Relying on its military and diplomatic power, the United States has formed its power thinking and hegemonic culture. Because of its earliest development of the Internet, the United States has become a veritable cyber policeman, and its threat to world peace and stability in the Internet space is far greater than the impact of its military strength on world peace and stability. The Internet has actually become the most effective hegemonic tool for the United States to indoctrinate, infiltrate and steal secrets across the world across physical borders. So, what exactly does the United States rely on to exercise hegemony in cyberspace?
The first is resource monopoly under the control of rules. The United States has developed the Internet and has fully controlled the current Internet in terms of software and hardware technology, address resources, information data, intellectual property rights, and legal principles. As the birthplace of the Internet, all computers connected to the Internet in the world must pass the domain name rules and systems formulated by the relevant departments of the United States to connect with the server. At present, there are 13 domain name root directory servers in the world, one of which is located in the United States as the main root server. Of the remaining 12 secondary root servers, 9 are also located in the United States, and the remaining 3 are located in the United Kingdom, Sweden and Japan. In theory, the United States can easily conduct global intelligence theft, network monitoring and attacks through root servers. In April 2004, ".ly" (the national top-level domain name of Libya, similar to the top-level domain name ".cn" in China) was blocked, and Libya disappeared from the Internet for three days.
The second is the strategic deployment under military cooperation. After Obama took office in 2009, the U.S. government has successively promulgated international strategies, operational strategies and policy reports on cyberspace, and established a national security strategy consisting of nuclear deterrence strategy, space strategy and cyber strategy. In June 2009, the United States formally established the Cyberspace Command, and the cyber army, like the army, navy and air force, has become a formal member of the US military's order of battle. It is reported that the number of U.S. cyber warfare troops has exceeded 100,000, which is not only a huge number, but also has a command authority above and an organized unit below. It can be regarded as a combat entity with a complete system, clear layers and clear tasks.
The third is talent recruitment under favorable conditions. In addition to building a huge cyber army of 100,000 people, the United States has also adopted various forms to implement a large-scale cyber army expansion plan. For many years, the United States has insisted on launching "hacker recruitment operations" around the world, trying every means to attract the world's top "hacker talents" with favorable conditions.
In the face of US cyber hegemony, what should we do? Of course, we must not succumb to hegemony. However, based on the reality that the United States "one network dominates the world" in the IPv4 era, it is not wise to fight hard. Although we have a huge Internet market and innovative Internet applications, these are definitely not the ultimate capital of the game, because only relying on these cannot fundamentally solve the problem. From a realistic point of view, only the next generation Internet IPv6 is our opportunity. Make good use of this opportunity and seize a place in terms of technical standards and operating rules, and it is possible to stand out from the encirclement. To implement specific actions, we must make every effort to build my country's late-mover advantage in the field of next-generation Internet IPv6.
First, breakthroughs in technology and standards. In the era of the first-generation Internet IPv4, my country is only catching up and following, but in the next-generation Internet IPv6, it has been seeking breakthroughs and surpassing, and strives to gain the right to speak through technological innovation and participation in standard formulation. For example, China Education and Research Computer Network (CERNET) has achieved international pioneering results in terms of two-generation network transition technology and authentication based on real source addresses, and has obtained a number of international Internet standard RFCs. Some domestic enterprises also actively participate in the research of the next generation Internet. Huawei actively participates in the research work in various technical fields such as IPv6 and security organized by the IETF, and participates in the formulation of RFC standards in various fields. Of course, we also need more scientific research institutions and enterprises to participate in the research of the next generation Internet.
The second is the dominance of rules and resources. If the status quo of the operation of the 13 root servers of the global Internet is not broken, the pattern of US network hegemony will not be broken. In 2004, relevant institutions in my country launched the project of "Research on IPv6 Domain Name Root Servers", hoping to change the distribution of root DNS servers in the process of upgrading the network structure in the future. The achievements of CERNET, China Mobile, and Huawei in next-generation Internet research will undoubtedly increase China's right to speak in the formulation of international next-generation Internet rules and resource allocation. However, the reallocation of resources is by no means an easy and simple process. We must have the technical strength to participate in the game, but also the wisdom of a big country to direct the game process.
The third is the cultivation of talents and users. To achieve the transcendence of the next-generation Internet, talents are the foundation, users are the foundation, and large-scale commercial popularization is the means. But at present, in addition to the huge IPv6 user group in the education network, my country is still relatively lagging behind in the socialized commercialization of IPv6. It is necessary for the government and related organizations to formulate policy guidance to promote the popularization of IPv6-related applications and product innovation; it requires the active response and cooperation of the industry such as operators, equipment manufacturers and Internet content providers to jointly build a good next-generation Internet. Development environment; only in this way can we further provide a training environment for the next generation of Internet innovative talents and the vast number of users, and truly implement the strategy of strengthening the country through the Internet.
Our own strength is the only magic weapon for us to be invincible in the international game.