Протистояння між США й Китаєм у сфері кібербезпеки

Автор(и)

  • Сергій Федонюк Волинський національний університет імені Лесі Українки
  • Сергій Магдисюк Волинський національний університет імені Лесі Українки

DOI:

https://doi.org/10.31861/mhpi2022.45.113-127

Ключові слова:

США, Китай, кібербезпека, протистояння

Анотація

Досліджено глобальну конкуренцію США і Китаю в сфері кібербезпеки. Встановлено характер і тенденції протистояння між країнами в сфері кібербезпеки, досліджено цілі, засоби кібернетичних впливів у протистоянні США й Китаю в цій сфері, встановлено напрями їх розвитку. Проаналізовано характер і напрями розвитку негативних кібернетичних впливів з точки зору кожної зі сторін. Розглянуто основні приклади кібернетичних впливів і позиції США й Китаю щодо взаємних кібернетичних загроз. Установлено стратегічні цілі кібер-впливів у різні періоди та їх зв’язок із стратегічними пріоритетами країн в аспекті їх міжнародної діяльності, зокрема з позиції китайської стратегії «багатополярного» світу й діяльності адміністрації президента США, спрямованої на консолідацію країн Заходу перед кіберзагрозами з боку Китаю. Визначено особливості актуальних тенденцій у протистоянні між США й Китаєм у сфері кібербезпеки з урахуванням стратегічних цілей обох держав.

Біографії авторів

Сергій Федонюк, Волинський національний університет імені Лесі Українки

Кандидат географічних наук, доцент кафедри міжнародних комунікацій та політичного аналізу

Сергій Магдисюк, Волинський національний університет імені Лесі Українки

Магістр

Посилання

Atlantic Council (2013). Chinese Army unit is seen as tied to hacking against U.S. Atlantic Council, February 19, 2013, available at: https://www.atlanticcouncil.org/blogs/natosource/chinese-army-unit-is-seen-as-tied-to-hacking-against-us/ (accessed March 10, 2022).

Austin, G. (2015). No Easy Solutions in U.S.-China Cyber Security. East Asia Forum, October 6, 2015.

BBC (2014). US justice department charges Chinese with hacking. BBC, 14 May, 2014, available at: https://www.bbc.com/news/world-us-canada-27475324 (accessed March 10, 2022).

Blogs.360 (2019). The CIA Hacking Group (APT-C-39) Conducts Cyber-Espionage Operation on China's Critical Industries for 11 Years. 360 Core Security, available at: https://blogs.360.cn/post/APT-C-39_CIA_EN.html (accessed March 10, 2022).

Brown, G., Yung, C. D. (2017b). Evaluating the US-China Cybersecurity Agreement, Part 1: The US Approach to Cyberspace. The Diplomat, January 19, 2017, available at: https://thediplomat.com/2017/01/evaluating-the-us-china-cybersecurity-agreement-part-1-the-us-approach-to-cyberspace/ (accessed March 10, 2022).

Brown, G., Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 3: Over a year later, what impact has the 2015 cyber agreement had on U.S.-China relations? The Diplomat, January 21, 2017, available at: https://thediplomat.com/2017/01/evaluating-the-us-china-cybersecurity-agreement-part-3/ (accessed March 10, 2022).

Carr, J. (2015). Cyber Attacks: Why Retaliating Against China Is the Wrong Reaction. The Diplomat, August 6, 2015.

Chang, A. (2015). Warring State: China’s Cybersecurity Strategy. Washington, D.C.: Center for a New American Security, December 2015, p. 7 and 10.

China’s ‘White-Hat’ Hackers Fear Dark Times After Community Founder Is Detained. The Wall Street Journal, 1 Aug. 2016. URL: https://www.wsj.com/articles/BL-CJB-29440.

China's government is keeping its security researchers from attending conferences. Cyberscoop, Mar. 8, 2018. URL: https://www.cyberscoop.com/pwn2own-chinese-researchers-360-technologies-trend-micro/.

Chong, J. (2010). Cyber: The Invisible New Battlefront [Wangluo: Kanbujian de xin zhanxian], Seeking Truth [Qiu Shi], No. 13, 2010, p. 53–55.

Cyberscoop (2018). China's government is keeping its security researchers from attending conferences. Cyberscoop, March 8, 2018. available at: https://www.cyberscoop.com/pwn2own-chinese-researchers-360-technologies-trend-micro/ (accessed March 10, 2022).

Deibert, R. (2015). Trajectories for Future Cybersecurity Research. The Oxford Handbook of International Security. Ed. by A. Gheciu and W. C. Wohlforth. Oxford: Oxford University Perss, p. 531-556.

Diamond, L., Carson, B. (2019). Jaw-Jaw: How Chinese Sharp Power Takes Aim at American Democracy. War on the Rocks. [online], February 5, 2019, available at: https://warontherocks.com/ 2019/02/jaw-jaw-how-chinese-sharp-power-takes-aim-at-american-democracy (accessed March 10, 2022).

DNI (2021). Annual Threat Assessment of the US Intelligence Community. Office of the Director of National Intelligence, April 9, 2021, available at: https://www.dni.gov/files/ODNI/ documents/assessments/ATA-2021-Unclassified-Report.pdf (accessed March 10, 2022).

Equation Group (2017). The Analysis of Equation Drug –the Fourth Analysis Report of Equation Group, January 26, 2017, available at:https://www.antiy.net/p/the-analysis-of-equation-drug-the-fourth-analysis-report-of-equation-group/ (accessed March 10, 2022).

Finkle, J. (2012). Hundreds more cyber attacks linked to 2009 Google breach. Reuters, Sept. 12, 2012, available at: https://www.reuters.com/article/cybersecurity-espionage-idUSL2E8K7A9E 20120907 (accessed March 10, 2022).

Fireyes (2013). Cyber Threat Intelligence on Advanced Attack Groups and Technology Vulnerabilities. Threat Intelligence Reports. Fireyes, 2013.

Greenberg, A. (2017). China tests the limits of its U.S. hacking truce. Wired, October 13, 2017, available at:https://www.wired.com/story/china-tests-limits-of-us-hacking-truce/# (accessed March 10, 2022).

Guozhu, L. (2021). “拜登政府国家安全战略的基本方针与发展方向, (Bài dēng zhèngfǔ guójiā ānquán zhànlüè de jīběn fāngzhēn yǔ fāzhǎn fāngxiàng/ The main policy and direction of development of the National Security Strategy of the Biden administration)”. Dangdai Shijie, 5 (2021), pp. 50–57, available at: https://webcache.googleusercontent.com/search?q=cache:7-mexZ_mX1EJ:https://dysw.cnki.net/kcms/detail/detail.aspx%3Ffilename%3DJSDD202105008%26dbcode%3DCJFD%26dbname%3DCJFD2021%26v%3D+&cd=1&hl=uk&ct=clnk&gl=ua (accessed March 10, 2022).

Harold, S. W., Libicki, M. C., & Cevallos, A. S. (2016). The “Cyber Problem” in U.S.-China Relations. In Getting to Yes with China in Cyberspace (pp. 1–16). RAND Corporation, available at: http://www.jstor.org/stable/10.7249/j.ctt1cx3vfr.6 (accessed March 10, 2022).

IISS (2021). Cyber Capabilities and National Power: A Net Assessment. IISS. Research Papers, June 28, 2021, available at: https://www.washingtonpost.com/politics/2021/06/28/ cybersecurity-202-united-states-is-still-number-one-cyber-capabilities/ (accessed March 10, 2022).

Julian N. (2021). United States’ and China’s Cybersecurity Policies: Collaboration or Confrontation? Journal of International Relations, January 24, 2021, available at: http://www.sirjournal.org/research/2021/1/24/united-states-and-chinas-cybersecurity-policies-collabo ration-or-confrontation (accessed March 10, 2022).

Kharpal, A. (2022). China state-backed hackers compromised networks of at least 6 U.S. state governments, research finds. CNBC, March 9, 2022, available at: https://www.cnbc.com/ 2022/03/09/china-state-backed-hackers-compromised-6-us-state-governments-report.html (accessed March 10, 2022).

Lieberthal, K. (2012) Cybersecurity and U.S. – China Relations. Jonh L. Torton China Institute in Brookings. 52 p., available at: https://www.brookings.edu/wp-content/uploads/ 2016/06/0223_cybersecurity_china_us_lieberthal_singer_pdf_english.pdf (accessed March 10, 2022).

Lindsay, J. R. (2015). The impact of China on cybersecurity: Fiction and friction. International Security, Vol. 39. №. 3, p. 7-47.

Linfei, Zh. (2015). Commentary: U.S. Should Think Twice Before Retaliating Against China over Unfounded Hacking Charges. Xinhua. August 3, 2015.

Mandiant Consulting Services (2013). APT1: Exposing One of China’s Cyber Espionage Units, 2013, available at: https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf (accessed March 10, 2022).

MFA of the PRC (2021a). Spokesperson of the Chinese Mission to the EU Speaks on a Question Concerning the Statements from the EU and NATO on the So-called Chinese Malicious Cyber Activities, July 20, 2021, available at: https://static.poder360.com.br/2021/07/nota-china-ataques-hackers.pdf (accessed March 10, 2022).

MFA of the PRC (2021b). Foreign Ministry Spokesperson Zhao Lijian's Regular Press Conference on July 29, 2021, July 29, 2021, available at: https://www.mfa.gov.cn/ ce/cohk//eng/Topics/fyrbt/t1896083.htm

Morgan, S. (2021). 2021 Report: Cyberwarfare in the C-suite, Cybersecurity Ventures, available at:https://1c7fab3im83f5gqiow2qqs2k-wpengine.netdna-ssl.com/wp-content/uploads/2021/ 01/Cyberwarfare-2021-Report.pdf (accessed March 10, 2022).

National Cyber Security News. Today (2021). US turns cyberspace into another anti-China battlefield, ‘futile to contain Beijing’. National Cyber Security News. Today, July 28, 2021, available at: https://nationalcybersecuritynews.today/us-turns-cyberspace-into-another-anti-china-battlefield-futile-to-contain-beijing-cybersecurity-cyberattack/ (accessed March 10, 2022).

Neumann, S. (2021). Intelligence Chiefs Say China, Russia Are Biggest Threats To U.S. NPR, April 14, 2021, available at: https://www.npr.org/2021/04/14/987132385/intelligence-chiefs-say-china-russia-are-biggest-threats-to-u-s (accessed March 10, 2022).

Parker, C. B. (2018). China Exerting „Sharp Power‟ Influence On American Institutions. HOOVER, Dec. 19, 2018 available at: https://www.hoover.org/news/china-exerting-sharp-power-influence-american-institutions (accessed March 10, 2022).

Perlroth, N. (2021). How China Transformed Into a Prime Cyber Threat to the U.S. The New York Times, July 19, 2021, available at: https://www.nytimes.com/2021/07/19/technology/china-hacking-us.html (accessed March 10, 2022).

Qingqing, Ch., Keyue, Xu and Yelu, Xu (2021). US Turning G7 Into Anti-China, Anti-Russia Chorus ‘Wishful Thinking. Global Times, June 6, 2021, available at: https://www.globaltimes.cn/page/202106/1225524.shtml (accessed March 10, 2022).

Qingqing, Ch., Siqi C. (2021). US turns cyberspace into another anti-China battlefield, ‘futile to contain Beijing’. Global Times, July 20, 2021, available at: https://www.globaltimes.cn/ page/202107/1229168.shtml (accessed March 10, 2022).

Reuters (2021). U.S. charges four Chinese nationals charged in global hacking campaign. Reuters, July 19, 2021, available at: https://www.reuters.com/technology/four-chinese-nationals-charged-global-hacking-campaign-us-justice-department-2021-07-19/ (accessed March 10, 2022).

Satter, R. (2020). Chinese cybersecurity company accuses CIA of 11-year-long hacking campaign. Reuters, March 3, 2020, available at: https://www.reuters.com/article/us-china-usa-cia-idUSKBN20Q2SI (accessed March 10, 2022).

Schaffer, A. (2021). The Cybersecurity 202: The United States is still number one in cyber capabilities. The Washington Post, June 28, 2021., available at: https://www.washingtonpost.com/ politics/2021/06/28/cybersecurity-202-united-states-is-still-number-one-cyber-capabilities/ (accessed March 10, 2022).

Soo, Z. (2019). How Huawei beat America’s anti-China 5G propaganda war in Southeast Asia, years before it even began. South China Morning Post, April 22, 2019, available at: https://www.scmp.com/tech/article/3006935/how-huawei-beat-americas-anti-china-5g-propaganda-war-southeast-asia-years-it (accessed March 10, 2022).

Swaine, M, D. (2013). Chinese Views of Cybersecurity in Foreign Relations. China Leadership Monitor, No. 42, fall 2013.

The Wall Street Journal (2016). China’s ‘White-Hat’ Hackers Fear Dark Times After Community Founder Is Detained. The Wall Street Journal, August 1, 2016, available at: https://www.wsj.com/articles/BL-CJB-29440 (accessed March 10, 2022).

The New York Times (2015). Obama and Xi Jinping of China Agree to Steps on Cybertheft. The New York Times, September 25, 2015, available at: https://www.nytimes.com/2015/09/26/ world/asia/xi-jinping-white-house.html (accessed March 10, 2022).

The White House (2021). Renewing America’s Advantages: Interim National Security Strategic Guidance, March 2021, 20, available at: https://www.whitehouse.gov/wp-content/uploads/2021/03/NSC-1v2.pdf (accessed March 10, 2022).

US Department of State (2021). Secretary Antony J. Blinken, National Security Advisor Jake Sullivan, Director Yang and State Councilor Wang at the Top of Their Meeting. Anchorage, March 18, 2021, available at: https://www.state.gov/secretary-antony-j-blinken-national-security-advisor-jake-sullivan-chinese-director-of-the-office-of-the-central-commission-for-foreign-affairs-yang-jiechi-and-chinese-state-councilor-wang-yi-at-th/ (accessed March 10, 2022).

US Senate Committee on Foreign Relations (2021). Strategic Competition Act of 2021, April 2021.

Wenli, Yi, (2012). Divergence Between China and the U.S. and the Path Toward Cooperation in Cyberspace [“Zhong-Mei zai Wangluo Kongjian de Fenqi yu Hezuo Lujing”]. Contemporary International Relations [Xiandai Guoji Guanxi], Vol. 22, No. 4, July/August 2012, p. 124–141.

Wolfe, D. (2021). How China Became a Digital Adversary and Threat to the U.S. GSIExchange. July 21, 2021, available at: https://gsiexchange.com/how-china-became-a-digital-adversary-and-threat-to-the-u-s/ (accessed March 10, 2022).

Wong, E., Swanson, A. (2022). U.S. Aims to Constrain China by Shaping Its Environment, Blinken Says. The New York Times, May 26, 2022, available at: https://www.nytimes.com/ 2022/05/26/us/politics/china-policy-biden.html (accessed My 30, 2022).

Xinming, M. (2015). What Kind of Internet Order Do We Need? Chinese Journal of International Law, Vol. 14. No. 2, 2015, p. 399–403.

Zetter, K. (2013). New York Times Hacked Again, This Time Allegedly by Chinese. Wired, January 31, 2013, available at: https://www.wired.com/2013/01/new-york-times-hacked/ (accessed March 10, 2022).

@SecBlinken [Secretary Antony Blinken] (2021). United States government official, July 19, 2021, available at: https://twitter.com/secblinken/status/1417103602133479429 (accessed March 10, 2022).

##submission.downloads##

Опубліковано

2022-06-27

Як цитувати

Федонюк, С., & Магдисюк, С. (2022). Протистояння між США й Китаєм у сфері кібербезпеки. Історико-політичні проблеми сучасного світу, (45), 113–127. https://doi.org/10.31861/mhpi2022.45.113-127