December 03, 2014
Warring State: China’s Cybersecurity Strategy
Research Associate Amy Chang explores the political, economic, and military objectives of China’s cybersecurity apparatus; reveals drivers and intentions of Chinese activity in cyberspace; and analyzes the development of Beijing’s cybersecurity infrastructure over the last three decades.
This report contributes a solid foundation of understanding of China’s cybersecurity strategy, and aims to inform U.S. efforts in negotiating with China on cyber issues. As such, this report hopes to illuminate, though it is not a solution in itself. Ms. Chang notes that any solution must leverage U.S. advantages in this realm and increase China’s risk calculus sufficiently to alter China’s behavior.
More from CNAS
-
Defense / Indo-Pacific Security / Technology & National Security
Can China’s Military Win the Tech War?The United States and its allies should take seriously Beijing’s efforts to militarize China’s technological base....
By Anja Manuel & Kathleen Hicks
-
Defense / Technology & National Security
Transcript from Emerging Concepts in Joint Command and ControlOn Wednesday, May 20, 2020, the CNAS Technology and National Security Program hosted a virtual panel discussion on emerging concepts in joint command and control featuring Hon...
By Robert O. Work, Chris Dougherty & Paul Scharre
-
Technology & National Security
What the government should or should not do to help space industryThe COVID-19 economic slowdown will have lasting implications on the new space sector. Yet the United States cannot afford another lost decade of commercial space innovation. ...
By Mikhail Grinberg
-
Indo-Pacific Security / Technology & National Security
Time for the US to declare independence from ChinaAmericans now know they can’t rely on China or even our allies to produce the goods we need during a pandemic. That’s why it’s time for the United States government to do what...
By Anthony Vinci & Dr. Nadia Schadlow