April 09, 2018
Careful what you wish for—change and continuity in China’s cyber threat activities (part 2)
At a time when ‘cyber anarchy’ seems to prevail in the international system, the emergence in 2015 of US–China consensus against ‘cyber-enabled theft of intellectual property’ initially appeared to promise progress towards order. The nascent norm against commercial cyber espionage that emerged between Xi Jinping and Barack Obama was later reaffirmed by the G‑20. China subsequently recommitted to this proscription in a number of bilateral agreements, including reaching a parallel commitment with Australia in April 2017.
While frail, such a norm might be celebrated as a triumph for cyber diplomacy, yet its inherent ambiguities have also created a grey zone that makes non-compliance difficult to demonstrate. At the same time, Beijing’s pursuit of economic security means that priority targets will likely continue to face persistent intrusions from more capable threat actors.
In fact, based on the technicalities of its terms, there’s fairly limited evidence of Chinese cyber intrusions since 2015 that obviously or blatantly contravene the Xi–Obama agreement.
Arguably, US diplomacy has contributed to reshaping China’s cyber-espionage operations. However, despite the decline in activities, the results haven’t been entirely as intended. The pattern of activities undertaken by Chinese advanced persistent threat (APT) groups since the agreement reflects China’s exploitation of the leeway in its phrasing. For example, the condition that neither the US nor China will ‘knowingly’ support IP theft may have encouraged higher levels of plausible deniability in Chinese cyber espionage operations since.
Read the full article at ASPI
More from CNAS
-
Energy, Economics & Security / Technology & National Security
Beyond Bans: Expanding the Policy Options for Tech-Security ThreatsStuck between a rock (the fact that banning all Chinese tech that poses a risk is expensive and impractical) and a hard place (the fact that many existing mitigation proposals...
By Geoffrey Gertz
-
Indo-Pacific Security / Technology & National Security
Cyber Crossroads in the Indo-PacificThe Indo-Pacific faces a cyber crossroads. Down one path lies deeper military, intelligence, and economic ties between Washington and its key allies and partners in this strat...
By Vivek Chilukuri, Lisa Curtis, Janet Egan, Morgan Peirce, Elizabeth Whatcott & Nathaniel Schochet
-
Technology & National Security
Securing America’s AI Future: Federal Research and Development PrioritiesOn April 29, 2025, the White House Office of Science and Technology Policy (OSTP) issued a Request for Information on the Development of a 2025 National Artificial Intelligenc...
By Caleb Withers & Spencer Michaels
-
Middle East Security / Technology & National Security
‘We Want Peace’: How Attacks Between Israel and Iran Could Impact People in NCRetired Lt. Gen. Jack Shanahan is an adjunct senior fellow at the Center for New American Security. Shanahan provided some context on how the two Middle East countries got her...
By Lt. Gen. Jack Shanahan