China News Service, Beijing, February 5 (Kan Feng and Peng Ningling) From small to basic necessities, food, housing and transportation, to political, economic and social development, the Internet is now deeply affecting our era, and network security is related to national security.

  Recently, the book "Excerpts from Xi Jinping's Essays on Network Power" edited by the Institute of Party History and Documentation of the Central Committee of the Communist Party of China was published nationwide.

Since the 18th National Congress of the Communist Party of China, General Secretary Xi Jinping has put forward a series of new ideas, new viewpoints and new thesis on network security and informatization work, and profoundly answered a series of major questions.

  A few days ago, Chinanews.com interviewed Zhi Zhenfeng, a researcher at the Institute of Law of the Chinese Academy of Social Sciences, and conducted an in-depth interpretation and analysis on the series of important thesis of General Secretary Xi Jinping and related topics such as current network governance and network security in my country.

——Building a community of shared future in cyberspace to crack the "governance deficit"

Chinanews.com: General Secretary Xi Jinping once mentioned that “without cyber security, there would be no national security.” How do you understand the role of cyber security in the overall national security?

Zhi Zhenfeng

: Cybersecurity is a big concept, which should be understood in the overall national security concept.

The network virus attacks, network crimes, and information leaks that people often mention are relatively intuitive network security cases, but the scope of network security is much larger.

  For example, this "security" includes information technology security. Can some core technologies not be "stucked"; another example is data flow security, large-scale cross-border financial, commercial, critical infrastructure, and personal information data flow countries Security risks; another example is the security of information content, such as inciting cyber violence through social networks, inciting social movements, and even influencing national political trends.

  In addition, the militarization of international cyberspace, the weaponization of artificial intelligence, and so on, the international cyberspace is facing serious "governance deficits". These are all within the scope of cybersecurity and directly related to national security.

  Of course, although the concept of network security is grand, it is closely related to our lives. The total number of netizens in my country is close to 1 billion, and the Internet has penetrated into all aspects of social life.

  As early as 2014, General Secretary Xi Jinping mentioned that network security and informatization are major strategic issues related to national security and development, as well as the work and life of the people.

  This sums up the relationship between network security and national security very well, and promotes network security to the strategic height of national security.

Chinanews: You mentioned a concept, the "governance deficit" in international cyberspace. What kind of international cyberspace environment are we facing today?

What is China's claim?

Zhi Zhenfeng

: Cyberspace is a new type of social space for mankind. It has developed into a community closely related to the destiny of all countries in the world.

However, in the face of this "Xinjiang region", the traditional international governance order is often in a state of failure, and global cyberspace governance urgently needs to establish a new order.

  For example, the information gap between different countries and regions is widening today. Monitoring, attacks, and terrorism from the Internet have become a global public hazard, not to mention cyber crimes worldwide, as well as violations of intellectual property rights and personal privacy.

In addition, some developed countries use the superiority of network information technology to implement network hegemony and seriously endanger global network security.

  In 2015, General Secretary Xi Jinping pointed out at the Second World Internet Conference that cyberspace should not become a battlefield for countries to compete, let alone a hotbed of crimes, and there should be no double standards in maintaining cyber security.

  He has also mentioned many times that "building a community with a shared future in cyberspace", improving the global Internet governance system, and maintaining the order of cyberspace must adhere to the concept of mutual assistance, mutual trust and mutual benefit, and abandon the old concepts of zero-sum game and winner-take-all.

  International cyberspace governance should insist on multilateral participation and multi-party participation, and it should be handled by everyone through consultation. No unilateralism, no one-sided dominance, or a few parties together to make the final decision.

——Cyberspace enjoys freedom and responsibilities

Chinanews.com: When talking about network security, ordinary people may intuitively think about whether the information when scanning codes and swiping faces will be leaked, will children see pornographic violence when surfing the Internet, and whether the elderly will encounter fraud when surfing the Internet.

In the Internet age, people are also confused. Does the Internet make us stronger or more vulnerable?

Zhi Zhenfeng

: First of all, we have to admit that human life can only become more and more informationized, digitalized and intelligent. The development and popularization of the Internet has made it difficult for us to return to the traditional way of life.

  Technological progress not only brings great convenience to our lives, but also strongly promotes economic and social development.

However, technology is a "double-edged sword." It can benefit society and the people, and it can also be used by some people to harm the public interest and the public interest.

The development of the Internet presents us with some new issues and challenges that need to be resolved, which are inevitable.

  General Secretary Xi Jinping mentioned that network security and informatization are the two wings of one body and the two wheels of driving. They must be planned, deployed, advanced, and implemented in a unified manner.

  To do well in network security, we must handle the relationship between security and development.

No one wants to live in a space full of falsehood, fraud, attacks, abuse, terror, pornography, and violence.

Therefore, maintaining network security is the common responsibility of the entire society. The order of cyberspace needs to be jointly constructed, shared, and governed by everyone to jointly create a clear cyberspace.

Chinanews: Many people think that the natural nature of the Internet is concealment and virtuality.

On the one hand, people worry that there are too many "pits" on the Internet and need to be governed. On the other hand, they worry that personal privacy and free space will be narrowed. Then, where is the boundary of supervision?

Zhi Zhenfeng

: Cyberspace is not only a new space, but also a mapping of real space. Cyberspace is virtual, but the subject using cyberspace is real.

Like the real society, cyberspace must not only promote freedom but also maintain order. It cannot be a place outside the law.

  As early as 2012, the Standing Committee of the National People’s Congress issued a decision on strengthening network information protection, which required network service providers to handle website access services for users, handle network access procedures such as fixed telephones and mobile phones, or provide users To provide information publishing services, users should be required to provide true identity information when signing an agreement with users or confirming the provision of services.

  This is what we often call the network real-name system. Real-name system is not only a practical necessity, but also a clear requirement of national laws. At present, our country has solved the problem of real-name system, which means that "back-end real-name, front-end voluntary", through real-name system, can better Maintain the order of cyberspace.

  On the one hand, you are free to express your speech on the Internet, and you can use your real name or nickname account; on the other hand, cyberspace is not a place outside the law. The front desk can be voluntary, but the backstage needs to be real-named. Cyberspace enjoys both freedom and responsibility.

  Of course, supervision cannot be abused. The real-name system must be coordinated with the protection of personal information and personal privacy. Therefore, our country has the "Cyber ​​Security Law" and is currently formulating the "Personal Information Protection Law" and "Data Security Law", as well as a series of Internet governance The rules and regulations are also being improved.

——The abuse of human biological information such as face recognition needs urgent treatment

Chinanews.com: Recently, the Supreme People's Procuratorate released a set of data. In recent years, the number of cyber crime cases handled by procuratorial agencies has increased at an average annual rate of nearly 40%, reaching 54% in 2020.

In your opinion, what are the issues that need to be solved urgently in our cyber security risks?

Zhi Zhenfeng

: I think there are two outstanding phenomena that need to be resolved urgently.

  The first is the problem of youth use of the Internet.

Because the current online environment is very unfriendly to children and young people, some online information and online game products contain illegal information such as pornography, obscenity, gambling, violence, and vulgar, decadent, negative and other value-oriented information with serious deviations.

These phenomena will not only induce juvenile delinquency, but also cause a lot of psychological problems for young people.

  Internet and game addiction among minors is now a very serious problem. These children are the future of the country and the nation, and this danger is worrying.

  In addition, the abuse of human biological information also urgently needs to be addressed.

Biometric information of the human body is different from other personal information. For example, if your password is stolen, you can change the password, but if your fingerprint, iris, and face information are copied or stolen by others, how can you change it?

Once a large amount of human biological information is leaked out, it may become a tool of cybercrime, and even affect national security.

  In some places, when entering a community or entering a school, you must be forced to brush your face. This is indeed an abuse of human biological information, and our legal supervision has indeed not kept up.

In my opinion, unless we can ensure information security and ensure that human biological information remains on the terminal from being collected and stolen, in principle, human biological information should not be allowed to be used in commercial and general government affairs.

Chinanews.com: Now all kinds of smart phones, social software, and security software are complicated. They deeply bind products and user information. There are huge benefits behind the private data of network users. Various algorithms are tracked and big data is used to make sure. Often people are both disgusted and helpless.

How to manage this kind of technical bullying in the Internet age?

Zhi Zhenfeng

: Algorithm governance is indeed a very big problem, so some countries have established algorithms such as algorithm management committees.

At present, because the algorithm technology is relatively complex, the governance of the algorithm is still being explored and improved.

  In our country, laws such as the "E-Commerce Law" have clear measures to punish algorithmic chaos such as "big data cracking", but it is undeniable that the regulation of algorithm application is not perfect, and the concealment of big data cracking has also caused It is difficult to provide evidence for rights protection.

  Therefore, for such issues as data profiling and price discrimination, the regulatory authorities and the general public must be combined for supervision, algorithms must increase transparency, and there must be more ethical guidelines. When conditions are ripe in the future, relevant algorithms should be accountable. Laws and regulations.

——The degree of legalization of network governance needs to be improved

Chinanews.com: In recent years, we have promulgated the "Cyber ​​Security Law", and the "Civil Code" also regulates related issues of network security. This year, the "Data Security Law" and "Personal Information Protection Law" have also been included in the National People's Congress. The focus of legislative work.

In your opinion, at present, what institutional issues need to be resolved in my country's network security and network governance?

Zhi Zhenfeng

: In recent years, our country has developed very fast in terms of network technology, network industry and network applications. In this context, China's network legal system has also made rapid progress.

  However, in the fields of personal information protection, intellectual property protection, data security protection, network technology supervision, anti-monopoly and unfair competition, the development of laws still faces the situation that the development of laws cannot keep up with the needs of technology and industry.

  In addition to the need to improve laws and regulations, we have to see that the degree of legalization of our network governance is not high.

  We now place more emphasis on administrative supervision, but in fact our administrative supervision is insufficient, and there are still problems of multiple management, overlapping functions, different powers and responsibilities, and low efficiency.

Of course, we still have the problem of emphasizing supervision and neglecting protection. The judicial remedy channels are not smooth, and many cases cannot enter judicial procedures.

  In addition to improving the rule of law on the Internet, network governance also requires the Internet industry to fulfill its social responsibilities and strengthen industry self-discipline. Each netizen should also improve his own network literacy. Maintaining network security is the common responsibility of the whole society and requires the government, enterprises, social organizations, and the majority of netizens. Participate to build a network security line of defense.

(Finish)