Secretary of State Antony Blinken met with China's top diplomat Yan Jiechi in Anchorage, Alaska on March 18, 2021. (State Department photo by Ron Przysucha) As Blinken Visits Europe, China Retaliates Against U.S., EU Xinjiang Sanctions On March 22, the United States, along with the European Union, the United Kingdom and Canada imposed coordinated sanctions on Chinese officials accused of human rights abuses in Xinjiang. The sanctions freeze all of the targeted officials’ assets under the control of the sanctioning nations and ban the Chinese officials from traveling in or through those countries. China responded with its own sanctions against European officials and academics. U.S. Secretary of State Antony Blinken is currently in Brussels, meeting with high-level European officials; on March 23, he reportedly told NATO personnel that “we’re in it together” when it comes to China and Russia. The EU sanctions represent a significant hardening of European attitudes toward Beijing, as these actions are the bloc’s first major sanctions against China in 32 years. The European Union had not imposed substantial sanctions on China since the Tiananmen Square massacres in 1989. The EU sanctions included four senior Xinjiang officials, along with the Xinjiang Public Security Bureau, described as a “state-owned economic and paramilitary organization” that controls Xinjiang. Britain and Canada announced their own sanctions shortly after the European Union. British diplomats described the coordinated sanctions as “intensive diplomacy” meant to force action after the United States officially labeled China’s actions against Uighurs in Xinjiang as genocide on Jan. 19. This is the second round of sanctions levied by the United States on Chinese officials responsible for the central government’s repressive actions in Xinjiang; the last were imposed in July 2020. In a statement on March 22, Secretary Blinken said the coordinated sanctions demonstrate the United States’s commitment to “working multilaterally to … shin[e] a light on those in the [People’s Republic of China] government and [Chinese Communist Party] responsible for these atrocities.” The sanctions on Chinese officials were issued pursuant to recently implemented EU , U.K. and Canadian versions of the United States’s Global Magnitsky Act, which allow governments to declare sanctions on foreign individuals accused of gross violations of human rights or corruption. In retaliation, China sanctioned 10 European officials and four institutions for damaging China’s interests and “maliciously spread[ing] lies and disinformation.” The sanctioned individuals include five members of the European Parliament, as well as Adrian Zenz, a leading researcher on the human rights situation in Xinjiang, and MERICS, the leading European think tank on China. RaphaĆ«l Glucksmann, one of the sanctioned Parliament members, called the sanctions a “badge of honor” in a tweet. Cyberattacks Among U.S. Complaints at Anchorage Summit On March 18 in Anchorage, Alaska, Secretary Blinken and National Security Adviser Jake Sullivan met their Chinese counterparts, Director of the Office of the Central Commission for Foreign Affairs Yang Jiechi and State Councilor Wang Yi, for the first high-level dialogue between the U.S. and China under the Biden administration. The diplomats’ first meeting began with an extraordinary public statement of grievances, a sight once unusual in diplomatic fora but more frequent since the beginning of the Trump administration. Among the complaints made by the Americans were “cyber attacks on the United States.” In the past year alone, hackers linked to the Chinese government have been publicly accused of an email hacking campaign against some 30,000 U.S. companies, ransomware attacks against gaming and gambling entities, espionage against the U.S. defense industry, illegal scans of U.S. government networks, and attempts to steal coronavirus vaccine research. Chinese-linked cyber espionage in the United States—of which there have been 152 publicly reported instances since the year 2000—was three times as common from 2010 to 2020 as it was in the preceding decade. (Unreported numbers are likely much larger than reported numbers.) Of the total publicly reported cases, according to a Center for Strategic and International Studies report , 45 percent of the malicious actors were Chinese military or government employees, and nearly half were motivated by acquisition of commercial technology. In a July 2020 speech at the Hudson Institute, FBI Director Christopher Wray called Chinese espionage “one of the largest transfers of wealth in human history.” He went on to say: “[T]he potential economic harm to American businesses and the economy as a whole almost defies calculation …. [E]very figure I’ve seen is breathtaking.” Some of the most prolific China-linked cyber threat actors targeting the United States are Advanced Persistent Threat (APT) 41, known for the software supply chain attacks that led to Department of Justice indictments in September 2020; APT 40, which focuses its activities on nations engaged in challenging China in the South China Sea; TA 410, which targets utility companies; and APT 10, a state-sponsored group that focuses on hacking telecommunications infrastructure. (China denounces American accusations of state-sponsored hacking as untrue and unfair; Chinese officials counter that tens of thousands of attacks have been made by American actors against Chinese networks.) China is not the only strategic competitor to have allowed cyberattacks from its territory to penetrate U.S. systems; Russian actors were accused last fall of perpetrating a massive attack against U.S. government and private servers known as the SolarWinds hack. The Biden administration is now crafting a two-pronged response to these Russian and Chinese threats: bolstering U.S. defenses in private and public realms against the attacks, and raising the level of deterrence. Cyber has been designated a “top priority” in Biden’s national security regime and featured prominently in the administration’s Interim National Security Strategic Guidance. The administration is taking new steps to facilitate communication between private and public experts in the cybersecurity sector, secure agency cloud systems, and create a new cybersecurity rating system for private companies. Biden’s nominee for undersecretary of defense for policy, Colin Kahl, stated in his confirmation hearing that cybersecurity, in the face of new competition in quantum computing, would require a whole-of-government approach. Congress has also mandated the creation of a new position: national cyber director. One commentator has urged that the cyber operators in the Biden administration use their capabilities, together with those of the private sector, to hit back against foreign actors. Others support the creation of stronger international norms to promote cyber deterrence. On March 17, President Biden alluded in a televised interview to potential retaliation against Russia for the SolarWinds breach. According to recent reports , a retaliatory cyberattack against Russia is expected in the coming days. At least one commentator worries that cyber espionage and cyber sabotage could be conflated; if they are, retaliation could result in dangerous escalation. The Commerce Department and the FCC Take Action Against Chinese Telecoms On March 17, the U.S. Department of Commerce issued subpoenas to multiple Chinese information and communications technology companies to collect information on transactions involving those companies and U.S. persons or entities. The Biden administration stated that it would continue to investigate and take action against Chinese technology companies to protect the “security of American companies, American workers, and U.S. national security.” The U.S. government did not name the Chinese companies it had subpoenaed. The subpoenas follow a number of high-profile administrative actions against private Chinese entities operating in the United States: Chinese companies Huawei and ZTE Corp. faced restrictions under the Trump administration; Chinese social media platforms WeChat and TikTok were temporarily banned in September 2020; and the Chinese chipmaker Semiconductor Manufacturing International Corporation (SMIC) was sanctioned in December, preventing U.S. suppliers from transacting with the company. The subpoenas were issued pursuant to a Trump-era executive order issued in May 2019 about securing U.S. technology supply chains. Commerce Secretary Gina Raimondo said the information gathered by the subpoenas would allow the U.S. to “make a determination for possible action” on the national security risk of transactions with the Chinese companies. She reiterated the Biden administration’s whole-of-government approach to ensure “untrusted companies cannot misappropriate and misuse
As Blinken Visits Europe, China Retaliates Against U.S., EU Xinjiang Sanctions posted first on http://realempcol.tumblr.com/rss
The law students aren’t considered the quickest off the mark for getting involved in applications and internships early on in their degree, but it’s a close one! More and more law firms are offering placements and taster days during the first year of university so it is tempting to think that you need to get involved in deciding your career choice right from day one.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment