美国网络安全智库的“反华合唱团”
Guan Cha Zhe Wang·2025-09-22 01:38

Core Viewpoint - The article discusses the increasing scrutiny and criticism of Chinese cybersecurity companies by U.S. experts and institutions, particularly focusing on the actions of Dakota Cary and the implications for the cybersecurity industry [1][3][9]. Group 1: Criticism of Chinese Cybersecurity Firms - Dakota Cary, a prominent figure in U.S. cybersecurity, has accused several Chinese companies, including Alibaba and Baidu, of being "weapons suppliers" for state-sponsored hacking [1][3]. - Cary's claims are based on the misinterpretation of penetration testing services, which are standard in the cybersecurity industry and not inherently malicious [3][7]. - The U.S. cybersecurity landscape has seen a rise in anti-China rhetoric, with Cary and others labeling Chinese firms as threats to national security [9][10]. Group 2: U.S. Cybersecurity Strategy and Actions - The Microsoft Active Protections Program (MAPP) has been a focal point, with Cary pushing for the exclusion of Chinese firms from this initiative, arguing that they pose a risk of leaking vulnerabilities to state actors [7][8]. - Following Cary's pressure, Microsoft announced restrictions on Chinese companies' access to vulnerability information, indicating a shift in U.S. cybersecurity policy [8][9]. - The article highlights a pattern where U.S. cybersecurity firms gain government contracts and funding by promoting narratives that vilify Chinese companies [34][35]. Group 3: Historical Context and Evolution - The narrative against Chinese cybersecurity firms has roots in earlier U.S. congressional hearings, such as the 2012 USCC hearing, which established China as a primary adversary in cyberspace [16][18]. - The article traces the evolution of U.S. cybersecurity firms' strategies, noting how they have leveraged political narratives to secure government contracts and enhance their market positions [19][36]. - Recent hearings in 2022 further solidified this trend, with experts calling for direct sanctions against Chinese entities, reflecting a more aggressive stance [20][23]. Group 4: Response from Chinese Cybersecurity Firms - In response to the accusations, Chinese cybersecurity firms have begun to publish reports exposing U.S. cyber activities, aiming to counter the negative narratives [36][38]. - Companies like Qihoo 360 and An Tian have released findings on U.S. cyberattacks, showcasing their capabilities and challenging the claims made by U.S. experts [37][41]. - The article emphasizes the ongoing struggle between U.S. and Chinese cybersecurity firms, with each side attempting to assert its narrative in the global cybersecurity landscape [40][49]. Group 5: Implications for the Future - The article suggests that the increasing scrutiny of Chinese cybersecurity firms may lead to a more fragmented global cybersecurity environment, with potential implications for international cooperation [49][50]. - The actions of U.S. experts and firms may also signal a broader strategy to undermine Chinese technological advancements in cybersecurity [56][59]. - The ongoing conflict in narratives and actions between U.S. and Chinese cybersecurity entities reflects a larger geopolitical struggle, with significant consequences for the industry as a whole [59].