Professional Documents
Culture Documents
Chinas Engagementin Cyberspace
Chinas Engagementin Cyberspace
net/publication/305709946
CITATIONS READS
0 1,512
1 author:
Francis C. Domingo
De La Salle University
25 PUBLICATIONS 20 CITATIONS
SEE PROFILE
All content following this page was uploaded by Francis C. Domingo on 24 November 2017.
Francis C. Domingo1,2
William C. Hannas, James Mulvenon and Anna B. Puglisi. 2013. Chinese Industrial Espionage:
Technology Acquisition and Military Modernization. New York, USA: Routledge. 302 pp.
ISBN 978-041-582-1421.
Greg Austin. 2014. Cyber Policy in China. Cambridge & Malden, MA: Polity Press. 232 pp.
ISBN: 978-0-7456-6979-3.
Jon R. Lindsay, Tai Ming Cheung and Derek S. Reveron (Eds.). 2015. China and Cybersecurity:
Espionage, Strategy, and Politics in the Digital Domain. Oxford, UK: Oxford University Press.
398 pp. ISBN: 9780190201265.
Introduction
The emergence of cyber-enabled technologies has profoundly influenced the inter-
actions between different actors in the international system. Networked computers
have allowed for transactions that are more efficient in global commerce, civil
society and government services but have also created unique challenges that affect
the national security of states. The dilemma of how to gain advantages from cyber-
space is more pronounced in the case of China, which has one of the fastest growing
Internet economies and a regional power with comprehensive military capabilities in
the cyber domain (Lindsay, 2015a, p. 1). Furthermore, the discourse on China and
cybersecurity has generally been confounded with different issues such as political
censorship, unfair competition and Internet governance that involve similar informa-
tion technologies but do not necessarily conform to the same dynamics and strategic
logic (Lindsay, 2015b, p. 7). Despite these nuances, concerns about China’s compe-
titive advantage in cyberspace as well as increasing fears about massive attacks
against digital infrastructures continue to aggravate the mistrust and confusion
between China and other powerful states in cyberspace (Brito & Watkins, 2011).
In this context, the three books reviewed in this essay offer different perspec-
tives regarding China’s engagement in cyberspace. Chinese Industrial Espionage
1
De La Salle University, Manila, Philippines.
2
University of Nottingham, United Kingdom.
Corresponding author:
Francis C. Domingo, De La Salle University, Manila, Philippines.
E-mail: francis.domingo@dlsu.edu.ph
Political
The first theme concerns China’s exploitation of cyberspace for political control.
Two debates are central to this theme. The primary debate focuses on the efforts
of the Chinese Communist Party (CCP) to censor the content of the Internet
(Lindsay, 2015b, pp. 13–15). One perspective within this debate postulates that
the CCP has been effective in controlling and censoring information accessed
through the Internet (Shambaugh, 2007). This argument is supported by other
authors who attribute the CCP’s success to its technical counterstrategies
‘including blocking of web sites, e-mail monitoring and filtering, denial, decep-
tion, disinformation, and even the hacking of dissident and Falun gong web sites’
(Chase & Mulvenon, 2002, p. xii). Another study suggests that the CCP censor-
ship and control strategy is effective because it is well targeted. The CCP allows
criticism about the state, its policies and its leaders but censors ‘comments that
represent, reinforce, or spur social mobilization, regardless of content’ (King,
Pan, & Roberts, 2013, p. 326).
In contrast, there are authors who are sceptical about the CCP’s efforts. One
interpretation is that the policies of the CCP are conflicting therefore, the measures
employed to control the Internet are not productive. The stringent suppression poli-
cies adopted by the CCP contradict equally assertive economic policies ‘designed
to facilitate the penetration and extension of new information and communication
technologies’ into all sectors of society (Deibert, 2002, pp. 154–155). A reinforcing
argument meanwhile, points to the uncontrollable number of Chinese internet
users and the ‘increasingly sophisticated means of averting police surveillance’ as
justifications for the failure of the CCP to prevent the negative effects of the Internet
(Endeshaw, 2004, p. 52).
The secondary main debate has to do with the impact of the Internet develop-
ment on the democratization of China. Proponents of technology expect the
growth of Internet users, the unrestricted flow of information and active participa-
tion of the civil society groups to contribute to democratization and threaten the
power and authority of the CCP (Kluver, 2005). Moreover, the Internet has been
instrumental in the development of civil society through the encouragement of
public debate, the emergence of virtual communities and the introduction of new
elements into the dynamics of protest (Yang, 2003, p. 453). Other authors disa-
gree, arguing that the Internet is unlikely to influence political age in China
(Kalathil & Boas, 2001, p. 42). There are several conditions that are necessary for
democratization hence, it is doubtful that technological determinism or the strong
dependence of technology by itself could initiate a democratic or mass movement
in China (Wacker, 2003, p. 73).
Espionage
The second theme considers the impact of China’s cyber espionage activities on
western states. The main debate within this theme is level of threat posed by
Chinese computer network exploitation. A prevailing perspective contends that
China’s exploitation capabilities are considerable therefore making cyberspace a
contested environment. The uncertainty about the sophistication of China’s capa-
bilities for espionage has influenced states’ insecurity in cyberspace; given that
strategic logic dictates that extensive military preparations are required in times of
uncertainty (Hjortdal, 2011, p. 4). A related but more pessimistic view suggests that
Chinese capabilities in computer network operations are sufficiently developed to
threaten US military operations in the event of a conflict (Krekel, Adams, & Bakos,
2012, p. 8). In addition, the authors also reveal that China’s intelligence collection
is not only limited to a state’s sensitive national security and policymaking infor-
mation but also includes economic and competitive data to assist business (Krekel,
Adams, & Bakos, 2012, p. 12).
In opposition, some authors assert that the threats surrounding Chinese cyber
espionage are exaggerated. Although China is stealing information from and
exploiting the weaknesses of other states through cyberspace, the vulnerabilities
caused by the Internet are also consequential for the China’s internal security and
political cohesion (Inkster, 2010, p. 56). In this sense, threat narratives regarding
China’s espionage activities tend to be inflated since it is unclear whether the
Chinese can actually benefit from their aggressive actions in cyberspace (Inkster,
2012, p. 203). More significantly, the process of acquisition, absorption and appli-
cation of data from other states is complicated and takes time, expertise and
resources to develop. Transaction costs at every phase caused by ‘information
overload, analytic misinterpretation or bureaucratic silos’ can challenge the trans-
formation of stolen data into new production knowledge that enables successful
competition in the marketplace (Lindsay, 2015b, p. 24).
Military
The third theme focuses on the ability of the People’s Liberation Army (PLA)
to conduct warfare through cyberspace. The key debate concerning this theme
is the consequences of the PLA’s offensive cyber capabilities on the US as well
as other states in the region. One view contends that the PLA’s offensive cyber
capabilities are sophisticated enough to inflict significant damage against
powerful states. In this sense, the Chinese military considers cyberwarfare to
be an inexpensive, long-range and highly effective counter measure to a supe-
rior adversary (Mulvenon, 2009, pp. 257–261). Given the PLA’s considerable
cyber capabilities, a critical component of its strategy is to control the enemy’s
information flow, targeting China’s enemies that are presumably highly
dependent on cyber-enabled technology. The ability to damage the flow of
information would enable them to secure an advantage in the physical battle-
field (Siboni, 2012, p. 51).
The favourable assessment of the PLA’s offensive cyber capabilities are
contested based on three grounds. First, PLA’s strategy of ‘integrated network
electronic warfare’ has been tested against real enemies and in a complex
warfighting environment (Lindsay, 2015b, p. 32). Second, there is no evidence
that the PLA can infiltrate highly secure networks or secretly steal or falsify
critical data. It is therefore uncertain if the Chinese military is actually capable of
systematically sabotaging selected command and control, defence and intelli-
gence networks and databases of advanced adversaries (Ball, 2011, p. 101).
Third, the advantages afforded by sophisticated cyber capabilities can be reduced
by weaknesses triggered by computer networks. China’s efforts to develop supe-
rior cyber capabilities make it increasingly vulnerable to the same weaknesses it
Institutional
The fourth theme involves the regulation and governance of the Internet. The
primary disagreement in this literature is developing a favourable arrangement for
governing the cyberspace. China’s proposed code of conduct for information
security disputes the status quo of a free and open Internet by emphasizing new
mechanisms to manage the Internet: state sovereignty and non-interference in
cyberspace (Hsu & Murray, 2014, p. 2). Due to the increasing threats caused by
the use of computer networks, states have the right ‘to protect, in accordance with
relevant laws and regulations, their information space and critical information
infrastructure from threats, disturbance, attack and sabotage’.1
Another justification for a state-centric approach to Internet governance is to
challenge US leadership of the Internet. China is working with other powerful
states such as Russia and Brazil as well as other sympathetic states, in advancing
a more centralized and top-down approach to Internet governance (Nocetti, 2015,
p. 120). There are two points to this argument. First, China and Russia consider
the stance of the US towards cyber politics as mainly hypocritical: Americans
advocate for a denationalized Internet but monitor and exploit mass surveillance
data without any control (Farell & Finnemore, 2013). Second, the Chinese and
Russians also find it problematic that the US has control over Internet infrastruc-
ture (root name servers for example) and that the American companies dictate the
management of the Internet (Nocetti, 2015, pp. 120–121).
The argument of western states against China’s proposal is that cyberspace
should be governed by ‘multi-stakeholders’ and through existing governance
frameworks and processes (Cornish, 2015, p. 161). Multi-stakeholder govern-
ance is a framework that follows on ‘a constantly shifting balance of powers
between private industry, international technical governance institutions,
governments, and civil society’ (DeNardis, 2014, pp. 226–227). The framework
can replace state governance since it is suitable for cross-border environments
such as the Internet, and is a stimulus for promoting democratic processes around
the world (DeNardis, 2014, p. 229). Another suggestion based on this argument,
is the creation of a treaty for cyberspace. A multilateral agreement on cyber-
space, that follows the principles of law of armed conflict, should be created to
define the parameters of state behaviour, institute protocols for mitigating cyber
conflicts (Hughes, 2010, p. 533–535).
the Internet. In this context, China has no choice but to continue to oppose the
ideal of an open and free Internet if it wants to preserve political stability, sover-
eignty and national cohesion.
There are three key areas where the book could improve (Domingo, 2015).
First, the discussion regarding the framework of the study (ideal policy values)
seems inadequate. This limitation makes the book less comprehensible for people
not oriented with the literature on information society and international ethics.
Second, the book does not consider the role of external factors in analyzing
China’s leadership values. Does this imply that external factors such as distribu-
tion of power and external threats do not influence China’s desire to develop an
information society? The third point relates to the book’s contribution. The study
could have been more noteworthy if linked to China’s efforts to develop informa-
tion society to its ambition towards achieving a stronger regional presence in the
Asia-Pacific (Domingo, 2015).
with cybersecurity issues. The book advances the literature in all the main themes
in the literature. Chapters 4, 9–11 contribute to the political theme since they
provide comprehensive accounts of the criminal, commercial, societal, techno-
logical, legal and political issues, and confront the CCP in their effort to maintain
control and authority over the Internet. Chapters 2 and 3 of the book develop the
existing literature on the second theme of espionage by delineating the impact of
information technology on the Chinese intelligence machinery and, more signi-
ficantly, by breaking down the effectiveness of China’s espionage operations.
Chapters in the section on military strategy and institutions make two signi-
ficant contributions to the military theme in the literature. First, since western
perspectives mainly dominate the literature, the concepts and ideas articulated
in chapters 5 and 6 are valuable for refining current knowledge on Chinese
military strategy and cybersecurity. Second, the extensive details about organi-
zations and capabilities are not typically disclosed in an academic publication;
therefore, chapter 7 provides good insights about the status of China’s cyber
capabilities. Finally, the book enhances the literature on the institutional debates
about China and cybersecurity by clarifying the issues that affect cooperation
and the development of cyber norms. In chapter 12, Cate contends that ‘petty
nationalism’ compromises rather than improves cybersecurity; therefore, states
need to be more pragmatic in their engagements with each other (Lindsay et al.,
2015, p. 323). Lindsay and Reveron note in chapter 13, that international coopera-
tion on cybersecurity is a desirable objective; however, the actual cyber activities
and interests of governments seem to contradict efforts towards achieving this
objective.
The scope of the book is comprehensive, although more analysis regarding the
impact of China on the cyber interactions between states in Asia-Pacific could
have enhanced the policy relevance of the book. Since East Asia is the most active
region for cyber conflict (Valeriano & Maness, 2015), it is crucial to understand
the strategic implications of these conflicts on China. Another area of develop-
ment that the authors could have considered is the link between the PLA’s cyber
and conventional military capabilities. Despite the fact that there has been some
work on this area, few studies have looked into the actual utility of cyber capabili-
ties as a force multiplier for the PLA (cf. Chase et al., 2015; Kamphausen & Lai,
2015; Mulvenon, 2009; Mulvenon & Yang, 1998).
Conclusion
A review of the various debates, including three recent books, reveals that China’s
cyber engagement is not as threatening as portrayed by some academics and poli-
cymakers. The contentious political debates about China’s censorship and control
of cyberspace will continue to persist as part of the CCP’s strategy for maintaining
power and authority. The CCP has struggled to address the challenges of informa-
tion age; however, it is unlikely that the Internet will be a driving force for poli-
tical change in China because it is a necessary but not sufficient condition for
democratization. The debates regarding the espionage tend to be overstated.
Whilst the prevailing discourse frames China as the significant cyber threat, it is
still unclear whether China can make use of stolen data to create concrete and
competitive hardware.
Debates about the military are also exaggerated since there is no definitive
evidence that China can deliver massive computer network attacks against an
adversary. More importantly, the advantages afforded by sophisticated cyber capa-
bilities are contradicted by vulnerabilities caused by exposure to computer network
attacks. Institutional debates suggest bleak prospects for any type of agreement on
Internet governance. Conflicting interests between democratic and authoritarian
states, regarding value of Internet freedom and appropriate measures to secure
cyberspace, make the development of agreements and norms improbable.
There are three opportunities where scholars can pursue further research on
China and cybersecurity. The first is to systematically assess the cyber power of
China. Existing studies (Clarke & Knake, 2010; Nye, 2010; Spade, 2012; Thomas,
2009) consider China as a cyber power based on an assessment of its material
capabilities, although these studies do not account for the domestic challenges and
technological vulnerabilities of China. It is therefore necessary to re-evaluate
China’s cyber power in light of new research on the topic. The second opportunity
is the study of China’s impact on the cyber strategies of other states in the Asia-
Pacific. The literature mainly focuses on the impact of China on cybersecurity but
studies on the responses of secondary states are limited (Burton, 2013; Chong,
2012). The third is to explore the prospects of ‘cyber spill over’ (Valeriano &
Maness, 2015) involving cases of territorial disputes between China and other
states in East Asia. A recent study by Gompert and Libicki (2014) argues that
conflict escalation due to cyber incidents is unlikely between China and the US.
Nonetheless, it is uncertain if this scenario can apply to the disputes involving
Taiwan, Vietnam and Japan.
Acknowledgments
The author thanks Izzanie Domingo, May Pei Lee, Stephen Westcott and the editors of the
journal for their comments and suggestions.
Note
1. U.N. General Assembly, 66th Session. (2011, 14 September). Letter dated 12 September
2011 from the Permanent Representatives of China, the Russian Federation, Tajikistan
and Uzbekistan to the United Nations addressed to the Secretary-General (A/66/359).
Official Record.
References
Austin, G. (2014). Cyber Policy in China. Cambridge & Malden, MA: Polity Press.
Ball, D. (2011). China’s cyber warfare capabilities. Security Challenges, 7(2), 81–103.
Brito, J., & Watkins, T. (2011). Loving the cyber bomb? The Dangers of threat inflation in
cybersecurity policy. Harvard National Security Journal, 3(1), 39–84.
Burton, J. (2013). Small states and cyber security: The case of New Zealand. Political
Science, 65(2), 216–238.
Chase, M.S., & Mulvenon, J.C. (2002). You’ve got dissent! Chinese dissident use of the
internet and Beijing’s counter-strategies. Santa Monica, CA: RAND Corporation.
Chase, Michael, S., Jeffrey Engstrom, Tai Ming Cheung, Kristen A. Gunness, Scott Warren
Harold, Susan Puska, & Samuel K. Berkowitz. (2015). China’s incomplete military
transformation. Santa Monica, CA: RAND Corporation.
Chong, A. (2012). Singapore’s encounter with information warfare. In Daniel Ventre (Ed.),
Cyber conflict competing national perspectives (pp. 223–250). London: ISTE, Ltd.
Clarke, R., & Knake, R. (2010). Cyberwar: The next threat to national security and what
to do about it. New York: HarperCollins Publishers.
Cornish, P. (2015). Governing cyberspace through constructive ambiguity. Survival, 57(3),
153–176.
Deibert, R.J. (2002). Dark guests and great firewalls: The internet and Chinese security
policy. Journal of Social Issues, 58(1), 143–159.
DeNardis, L. (2014). The global war for internet governance. New Haven, CT: Yale
University Press.
Domingo, F. (2014). Review of Chinese industrial espionage: Technology acquisition and
military modernization. Philippine Political Science Journal, 35(2), 281–283.
———. (2015). Review of cyber policy in China. Europe-Asia Studies, 67(10), 1717–
1718.
de Silva, E. (2015). National security and counterintelligence in the era of cyber espionage.
Hershey, PA: IGI Global.
Endeshaw, A. (2004). Internet regulation in China: The never-ending cat and mouse game.
Information and Communications Technology Law, 13(1), 41–57.
Farell, H., & Finnemore, M. (2013). The end of hypocrisy: American foreign policy in the
age of leaks. Foreign Affairs, 92(6), 22–26.
Gompert, D.C., & Libicki, M. (2014). Cyber warfare and Sino-American crisis instability.
Survival, 56(4), 7–22.
Hannas, W.C., Mulvenon, J. & Puglisi, A.B. (2013). Chinese Industrial Espionage:
Technology Acquisition and Military Modernization. New York, USA: Routledge.
Hjortdal, M. (2011). China’s use of cyber warfare: Espionage meets strategic deterrence.
Journal of Strategic Security, 4(2), 1–24.
Hughes, R. (2010). A treaty for cyberspace. International Affairs, 86(2), 523–541.
Hsu, K., & Murray, C. (2014). China and international law in cyberspace. Washington
DC: US–China Economic and Security Review Commission.
Inkster, N. (2010). China in cyberspace. Survival, 52(4), 55–66.
———. (2012). China in cyberspace. In Derek S. Reveron (Ed.), cyberspace and national
security threats, opportunities, and power in a virtual world (pp. 91–206). Washington
DC: Georgetown University Press.
Kamphausen, R., & Lai, D. (2015). The Chinese people’s liberation army in 2025. Carlisle,
PA: US Army War College.
Kluver, R. (2005). US and Chinese policy expectations of the internet. China Information,
19(2), 299–324.
King, G., Pan, J., & Roberts, M.E. (2013). How censorship in China allows government
criticism but silences collective expression. American Political Science Review, 107(2),
326–343.
Kalathil, S., & Boas, T. (2001). Open networks, closed regimes: The impact of the Internet
on authoritarian rule. Washington DC: Carnegie Endowment for International Peace.
Krekel, B., Adams, P., & Bakos, G. (2012). Occupying the information high ground Chinese
capabilities for computer network operations and cyber espionage. Washington DC:
US-China Economic and Security Review Commission.
Lindsay, J.R. (2015a). China and cybersecurity: Controversy and context. In J.R. Lindsay,
T.M. Cheung, & D.S. Reveron (Eds), China and cybersecurity: Espionage, strategy,
and politics in the digital domain (pp. 1–28). Oxford: Oxford University Press.
———. (2015b). The impact of China on cybersecurity: Fiction and friction. International
Security, 39(3), 7–47.
Lindsay, J.R., Cheung, T.M. & Reveron, D.S. (Eds). (2015). China and Cybersecurity:
Espionage, Strategy, and Politics in the Digital Domain. Oxford, UK: Oxford University
Press.
Mulvenon, J.C. (2009). PLA computer network operations: Scenarios, doctrine,
organizations, and capability. In Roy Kamphausen, David Lai & Andrew Scobell (Eds),
Beyond the strait: PLA missions other than Taiwan (pp. 253–286). Carlisle, PA: US
Army War College.
Mulvenon, J.C., & Yang, R.H. (1998). The people’s liberation army in the information age.
Santa Monica, CA: RAND Corporation.
Nocetti, J. (2015). Contest and conquest: Russia and global Internet governance.
International Affairs, 91(1), 111–130.
Nye, J.S. (2010). Cyber power. Cambridge, MA: Belfer Center for Science and International
Affairs, Harvard University.
Reardon, R., & Choucri, N. (2012). The role of cyberspace in international relations:
A view of the literature. Paper presented at the International Studies Association
Annual Convention, San Diego, CA.
Shambaugh, D. (2007). China’s propaganda system: Institutions, processes and efficacy.
The China Journal, 57(January), 25–58.
Siboni, G.Y.R. (2012). What lies behind Chinese cyber warfare. Military and Strategic
Affairs, 4(2), 49–64.
Spade, J. (2012). Information as power: China’s cyber power and America’s national
security. Carlisle, PA: Strategic Studies Institute, U.S. Army War College Press.
Thomas, T. (2009). Nation-state cyber strategies: Examples from China and Russia.
In F.D. Kramer, S.H. Starr & L.K. Wentz (Eds), Cyberpower and national security
(pp. 465–490). Washington DC: Potomac Books.
Ventre, D. (Ed). (2014). Chinese cybersecurity and defense. London: ISTE Ltd.
Valeriano, B., & Maness, R. (2015). Cyber war versus cyber realities: Conflict in the
international system. Oxford: Oxford University Press.
Wacker, G. (2003). The Internet and censorship in China. In C.R. Hughes & G. Wacker
(Eds), China and the Internet politics of the digital leap forward (pp. 58–82). London:
Routledge .
Wise, D. (2011). Tiger trap: America’s secret spy war with China. Boston: Houghton
Mifflin Harcourt.
Yang, G. (2003). The Internet and civil society in China: A preliminary assessment. Journal
of Contemporary China, 12(36), 453–475.