Professional Documents
Culture Documents
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
The Johns Hopkins University Press is collaborating with JSTOR to digitize, preserve and
extend access to Asian Perspective
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
Asian Perspective 39 (2015), 541-553
COMMENTARY
541
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
542 Words Mightier Than Hacks
In both China and the United States, media often use narratives of
cyberwar to warn of a foreign threat. Cyberwar has been making
the headlines during the last several years not only for events
related to armed conflicts but also for malicious cyber activities
such as theft of intellectual property rights, the operations of the
hacker group Anonymous, Internet censorship, and espionage. In
both countries these narratives have been exploited in the same
way, but the threats highlighted are different.
Generally, media produce three kinds of narratives about
cyberwar. The first kind stresses the threat of foreign actors. In
the US narrative these are Russia, China, and a few others, while
in China it has recently become the United States. The second
kind of narrative focuses on cyberweapons such as Stuxnet1 that
act as proof of the existence of new and terrible cyberthreats
endangering the regular functioning of both civil and military sys-
tems. These first two narratives are often combined with stories
concerning cyber espionage and cyber crime to create a height-
ened sense of danger, encompassing a wide array of cybersecurity
issues. The third narrative, which is probably the least popular
and is most common in the West, claims that cyberwar has not
happened yet and that it still does not represent as much of a
threat as many believe.
Narratives stressing the threat of cyberattacks by foreign
actors were first produced by the US media and were responsi-
ble for popularizing cyberwar narratives more broadly. Russian
hackers were the source, causing a disturbance in Estonia and
later supporting Russian government military operations in
Georgia. US media pointed to Russia as being the first
cyberthreat to US national security, but since then China has
increasingly been depicted as the main threat because of alleged
cyber operations conducted against US industries and military
suppliers.
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
Cuihong Cai and Diego Dati 543
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
544 Words Mightier Than Hacks
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
Cuihong Cai and Diego Dati 545
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
546 Words Mightier Than Hacks
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
Cuihong Cai and Diego Dati 547
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
548 Words Mightier Than Hacks
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
Cuihong Cai and Diego Dati 549
crime and cyber espionage with China and Russia, which are
often described as the main sources of such activities.
US government documents suggest three important character-
istics of official narratives. First, the focus is on a foreign threat,
which is often represented by China. Second, the Defense Depart-
ment's attempt to foster cooperation with the private sector may
lead to conflicts of interest. Third is the willingness not only to
defend but also to develop offensive capabilities and maintain
superiority in cyberspace, which the Department of Defense offi-
cially recognized as a domain of warfare in 2010. In Presidential
Policy Directive 20 (Office of the President 2013) disclosed in
June 2013, a section on Offensive Cyber Effects Operations
(OCEO) clearly states that "the United States Government shall
identify potential targets of national importance where OCEO can
offer a favorable balance of effectiveness and risk as compared
with other instruments of national power, establish and maintain
OCEO capabilities integrated as appropriate with other U.S.
offensive capabilities, and execute those capabilities in a manner
consistent with the provisions of this directive."
Chinese official declarations and white papers do not have
cyberwar narratives; indeed, even a definition of cyberwar is lack-
ing. Instead, informatization of the military is emphasized, which
suggests a relation between the development of cyberwarfare and
electronic warfare capabilities. In the official statements, the Chi-
nese government seems to be mostly concerned about the security
of information itself, and its ability to control it. Since 1998, the
government has been regularly publishing national defense white
papers; seven have been released so far, plus a 2013 white paper
titled "The Diversified Employment of China's Armed Forces."3
None of them mentions prioritization of cybersecurity threats or
cyberwar. Likewise, not one national congress of the Chinese
Communist Party has ever heard the term cyberwar mentioned.
The priority for many years has been to carry on the process of
modernization of the army, a process that implies building a struc-
ture combining mechanization and informatization.
But a trend toward increased focus on cybersecurity started in
2010, when the National Defense White Paper mentioned strate-
gic cyber operations. The 2013 white paper went a step further,
recognizing foreign governments' efforts to develop military
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
550 Words Mightier Than Hacks
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
Cuihong Cal and Diego Dati 551
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
552 Words Mightier Than Hacks
Notes
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms
Cui hong Cai and Diego Dati 553
References
This content downloaded from 130.104.138.249 on Sat, 17 Jun 2023 13:16:36 +00:00
All use subject to https://about.jstor.org/terms