, science, education, culture and society of advanced technologies in information processing, based on a pervasive, highly modern communications infrastructure = informatization 2

CHINA’S INFO TECH ACHIEVEMENTS manufacturing: Lenovo “biggest” PC manufacturer in the world (2013) social: more netizens than any other country scientific: first teleportation of quantum properties between remote particles (2012) engineering: IPv6 leadership role, fastest supercomputers security: “Biggest” surveillance system in human history (in terms of manpower) foreign intelligence: cyber espionage 3

NET ASSESSMENT: WORLD ECONOMIC FORUM Network Readiness Index of the annual Global Information Technology Report: China’s ranking : 64 th (Sachs et al) 2011: 36 th 2012: 51 st 2013: 58 th 2014: 62 st …. among 148 countries 4

SHANGHAI ACADEMY SOC SCI SMART CITIES RANKINGS NOV London 2.Seoul 3.Hong Kong 4.Singapore 5.Toronto 6.New York 7.Chicago 8.Berlin 9.Sydney 10.Paris 11.Tokyo 12.Los Angeles 13.Buenos Aires 14.Dubai 15.Moscow 16.Shanghai 17.Beijing 18.Mumbai 19.Rio de Janeiro 20.Cairo 5

LEADERSHIP VIEWS China’s leaders accept the broad thrust of these assessments: China is (a) lagging and (b) slipping off the pace The book is not primarily about what happens in cyberspace It is a book about China’s leadership and their view of the country’s “cyber-enabled power” – (a) how advanced information technology enables shifts in power (politics, economics, strategic/diplomatic) (b) what China has to do to be competitive in these “new” power stakes 6

CYBER-ENABLED POWER: REFERENCE CONCEPTS AND DATES Machlup 1962: knowledge economy Information economy Post-industrial society (Bell 1973) information-led Masuda 1980: “computopia”, information utilities, redefinition of privacy: information society Internet revolution: information superhighway ( ) World Summit on Information Society

INFORMATION SOCIETY: HOW TRANSFORMATIONAL? Transformational, and radically so; Castells 2012: politics “forever transformed” Value-based, people-oriented -- not merely technologies (WSIS , CAS Roadmap 2011) Floridi: sufficiently different to reassess Frost: inevitable ethical contest the Chinese leaders are in a “dialogue” with the world on values for the info society … no end … CCP does not win 8

CHINA TIME LINE 1983Toffler and electronics industry target 1993Leaders decide for information economy 1995public access to internet, USITO 1999USA uses cyber operations against Belgrade 2000information society decision & take-off 2001Small Leading Group moves to Premier 2003war under informatization; “Titan Rain” 2006National Informatization Plan internet white paper 2011CAS Roadmap for Information Technology 2014 Xi proclaims “cyber power” ambition 9

IDEAL VALUES FOR AN INFORMATION SOCIETY National information ecosystem freedom of information exchange protection of information exchange trusted information Innovative information economy transformation intent innovation system innovator class Global information ecosystem strategic stability: for trade, invest t, & security bridging military divides Interdependent informatized security 10

ICT SHARE, MERCHANDISE TRADE, About 2/3 of China’s ICT production is from foreign-invested or foreign-owned factories

SECURITY IN GLOBAL INFO-SPHERE: IDEAL VALUES Strategic stability (#1) No military divides (#2) Interdependent informatized security (#3) 12

TIMELINE OF CHINA’S CYBER MILITARY DEVELOPMENT 2001PLA joins Informatization Leading Group 2003 CMC Decision at doctrinal level; two stages 2020 & Training regs approved 2007 Anti-satellite weapon test 2011 Changes in GSD comms structures 2014 “Cyber Power”, Xi takes control 13

#1 STRATEGIC STABILITY strong commitment in principle to a stable world order … to allow ICT development want an adjustment of the balance of power more in their favour committed to positioning the country for long-term cyber military power concerned about U.S. capability for pre- emption (cyber in nuclear C4I) an aggressive actor in cyber espionage (like other major powers) a conflict in these values and need for reassurance on all sides. 14

#2 BRIDGING DIVIDES a deepening commitment to peaceful integration with Taiwan because this strategy is working China has replaced the United States as Taiwan’s main economic partner the pay-offs for China in Taiwan policy have been spectacular Yet its adversarial view of the United States had deepened considerably. 15

#3 INTERDEPENDENT INFORMATIZED SECURITY committed in principle and practice to cooperative norms in economic and technological aspects of the global information economy strengthened its commitment to joint problem solving in non-military domains unable so far to bridge its formidable differences with the United States and like-minded countries over internet governance. 16

LOOKING AHEAD: INTERNATIONAL SECURITY timetable of 2050 for full informatization of the armed forces should be attainable considerable successes in cyber espionage, but so too its potential adversaries unlikely to make an appreciable dint in the ‘information superiority’ of the US global alliance system China’s race for capability will take more account of diplomatic costs because China needs a globalized economy. 17

CONCLUSIONS IN THE BOOK China's censorship policies and its “closed” education system have constrained its ambitions to become an advanced technology country China's leaders are deeply concerned about the difficulty of building a high- performing national innovation system China has proven itself incapable of resisting the powerful transformation effects of the information age The leaders now want more, not less. 18

WHAT CAN WE LEARN China and the USA are both subject to an information revolution that is transformational and NOT defined by the policy preferences of either. IT underpins all advanced science China’s cyber power will remain heavily dependent on private actors and governments in the United States, Japan, and the European Union (the greatest “lawful” transfer of wealth in human history … since at least 1979) “Knowledge has no flag”… except in the narrow area of national security, and even there allegiances have been blurred irrevocably by the information revolution For Australia: China’s cooperative impulses far outweigh their combative impulses, but they are in a competitive mode 19

THANK YOU Cyber Policy in China, Cambridge: Polity

FOOTNOTE: COMMERCIAL ESPIONAGE United States has launched a diplomatic strategy premised on the distinction between national security intelligence and economic intelligence collected by China for the benefit of China’s civil sector firms In the public record to date, the U.S. administration has not even gone close to proving charges that it is Chinese government policy to direct its intelligence officials to hand over foreign corporate secrets to its civil sector firms in order to sabotage U.S. competitiveness either at the firm level (see Westinghouse nuclear case) or national level The United States may have such evidence but there is considerable room to believe that it does not (see 2013 White House paper, NCIX reports, and the indictments) 21