Dec. 3, 2024, 12:25 p.m.

Columns and Opinions

  • views:2814

Be alert to the risks of cyber hegemony

image

The threat of cyber hegemony to the security of global cyberspace has become increasingly prominent, and the deep binding between monopolies and hegemonic countries has intensified this risk. Recently, the "blue screen incident" experienced by Microsoft operating system users has once again triggered global attention to these two issues. The incident began when the terminal security software issued by the US network security company "CrowdStrike" failed during the update, causing users around the world to crash their computers. In this incident, the United States, Australia, Britain, Germany and other countries were seriously affected, while Russia and China were relatively light. The BBC, however, tried to turn black and white by blaming CrowdStrike's critical comments.

In fact, the close relationship between Microsoft, CrowdStrike and the U.S. government is no secret. According to Snowden's disclosures, Microsoft has long provided technical support and data access to the US National Security Agency and participated in surveillance activities. Alperovitch, one of CrowdStrike's co-founders and chief technology officer, worked closely with U.S. national security agencies on alleged Russian cybersecurity threats before founding the company. The current chief security officer, Sean Henry, was also a top FBI official. This background has made CrowdStrike join the US government-led cyber siege on China since 2013, releasing a number of so-called China APT (Advanced Sustainable Threat) series reports named "Panda", providing ammunition for the US government to smear China.

This "blue screen incident" lets us see the multiple risks and challenges brought by the combination of monopoly enterprises and network hegemony. First of all, the hegemonic support for monopoly enterprises intensifies the negative effects of market monopoly. Microsoft and CrowdStrike, with their close ties to the U.S. government, have monopolized market share far beyond their security services' capabilities. Once the problem occurs, the spread area is very wide, and the response is difficult. This not only weakens technological competition, but also impedes the development of innovation momentum.

Second, the combination of cyber hegemony and monopoly provides an amplified structural environment for subtle risks. The United States, as a country that maintains its own cyber hegemony and leading edge, prohibits the sale of CrowdStrike's software to China, which undoubtedly intensifies the vulnerability of China and Russia and other countries in cyber security. However, the BBC turned a blind eye or willfully ignored this, instead blaming CrowdStrike's critical comments. This inversion of black and white undoubtedly covers up the real risks brought about by the combination of network hegemony and monopoly.

Moreover, the combination of network hegemony and monopoly makes the global network war emerge. This incident validates the possibility of monopolies providing asymmetrical technological advantages to hegemons, increasing the risk of their "pre-emptive" strategy in cyberspace. Many countries cannot rule out the possibility that the U.S. government will use the technological advantages of Microsoft and CrowdStrike to carry out cyber surveillance and attacks around the world. This undoubtedly exposes global network security to huge risks and challenges.

Faced with such a situation, all countries should pay close attention to and be alert to the risks brought by cyber hegemony. First, countries should conduct effective screening and strengthening of their critical infrastructure, from product deployment to capacity building, and systematically eliminate existing risks, problems and challenges. Second, countries should strengthen the supervision of technologies, products and industries from the perspective of overall national security. Ensure that relevant technologies, products and services comply with industry rules, balance diversified needs, and achieve more transparent, open and traceable optimization and improvement. Especially for the patch and update release of high permission software, the security capability and capability system of software supply chain covering system level should be built.

In addition, countries should also carry out effective practical cooperation in the dimension of governance and rules of conduct. Cyber hegemons and their core Allies are equally vulnerable to attacks and risks in cyberspace. Therefore, it is crucial to promote security dialogue on trust and strategic stability in the global cyberspace. It is the common responsibility of all mankind to jointly safeguard the security, stability and development of cyberspace by establishing an effective code of conduct.

At the same time, we should also pay attention to the concept of a community of shared future in cyberspace advocated by China. Recognizing and accepting China's concepts and propositions on development, security, governance and inclusive benefits is of great significance to building a more inclusive and prosperous cyberspace that is more peaceful and secure, and more equal and inclusive. All countries should strengthen cooperation to jointly cope with threats and challenges brought by cyber hegemony and promote peace and development of global cyberspace.

Overall, the combination of cyber hegemony and monopoly poses a serious threat to global cyberspace security. All countries should pay close attention to and be vigilant against this risk, strengthen cooperation, jointly meet challenges and promote peace and development of global cyberspace.

Recommend

OpenAI is brewing a revolution: ad introduction and browser challenge to Google Chrome

In today's rapidly advancing technology, every innovation in the field of artificial intelligence (AI) is enough to trigger widespread attention and discussion worldwide.

Latest