December 03, 2014

Warring State: China’s Cybersecurity Strategy

By Amy Chang

Research Associate Amy Chang explores the political, economic, and military objectives of China’s cybersecurity apparatus; reveals drivers and intentions of Chinese activity in cyberspace; and analyzes the development of Beijing’s cybersecurity infrastructure over the last three decades. 

This report contributes a solid foundation of understanding of China’s cybersecurity strategy, and aims to inform U.S. efforts in negotiating with China on cyber issues. As such, this report hopes to illuminate, though it is not a solution in itself. Ms. Chang notes that any solution must leverage U.S. advantages in this realm and increase China’s risk calculus sufficiently to alter China’s behavior.

Authors

  • Amy Chang

  • Reports
    • January 8, 2020
    Total Competition

    China’s coercive attempts to wield hegemonic control over the South China Sea threaten the sovereignty of Southeast Asian states and international freedom of the seas, both of...

    By Patrick M. Cronin & Ryan Neuhard

  • Commentary
    • Foreign Policy
    • December 27, 2019
    The U.S.-Chinese Trade War Just Entered Phase 2

    The Trump administration’s “phase one” trade deal with China may mark the end of the first chapter of the trade conflict between the United States and China, which saw Washing...

    By Peter Harrell

  • Reports
    • December 18, 2019
    Crossed Wires

    The United States’ current diplomacy with North Korea has enduring implications for its strategic competition with China....

    By Kristine Lee, Daniel Kliman & Joshua Fitt

  • Commentary
    • The Hill
    • December 13, 2019
    Why policymakers and universities need to collaborate for democracy

    Policymakers have singled out the higher education system as a critical area of vulnerability in American society. Christopher Wray memorably stated before the Senate Judiciar...

    By Kristine Lee & Joshua Fitt

View All Reports View All Articles & Multimedia