The “Cyber Weapons Gap.” The Assessment of the China’s Cyber Warfare Capabilities and Its Consequences for Regional Security System (original) (raw)

The U.S.-China Cyber Warfare in the 21 st Century: Implications for International Security

Research Article, 2023

The power competition between the major powers of the world has always been dependent on the strategic security landscape. Over the years, military operations and warfare have evolved with the development of new weapons, equipment, and technologies. During the 20 th century, the world witnessed a transformation from conventional strategic competition to unconventional strategic competition with the advent of nuclear weapons. The genesis of the 21 st century marked another revolution in military affairs when electronic warfare was modernized and cyber warfare came into the spotlight. In the current century, new poles of powers have emerged whereby Beijing and Washington started competing at all levels and in all domains. Shortly after the incorporation of digital, electronic, and cyber equipment and techniques by militaries around the world, cyberspace became militarized and emerged as the fifth battlefield. The U.S. armed forces and the Chinese PLA both rely heavily on cyberspace when it comes to their communication, operations, and planning. Cyber campaigns launched by Washington and Beijing on various targets accounted for a cyber arms race and continuous cyberspace strategic competition between the two countries.

THE IMPACT OF CHINA'S CYBERPOWER DEVELOPMENT ON THE INTEREST OF THE UNITED STATES

Chinese aggressiveness in the virtual world for the last 10 years is not an instantly made plan. The desire to modernize the military has been seen since 3 decades ago. Since 2006 China has released "The State Information Development Strategy" which contains the purpose of building the information of China until the year 2020 in the future. President Xi Jinping explicitly said that China should be a cyber-power country. The development of Chinese cyberpower led to the outrage of the United States following a number of Chinese behaviors in cyberspace that harmed the interests of the United States. This study aims to understand the purpose of China's cyberpower development and how it falls on the interests of the United States.

Cyberspace Implications for U.S. Domain Warfare and Sino Relations

2015

I wish to thank my family, friends, colleagues and professors at Johns Hopkins University for their support as I balanced working and attending the Global Security Studies program full-time. Without your understanding the research and work herein would not be possible. I would like to especially thank my husband Juan and best friend Damian for the countless hours you spent supporting me through this program and thesis. vi

IB 323 China’s Developing Cyber Warfare Capabilities

The Centre for Land Warfare Studies (CLAWS), New Delhi, is an independent Think Tank dealing with national security and conceptual aspects of land warfare, including conventional & sub-conventional conflict and terrorism. CLAWS conducts research that is futuristic in outlook and policy-oriented in approach.

People's War in Cyberspace: Using China's Civilian Economy in the Information Domain

Military Cyber Affairs, 2016

China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China's cyber capabilities have focused on the role of the People's Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace.[1] However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the "Information Domain." In Chinese doctrine, controlling the information environment entails the combined use of network, electromagnetic, intelligence, and propaganda assets in both the civilian and military spheres in conjunction with the other elements of national power to achieve strategic objectives. Consequently, over the past two decades, China has adopted a policy of augmenting its information warfare (IW) capabilities by leveraging the civilian sector (notably private institutions, academia, and civilian government institutions). This paper provides a broad survey of China's cyber auxiliary capabilities and assesses how China uses its civilian economy as a "strategic reserve" in all four areas of the Information Domain.

China’s Vision of the Future Network-Centric Battlefield: Cyber, Space and Electromagnetic Asymmetric Challenges to the U.S.

Comparative Strategy, 2019

This article examines the intersection of the evolving Chinese command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) military paradigm, with the cyber, space, and electronic warfare asymmetric challenges posed to the U.S. on the future network-centric battlefield. In contrast to China’s conventional weapon systems, far less ink has been spilled​ on Chinese thinking in the development of the critical support architecture, which enables and enhances China’s war-fighting capabilities. A central argument this article makes is that the technologically advanced offensive weapons fused by C4ISR systems, pose greater threats to the U.S. than the sum of their parts. The destabilizing dynamics emerging in the Asia Pacific will likely increase the incentives for both sides to strike first, and pre-emptively against the others C4ISR systems.

COMPARING AND CONTRASTING HOW THE UNITED STATES AND CHINA ADDRESS CYBERSECURITY

COMPARING AND CONTRASTING HOW THE UNITED STATES AND CHINA ADDRESS CYBERSECURITY, 2019

The research that was examined during this Capstone Project was to provide a clear understanding of how People’s Republic of China and the United States manipulates and utilizes the cyber domain to carry out cyber operations that are beneficial to their economy, government and national security. This is accomplished by examining the questions of how China or the United States established a greater strategic success in the cyber domain since the United States bombing of the Chinese embassy in Belgrade and the collision of a United States Navy airplane with a Chinese fighter jet over the South China Sea? How did APT1 disturb United States national security and how did the United States react to APT1 and long-term effects on the cyber domain? How has the United States and China handled the cyber attacks of Unit 61398, the Shanghai-based cyber unit of the PLA of China, and what were the effects? This research demonstrates that the People’s Republic of China and the United States both have established a strategy in the cyber domain. It will also discuss the adverse effects of APT1 on the United State’s national security, then, it will illustrate how China and the United States have handled China’s People’s Liberation Army Unit 61398 differently. Keywords: Cybersecurity, Cyber attacks, United States, China, People’s Republic of China (PRC), China’s People’s Liberation Army Unit 61398, Cyber espionage, Advanced persistent threats, Cyber realm, Military dominance, Jaclyn Giordano