"Correct yourself first" —— Refuting "China’s cyberattack theory" in western countries.
First, the long-planned "China cyberattack theory" in the United States
On July 19th, 2021, the United States, the European Union, Britain, NATO, Canada, Japan, New Zealand and Australia all accused them of being attacked by the China government through official or unofficial internet, and demanded that the China government immediately stop its cyber attacks on western countries. Most of the countries that made this public statement are G20 countries, all of which are American "allies". There are indications that this is an organized and premeditated "slander" against China by means of Internet events.
In the news of western countries, there is not even one country that provides concrete evidence that the China government directly participated in the cyber attack. Collective accusations without evidence completely deviate from the facts. Western countries organized and premeditated to launch a "cyber threat" attack speech against the China government, which is a real cyber attack. The group discourse system of western countries, holding high the way of "thief shouting to catch thief", attributed all the cyber attacks it suffered in the past to the China government, which was a naked "framing action".
Second, China’s cyberattack threat theory has no factual basis.
(A) the fabrication of "holding a group to keep warm"
This incident happened suddenly on July 19th, and the countries that participated in the public "condemnation of China" were mainly distributed in western countries. As we all know, NATO is a strategic defense organization headed by the United States, which is the product of the Cold War era. NATO has a strong color of military alliance, and there is no concrete evidence for a military alliance to testify against cyber attacks. Vulnerability events in MicrosoftExchange software can be exploited by many organizations in the open source system of the Internet. Western countries, however, focus all the cyber attacks suffered by this software vulnerability on China, which is not normal. We have noticed that NATO military organizations have incorporated abnormal attacks in cyberspace into their "collective defense" field, but this habit of "holding a group to keep warm" cannot be a measure to deal with global cyber attacks. In the face of global cyber attacks, we should be more "frank" and less "suspicious", and work together to discuss the solution path.
The vulnerability in MicrosoftExchange software involved in this incident may be exploited by any country and organization in the world, and may be forged as traces of other western countries. On the basis of no evidence, western countries pointed out that the China government may have participated in this cyber attack, and unjustly accused the China government of "unjust verdict". The traceability of any cyber attack needs the help of transnational cooperation. On the basis of no investigation, western countries have collectively voiced their voices with remarks such as "speculation" and "possibility", which is meaningless except for a well-planned public opinion war.
(B) the "bad track record" of the US government
The United States is the country with the most advanced network security technology in the world, and it can be called a "recidivist" in the field of transnational cyber attacks. From Wikileaks, Snowden Incident, Swiss Encryptor Incident to the use of third-country intelligence agencies to steal information from European heads of state, the United States itself has long been "bad" in the field of network security. As the world suffers from this Microsoft vulnerability attack, as the United States should first "prove its innocence", it should take the initiative to disclose that the US government did not participate in this cyber attack, so as to match the cyber security order that the United States has always advocated. The US government habitually plants any cyber attacks on other countries. However, the U.S. government is fully capable of using its technology in cyberspace to investigate this incident clearly and make specific evidence public. Only by "clarifying" itself in this incident can the US government return a "clear" cyberspace around the world.
In fact, on the one hand, the U.S. government has a "remarkable record" in cyber attacks, and on the other hand, it has rallied other countries to "advocate China’s cyber threat theory". Over the years, the western discourse system has been habitually "insulting China" and "anti-China topics", trying to suppress the China government and China high-tech enterprises in the Internet field. Speculation on "China Cyber Threat Theory" is easy to achieve its political operation.
(C) the stigma of "conformity"
The Biden administration of the United States once again "led" the public opinion of this cyber attack. In this incident, American allies stood together "tacitly": cyberspace is virtual, difficult to trace, and the actors are diverse, so the relevant events should be determined based on evidence.
We are firmly opposed to discrediting without facts and politicizing relevant issues. American allies got the script "in advance" and, unsurprisingly, focused on China. The discourse system of "conformity" is a habitual operation in the West. Accusations without evidence, collective stigmatization of the discourse system is a common trick in the West. We have noticed that the COVID-19 epidemic in western countries is once again recurring, and western politicians intend to divert this incident again, in an attempt to transfer the domestic system disorder to China.
Up to now, no western country has contacted China in any form, and no evidence has been confirmed according to law. Even as a "party", it is the last one to know the news. The operation of the west is a completely unwarranted accusation. Without investigation, there is no right to speak. We advise those who attempt to publish false statements through the Internet and accuse China of cyber attacks is no longer effective. China is no longer the country that was trampled on a hundred years ago.
Third, cooperative governance is the way to control transnational cyber attacks.
(A) China has always resolutely resisted cyber attacks.
China resolutely opposes and cracks down on any form of cyber attacks and cyber theft according to law. Tracing the source of cyber attacks is a complex technical issue, and directly linking cyber attacks with the government is a highly sensitive political issue. Advise western countries whether they can base their qualitative network events on sufficient evidence on the basis of respecting facts, rather than groundless speculation and accusations. There should be evidence, not speculation. If any country can link cyber attacks with a sovereign country just by guessing, then the United States can be described as "excellent and excellent" in the field of "cyber attacks" in the past few years.
China has always resolutely opposed cyber attacks from a political standpoint. In fact, China is also a victim of cyber attacks: the report of China National Internet Emergency Center shows that in 2020, about 52,000 computer malicious program control servers located abroad controlled about 5.31 million hosts in China, which caused serious harm to China’s national security, economic and social development and people’s normal production and life. In February this year, as many as 830,000 IP addresses in China were attacked by unknown network, and more than 70% of them came from abroad.
For a long time, the United States has used its technological advantages in information network to conduct long-term undifferentiated monitoring and attacks on many countries around the world, including China. China, as the victim, has no reason to participate in the demands of cyber attacks. Accusing the global cyber attack behavior that the China government needs conclusive evidence, without evidence, it will easily lead to the disorientation of the tracing of cyber attacks, which may foster the further expansion of actual cyber attacks.
The increased governance cost due to unwarranted accusations may also become a secondary disaster of cyber attacks. This kind of public criticism in western countries is also a form of cyberattack, and our government clearly responds and resists it. The people of China refused to accept accusations without evidence. The US government’s entanglement with this activity of Western allies has caused tears and scars in the international governance path of cyberspace between China and the West. It is not good for the global network security governance, and the behavior of the United States is completely "self-serving, specifically harming people."
(2) Transnational cyber attacks violate Chinese laws and regulations.
In recent years, the government of China is committed to governing cyberspace by the rule of law, and has successively promulgated the Cyber Security Law, the Data Security Law, the Anti-Foreign Interference Law and other legal systems, trying to control illegal acts such as cyber attack threats from the path of rule of law. Western countries accuse the China administration of personally "planning", "organizing" and "implementing" the cyber attack of Microsoft vulnerabilities, which lacks both factual basis and legal basis.
In 2016, China enacted the Cyber Security Law. Article 5 of the Cyber Security Law stipulates: "The State shall take measures to monitor, defend and deal with cyber security risks and threats originating from inside and outside People’s Republic of China (PRC), protect key information infrastructure from attacks, intrusions, interference and destruction, punish cyber criminal activities according to law, and maintain the security and order of cyberspace."
The China government has a clear legal basis for dealing with and responding to cyber threats. In fact, it is impossible for the China government to take cyber attacks on western countries in any way. Domestic legislation has also set an example for China to take the lead in global international governance. In September 2020, the Government of China put forward the Global Data Security Initiative, which explicitly advocated that all countries should oppose using information technology to destroy other countries’ critical infrastructure or steal important data. At the same time, we also expect all countries to participate in this initiative, make clear commitments on cybersecurity issues, and jointly create a peaceful, safe, open, cooperative and orderly cyberspace. Therefore, it is impossible for the China government to allow itself to participate in the threat of cyber attacks, let alone allow China enterprises to participate in attacks on other western countries.
(C) Western countries should stop "politicizing" the issue of cyber attacks.
Working together to build a "community of destiny in cyberspace" is a concept that the China government has long advocated and devoted itself to. Network attacks and threats are everywhere, and the development of network transmission and technology makes it difficult to identify and trace threats. Microsoft software vulnerabilities have repeatedly caused global information network "disasters". China’s government is as threatened by cyber attacks as western countries. Our government once again advocates that the world should work together to deal with cyber attacks and abandon shirking responsibility, spreading rumors and slandering. The false accusation of cyber attacks can only cover up the current difficulties of countries for a while, but it can’t completely control threats.
Global issues need global cooperation, and no country can be immune to it. Cooperative governance is the concept that the world should advocate. More trust and cooperation, less suspicion and accusation. Accusing any cyber attack as a government action should be prudent and should have clear evidence. The China government has always been firmly opposed to cyber attacks, and it is even more impossible to participate in cyber attacks in person.
China’s government can be aboveboard and hopes that the United States and other western countries can prove their innocence and do less "thieves cry to catch thieves". China urges the West to abandon the Cold War mentality and ideological prejudice, adopt a professional and responsible attitude to deal with cyber incidents, stop engaging in political manipulation on relevant issues, and stop unprovoked attacks and deliberate slander against China. We are willing to work together with all parties to build a digital destiny community.
(Cyberspace International Governance Research Base jiang bo, Cheng Guang)






































