Research Associate Amy Chang explores the political, economic, and military objectives of China’s cybersecurity apparatus; reveals drivers and intentions of Chinese activity in cyberspace; and analyzes the development of Beijing’s cybersecurity infrastructure over the last three decades.
This report contributes a solid foundation of understanding of China’s cybersecurity strategy, and aims to inform U.S. efforts in negotiating with China on cyber issues. As such, this report hopes to illuminate, though it is not a solution in itself. Ms. Chang notes that any solution must leverage U.S. advantages in this realm and increase China’s risk calculus sufficiently to alter China’s behavior.
More from CNAS
China’s coercive attempts to wield hegemonic control over the South China Sea threaten the sovereignty of Southeast Asian states and international freedom of the seas, both of...
By Patrick M. Cronin & Ryan Neuhard
CommentaryThe U.S.-Chinese Trade War Just Entered Phase 2
The Trump administration’s “phase one” trade deal with China may mark the end of the first chapter of the trade conflict between the United States and China, which saw Washing...
By Peter Harrell
The United States’ current diplomacy with North Korea has enduring implications for its strategic competition with China....
By Kristine Lee, Daniel Kliman & Joshua Fitt
CommentaryWhy policymakers and universities need to collaborate for democracy
Policymakers have singled out the higher education system as a critical area of vulnerability in American society. Christopher Wray memorably stated before the Senate Judiciar...
By Kristine Lee & Joshua Fitt