China's Data Security Agreement with Five Central Asian Countries, Right to Control Network, New Trends in Intelligent Wars, and Quantum Proofing Transactions
Issue 34, 13 June 2022
Hello,
I recently published an article on Wang Yi’s Pacific tour and the US-China game of influence in the Pacific. Do give it a read :)
I. Military and Warfare
Right to Control Network?
This week, Yu Zhifeng, Lu Jie, and Wang Lizhi (affiliation unknown) highlight how cyberspace has become a new frontier of national security, a new field of strategic games, and a new battlefield of military struggle. Hence, controlling networks will affect national security, and thus right to control network is important from a national security perspective.
The significance of cyberspace in the information age is evident from the following statement.
As the "second type of living space" and "fifth-dimensional battlefield of military struggle" for human beings in the information society, cyberspace has profoundly changed people's production and life. method, and also forcibly change the form of war. (网络空间作为信息社会人类“第二类生存空间”和“军事斗争第五维战场”,深刻改变了人们生产生活方式,也强制性地改变着战争形态。)
Authors have identified four domains related to cyberspace in the information age:
Information Domain
The main body of cyberspace.
It consists of various network signals (stored, circulated, and processed), the information content contained in the signals as well as data formats, protocols, and network addresses.
With the development of computer technology, network technology, signal processing technology, and its application in the military field, the network has become important in reshaping the structure of the battlefield. It now connects sensors and combat platforms on the battlefields of land, sea, air, and space into an organic whole. Controlling the network at the battlefield level focuses on the close coordination of firepower strikes to implement "system paralysis" on the opponent's battlefield network through various means - like destroying its core nodes and links, destroying information transmission capability, influencing the command and decision-making of the combat opponent, etc.
Physical Domain
The material basis for the formation of cyberspace.
It consists of various computing devices, network devices, servers, sensors, communication devices, transmission links, and embedded operating systems and software.
The prerequisite for seizing cyberspace dominance lies in the independent controllability of technology and the comparative advantage over opponents. From equipment to chips, from software to operating systems, only by strengthening the independent innovation of core technologies of information networks can one consolidate independent and credible defense in this domain. (夺取网络空间制权的先决条件在于技术上的自主可控和与对手的比较优势,从设备到芯片,从软件到操作系统,只有加强信息网络核心技术自主创新,才能夯实自主可信的网络防御根基,有效应对敌攻势行动。)
Cognitive Domain
The cognitive aspect of cyberspace is a reflection of human knowledge, thoughts, emotions, and beliefs and can be seen as an expansion of human cognition.
Cognitive activities here mean acquisition, understanding, reasoning, and judgment of information in cyberspace.
How does cyberwarfare affect the cognitive domain?
Cyber warfare acts on the physical space through the virtual space, enhancing the psychological effect of a physical attack.
It uses the network's extensiveness, immediacy, and interactivity to directly affect the public's cognitive system.
A large number of users, high penetration rate, and rapid dissemination of cyberspace make it an important way to affect the human cognitive domain,. Hence, it has also become the core battlefield of cognitive warfare.
Social Domain
The social domain provides a convenient channel for transcending the traditional battlefield and directly attacking the social foundation of the adversary.
These days, virtual space mirrors physical space. The Internet has become the main channel for social production and life behavior. Hence, cyberspace and social physical space have achieved real integration.
Even if it dominates all aspects of life, Cyberspace has made it easier and faster to manipulate social behaviors and norms.
Cognitive Domain Operations from the Perspective of Hybrid Warfare
An interesting article by Wu Jiaxi (Institute of Military-Political Work, Academy of Military Sciences) in this week's PLA Daily. Wu has tried to see Cognitive warfare from the perspective of hybrid warfare. Points in the article are similar to the ones written by PLA writers earlier, however, this article looks at cognitive warfare explicitly from a hybrid warfare perspective.
The author states that "cognitive domain operations must be achieved through the comprehensive use of multiple means of hybrid warfare to gain advantages in multiple domains." This is because it has become difficult to achieve certain combat objectives only through single domain operations.
Wu has made the following observations regarding cognitive domain operations in hybrid warfare:
In the cognitive domain, the boundary between peaceful and combat operations is mixed and tends to shift
Forces engaged in cognitive warfare are diverse - including both military and non-military personnel. Non-military personnel includes people from all walks of life - including news media, companies, research institutions, school societies, and civil teams, other social groups, politicians, celebrities, journalists, businessmen, lawyers, actors, etc.
The purpose of operations in the cognitive domain is mixed. The goal in the physical domain is to destroy the enemy's physical assets. In cognitive domain operations, the goal is to win without fighting.
Methods and means of warfare in the cognitive domain are mixed and diverse. Wu has highlighted three methods here:
Cognitive deterrence: Wu has given two examples of cognitive deterrence here. One is giving psychological shock to the enemy by paralyzing the financial system, carrying out economic blockades, and imposing trade sanctions on the enemy. The second is by broadcasting videos of advanced weapons and accurately targeting the enemy's weapons and equipment.
Cognitive shaping operations: this includes agitating the enemy's values, political attitudes, religious beliefs, mental states, and other ideological fields
Cognitive deception: This includes propaganda, cyberattacks, spreading disinformation, etc.
Analyzing New Trends in Intelligent Warfare
Yue Guiyun, Cheng Cimin, and Li Qinan analyze 'new' trends in intelligent warfare in an article for PLA Daily. The authors have identified the following trends:
Evolution of combat space into global multi-dimensional space.
Evolution of combat forces into man-machine hybrid interfaces.
Evolution of combat command towards autonomous intelligent operations.
Development of intelligent combat units.
Penetration of technology in war and warfare.
I have covered these themes in the past issues. Although, I highly recommend this article to those who have not read about the Chinese point of view on intelligent warfare so far.
Additional Reading:
II. SinoSync
China's Data Security Agreement with Five Central Asian Countries
China and five Central Asian countries adopted the "China + Five Central Asian Countries" Data Security Cooperation Initiative on June 8, 2022. The agreement was adopted at the meeting of foreign ministers of China and five Central Asian countries - Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan.
A summary of this agreement (in Chinese) was published in People's Daily. My colleague Manoj has covered highlights of the agreement in his blog Tracking People's Daily. I am providing excerpts from his blog here:
The data security document calls on countries and enterprises to (NOTE: This is not the official translation.)
Treat data security comprehensively and objectively based on facts, and maintain the openness, security, and stability of the global information technology products and services supply chain. 应以事实为依据全面客观看待数据安全问题,积极维护全球信息技术产品和服务的供应链开放、安全、稳定。
Oppose the use of information technology to damage/destroy other countries’ key information infrastructure or steal important data, and use it to engage in actions that endanger other countries’ national security and public interest. 反对利用信息技术破坏他国关键信息基础设施或窃取重要数据,以及利用其从事危害他国国家安全和社会公共利益的行为.
Prevent and stop the use of the Internet to infringe on personal information, and oppose the misuse of information technology to engage in acts such as large-scale surveillance against other countries or illegally collecting personal information of citizens of other countries. 防范、制止利用网络侵害个人信息的行为,反对滥用信息技术从事针对他国的大规模监控、非法采集他国公民个人信息.
Enterprises must abide by the laws of the country where they are located and domestic enterprises must not be required to store and process data generated and acquired overseas in their home countries. 呼吁企业遵守所在国法律,不得要求本国企业将境外产生、获取的数据在境内存储和处理.
All countries should respect the sovereignty, jurisdiction, and security management rights of other countries, and should not directly ask enterprises or individuals for data located in other countries without the permission of other countries’ laws. 各国应尊重他国主权、司法管辖权和对数据的安全管理权,未经他国法律允许不得直接向企业或个人调取位于他国的数据.
If countries need to acquire cross-border data for law enforcement purposes, such as combating crimes, they should do so through mutual legal assistance channels or this must be done in accordance with agreements signed between countries. 各国如因打击犯罪等执法需要跨境调取数据,应通过司法协助渠道或根据国家间协定解决.
Cross-border data acquisition agreements between countries must not infringe upon the judicial sovereignty and data security of third countries. 国家间缔结跨境调取数据协议,不得侵犯第三国司法主权和数据安全. (Quick thought: How does one define infringement and then enforce this? Also, does this imply Beijing has a say in Kazakhstan’s data cooperation with Russia or any other country?)
IT products and services supply enterprises shall not set back doors in products and services to illegally obtain user data, or control or manipulate user systems and equipment. 信息技术产品和服务供应企业不得在产品和服务中设置后门,非法获取用户数据、控制或操纵用户系统和设备.
IT companies shall not seek illegitimate gains by taking advantage of users' dependence on their products. Users must not be forced into upgrades and system upgrades except to meet the needs of maintaining users’ property security and social and public interests. (Quick thought: While this sounds like a user-based approach, this is basically giving governments greater control over tech enterprises. What does social and public interest mean?) Product providers should inform the partners and users of the safety defects or loopholes in their products in a timely manner, and propose remedial measures.信息技术企业不得利用用户对其产品依赖性谋取不正当利益。除出于维护用户财产安全和社会公共利益的需要外,不得强迫用户升级系统或更新换代。产品供应方承诺及时向合作伙伴及用户告知产品的安全缺陷或漏洞,并提出补救措施.
Chang’An Chain: Quantum Proofing Transactions
The blockchain created by 'ChainMaker', called 'Chang’An Chain' (Cháng'ān liàn 长安链) can reportedly survive attacks from both traditional supercomputers as well as quantum supercomputers, SCMP cited a report by China News Service.
If this claim is true, this blockchain technology can be used to secure financial transactions, online transactions, and other applications where secure transactions are a key requirement. The information on the ChainMaker website lists government services, food traceability, financial services, and energy and environmental protection as possible application areas of this blockchain. For example, the 'Chang’An Chain' was used in Beijing Winter Olympics as per the company website.
'Chang’An Chain' (Cháng'ān liàn 长安链) is a software and hardware system reportedly developed jointly by Tsinghua University and Beihang University, and tech giants like Tencent and Baidu. It is also an open-source technology.
The 'Chang’An Chain' technology is claimed to have parallel scheduling, a wide area network, multi-chain architecture, and authority management. Read more about the feature of this technology on ChainMaker's website. Some other information on this technology can be accessed here.
Behind This Tech
'ChainMaker' is a blockchain platform launched by the Beijing Academy of Blockchain and Edge Computing (BABEC) (北京微芯区块链与边缘计算研究院).
BABEC is backed by Beijing Municipal Party Committee and Municipal Government and promoted by the Beijing Municipal Science and Technology Commission and the Haidian District People's Government. According to its website, the institute is dedicated to developing cutting-edge applications in edge computing chips, new sensors, blockchain, and artificial intelligence.
The 'Chang’An Chain' (Cháng'ān liàn 长安链) is already being implemented in "Beijing-Tianjin-Hebei Credit Information Chain" under the guidance of the People's Bank of China.
Why this is important?
As SCMP reported, this blockchain technology is supposed to be safe from even quantum supercomputers. The quantum supercomputers, in which China has an apparent advantage, have raised concerns about rendering the traditional encryption systems obsolete. The Quantum supercomputers can reportedly break encryption most commonly used in computers. Although that is still a theoretical possibility and not a real one, still the possibility of the most powerful encryption being broken in a matter of days (if not hours) had raised eyebrows in the tech world.
This claim of this blockchain being able to overcome quantum hurdle is expected to provide a respite to all security enthusiasts. However, apart from the claims reported in the media, the official website of the 'ChainMakers' has no clear evidence to support the claim of this technology being quantum supercomputer proof so far.
Megha Pardhi is a Research Analyst at The Takshashila Institution. She tweets at @pardhimegha21.