US-China Confrontation in Cyber Security
DOI:
https://doi.org/10.31861/mhpi2022.45.113-127Keywords:
USA, China, cybersecurity, confrontationAbstract
This study presents the research results of the activities of the United States and China as the major global competitors in the field of cybersecurity. We have established the nature and trends of the confrontation, explored the goals and means of cyber influences in the confrontation between two states in this area, and identified directions for the development of the competition between the United States and China in the field of cybersecurity. Today, the United States and China are the world leaders in cyberspace and the information (cyber) security sector. The United States remains the undisputed world leader in cybersecurity, but China is rapidly closing the gap, relying on the strong potential of human and economic resources in cyberspace. From the beginning of the second decade of the XXI century. countries have been accusing each other of cyberattacks for economic purposes and cyber espionage. The United States has pointed to the People's Liberation Army's (PLA) leading role in organizing cyberattacks, and China has made similar allegations against the US intelligence. Despite attempts to reconcile policies in this area, tensions between the United States and China over cyber-building are growing. And since the beginning of the 2020s, politically motivated influences on information systems have become the target of cyberattacks. The United States notes a change in China's cyberattack strategy from regular cyber espionage to prosecuting political and security goals. Additionally, systematic control over the sources of cyber threats has been transferred from the PLA to the security structures of China. China also accuses the United States of using cyber influences to increase world hegemony and using cyber threats in the arms race. Beijing makes these statements from the standpoint of its own “multipolar” world strategy, which is threatened by the activities of the Joe Biden administration, aimed at consolidating Western countries in the face of cyber threats from China. The field of cybersecurity in US-China relations is becoming increasingly important in terms of the security strategies of these two world leaders. Each of them uses cyber tools as a tool of cyber influence, as well as a tool for strategic communication at the level of relations with strategic partners. Therefore, these issues will become increasingly important in terms of research interests, in particular the implementation of foreign policy interests in relations with these countries.
References
Atlantic Council (2013). Chinese Army unit is seen as tied to hacking against U.S. Atlantic Council, February 19, 2013, available at: https://www.atlanticcouncil.org/blogs/natosource/chinese-army-unit-is-seen-as-tied-to-hacking-against-us/ (accessed March 10, 2022).
Austin, G. (2015). No Easy Solutions in U.S.-China Cyber Security. East Asia Forum, October 6, 2015.
BBC (2014). US justice department charges Chinese with hacking. BBC, 14 May, 2014, available at: https://www.bbc.com/news/world-us-canada-27475324 (accessed March 10, 2022).
Blogs.360 (2019). The CIA Hacking Group (APT-C-39) Conducts Cyber-Espionage Operation on China's Critical Industries for 11 Years. 360 Core Security, available at: https://blogs.360.cn/post/APT-C-39_CIA_EN.html (accessed March 10, 2022).
Brown, G., Yung, C. D. (2017b). Evaluating the US-China Cybersecurity Agreement, Part 1: The US Approach to Cyberspace. The Diplomat, January 19, 2017, available at: https://thediplomat.com/2017/01/evaluating-the-us-china-cybersecurity-agreement-part-1-the-us-approach-to-cyberspace/ (accessed March 10, 2022).
Brown, G., Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 3: Over a year later, what impact has the 2015 cyber agreement had on U.S.-China relations? The Diplomat, January 21, 2017, available at: https://thediplomat.com/2017/01/evaluating-the-us-china-cybersecurity-agreement-part-3/ (accessed March 10, 2022).
Carr, J. (2015). Cyber Attacks: Why Retaliating Against China Is the Wrong Reaction. The Diplomat, August 6, 2015.
Chang, A. (2015). Warring State: China’s Cybersecurity Strategy. Washington, D.C.: Center for a New American Security, December 2015, p. 7 and 10.
China’s ‘White-Hat’ Hackers Fear Dark Times After Community Founder Is Detained. The Wall Street Journal, 1 Aug. 2016. URL: https://www.wsj.com/articles/BL-CJB-29440.
China's government is keeping its security researchers from attending conferences. Cyberscoop, Mar. 8, 2018. URL: https://www.cyberscoop.com/pwn2own-chinese-researchers-360-technologies-trend-micro/.
Chong, J. (2010). Cyber: The Invisible New Battlefront [Wangluo: Kanbujian de xin zhanxian], Seeking Truth [Qiu Shi], No. 13, 2010, p. 53–55.
Cyberscoop (2018). China's government is keeping its security researchers from attending conferences. Cyberscoop, March 8, 2018. available at: https://www.cyberscoop.com/pwn2own-chinese-researchers-360-technologies-trend-micro/ (accessed March 10, 2022).
Deibert, R. (2015). Trajectories for Future Cybersecurity Research. The Oxford Handbook of International Security. Ed. by A. Gheciu and W. C. Wohlforth. Oxford: Oxford University Perss, p. 531-556.
Diamond, L., Carson, B. (2019). Jaw-Jaw: How Chinese Sharp Power Takes Aim at American Democracy. War on the Rocks. [online], February 5, 2019, available at: https://warontherocks.com/ 2019/02/jaw-jaw-how-chinese-sharp-power-takes-aim-at-american-democracy (accessed March 10, 2022).
DNI (2021). Annual Threat Assessment of the US Intelligence Community. Office of the Director of National Intelligence, April 9, 2021, available at: https://www.dni.gov/files/ODNI/ documents/assessments/ATA-2021-Unclassified-Report.pdf (accessed March 10, 2022).
Equation Group (2017). The Analysis of Equation Drug –the Fourth Analysis Report of Equation Group, January 26, 2017, available at:https://www.antiy.net/p/the-analysis-of-equation-drug-the-fourth-analysis-report-of-equation-group/ (accessed March 10, 2022).
Finkle, J. (2012). Hundreds more cyber attacks linked to 2009 Google breach. Reuters, Sept. 12, 2012, available at: https://www.reuters.com/article/cybersecurity-espionage-idUSL2E8K7A9E 20120907 (accessed March 10, 2022).
Fireyes (2013). Cyber Threat Intelligence on Advanced Attack Groups and Technology Vulnerabilities. Threat Intelligence Reports. Fireyes, 2013.
Greenberg, A. (2017). China tests the limits of its U.S. hacking truce. Wired, October 13, 2017, available at:https://www.wired.com/story/china-tests-limits-of-us-hacking-truce/# (accessed March 10, 2022).
Guozhu, L. (2021). “拜登政府国家安全战略的基本方针与发展方向, (Bài dēng zhèngfǔ guójiā ānquán zhànlüè de jīběn fāngzhēn yǔ fāzhǎn fāngxiàng/ The main policy and direction of development of the National Security Strategy of the Biden administration)”. Dangdai Shijie, 5 (2021), pp. 50–57, available at: https://webcache.googleusercontent.com/search?q=cache:7-mexZ_mX1EJ:https://dysw.cnki.net/kcms/detail/detail.aspx%3Ffilename%3DJSDD202105008%26dbcode%3DCJFD%26dbname%3DCJFD2021%26v%3D+&cd=1&hl=uk&ct=clnk&gl=ua (accessed March 10, 2022).
Harold, S. W., Libicki, M. C., & Cevallos, A. S. (2016). The “Cyber Problem” in U.S.-China Relations. In Getting to Yes with China in Cyberspace (pp. 1–16). RAND Corporation, available at: http://www.jstor.org/stable/10.7249/j.ctt1cx3vfr.6 (accessed March 10, 2022).
IISS (2021). Cyber Capabilities and National Power: A Net Assessment. IISS. Research Papers, June 28, 2021, available at: https://www.washingtonpost.com/politics/2021/06/28/ cybersecurity-202-united-states-is-still-number-one-cyber-capabilities/ (accessed March 10, 2022).
Julian N. (2021). United States’ and China’s Cybersecurity Policies: Collaboration or Confrontation? Journal of International Relations, January 24, 2021, available at: http://www.sirjournal.org/research/2021/1/24/united-states-and-chinas-cybersecurity-policies-collabo ration-or-confrontation (accessed March 10, 2022).
Kharpal, A. (2022). China state-backed hackers compromised networks of at least 6 U.S. state governments, research finds. CNBC, March 9, 2022, available at: https://www.cnbc.com/ 2022/03/09/china-state-backed-hackers-compromised-6-us-state-governments-report.html (accessed March 10, 2022).
Lieberthal, K. (2012) Cybersecurity and U.S. – China Relations. Jonh L. Torton China Institute in Brookings. 52 p., available at: https://www.brookings.edu/wp-content/uploads/ 2016/06/0223_cybersecurity_china_us_lieberthal_singer_pdf_english.pdf (accessed March 10, 2022).
Lindsay, J. R. (2015). The impact of China on cybersecurity: Fiction and friction. International Security, Vol. 39. №. 3, p. 7-47.
Linfei, Zh. (2015). Commentary: U.S. Should Think Twice Before Retaliating Against China over Unfounded Hacking Charges. Xinhua. August 3, 2015.
Mandiant Consulting Services (2013). APT1: Exposing One of China’s Cyber Espionage Units, 2013, available at: https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf (accessed March 10, 2022).
MFA of the PRC (2021a). Spokesperson of the Chinese Mission to the EU Speaks on a Question Concerning the Statements from the EU and NATO on the So-called Chinese Malicious Cyber Activities, July 20, 2021, available at: https://static.poder360.com.br/2021/07/nota-china-ataques-hackers.pdf (accessed March 10, 2022).
MFA of the PRC (2021b). Foreign Ministry Spokesperson Zhao Lijian's Regular Press Conference on July 29, 2021, July 29, 2021, available at: https://www.mfa.gov.cn/ ce/cohk//eng/Topics/fyrbt/t1896083.htm
Morgan, S. (2021). 2021 Report: Cyberwarfare in the C-suite, Cybersecurity Ventures, available at:https://1c7fab3im83f5gqiow2qqs2k-wpengine.netdna-ssl.com/wp-content/uploads/2021/ 01/Cyberwarfare-2021-Report.pdf (accessed March 10, 2022).
National Cyber Security News. Today (2021). US turns cyberspace into another anti-China battlefield, ‘futile to contain Beijing’. National Cyber Security News. Today, July 28, 2021, available at: https://nationalcybersecuritynews.today/us-turns-cyberspace-into-another-anti-china-battlefield-futile-to-contain-beijing-cybersecurity-cyberattack/ (accessed March 10, 2022).
Neumann, S. (2021). Intelligence Chiefs Say China, Russia Are Biggest Threats To U.S. NPR, April 14, 2021, available at: https://www.npr.org/2021/04/14/987132385/intelligence-chiefs-say-china-russia-are-biggest-threats-to-u-s (accessed March 10, 2022).
Parker, C. B. (2018). China Exerting „Sharp Power‟ Influence On American Institutions. HOOVER, Dec. 19, 2018 available at: https://www.hoover.org/news/china-exerting-sharp-power-influence-american-institutions (accessed March 10, 2022).
Perlroth, N. (2021). How China Transformed Into a Prime Cyber Threat to the U.S. The New York Times, July 19, 2021, available at: https://www.nytimes.com/2021/07/19/technology/china-hacking-us.html (accessed March 10, 2022).
Qingqing, Ch., Keyue, Xu and Yelu, Xu (2021). US Turning G7 Into Anti-China, Anti-Russia Chorus ‘Wishful Thinking. Global Times, June 6, 2021, available at: https://www.globaltimes.cn/page/202106/1225524.shtml (accessed March 10, 2022).
Qingqing, Ch., Siqi C. (2021). US turns cyberspace into another anti-China battlefield, ‘futile to contain Beijing’. Global Times, July 20, 2021, available at: https://www.globaltimes.cn/ page/202107/1229168.shtml (accessed March 10, 2022).
Reuters (2021). U.S. charges four Chinese nationals charged in global hacking campaign. Reuters, July 19, 2021, available at: https://www.reuters.com/technology/four-chinese-nationals-charged-global-hacking-campaign-us-justice-department-2021-07-19/ (accessed March 10, 2022).
Satter, R. (2020). Chinese cybersecurity company accuses CIA of 11-year-long hacking campaign. Reuters, March 3, 2020, available at: https://www.reuters.com/article/us-china-usa-cia-idUSKBN20Q2SI (accessed March 10, 2022).
Schaffer, A. (2021). The Cybersecurity 202: The United States is still number one in cyber capabilities. The Washington Post, June 28, 2021., available at: https://www.washingtonpost.com/ politics/2021/06/28/cybersecurity-202-united-states-is-still-number-one-cyber-capabilities/ (accessed March 10, 2022).
Soo, Z. (2019). How Huawei beat America’s anti-China 5G propaganda war in Southeast Asia, years before it even began. South China Morning Post, April 22, 2019, available at: https://www.scmp.com/tech/article/3006935/how-huawei-beat-americas-anti-china-5g-propaganda-war-southeast-asia-years-it (accessed March 10, 2022).
Swaine, M, D. (2013). Chinese Views of Cybersecurity in Foreign Relations. China Leadership Monitor, No. 42, fall 2013.
The Wall Street Journal (2016). China’s ‘White-Hat’ Hackers Fear Dark Times After Community Founder Is Detained. The Wall Street Journal, August 1, 2016, available at: https://www.wsj.com/articles/BL-CJB-29440 (accessed March 10, 2022).
The New York Times (2015). Obama and Xi Jinping of China Agree to Steps on Cybertheft. The New York Times, September 25, 2015, available at: https://www.nytimes.com/2015/09/26/ world/asia/xi-jinping-white-house.html (accessed March 10, 2022).
The White House (2021). Renewing America’s Advantages: Interim National Security Strategic Guidance, March 2021, 20, available at: https://www.whitehouse.gov/wp-content/uploads/2021/03/NSC-1v2.pdf (accessed March 10, 2022).
US Department of State (2021). Secretary Antony J. Blinken, National Security Advisor Jake Sullivan, Director Yang and State Councilor Wang at the Top of Their Meeting. Anchorage, March 18, 2021, available at: https://www.state.gov/secretary-antony-j-blinken-national-security-advisor-jake-sullivan-chinese-director-of-the-office-of-the-central-commission-for-foreign-affairs-yang-jiechi-and-chinese-state-councilor-wang-yi-at-th/ (accessed March 10, 2022).
US Senate Committee on Foreign Relations (2021). Strategic Competition Act of 2021, April 2021.
Wenli, Yi, (2012). Divergence Between China and the U.S. and the Path Toward Cooperation in Cyberspace [“Zhong-Mei zai Wangluo Kongjian de Fenqi yu Hezuo Lujing”]. Contemporary International Relations [Xiandai Guoji Guanxi], Vol. 22, No. 4, July/August 2012, p. 124–141.
Wolfe, D. (2021). How China Became a Digital Adversary and Threat to the U.S. GSIExchange. July 21, 2021, available at: https://gsiexchange.com/how-china-became-a-digital-adversary-and-threat-to-the-u-s/ (accessed March 10, 2022).
Wong, E., Swanson, A. (2022). U.S. Aims to Constrain China by Shaping Its Environment, Blinken Says. The New York Times, May 26, 2022, available at: https://www.nytimes.com/ 2022/05/26/us/politics/china-policy-biden.html (accessed My 30, 2022).
Xinming, M. (2015). What Kind of Internet Order Do We Need? Chinese Journal of International Law, Vol. 14. No. 2, 2015, p. 399–403.
Zetter, K. (2013). New York Times Hacked Again, This Time Allegedly by Chinese. Wired, January 31, 2013, available at: https://www.wired.com/2013/01/new-york-times-hacked/ (accessed March 10, 2022).
@SecBlinken [Secretary Antony Blinken] (2021). United States government official, July 19, 2021, available at: https://twitter.com/secblinken/status/1417103602133479429 (accessed March 10, 2022).
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.